|
You are here |
0x434b.dev | ||
| | | | |
mazzo.li
|
|
| | | | | Pipes are ubiquitous in Unix --- but how fast can they go on Linux? In this post we'll iteratively improve a simple pipe-writing benchmark from 3.5GiB/s to 65GiB/s, guided by Linux `perf`. | |
| | | | |
blog.lexfo.fr
|
|
| | | | | The first article covers an in-depth CVE/bug analysis, designs an attack scenario and starts implementing a PoC in ring-0 with SystemTap. The core concept section focuses on file/socket related data structures, netlink and refcounters. | |
| | | | |
manybutfinite.com
|
|
| | | | | After examining the virtual address layout of a process, we turn to the kernel and its mechanisms for managing user memory. Here is gonzo again: Linux processes are implemented in the kernel as insta | |
| | | | |
raelize.com
|
|
| | | Raelize provides top-notch embedded device security serrvices like consultancy, testing, research and training. | ||