Factbites
 Where results make sense
About us   |   Why use us?   |   Reviews   |   PR   |   Contact us  

Topic: Kernel function


Related Topics

In the News (Tue 16 Jul 19)

  
  Month of Kernel Bugs (MoKB) archive
This particular vulnerability is caused by an integer overflow at ffs_mountfs() function.
The UFS filesystem handling code of the Solaris 10 kernel fails to properly handle corrupted data structures, leading to an exploitable denial of service issue and potential loss of data or corruption of the local UFS filesystems, due to memory corruption.
This particular vulnerability is caused by a null pointer dereference in the superblock_doinit function.
projects.info-pull.com /mokb   (1589 words)

  
  System Calls
When a process requests a service from the kernel (such as opening a file, forking to a new process, or requesting more memory), this is the mechanism used.
Then it calls the function, and after it returns, does a few system checks and then return back to the process (or to a different process, if the process time ran out).
Next, B is inserted into the kernel, which replaces the system call with B_open, which will call what it thinks is the original system call, A_open, when it's done.
www.faqs.org /docs/kernel/x931.html   (1180 words)

  
 Stata help for kdensity
Kernel plot cline_options affect rendition of the plotted kernel density estimate
kernel(kernel) specifies the kernel function for use in calculating the kernel density estimate.
The default kernel is the Epanechnikov kernel (epanechnikov).
www.stata.com /help.cgi?kdensity   (561 words)

  
 Making System Calls From Kernel Space | Linux Magazine
The Linux kernel implementation is able to break the distinction between kernel space and user space by allowing kernel code to invoke system calls as well.
The function's role is copying data from a source to buffers held in the application.
The kernel implementation of the system call is not optimized for speed, and is only there for the convenience of a few kernel needs.
www.linux-mag.com /id/651   (2724 words)

  
 Kernel Density Estimators
In comparison to parametric estimators where the estimator has a fixed functional form (structure) and the parameters of this function are the only information we need to store, Non-parametric estimators have no fixed structure and depend upon all the data points to reach an estimate.
The extent of this contribution is dependent upon the shape of the kernel function adopted and the width (bandwidth) accorded to it.
to ensure that the estimates f(x) integrates to 1 and where the kernel function K is usually chosen to be a smooth unimodal function with a peak at 0.
homepages.inf.ed.ac.uk /rbf/CVonline/LOCAL_COPIES/AV0405/MISHRA/kde.html   (654 words)

  
 KernelFunctionInstrumentation - CE Linux Public
Kernel Function Instrumentation (KFI) is a kernel function tracing system, which uses the "-finstrument-functions" capability of the gcc compiler to add instrumentation callouts to every function entry and exit.
KFI is excellent at providing a good timing overview of kernel procedures, allowing you to see where time is spent in functions and sub-routines in the kernel.
Tools are supplied to convert numeric trace data to kernel symbols, and to process and analyze the data in a KFI trace.
tree.celinuxforum.org /CelfPubWiki/KernelFunctionInstrumentation   (1055 words)

  
 docs.sun.com: Solaris Dynamic Tracing Guide   (Site not responding. Last check: )
The boundary of a function is crossed by entering the function and by returning from the function.
FBT thus provides two functions for every function in the kernel: one upon entry to the function, and one upon return from the function.
You are usually interested in either the value that a function returned or the fact that the function returned at all rather than the specific return path taken.
docs.sun.com /app/docs/doc/817-6223/6mlkidljt?a=view   (1803 words)

  
 System Calls
When a process requests a service from the kernel (such as opening a file, forking to a new process, or requesting more memory), this is the mechanism used.
Then it calls the function, and after it returns, does a few system checks and then return back to the process (or to a different process, if the process time ran out).
Next, B is inserted into the kernel, which replaces the system call with B_open, which will call what it thinks is the original system call, A_open, when it's done.
wearcam.org /ece385/kernelmodule/node20.html   (1177 words)

  
 TFE
This function will execute some code and, eventually, will have to make a system call that will be intercepted by the scheduler (remember that the tasks have to explicitly call the scheduler for full portability implies a cooperative design).
The scheduler will call a kernel internal function to implement the system call and then it will determine which active task has the highest priority (and so has to be (re)started).
The macros have to be used in tasks and the C functions have to be used in interrupt routines and in normal C functions (like main(), for example).
www.montefiore.ulg.ac.be /~smeets/kernel.html   (1298 words)

  
 Kernel Function Trace - Embeddedlinux
Kernel Function Trace (KFT) is a kernel function tracing system, which uses the "-finstrument-functions" capability of the gcc compiler to add instrumentation callouts to every function entry and exit.
Tools are supplied to convert numeric trace data to kernel symbols, and to process and analyze the data in a KFT trace.
When using KFT to find long-duration functions in the kernel, we usually are not interested in routines that execute quickly, and instead use something like "filter mintime 500" to filter out routines taking less than 500 microseconds.
elinux.org /Kernel_Function_Trace   (1234 words)

  
 Kernel Fun
Linux 2.6.7 - 2.6.18.3 get_fdb_entries() function is vulnerable to an integer overflow condition.
This could be abused to force memory allocation of an attacker controlled size.
This particular vulnerability is caused by an integer overflow in the fatfile_getarch2() function.
kernelfun.blogspot.com   (558 words)

  
 A Web-based Kernel Function for Measuring the Similarity of Short Text Snippets
This implies that the kernel function is robust for use in large collections, as its value does not depend on the number of relevant documents, but simply on the directional dispersion (measured by the standard deviation over angles) of the vectors of the relevant documents.
If the kernel is effective, we would generally expect higher kernel scores to lead to more useful queries suggested to the user (as they would tend to be more on-topic even given the post-filtering mechanism that attempts to promote diversity among the query suggestions).
This indicates that queries deemed by the kernel to be very related to the original query are quite useful to users in honing their information need, especially when we allow for some diversity in the results using the post-filtering mechanism.
www.www2006.org /programme/files/xhtml/3069/3069-sahami/3069-sahami-xhtml.html   (6428 words)

  
 NetBSD Documentation: Writing a pseudo device
The kernel interfaces to your device via a set of function calls which will be called when a user level programme accesses your device.
The attach function is passed one parameter which is the number of devices this driver is expected to handle.
After building and installing a new kernel there is one last thing that needs to be done to access the new pseudo-device, this is to make a device node for talking to the new device.
www.netbsd.org /Documentation/kernel/pseudo   (2340 words)

  
 CS345, Machine Learning, Probability Density Estimation using Kernels   (Site not responding. Last check: )
In the present context, a kernel function is simply a predefined probability density, usually something simple like a Gaussian or a bump function.
A kernel function may be scaled by selecting a width parameter w and considering the new function (1/w)*K(x/w).
The density estimate (function) is initialized to 0 everywhere.
www.cs.bc.edu /~alvarez/ML/KernelEstimation/kernelEstimation.html   (459 words)

  
 Kernel Mode Linux | Linux Journal
Kernel Mode Linux (KML) is a technology that enables the execution of ordinary user-space programs inside kernel space.
Thus, the kernel is protected by CPUs, because programs executed in user mode cannot access memory that belongs to programs executed in kernel mode.
The kernel code segment is used for the kernel itself, and its privilege level is kernel mode.
www.linuxjournal.com /article/6516   (2325 words)

  
 FAQ/SyscallTrace - Linux Kernel Newbies
Intercepting a system call means that you want a function of your own to be called instead of the kernel function implementing a given system call everytime the latter in invoked.
These macros are there to "register" the functiosn edu_init and edu_exit as the functions to be called respectively when the LKM is loaded and unloaded from the kernel.
If you want to provide some code in a module that kernel code needs to call, provide a hook in the kernel code as a patch, then a module on top of that (an example of this is sys_nfsservctl()).
kernelnewbies.org /FAQ/SyscallTrace   (1500 words)

  
 FreeVPS Kernel - FreeVPS Documentation
To enable new system calls, it is required to install the new patched kernel on your Linux box.
Other UNIX clones are not supported, but you may try this kernel on them.
Kernels are compiled using basic configuration, that's why they support only standard hardware.
www.freevps.com /docs/vps_patched_kernel.html   (578 words)

  
 Fun and Games with FreeBSD Kernel Modules
Probably the most commonly used technique is to replace function pointers in the kernel to point to the newly loaded functions.
When you deal with kernel memory you might first be interested in finding the correct place of a symbol you might want to read or write to.
Kernel modules are not the only way to alter the workings of the kernel.
www.r4k.net /mod/fbsdfun.html   (6354 words)

  
 [No title]
Linux kernel release 2.0.xx These are the release notes for linux version 2.0.
The kernel will be slightly larger, but will work on different machines regardless of whether they have a math coprocessor or not.
To find out the kernel function name, you'll need to find the system binary associated with the kernel that exhibited the symptom.
www.kernel.org /pub/linux/kernel/README   (1653 words)

  
 Kernel functions
The first parameter is the number of the kernel function to be called, the second number undetermined (as of yet).
The number of parameters passed to the kernel function are determined by kparam.
This function looks up one specific loop in a specific view (both are taken from selectors with the same name from the object pointed to by the parameter) and returns the number of cels (animation frames) in it.
freesci.linuxgames.com /scihtml/x3684.html   (4663 words)

  
 Kernel Look-up - The Code Project - C# Programming
It ensures that the user can access the selected kernel functions because direct calls are not possible.
The first is a C# GUI and the second is a C kernel driver.
The second part is the kernel driver located in the sys directory, lookup.c.
www.codeproject.com /csharp/lookup.asp   (1119 words)

  
 Vista's kernel protection function under the microscope - heise Security
Matthew Conover from Symantec has examined the preliminary version and described how the new security mechanism intended to protect Windows from things like rootkits actually functions in the kernel.
Among other measures, the kernel conducts constant integrity checks and can be set to load only signed drivers.
Conover also criticised that the new kernel function will make the integration of third-party security products more difficult.
www.heise-security.co.uk /articles/76723   (149 words)

  
 Kernel events without kevents [LWN.net]
Signals tend to be tricky for applications to handle; they are asynchronous events which are delivered to a special signal handler function, but that function is seriously limited in what it can do.
I thought select() was a pretty painful wait to get notification of activity, because the kernel side had to build up a big data blob describing what fds had activity, and then the user side had to grovel around in the big data blob to find out what fds had activity.
With a ring buffer you only need to notify the kernel when there is a risk the kernel may run out of space in the buffer.
lwn.net /Articles/225714   (6837 words)

  
 Directory of open access journals
Based on the wavelet decomposition and conditions of the support vector kernel function, Morlet wavelet kernel function for SVM is proposed.
This function is not only a kind of orthonormal function, but also suitable for local signal analysis, signal-noise separation and detection of jumping signals, thus it enhances the generalization ability of the SVM.
According to the wavelet kernel function and the regularization theory, Least squares support vector machine on Morlet wavelet kernel function (LS-MWSVM) is proposed to greatly simplify the solving process of MWSVM.
www.doaj.org /doaj?func=abstract&id=180921&recNo=8&toc=1   (176 words)

  
 Paul Clements - Re: Hanging at GetModuleFileName in inside_kernel function
...which is a stackdump deep within bash itself, pretty far from any cygwin functions.
Anyway, I just noticed that the last stack address (which looks bogus), as well as the EBP register value, are the same in the stack traces that both Peter and I posted:
It would seem very coincidental for these two crashes not to be related somehow.
www.cygwin.com /ml/cygwin/2006-03/msg00024.html   (248 words)

  
 KernelFunctionTrace - CE Linux Public
"Learning the Kernel and Finding Performance Problems with KFI"
Patch for Linux 2.6.12: see the PatchArchive page (available as an all-in-one patch or a tar archive of broken-out patches)
maybe can check "Function Trace in KDB" patch for help with this
www.celinuxforum.org /CelfPubWiki/KernelFunctionTrace   (1233 words)

  
 Using a Radial Basis Function as kernel
Next: Using a polynomial kernel Up: Selecting the Kernel function Previous: Selecting the Kernel function
shows a two-dimensional version of such a kernel.
, the output of the kernel is dependent on the Euclidean distance of
svr-www.eng.cam.ac.uk /~kkc21/thesis_main/node31.html   (259 words)

  
 WWW2006 - A Web-based Kernel Function for Measuring the Similarity of Short Text Snippets
A Web-based Kernel Function for Measuring the Similarity of Short Text Snippets
Determining the similarity of short text snippets, such as search queries, works poorly with traditional document similarity measures (e.g., cosine), since there are often few, if any, terms in common between two short text snippets.
Sahami, M. and Heilman, T. A web-based kernel function for measuring the similarity of short text snippets.
www2006.org /programme/item.php?id=3069   (201 words)

  
 Windows rootkits of 2005, part one
The kernel must be protected from user applications, but user applications require certain functionality from the kernel.
Kernel mode refers to a mode of execution in a processor that grants access to all system memory and all the processor's instructions.
For an inline function hook, the rootkit saves the original bytes in the function it is overwriting in order to preserve the same functional behavior.
www.securityfocus.com /infocus/1850   (2383 words)

  
 Writing AIX kernel extensions
Kernel extensions are routines added to the kernel to extend its functions.
Kernel extensions are an important part of the AIX kernel architecture, and they are similar to dynamically loadable modules available on other platforms, such as Linux®, that add function to the running kernel without the need of a machine reboot.
Dual-mode kernel extensions can be used to simplify the loading of kernel extensions that run on both the 32- and 64-bit kernels.
www.ibm.com /developerworks/aix/library/au-kernelext.html?ca=drs-   (2540 words)

  
 [No title]
Kernel space is where the kernel code lives, and user space is where the user programs live.
Also, when paramaters are passed by address to a kernel function, the kernel function can not read the parameters directly.
Here are a few useful functions to use in kernel mode for transferring data bytes to or from user memory.
www.w00w00.org /files/articles/lkmhack.txt   (1210 words)

  
 Kernel
The advantages of the kernel density estimator are the ease with which it may be implemented, smoothness, and a relatively fast convergence rate.
All the information about the sample is retained in a kernel function which is centered at each datum [7].
Although the B-Spline density estimator converges at the same asymptotic rate as kernel density estimators, it does not suffer from the problems of the kernel method because all the information about the sample is collected in a set of summary statistics which are only calculated once.
www.caam.rice.edu /~mmerritt/thesis/node4.html   (351 words)

Try your search on: Qwika (all wikis)

Factbites
  About us   |   Why use us?   |   Reviews   |   Press   |   Contact us  
Copyright © 2005-2007 www.factbites.com Usage implies agreement with terms.