SysFn 9 security fix: now apps cannot destroy kernel memory via passing illegal address in ebx
Update docs on SysFn 9 git-svn-id: svn://kolibrios.org@8246 a494cfbc-eb01-0410-851d-a64ba20cac60
This commit is contained in:
@@ -283,6 +283,9 @@ Parameters:
|
||||
ecx = -1 - get information on the current thread
|
||||
Returned value:
|
||||
* eax = maximum number of the slot of a thread
|
||||
but if pointer in ebx is illegal, for example,
|
||||
[ebx, ebx + 0x4C) region intersects with kernel memory,
|
||||
then function returns -1
|
||||
* buffer pointed to by ebx contains the following information:
|
||||
* +0: dword: usage of the processor (how many time units
|
||||
per second leaves on execution of this thread)
|
||||
|
Reference in New Issue
Block a user