This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
--- contracts/Namev2_prx11.asm 2019-04-19 00:49:46.409038062 +0800 | |
+++ contracts/Namev2_prx11.petersburg.asm 2019-04-19 00:49:17.116352277 +0800 | |
@@ -25,7 +25,7 @@ | |
/* "contracts/Namev2_prx11.sol":170:188 owner = msg.sender */ | |
dup1 | |
sload | |
- not(sub(exp(0x02, 0xa0), 0x01)) | |
+ not(sub(shl(0xa0, 0x01), 0x01)) | |
and | |
/* "contracts/Namev2_prx11.sol":178:188 msg.sender */ |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
--- TWLKH-description.txt 2018-08-20 21:49:59.361145866 +0800 | |
+++ TWLKH-description.txt.hacked 2018-08-20 22:12:40.319784822 +0800 | |
@@ -17,23 +17,6 @@ | |
社團另有 slack 聊天室位於 | |
https://twlinuxkernelhackers.slack.com/ | |
-欲加入社團FB messenger群組請洽管理員。 | |
- | |
-Kernel 內容繁雜,目前依據貼文的內容用tag在 Facebook 上面分類(字母排序) | |
- |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/* x86-64 program to test wether stack access without setting the stack poitner register would cause SEGFAULTs | |
* $ ./stack-and-sp # just access stack adjacent memory until SEGFAULT. | |
* $ ./stack-and-sp --set-sp # set stack pointer register before accessing memory. | |
* | |
* Output: | |
* stack-and-sp: do_set_sp: 1 | |
* RLIMIT_STACK: 8192/unlimited (cur/max) | |
* sp0: 0x7ffd5fdd3000 | |
* sp: 0x7ffd5f5d7000, size: 8176K | |
*/ |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
$ gdb -q -x syscall-restart-after-handler.gdb | |
Breakpoint 1 at 0x400920: file syscall-restart-after-handler.c, line 13. | |
pre blocking read on pipe | |
Breakpoint 1, sig_handler (sig=14, info=0x7fffffffc230, ctx=0x7fffffffc100) at syscall-restart-after-handler.c:13 | |
warning: Source file is more recent than executable. | |
13 fprintf(stderr, "%s: caught signal %d (%s) \n", program_name, sig, strsignal(sig)); | |
#0 sig_handler (sig=14, info=0x7fffffffc230, ctx=0x7fffffffc100) at syscall-restart-after-handler.c:13 | |
#1 <signal handler called> | |
#2 0x00007ffff7b02fc1 in __GI___libc_read (fd=3, buf=buf@entry=0x7fffffffc6b7, nbytes=nbytes@entry=1) at ../sysdeps/unix/sysv/linux/read.c:27 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/* Burn some CPU time then segfault */ | |
int main() | |
{ | |
volatile int i; | |
for (i=0; i>=0; i++) | |
; | |
*(volatile char*)0; | |
return 0; | |
} |
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.