You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: 2021/hitcon-ctf-2021/dtb/README.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -93,4 +93,4 @@ if (state) {
93
93
94
94
Regmap overlapping doesn't work by default because of `memblock_is_memory` which scans `memblock.memory`, but overwriting `memblock.memory.regions[0].base` (`0x41df0f88`) with the spin table primitive allows us to bypass the check. With the overlapping regmap, we could flip arbitrary bit in the kernel code, and patching the kernel to make an LED device loads its color name from the flag location was straightforward.
95
95
96
-
[This is our final exploit (example.dts).](./example.dts) and [generator](./xor-patcher.py)
96
+
[This is our final exploit (example.dts).](./example.dts) and [generator](./xor_patcher.py)
0 commit comments