I am Dave Jing Tian, an Assistant Professor in the Department of Computer Science at Purdue University working on system security. My research involves embedded systems, operating systems, trusted and confidential computing, and hardware security and trust. All opinions are my own.
- 221,114 hits
All blogs on this website are licensed under a Creative Commons Attribution 4.0 International License.
Tag Archives: socket
In my old post (https://davejingtian.org/2015/02/17/retrieve-pid-from-the-packet-in-unix-domain-socket-a-complete-use-case-for-recvmsgsendmsg/), we talked about how to retrieve the peer PID from Unix domain socket using struct ucred. A more smart way to do this is using getsockopt() syscall with option SO_PEERCRED directly. As you expected (or … Continue reading
The original question was how to retrieve the PID of the packet (sender) in the Unix domain socket. As titled, the answer is recvmsg()/sendmsg(). However, the most useful information I could find online is Michael’s man7.org. People keep talking about … Continue reading
Recent playing with Python urllib2 reveals an interesting fact that the timeout parameter of urlopen() does not work sometimes. The interesting issue has successfully pushed me deep into the Python source code for debugging. The final debugging, without surprise, shows … Continue reading
Recently encountered a bind() error 0x63 – cannot assign requested address. After some effort on debugging, I list 2 possibilities here for reference when handling such this error code from bind(). Generally, if it is related with bad socket close/cleanup, … Continue reading
Name: sodt (套接字缓存溢出探测器) Language: KSH Destination: Detect socket buffer overflow for certain process real-timely Orignal Intention: Confirm messages lost caused by socket buffer overflow Version: 0.1 Supported Protocol: UDP/TCP/SCTP Supported OS: Linux/FreeBSD Note: ‘root’ permission is preferred to avoid OS … Continue reading