Reading Kernel Source Code - Analysis Of An Exploit