Reading Kernel Source Code - Analysis of an Exploit