Get the Whitepaper called Kernel Exploitation 5: Integer Overflow.
You can download it from the following link: https://packetstormsecurity.com/files/download/145984/5-integer-overflow.pdf
Source: https://packetstormsecurity.com/files/145984/Kernel-Exploitation-Part-5-Integer-Overflow.html