News

In our previous installment, the author introduced methods for accessing peripherals from user space in Linux. In this installment, Abbott describes kernel modules and device drivers followed by a ...
When you program in the kernel, there is no operating system to step in and safely stop your code from running and tell you that you have a problem. The Linux kernel is pretty nice to its own code.
This approach would allow different security models to work without modifying the main kernel code. Out of this discussion grew the Linux Security Module Project (LSM). A number of developers worked ...
Programmers had already been experimenting with earlier versions of the language as an option for kernel module programming, with a proof of concept developed in 2013.
Although Linux does not (yet) support this binary format, the good news is that you can learn how to write kernel modules by implementing COM support for the Linux kernel.
Blacklisting modules prevents them from being loaded and used, and it is sometimes an important step in keeping a system running properly. The Linux kernel is modular — composed of modules that ...
The kernel, however, including modules, has no such restriction. That can make debugging modules tricky because you can easily bring the system to its knees.
Members of the open source community are working on a new security-focused project for the Linux kernel. Named Linux Kernel Runtime Guard (LKRG), this is a loadable kernel module that will perform ...
Remote code execution flaw patched in Linux Kernel TIPC module The bug was spotted within a year of introduction to the codebase.
With this second excerpt, Abbott discusses kernel modules and device drivers in Part 1, Part 2, Part 3, Part 4, Part 5 and Part 6. In this final installment of the excerpt, Abbott continues this ...