News

When you program in the kernel, there is no operating system to step in and safely stop your code from running and tell you that you have a problem. The Linux kernel is pretty nice to its own code.
This article presents a cracker idea—the kernel module exploit—and shows how you can improve your system's security by using some of the same ideas and techniques. First, I will discuss the origin of ...
With this second excerpt, Abbott discusses kernel modules and device drivers in Part 1, Part 2, Part 3, Part 4, Part 5 and Part 6. In this final installment of the excerpt, Abbott continues this ...
Although Linux does not (yet) support this binary format, the good news is that you can learn how to write kernel modules by implementing COM support for the Linux kernel.
The makers of systems programming language Rust are looking at how to adapt the language for use in the Linux kernel. Josh Triplett, a former Intel engineer and a lead of the Rust language team ...
The kernel, however, including modules, has no such restriction. That can make debugging modules tricky because you can easily bring the system to its knees.
The memory safe programming language will join C and the other traditional languages developers use to create new pieces and drivers of the ubiquitous open source kernel.
New Linux kernel "lockdown" module to limit high-privileged users -- even root -- from tampering with some kernel functionality.
In our previous installment, the author introduced methods for accessing peripherals from user space in Linux. In this installment, Abbott describes kernel modules and device drivers followed by a ...