|
You are here |
nfil.dev | ||
| | | | |
bootlin.com
|
|
| | | | | ||
| | | | |
xcellerator.github.io
|
|
| | | | | Okay, so you've built your first kernel module, but now you want to make it do something cool - something like altering the behaviour of the running kernel. The way we do this is by function hooking, but the question is - how do we know which functions to hook? Luckily for us, there is already a great list of potential targets: syscalls! Syscalls (or system calls) are kernel functions that can be called from userspace, and are required for almost anything remotely interesting. | |
| | | | |
www.dgendill.com
|
|
| | | | | [AI summary] A detailed exploration of using Rust and WebAssembly for system-level programming, focusing on memory management, allocator implementation, and low-level concepts like alignment and size in memory layout. | |
| | | | |
healeycodes.com
|
|
| | | Building a technical demo to understand this blossoming area of technology. | ||