|
You are here |
blog.packagecloud.io | ||
| | | | |
venam.net
|
|
| | | | | System calls are one subject that scares many people. Actually most of the low level stuffs happening on the operating system scares a lot of people. I admit, I was a bit afraid of dealing with this subject. Not because it's hard or anything but because it's something that we're not used to dealing with every day, it's lik... | |
| | | | |
nfil.dev
|
|
| | | | | This post documents my attempts to manage to jump (or return?) from kernel-space to usermode in my Rust kernel so that it can do what a kernel is supposed to actually do: give the CPU to user programs. That's pretty exciting! In the next part, we'll even take control back from the programs so that we can implement a scheduler. | |
| | | | |
blog.codingconfessions.com
|
|
| | | | | An explanation of how Linux handles system calls on x86-64 and why they show up as expensive operations in performance profiles | |
| | | | |
comsecuris.com
|
|
| | | [AI summary] This blog post discusses a detailed exploit chain targeting a mobile phone's application processor OS through a compromised modem. The author outlines the process of identifying vulnerabilities in the baseband firmware, reverse engineering the MT6795's cellular stack layers, and attempting to fuzz the MM layer for potential memory corruption issues. The post also touches on the challenges of creating a persistent rootkit via the modem and the importance of hardware isolation in securing mobile platforms. | ||