Closed. This question needs details or clarity. It is not currently accepting answers.
Want to improve this question? Add details and clarify the problem by editing this post.
Closed 7 years ago.
Improve this question
How I can create a new process in the Linux kernel?
Because the function fork could not be implemented in the kernel... Then as How I can create a new process in the Kernel?
Thx.
In-kernel process can be created using kthread_create (or kthread_run, which is similar to kthread_create, but also starts the thread).
User-space program can be called using call_usermodehelper.
Creating generic user-space process in the kernel is discouraged (and actually unclear).
Related
Closed. This question needs to be more focused. It is not currently accepting answers.
Want to improve this question? Update the question so it focuses on one problem only by editing this post.
Closed 1 year ago.
Improve this question
I want to test the kernel by causing a kernel panic. I tried with a panic module, but that option isn't very effective as I can't really keep a trace of the panic.
You can call the panic function in the kernel:
panic("DON'T PANIC!\n");
You should issue the command:
sudo bash -c 'echo "c" > /proc/sysrq-trigger'
Closed. This question needs to be more focused. It is not currently accepting answers.
Want to improve this question? Update the question so it focuses on one problem only by editing this post.
Closed 5 years ago.
Improve this question
I have a question that is why Linux driver need to compile with Linux source if a new hardware in the unsupported list of Linux kernel? but Windows driver just only need to double click setup.exe, don't need to compile...
Is it the kernel type different? microkernel vs monolithic kernel? or any other reason? thank you.
This is mainly to do with Linux' Monolithic Kernel. This in contrast to Windows' kernel which does not include drivers and drivers are written using the Windows Driver Model which is plug-and-play. Read about the differences in their respective Driver Architectures here.
I would suggest you give this article on Loadable Kernel Modules a read.
Closed. This question needs details or clarity. It is not currently accepting answers.
Want to improve this question? Add details and clarify the problem by editing this post.
Closed 6 years ago.
Improve this question
How to create threads and assign tasks to them? Is there any way to do it, like usage of
thread.start_new_thread ( function, args[, kwargs] )
in Python?
thanks in advance
Haskell threads can be spawned using forkIO.
I recommend also reading the GHC concurrency guide, since it has all the relevant pointers.
Closed. This question needs to be more focused. It is not currently accepting answers.
Want to improve this question? Update the question so it focuses on one problem only by editing this post.
Closed 8 years ago.
Improve this question
I am making a smart home device and I need to make my own linux os from the ground up including the GUI and some assembly code I know will be necessary. What programming languages will I need to learn? What software will I need? Where do I start? Will I have to make my own kernel?
If you are not programmer and have not any such skills so run and dont look behind and save yourself but if not look at this: http://www.linuxfromscratch.org/
Closed. This question needs to be more focused. It is not currently accepting answers.
Want to improve this question? Update the question so it focuses on one problem only by editing this post.
Closed 9 years ago.
Improve this question
Im a beginner in Linux and exploitation things.. and I'm trying to figure out what is a kernel space shellcode and how can we debug it .. Thanks in advance =)
Shellcode are machine code instructions contained in data. They are used when exploiting buffer overrun and other vulnerabilities that cause the data you supply to be copied over existing code, or allow you to set a return address to a buffer filled with your shellcode.
Debugging kernel mode shellcode would require a kernel debugger. Place a breakpoint in the vulnerable kernel code, perform your exploit, and single step as control transfers to the shellcode.