Michael Hale Ligh

Цитаты

Andrii Pastushenkoцитируетпозавчера
kernel mode is implemented in ring 0 (most privileged) and user mode in ring 3 (least privileged). When the processor is executing in kernel mode, the code has unrestricted access to the underlying hardware, including privileged instructions, and to kernel and process memory regions (except on newer systems with SMEP, which prevents ring 0 execution of user pages).
Andrii Pastushenkoцитируетпозавчера
most operating systems define a set of stable APIs that map to one or more system calls (for example, the APIs provided by ntdll.dll and kernel32.dll on Windows)
Andrii Pastushenkoцитируетпозавчера
user application requests a service from the operating system’s kernel using a system call
fb2epub
Перетащите файлы сюда, не более 5 за один раз