Michael Hale Ligh

Цитаты

Andrii Pastushenkoцитирует1 час назад
kernel mode is implemented in ring 0 (most privileged) and user mode in ring 3 (least privileged). When the processor is executing in kernel mode, the code has unrestricted access to the underlying hardware, including privileged instructions, and to kernel and process memory regions (except on newer systems with SMEP, which prevents ring 0 execution of user pages).
Andrii Pastushenkoцитирует1 час назад
most operating systems define a set of stable APIs that map to one or more system calls (for example, the APIs provided by ntdll.dll and kernel32.dll on Windows)
Andrii Pastushenkoцитирует1 час назад
user application requests a service from the operating system’s kernel using a system call
fb2epub
Перетащите файлы сюда, не более 5 за один раз