Michael Hale Ligh

Quotes

Andrii Pastushenkohas quoted17 hours ago
kernel mode is implemented in ring 0 (most privileged) and user mode in ring 3 (least privileged). When the processor is executing in kernel mode, the code has unrestricted access to the underlying hardware, including privileged instructions, and to kernel and process memory regions (except on newer systems with SMEP, which prevents ring 0 execution of user pages).
Andrii Pastushenkohas quoted17 hours ago
most operating systems define a set of stable APIs that map to one or more system calls (for example, the APIs provided by ntdll.dll and kernel32.dll on Windows)
Andrii Pastushenkohas quoted17 hours ago
user application requests a service from the operating system’s kernel using a system call
fb2epub
Drag & drop your files (not more than 5 at once)