How do kernels stop programs from executing high privelige/potentially malicious instructions

Discussion in 'Computer Programming, Emulation, and Game Modding' started by StackMasher, Jan 23, 2017.

  1. StackMasher
    OP

    StackMasher GBAtemp Regular

    Member
    111
    54
    Nov 29, 2016
    ^^^
     
  2. Mrrraou

    Mrrraou GBAtemp Advanced Maniac

    Member
    1,869
    2,167
    Oct 17, 2015
    France
    they dont
     
    hobbledehoy899 likes this.
  3. nero99

    nero99 GBAtemp Advanced Maniac

    Member
    1,906
    866
    Sep 18, 2014
    United States
    silly OP, kernels are for popping in the microwave, not stopping code :rofl2:
     
    KapuDaKoopa likes this.
  4. x65943

    x65943 Resident Greekaboo, Amateur Dog Father

    Member
    2,547
    2,111
    Jun 23, 2014
    United States
    Indiana
    One common method is to make user programs only run in userspace (a specific section of ram) that cannot access/execute kernel commands.
     
    Minnow and StackMasher like this.
  5. FAST6191

    FAST6191 Techromancer

    pip Reporter
    23,361
    9,154
    Nov 21, 2005
    If you want to look specifically at the x86 family then have a look at the concept called rings. You might have met it before when people speak of a ring 0 rootkit.

    Otherwise yeah would be here all day discussing security.

    Edit. Another thing that might be worth looking at.
    I recall linking a talk from possibly Defcon or Blackhat (one of the big US security/hacker conferences anyway) detailing return oriented programming, however part of the run up to that was going through the previous measures that ultimately led to ROP becoming a thing. DEP and how it failed, ASLR and how it failed and so on. I can't recall specifically which talk and ROP is a fairly hot topic among hackers which is unfortunate if you go searching but it might be worth looking for.
     
    Last edited by FAST6191, Jan 24, 2017
    StackMasher likes this.
  6. Futurdreamz

    Futurdreamz GBAtemp Advanced Maniac

    Member
    1,655
    917
    Jun 15, 2014
    Canada
    What kind of Kernel are we talking about? There are very many different types, with their own practices. Some outsource everything to subcomponents with limited access, some require all executable code to be cryptographically signed before they will be executed, and some use use an obscure and unpopular OS so nobody will want to hack it.