TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Tales from the Kernel Parameter Side

38 点作者 MiguelHzBz超过 2 年前

2 条评论

teddyh超过 2 年前
Some of the descriptions of sysctl parameters are mixed up and wrong:<p><pre><code> kernel.core_uses_pid Block USB devices kernel.ctrl-alt-del Disable access to dmesg for unprivileged users kernel.dmesg_restrict Disable kexec to prevent kernel livepatching kernel.kptr_restrict Restrict access to kernel logs </code></pre> The <i>official</i> documentation for &#x2F;proc&#x2F;sys and sysctl settings is here: <a href="https:&#x2F;&#x2F;www.kernel.org&#x2F;doc&#x2F;html&#x2F;latest&#x2F;admin-guide&#x2F;sysctl&#x2F;index.html" rel="nofollow">https:&#x2F;&#x2F;www.kernel.org&#x2F;doc&#x2F;html&#x2F;latest&#x2F;admin-guide&#x2F;sysctl&#x2F;in...</a><p>The article seems to mostly exist to be a showcase for Falco, which apparently is some sort of file change security monitor.
评论 #33486372 未加载
anderspitman超过 2 年前
I&#x27;ve been playing with QEMU a lot lately. Early on I encountered a fairly fundamental problem: how do you pass arbitrary data to a booting Linux system? I ended up discovering fw_cfg[0], but it feels pretty janky for this purpose and didn&#x27;t seem to work for larger files like executables. Anyone aware of a better way?<p>[0]: <a href="https:&#x2F;&#x2F;www.kernel.org&#x2F;doc&#x2F;Documentation&#x2F;ABI&#x2F;testing&#x2F;sysfs-firmware-qemu_fw_cfg" rel="nofollow">https:&#x2F;&#x2F;www.kernel.org&#x2F;doc&#x2F;Documentation&#x2F;ABI&#x2F;testing&#x2F;sysfs-f...</a>
评论 #33486014 未加载
评论 #33489727 未加载
评论 #33486259 未加载