Writing Linux Kernel Modules in Safe Rust

Writing Linux Kernel Modules in Safe Rust

Linux Foundation via YouTube Direct link

UAF Static Analysis

9 of 37

9 of 37

UAF Static Analysis

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Writing Linux Kernel Modules in Safe Rust

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Memory unsafety
  3. 3 49% - Chrome
  4. 4 72% - Firefox
  5. 5 70% - Microsoft
  6. 6 65% - Ubuntu
  7. 7 65% - Android
  8. 8 225 - Syzkaller
  9. 9 UAF Static Analysis
  10. 10 Hardening C
  11. 11 Isolation
  12. 12 What do we want out of our language?
  13. 13 A whirlwind tour of Rust, focusing on safety
  14. 14 Hello world!
  15. 15 Uninitialized variables
  16. 16 Structs
  17. 17 Traits
  18. 18 Generics and polymorphism
  19. 19 Trait objects and runtime polymorphism
  20. 20 Enums with data
  21. 21 Option and Result
  22. 22 Error handling
  23. 23 Panics and unwinding
  24. 24 Dangling references
  25. 25 Mutable references are unique references
  26. 26 Atomics
  27. 27 Safe and unsafe Rust
  28. 28 Compiling
  29. 29 Bindings
  30. 30 Mapping kernel APIs to Safe Rust
  31. 31 Heap allocations just work
  32. 32 What about _user pointers?
  33. 33 Concurrency!
  34. 34 FileOperations must be Sync!
  35. 35 Architecture support
  36. 36 Real world out-of-tree module usage?
  37. 37 Better kbuild integration

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.