UserLand versus kernel land

Most operating systems rely on a ring protection model. This model represents superposed conceptual rings varying from high to low privileges. There are four layers numbered from 0 to 3:

  • Ring 3: This layer is the usual interaction layer, with the user normally in the user mode.
  • Ring 2: This layer contains operations with low privilege.
  • Ring 1: This is the layer of input/output operations.
  • Ring 0: This is the most sensitive layer. The kernel resides in this layer.

Linux, like many recent operating systems, doesn't rely exactly on a ring protection mechanism, but it is working on a two-layer mode: user mode, and ...

Get Advanced Infrastructure Penetration Testing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.