Cambridge-educated finance director died after tripping and banging his head on marble staircase while making a work phone call, inquest told
BRYONY GORDON: The unhealthy eating that trapped me hasn't gone anywhere. I've found only one way out of this trap
Labour on course for its worst election result in 116 YEARS as poll puts it on just 15% in Scotland ahead of Holyrood vote - with Reform set to be biggest opposition party to SNP
Taking aspirin in your 70s won't prevent cancer - and could increase your risk of dying from the disease
Beheaded by the Mafia: When an undertaker refused to pay extortion money, these gangsters chopped the head off his beloved dog. This is how, eventually, justice was done... and 323 thugs were thrown in jail
Ranked by our travel expert, Britain's best to worst holiday parks: From the 'perfect' posh lodges no one seems to know about to the only Center Parcs worth considering - and 'tired' resort to avoid like the plague
Andy Burnham reveals Starmer refused to speak to him before by-election block as Greens 'weaponise Gaza' against Labour
British girl, seven, missing after being swept out to sea while sitting on rocks with her family in Morocco
Dementia surge warning: Experts predict 2 MILLION Britons will be living with feared brain disease by 2050
Thousands of 'zombie' firms at risk of collapse as HMRC calls in overdue taxes
Inside the Linux Kernel Runtime Guard (LKRG): A New Layer of Kernel Integrity Protection
In an era where security threats continually evolve, protecting the heart of an operating system, the kernel, has never been more critical. One tool gaining traction in the Linux world is the Linux Kernel Runtime Guard (LKRG), a specialized security module designed to detect and respond to attacks targeting the kernel while the system is running. This project recently reached its first stable milestone with version 1.0.0, marking a major step forward for runtime protection on Linux systems.
What Is LKRG?LKRG (short for Linux Kernel Runtime Guard) is a loadable kernel module that continuously monitors the health and integrity of the Linux kernel while it’s running. Unlike many security features that rely on compile-time patches or static defenses, LKRG acts at runtime, watching for signs of unauthorized changes or exploit attempts and taking configurable action when something suspicious is detected.
Because LKRG is a module rather than a patch to the kernel source, it can be built and used across a variety of distributions and kernel versions without needing to recompile the core kernel itself. It supports a wide range of architectures, including x86-64, 32-bit x86, ARM64, and 32-bit ARM, and has been tested on kernels from older enterprise releases all the way up to recent mainline versions.
How LKRG WorksAt its core, LKRG performs runtime integrity checks on critical parts of the kernel and system state. It validates the kernel’s code, data, and metadata against expected values and monitors for unexpected changes that could be indicative of an exploit. The module also watches key process attributes and credentials to help spot unauthorized privilege escalation attempts.
Unlike compile-time defenses such as address space layout randomization (ASLR) or static code hardening, LKRG is designed to observe and react while the kernel is executing, a concept sometimes referred to as “post-detection” security. This complements other layers of defense rather than replacing them.
Version 1.0: A Milestone ReleaseAfter several years of development, with the first public release appearing back in 2018, LKRG has finally reached its 1.0 release, signaling maturity and broader real-world readiness. This milestone brings a suite of improvements, including:
-
Broader Kernel Compatibility: Support extending to recent kernel series such as Linux 6.17, while maintaining compatibility with older, long-lived versions.