Universal Multilingual Overlay for Linux Kernel Events
Experimental kprobe-based kernel module for real-time kernel event monitoring and diagnostic purposes.
Architect: Bureum Lee
The Infernal Translator (Rust)
Language is the conduit of data. Within the colossal system of the OS, where English is calcified into 0s and 1s, I use the cold, precise blade of Rust to refine reality. In the safest manner possible, this infernal translator shifts the machine's tongue into human languageβwithout a single error.
The Glitch in Perception
Even in the most perfect systems, a gap exists. That split second after hardware spits out bits, but just before the OS perceives them. That void is my battlefield. I do not destroy the system; I merely pierce the gap. While the core trusts the English, the shell speaks your mother tongue.
The Great Shift
I tear down the illusion of language barriers. Inside, the cold, hard logic of the machine remains. Outside, the warmth of human history and emotion flows. This is the essence of the interpreter I have designed.
[!NOTE]
Ghost Shell prioritizes design-level efficiency over runtime optimization.
Core Design:
- Zero-Cost Abstractions: Compile-time optimization
- No Heap Allocation: Fixed 64KB memory pool (
no_std) - Direct Kernel Access: C FFI bridge at native privilege
- Constant-Time Filtering: O(1) event processing path
Expected Characteristics:
- Overhead: Designed to approach native C modules
- Memory: Fixed 64KB (no runtime growth)
- Latency: O(1) in critical path
Formal benchmarking planned for v2.0
Current claims based on architectural analysis
[!CAUTION]
NOT SUPPORTED: WSL2 (Windows Subsystem for Linux)
This module uses ELF relocation type R_X86_64_GOTPCREL and Rust-for-Linux features not implemented in WSL2 kernel.
Supported:
- β Native Ubuntu 22.04/24.04 LTS
- β VMware / VirtualBox VM
- β Bare-metal Linux
ASCII Banner & System Online & System Call Capture:
Installation & System Messages:
Module Unload:
Running on Ubuntu 24.04 LTS (VMware)
Ubuntu/Debian:
sudo apt update
sudo apt install -y \
linux-headers-$(uname -r) \
build-essential \
clang llvmRust Nightly:
# Install Rust
curl --proto '=https' --tlsv1.2 -sSf \
https://sh.rustup.rs | sh
source $HOME/.cargo/env
# Set nightly toolchain
rustup default nightly
# Install kernel development components (REQUIRED)
rustup component add rust-src
rustup target add x86_64-unknown-none
# Verify installation
rustup component list --installed | grep -E "rust-src|x86_64-unknown-none"# Build
make clean
make
# Load module
sudo insmod ghost_driver.ko
# Monitor output
dmesg -w | grep GHOST
# Expected output:
# [GHOST] __x64_sys_write Captured. System Online
# [GHOST] Arch: x86_64 | Mem: 64KBsudo rmmod ghost_driver- Zero Heap Allocation β Fixed 64KB memory pool
- kprobe-based Hooking β Non-invasive syscall monitoring
- Real-time Logging β Live kernel event capture
- ANSI-Aware Filtering β Binary data/escape sequence handling
- Architectural Efficiency β O(1) filtering, no dynamic allocation
Current Phase: Proof of Concept (v1.0)
- Core Rust-to-Kernel FFI bridge
- kprobe syscall interception (
__x64_sys_write) - Early-return filtering logic
- Real-time event logging
- Multi-language translation (planned v2.0)
- Performance benchmarking (planned v2.0)
βΈοΈ v2.0 Docker Alternative (On Hold) - Exploring alternative proxy layers.
π οΈ v2.0 Ubuntu Ghost-Shell Integration - Under Review: Evaluating Dynamic JSON Loader vs. Performance tradeoffs.
This is a read-only kernel monitoring tool that:
β
Monitors kernel syscalls via kprobe
β
Displays intercepted events in real-time (dmesg)
β
Requires sudo / root privileges
β
Acts as a diagnostic probe tool
β Modify kernel behavior or syscall results
β Translate kernel messages (planned v2.0)
β Enforce security policies
β Optimize system performance
# Install
sudo insmod ghost_driver.ko
# Monitor
dmesg -w | grep GHOST
# Output example:
# [GHOST] SUCCESS
# [GHOST] __x64_sys_write Captured. System Online
# [GHOST] Scanning System Call Entry
# [GHOST] Kernel active: sys_call_table online
# Unload
sudo rmmod ghost_driverUse Cases:
- System diagnosis and debugging
- Kernel event tracing and analysis
- Educational/research purposes
- Security monitoring (read-only)
Error: "Invalid module format"
# Rebuild kernel headers
sudo apt install --reinstall linux-headers-$(uname -r)
make clean && makeError: "Unknown symbol in module"
# Check kernel config
cat /boot/config-$(uname -r) | grep KPROBES
# Should show: CONFIG_KPROBES=y
# If missing, recompile kernel with kprobes enabledError: "Operation not permitted"
# Ensure you're using sudo
sudo insmod ghost_driver.ko
# Check secure boot status (may block unsigned modules)
mokutil --sb-stateWSL2 Users:
β This module cannot run on WSL2.
β
Use VMware/VirtualBox with native Ubuntu instead.
Vision:
Kernel event translation layer with expandable language mappings.
| Language | Status | Contributor |
|---|---|---|
| π°π· Korean | π Planned | - |
| π¨π³ Chinese | π Planned | - |
| π―π΅ Japanese | π Planned | - |
| π·πΊ Russian | π Planned | - |
Translation framework and contribution guide coming in v2.0
Architecture:
- Language: Rust (
no_std) + C (FFI wrapper) - Hook Method: Linux kprobes API
- Target:
__x64_sys_writesyscall entry point - Memory: Fixed 64KB pool (zero dynamic allocation)
- Compatibility: Linux Kernel 5.15+ (tested on 6.8)
File Structure:
ghost-shell/
βββ Doc/
β βββ KERNEL_MAP.md
β βββ RESEARCH.md
βββ workspace/
β βββ src/
β βββ chrono-kernel-core/
β βββ src/
β β βββ lib.rs
β β βββ wrapper.c
β βββ .gitignore
β βββ Cargo.lock
β βββ Cargo.toml
β βββ Makefile
β βββ build.rs
β βββ rust-toolchain.toml
β βββ shim.c
β βββ wrapper.h
βββ DEVLOG.md
βββ LICENSE
βββ README.md
MIT License
This is an experimental kernel module.
- Requires root/sudo access
- May cause system instability if misused
- NOT intended for production environments
- Use in VM or test systems only
Author assumes NO liability for:
- System crashes or data loss
- Security vulnerabilities
- Any damage resulting from use
Educational and research purposes only.
Built by a Korean "Underdog", "Mad Scientist" exploring the boundaries between hardware, OS, and human language.
Inspired by the philosophy of systems architecture and the poetry of low-level programming.
"The core trusts English; the shell speaks your mother tongue."