Is Kernal patch protection available for ARM systems?
Kernal DMA protection, is this the same thing?
Kernal Patch protection. Same thing?
https://en.wikipedia.org/wiki/Kernel_Patch_Protection
In x64 editions of Windows, Microsoft began to enforce restrictions on what structures drivers can and cannot modify. Kernel Patch Protection is the technology that enforces these restrictions. It works by periodically checking to make sure that protected system structures in the kernel have not been modified. If a modification is detected, then Windows will initiate a bug check and shut down the system,[6][8] with a blue screen and/or reboot. The corresponding bugcheck number is 0x109, the bugcheck code is CRITICAL_STRUCTURE_CORRUPTION. Prohibited modifications include:[8]
Modifying system service descriptor tables
Modifying the interrupt descriptor table
Modifying the global descriptor table
Using kernel stacks not allocated by the kernel
Modifying or patching code contained within the kernel itself,[8] or the HAL or NDIS kernel libraries[9]
Kernel Patch Protection only defends against device drivers modifying the kernel. It does not offer any protection against one device driver patching another.[10]
Shims
https://github.com/Fleex255/CustomShim
https://fleexlab.blogspot.com/2020/12/applying-shims-to-standard-windows.html