There's nothing to run/see here (yet ;)).
This is a major part of a tool which will be able to run a DSM instance for research purposes without engaging your real DS machine and risking your data in the process (ask me how I know...).
This repository is target towards developers willing to learn and help with implementation of peculiarities of Synology's DSM Linux distribution.
Read about the quirk in a separate repo: https://github.com/RedPill-TTG/dsm-research/tree/master/quirks
- You need Synology's GPL sources for the kernel. Check the Makefile for details
 cdto kernel sources- Depending on the version:
- Linux v3
cp synoconfigs/bromolow .config
 - Linux v4
cp synoconfigs/apollolake .configecho '+' > .scmversion(otherwise it will error-out loading modules)
 
 - Linux v3
 make oldconfig ; make modules_preparecdback to the module directorymake LINUX_SRC=....(path to linux sources, default:../linux-3.10.x-bromolow-25426)- You will get a 
redpill.komodule as the result, you caninsmodit 
The procedure to build with the toolkit is not recommended. However, some versions lack the kernel sources (e.g. v7 now) and thus can only use this method.
- Get the appropriate toolkit from the official SF repo
- You want to get the 
.dev.txzfile for the corresponding platform (e.g.ds.bromolow-7.0.dev.txz) - You only need to unpack a part of it: 
tar -xvf ds.bromolow-7.0.dev.txz usr/local/x86_64-pc-linux-gnu/x86_64-pc-linux-gnu/sys-root/usr/lib/modules/DSM-7.0/build - If the path above changed you can use 
tar -tvf ds.bromolow-7.0.dev.txz | grep kfifo.hto find the correct one 
 - You want to get the 
 cdto the module directorymake LINUX_SRC=<toolkit-directory>/usr/local/x86_64-pc-linux-gnu/x86_64-pc-linux-gnu/sys-root/usr/lib/modules/DSM-7.0/build- You will get a 
redpill.komodule as the result, you caninsmodit 
While calling make you can also add these additional modifiers (e.g. make FOO BAR):
DBG_EXECVE=y: enabled debugging of everyexecve()call with argumentsSTEALTH_MODE=#: controls the level of "stealthiness", seeSTEALTH_MODE_*ininternal/stealth.h; it'sSTEALTH_MODE_BASICby defaultLINUX_SRC=...: path to the linux kernel sources (./linux-3.10.x-bromolow-25426by default)
On Debian-based systems you will need build-essential and libssl-dev packages at minimum.
The documentation regarding actual quirks/mechanisms/discoveries regarding DSM is present in a dedicated research repo at https://github.com/RedPill-TTG/dsm-research/. Documentation in this repository is solely aimed to explain implementation details of the kernel module. It will mostly be available in forms of long(ish) doc blocks.