lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Thu, 24 May 2007 21:15:47 +0200
From:	"Lars K.W. Gohlke" <lkwg82@....de>
To:	Jan Engelhardt <jengelh@...ux01.gwdg.de>
CC:	Tilman Schmidt <tilman@...p.cc>, linux-kernel@...r.kernel.org
Subject: Re: How to access correctly serial port inside module?

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Jan Engelhardt schrieb:
> On May 24 2007 19:19, Lars K.W. Gohlke wrote:
>> I want to read from serial port (I mean the port, which is called
>> /dev/ttyS0 in user-space). Then I want copy_to_user() it through
>> /proc/serialPort
>>
>> This is just to get familiar with driver programming (in kernelspace),
>> it could be better done in userspace - I know. But this is for learning.
>>
>> It is a kind of synthetic problem, but after this, I hope too know how
>> to handle further ones.
>>
>> Understood? It is a little bit strange, but hope it is explained well. ;)
>>
>> If tell me that for /dev/ttyS0 I can adept it to /dev/ttyS1 etc..
>
>
> struct file *filp = filp_open("/dev/ttyS0");
> char buf[4096];
> mm_segment_t oldfs = get_fs();
> loff_t pos = 0;
>
> set_ds(KERNEL_DS);
> while (vfs_read(filp, buf, sizeof(buf), &pos) > 0)
> 	printk("%s\n", buf);
>
> filp_close(filp);
>
>
>
> [I've warned about it... ;-) ]
>
> 	Jan
is it the way to access from kernelspace the userspace fs?
the not-correct-way?

If it is so, I will wait for another solution ;)

Dont want to learn writing nasty kernel code. *g*

Anyway thx.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (MingW32) - GPGrelay v0.959

iD8DBQFGVeRlAAomYJ1taN8RAj4LAJ4oD+3yGy6k69nBEXi5BSda+tdeNACeOCTY
+nJSUcsGpwh25uDjyC2GKRU=
=twVz
-----END PGP SIGNATURE-----

View attachment "lkwg82.vcf" of type "text/x-vcard" (125 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ