lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <59741.81.207.0.53.1183977750.squirrel@secure.samage.net>
Date:	Mon, 9 Jul 2007 12:42:30 +0200 (CEST)
From:	"Indan Zupancic" <indan@....nu>
To:	"mikie" <mikie.pl@...il.com>
Cc:	"Duncan Sands" <duncan.sands@...h.u-psud.fr>,
	linux-kernel@...r.kernel.org
Subject: Re: understanding firmware loader for speedtouch (kernel 2.6.21.5)

On Mon, July 9, 2007 10:49, mikie wrote:
> 2007/7/6, Indan Zupancic <indan@....nu>:
>> On Fri, July 6, 2007 16:20, Duncan Sands wrote:
>> > On Friday 6 July 2007 14:54:18 mikie wrote:
>> >> Hi,
>> >>
>> >> I experience some problems with the speedtch.c module, especially in
>> >> regards to its firmware loader.
>> >> I am not quite sure if this module is going to load the firmware
>> >> itself or does it use some external software to do that ?
>> >
>> > It loads it itself, using some external software!
>>
>> For information, it generates a hotplug event and the kernel calls the
>> program written at /proc/sys/kernel/hotplug with certain information.
>> That used to be /sbin/hotplug, became later udev, but today in general
>> udev reads the uevents generated by the kernel.
>
> On my system the /proc/sys/kernel/hotplug points to /sbin/hotplug.
> I copied your script to /sbin/hotplug and also added simple logging,
> so I can see whenever the script is being started. It turns out that
> the script is not started at all by the kernel...
>
> I am afraid that the kernel generates uevents only, could this be true?

Not really, it would break backward compatibility, and if it were true,
they're remove the /proc/sys/kernel/hotplug setting too. As far as I know,
if it's set, that program will be executed, and if zero is written to it, only
uevents are generated.

Make sure that the script is executable (chmod +x) and has "#!/bin/sh"
at the top, or else it won't work. If that's already the case, I've no idea.

Good luck,

Indan


-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ