lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <ac3eb2510909180513i188bcb96t15b3b299fa97c2ba@mail.gmail.com>
Date:	Fri, 18 Sep 2009 14:13:18 +0200
From:	Kay Sievers <kay.sievers@...y.org>
To:	Alan Jenkins <sourcejedi.lkml@...glemail.com>
Cc:	vprabu vprabu <prabu_online2005@...oo.com>,
	linux-hotplug@...r.kernel.org, linux-pci@...r.kernel.org,
	linux-usb@...r.kernel.org, kernelnewbies@...linux.org,
	linux-kernel@...r.kernel.org
Subject: Re: Auto loading of kernel modules COLD/HOT BOOT

On Fri, Sep 18, 2009 at 14:06, Alan Jenkins
<sourcejedi.lkml@...glemail.com> wrote:
> On 9/18/09, vprabu vprabu <prabu_online2005@...oo.com> wrote:
>> I am new to kernel hacking ; i had been an application guy; now focusing
>> into the fundamentals of linux kernel. I really have little knowledge about
>> the kernel, modules and auto loading of modules.After a lot of googling ,i
>> am now much perplexed :-).
>>
>>  Most of the articles are contradictory to each
>> other and not very clear ( or not so simple at my level to comprehend)
>
> Heh, I think that's a common reaction.  I don't know where there is a
> good introduction.

Here is a pretty old text from 2005, it explains some bits, if the old
stuff before udev is known to the reader. Some things have changed in
the meantime, like the event queue stuff which is no longer directly
accessible, but the general picture is still pretty close to what we
do today:
  http://vrfy.org/log/recent-state-of-udev.html

Kay
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ