lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2cd4ff050912020326rcd2d7ffseb481ca736cd7d8c@mail.gmail.com>
Date:	Wed, 2 Dec 2009 13:26:24 +0200
From:	Mai Daftedar <mai.daftedar@...il.com>
To:	Davide Libenzi <davidel@...ilserver.org>
Cc:	Mark Hounschell <markh@...pro.net>,
	Clemens Ladisch <clemens@...isch.de>,
	linux-kernel@...r.kernel.org
Subject: Re: Signal from kernel space to user space

Thanks all for the help,
 I needed to use signals just as interrupt signal from the kernel
space so that when a certain change occurs I'd be notified in the
userspace
 I used send_sig _info and it worked :)..The problem was with the
signal number I using a wong one..

 Thanks


> On Tue, Dec 1, 2009 at 8:05 PM, Davide Libenzi <davidel@...ilserver.org> wrote:
>>
>> On Tue, 1 Dec 2009, Mark Hounschell wrote:
>>
>> > If no "information" is required, which of these are the fastest, say from an interrupt handler?
>> > I have a PCI card that handles external interrupts from the outside world and does nothing but
>> > report those external interrupts to userland. We use send_sig or wake_up_process depending
>> > on whether userland is going to wait for it or not. If there is a better/faster way I would be
>> > very interested.
>>
>> eventfd is. eventfd_signal() is also callable from non-sleeping contexts.
>>
>>
>> - Davide
>>
>>
>
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ