lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAK7N6voyvDqWogEWOZFf0e-mQLnoODqxUZr7n=oA-U_z0hLCoA@mail.gmail.com>
Date:	Tue, 5 Feb 2013 17:14:58 +0530
From:	anish singh <anish198519851985@...il.com>
To:	motyl@...n.chemie.unibas.ch
Cc:	alan@...rguk.ukuu.org.uk,
	linux-kernel-mail <linux-kernel@...r.kernel.org>,
	stepan@...iburg.linux.de
Subject: Outdated mbuff driver- update to the latest kernel

Hello Tomasz,

I have gone through mbuff driver while looking for
this question:how to share large amount of memory
between kernel and user space?

Currently we can do that by mmaping /dev/mem
and /dev/zero but I am looking for something more
simpler(/dev/zero and /dev/mem is using shmem.c-
right now I don't want to dig it) and I think mbuff is
what I was looking for.

I would like to update the mbuff driver to make it
work for the latest kernel as it is using many deprecated
api's.

Is there any place from where I can pick up the latest
version of this driver?

I plan to setup this mbuff driver code in github.

In your mbuff implementation you are using vmalloced
memory but I plan to use get_free_pages just to get
used to using get_free_pages :)

I am sure that this kind of mmaping is already done in
current kernel but this whole exercise is aimed at
understanding it better by actually going through the problems
while implementing.

Hope it makes sense!!
anish
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ