Hi Prasad,
On Wed, Aug 6, 2008 at 6:50 PM, Prasad Joshi [EMAIL PROTECTED] wrote:
Hi All,
I want to encrypt the data before it is written to the disk and decrypt is
after it is being read from the disk. so copied the ext2 source code in my
directory.
Then modified the ext2 file_operations
On Feb 7, 2008 1:35 AM, Rajat Jain [EMAIL PROTECTED] wrote:
Hi,
If I remember correctly, there used to be syscall wrappers (_syscall3() etc)
in the kernel that could be used to make system calls
without any library support. I'm not able to locate them for i386. Where are
they?
Use
On 9/26/07, Andreas Dilger [EMAIL PROTECTED] wrote:
On Sep 25, 2007 23:40 -0600, Jim Cromie wrote:
kernel learner wrote:
ext3 filesystem has 32-bit block address and ext4 filesystem has
48-bit block address. If a user installs ext4, how will the file
system handle already existing block
Hi all,
For kernel 2.6.22.6 : I can see that tyoe of 2nd arg for read function
in strucy file_operations is changed is little bit changed from 2.4
kernel.
ssize_t (*read) (struct file *, char __user *, size_t, loff_t *);
For 2.4 it used to be:
ssize_t (*read) (struct file *, char *, size_t,
Hi all,
I have built my kernel from source, installed and booted in it.
Now I have written a small module. Can I insert this module into the
runningn kernel ?
Is there anything which I should take care of while compiling this
module, as we have to insert it into the running kernel ?
Thanks in
Hi all,
I have built my kernel from source, installed and booted in it.
Now I have written a small module. Can I insert this module into the
runningn kernel ?
Is there anything which I should take care of while compiling this
module, as we have to insert it into the running kernel ?
Thanks in