Doing kernel space in Linux user space

Source: Internet
Author: User
Tags andrew morton

Guide I believe the best and worst thing about Linux is the huge difference between kernel space (kernel spaces) and user space. Without this distinction, Linux may not be the most influential operating system in the world.
Linux kernel space and user space with the fire of the lit Linux community

Today, Linux is the largest in the world, and these applications have the largest user base in the world-although most users do not know that when they do Google search or touch Android phones, they are actually using Linux.

If it weren't for the great success of Linux, Apple might not be the way it is now (that is, using BSD technology in their computer products) (LCTT: After Linux was successful, Apple negotiated with Linus to use the Linux core as an Apple Computer System and assist in the development of matters, but were rejected. As a result, Apple is turning to BSD, which has a more permissive license. )。

No (need) to focus on user space is a feature rather than a flaw in Linux kernel development. As Linus in the 2003 Geek Cruise Geek Cruise, "I only do kernel-related stuff ... I don't know what's going on outside the kernel, and I don't care. I only focus on what's happening in the kernel section. "On another geek cruise years later, Andrew Morton taught me another lesson, and I wrote:

Kernel space is where Linux resides, and user space is where Linux uses it with other "natural materials." The distinction between kernel space and user space is similar to the difference between natural materials and human-made materials produced by humans. The difference is a natural result, even though the outside world is a moment away from Linux, but the Linux community remains relatively small. So, in order to increase the size of our community groups, I would like to point out two things. The first one is already very hot, and the other may fire up.

First : Blockchain (blockchain), from the famous distributed currency-Bitcoin hand.

While you are reading this article, people's attention to the blockchain is rising straight up.

Figure 1. Google search trends for blockchain

Second: Autonomous identity (Self-sovereign identity).

To explain this concept, let me ask you first: who are you and where are you from?

If you get answers from your boss, your doctor, or your DMV, Facebook, Twitter, or Google, you'll find that they are all administrative identities administrative identifiers--These institutions are fully set up for these identities and positions for reasons of their own convenience. As Timothy Ruff of evernym, a blockchain technology company, says, "You don't exist as an organization, but your identity exists." "Identity is a dependent variable. The independent variable-the variable that controls the identity-is the organization (where you are).

If your answer comes from yourself, we have a vast space to develop a new field in which we are completely free.

Devon Loffreto's interpretation of his own identity

As far as I know, the first one to explain this is Devon Loffreto. In February 2012, he wrote in the blog Moxy tongue: "What is ' Sovereign Source authority '?". In the article "Self-sovereign Identity", published in February 2016, he wrote: "Autonomous identity must be made by an independent individual and does not include social factors ... The self-identity originates from each individual's understanding of its own origin. A self-identity can bring a new social face to the individual. Each individual may generate an autonomous identity for himself, and this does not change the inherent human rights. The use of autonomous identity mechanisms is the cornerstone of the participation of all participants and is still able to maintain contact with all forms of human society. Put this concept in the Linux field, and only a person can set up his or her own open source community identity. This is only a very normal event in real practice. As an example, my own identity includes:

    • David Allen Searls, my parents would call me that.
    • David Searls, I'm going to call myself that on a formal occasion.
    • Dave, my relatives and good friends call me that.
    • Doc, that's what most people call me.

As a source of self-identity that recognizes the above, I can easily convert it in different situations. However, this is only in the real world. In the virtual world, this becomes very difficult. In addition to the above status, I can also be @dsearls (my Twitter account) and Dsearls (other network accounts). However, in order to remember the login names and passwords of hundreds of different accounts, I was overwhelmed.

You can feel this awful experience on your browser. On Firefox, I have hundreds of usernames and passwords. Many have been abandoned (many of them from the Netscape ERA), but I think there will be a lot of work accounts to deal with. For these, I'm just a passive recipient. There is no other workaround. Even some of the less secure user certifications have become an integral part of the real world.

Now, the simplest way to contact an account is through "Log in with Facebook" or "Login in with Twitter" to authenticate. In this case, every one of us is not even in the true sense of ourselves, and even (if we want to be recognized by others) lacks control over how other entities understand us.

What we need from the start is a personal system that can manifest our own identity and communicate when choosing how to protect and present ourselves. Because of the lack of this ability, we are now in chaos. Shoshana Zuboff called it "surveillance capitalism," she says:

... Hard to imagine, in witnessing the internet and gaining a huge success behind Google. The world is closely tied to Apple's showdown with the FBI. To be reasonable, the surveillance system developed by the avid surveillance capitalists is what every national Security Agency craves. Then she asks, "How can we protect ourselves from the influence of others?"

I recommend using your own identity. I believe this is the only way we can ensure that we escape from surveillance and that we can have an orderly world. Based on this, we can communicate with social, political and commercial people completely without scruple.

I summarized this provisional conclusion at the ID2020 meeting held by the United Nations in May. I'm glad that Devon Loffreto was there, and he promoted the creation of his own identity in 2013. This is some of the articles I wrote at that time, citing Devon's early blogs (such as the original text above).

There are three guidelines in this area:

    • "Self-sovereign Identity"-Devon Loffreto.
    • "System or Human first"-Devon Loffreto.
    • "The Path to Self-sovereign Identity"-Christopher Allen.

From a brief description of evernym, digi.me, Irespond, and Respect Network are also included. The comparative results of autonomous identity and social identity (also known as the current model) are shown in Figure Ii.

Figure 2. Current mode identity vs. autonomous identity

Sovrin is the platform for this, it describes itself as a "relying on advanced, dedicated, authorized, distributed platform, fully open source, identity-based identity declaration diagram platform." At the same time, there is a white paper. Its code name is plenum and is publicly available on Github.

Here--or something like that--we can recreate what we've done in the kernel space over the last 25 years in the user space.

Doing kernel space in Linux user space

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.