Perform kernel space operations in Linux user space

Source: Internet
Author: User

Perform kernel space operations in Linux user space
GuideI believe that Linux is the best and worst case, that is, the huge difference between kernel space and user space. Without this difference, Linux may not become the most influential operating system in the world.Linux kernel space and user space and the fire of the Linux community

Today, Linux is the most widely used in the world, and these applications have the largest user group in the world-although most users do not know, when they perform Google search or touch Android phones, they are actually using Linux.

If it is not a great success for Linux, Apple may not be like this (that is, using the BSD technology in their computer products, apple had negotiated with Linus to use the Linux core as the operating system of the Apple Computer and help with development, but was rejected. Therefore, Apple switched to BSD with more loose licenses .).

Paying Attention to user space is a feature of Linux kernel development, rather than a defect. As Linus mentioned in Geek Cruise, a Geek Cruise in 2003, "I only do kernel-related things ...... I don't know what happens outside the kernel, and I don't care about it either. I only focus on what happens in the kernel ." On another geek cruise many years later, Andrew Morton gave me another lesson, which I wrote:

The kernel space is the place where Linux is located, and the user space is used by Linux together with other "natural materials. The difference between kernel space and user space is similar to the difference between natural materials and artificial materials produced by humans. The difference is a natural result, that is, although the world is inseparable from Linux, the Linux community remains relatively small. Therefore, to increase the size of our community groups, I hope to point out two things. The first one is very popular, and the other may be very popular.

First: blockchain, from the famous distributed currency-Bitcoin.

While you are reading this article, people are paying more attention to blockchain.

Figure 1. Google search trends of blockchain

Second: self-sovereign identity ).

To explain this concept, let me first ask you: Who are you and where are you from?

If you get the answer from your boss, your doctor, or vehicle management office, Facebook, Twitter, or Google, you will find that they are all administrative identities administrative identifiers-these organizations set these identities and positions for their own convenience. As Timothy Ruff of Evernym, A blockchain technology company, said, "You do not exist because of organizations, but because of your identity ." Identity is a dependent variable. The independent variable, that is, the variable controlling the identity, is the organization where you are located.

If your answer comes from yourself, we will have a vast space to develop a new field in which we are completely free.

Devon Loffreto's explanation of autonomous identity

As far as I know, the first person who explains this is Devon Loffreto. In February 2012, he wrote in his blog Moxy Tongue: "What is 'sovereign Source Authority '?". In his article "Self-Sovereign Identity" published in February 2016, he wrote: autonomous identities must be proposed by independent individuals and do not contain social factors ...... Autonomous identity is derived from each individual's understanding of its own origins. An independent identity can bring a new social outlook to an individual. Each individual can generate an autonomous identity for himself, and this does not change the inherent human rights. The use of autonomous identity mechanisms is the cornerstone of participation by all participants and can still maintain relationships with various forms of human society. In the field of Linux, only an individual can set his or her own open-source community identity. In practice, this is just a very normal event. For example, my identity includes:

  • David Allen Searls, my parents call me this way.
  • David Searls, which I will officially call myself.
  • Dave, my relatives and friends call me this way.
  • Doc, which is what most people call me.

As an autonomous identity source for recognizing the above terms, I can easily switch between different scenarios. However, this is only in the real world. In the virtual world, this becomes very difficult. In addition to the above identity, I can also be @ dsearls (my twitter account) and dsearls (other network accounts ). However, I am overwhelmed to remember the login names and passwords of hundreds of different accounts.

You can feel this bad experience on your browser. On Firefox, I have hundreds of users and passwords. Many have been abandoned (many have been left behind by the Netscape era), but I think there will be a lot of work accounts to handle. I am only a passive recipient. There are no other solutions. Even some low-security user authentication has become an indispensable part of the real world.

Now, the easiest way to contact your account is to use "Log in with Facebook" or "Login with Twitter" for identity authentication. In this case, each of us is not even a real self, or even (if we want to be known by others) lack control over how other entities know us.

From the very beginning, we needed a personal system that could protect and present our own identity and communication. We are in chaos because we lack this capability. Shoshana Zuboff called it "monitoring capitalism", and she said:

... It is hard to imagine, behind the scenes of Google, which witnessed the Internet and achieved great success. The world is closely linked by Apple and the FBI. To put it bluntly, every national security institution is eager to develop a surveillance system developed by the capitalist keen on monitoring. Then she asked, "How can we protect ourselves from the influence of others? "

We recommend that you use your identity. I believe this is the only way we can ensure that we can escape from surveillance and make us have an orderly world. On this basis, we can communicate with people in society, politics, and commerce without any scrubs.

I summarized this interim conclusion at the ID2020 meeting held by the United Nations on May. I'm glad that Devon Loffreto is also there. In 2013, he promoted the creation of his own identity. This is some of the articles I wrote at that time, citing Devon's early blog (such as the original article above ).

There are three principles in this field:

  • "Self-Sovereign Identity"-Devon Loffreto.
  • "System or Human First"-Devon Loffreto.
  • "The Path to Self-Sovereign Identity"-Christopher Allen.

Digi. me, iRespond, and Respect Network are also included in Evernym's brief description. The comparison between autonomous identity and social identity (also known as the current model) is shown in figure 2.

Figure 2. Current Mode Identity vs. autonomous identity

Sovrin is a platform born for this purpose. It describes itself as a "fully open-source, logo-based, authenticated, and distributed platform based on advanced, dedicated, authorized, and distributed platforms ". At the same time, there is also a White Paper. Its code is named plenum and published on Github.

Here -- or elsewhere -- we can reproduce what we have done in kernel space over the past 25 years in user space.

From: http:// OS .51cto.com/art/201608/515763.htm

Address: http://www.linuxprobe.com/linux-kernel-space.html


Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.