Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU |
Does user mode linux + our current Linux kernel have some kind of PCI pass-through feature, like (I believe) Xen does? And/or can you force Linux to ignore the device completely, and allow hardware control to a UML process? If so, could you use ndiswrapper (or whatever Linux driver you use) this way? And IP-forward from your guest, to it's host? Just found this article, reading it now... Running virtualized native drivers in User Mode Linux http://usenix.net/events/usenix05/tech/freenix/full_papers/guffens/guffens_html/umlwifi_freenix05.html On Nov 29, 2007 10:02 PM, Ben Holland <[hidden email]> wrote: > It seems to me that working through just about any wireless driver would > be > easier and less risky then actually going from a x86_64 install to i386... > But hey... yea, I am very curious about how it goes. ~Ben > > On Nov 29, 2007 5:01 PM, Brendan Kidwell <[hidden email]> wrote: > > > I gladly volunteer to stand by and hold Kristian's beer. I want to see > > what > > happens. Kristian, please report how it went. > > > > On 11/28/07, David Kramer <[hidden email]> wrote: > > > > > > Kristian Erik Hermansen wrote: > > > > I am about to attempt it, against all recommendations from everyone > > > > else. If you have any idea what the pitfalls are going to be, > please > > > > let me know now! Any suggestions? What should I do before and > after? > > > > How can I mitigate any potential issues? Thanks :-) > > > > > > On a social mailing list I'm on, we have a name for when you're about > to > > > embark on a mission that is most likely dangerous and widely > > > ill-advised. It's called "Here, hold my beer..." > > > > > > > -- > > This message has been scanned for viruses and > > dangerous content by MailScanner, and is > > believed to be clean. > > > > _______________________________________________ > > Discuss mailing list > > [hidden email] > > http://lists.blu.org/mailman/listinfo/discuss > > > > -- > This message has been scanned for viruses and > dangerous content by MailScanner, and is > believed to be clean. > > _______________________________________________ > Discuss mailing list > [hidden email] > http://lists.blu.org/mailman/listinfo/discuss >
BLU is a member of BostonUserGroups | |
We also thank MIT for the use of their facilities. |