Language Selection

English French German Italian Portuguese Spanish

The Linux Kernel: Drivers

Filed under
Linux

Drivers are small programs that enable the kernel to communicate and handle hardware or protocols (rules and standards). Without a driver, the kernel does not know how to communicate with the hardware or handle protocols (the kernel actually hands the commands to the BIOS and the BIOS passes them on the the hardware). The Linux Kernel source code contains many drivers (in the form of source code) in the drivers folder. Each folder within the drivers folder will be explained. When configuring and compiling the kernel, it helps to understand the drivers. Otherwise, a user may add drivers to the kernel that they do not need or leave out important drivers. The driver source code usually includes a commented line that states the purpose of the driver. For example, the source code for the tc driver has a single commented line that says the driver is for TURBOchannel buses. Because of the documentation, users should be able to look at the first few commented lines of future drivers to learn their purpose.

There are different terms that should be understood so that the information below is understandable. An I/O device is an Input/Output device.

rest here




More in Tux Machines

Security: Twitter and Facebook

  • Twitter banned Kaspersky Lab from advertising in Jan
     

    Twitter has banned advertising from Russian security vendor Kaspersky Lab since January, the head of the firm, Eugene Kaspersky, has disclosed.  

  • When you go to a security conference, and its mobile app leaks your data
     

    A mobile application built by a third party for the RSA security conference in San Francisco this week was found to have a few security issues of its own—including hard-coded security keys and passwords that allowed a researcher to extract the conference's attendee list. The conference organizers acknowledged the vulnerability on Twitter, but they say that only the first and last names of 114 attendees were exposed.

  • The Security Risks of Logging in With Facebook
     

    In a yet-to-be peer-reviewed study published on Freedom To Tinker, a site hosted by Princeton's Center for Information Technology Policy, three researchers document how third-party tracking scripts have the capability to scoop up information from Facebook's login API without users knowing. The tracking scripts documented by Steven Englehardt, Gunes Acar, and Arvind Narayanan represent a small slice of the invisible tracking ecosystem that follows users around the web largely without their knowledge.

  • Facebook Login data hijacked by hidden JavaScript trackers
     

    If you login to websites through Facebook, we've got some bad news: hidden trackers can suck up more of your data than you'd intended to give away, potentially opening it up to abuse.

Beginner Friendly Gentoo Based Sabayon Linux Has a New Release

The team behind Sabayon Linux had issued a new release. Let’s take a quick look at what’s involved in this new release. Read more

Android Leftovers

Linux Foundation Leftovers

  • Cloud Foundry eyes China’s market with Alibaba Cloud’s membership
    Alibaba Cloud announced it is deploying Cloud Foundry on its infrastructure alongside joining the Cloud Foundry Foundation as a gold member.
  • Cloud Foundry Remains Committed, Cautious on Kubernetes
    The Cloud Foundry Foundation continues to garner strong support from the developer community. But the ongoing surge in interest around the use of Kubernetes to exploit containers for cloud deployments has placed a focus on how the Cloud Foundry Foundation will evolve. The topic of Kubernetes integration with Cloud Foundry was part of several sessions and keynote addresses at this week’s Cloud Foundry Summit. While the organization has tangentially begun to integrate the container orchestrator into its work, it remains cautious on a stronger embrace.
  • Kubernetes and Cloud Foundry grow closer
    Containers are eating the software world — and Kubernetes is the king of containers. So if you are working on any major software project, especially in the enterprise, you will run into it sooner or later. Cloud Foundry, which hosted its semi-annual developer conference in Boston this week, is an interesting example for this.
  • Cloud Foundry PaaS shops hone software delivery process
    Enterprises that have deployed Cloud Foundry platform as a service found it catalyzed new thinking about the application delivery process and other organizational practices.
  • Hyperledger bug bounty program goes public
    Hyperledger is an open-source project and hub for developers to work on blockchain technologies. The Hyperledger infrastructure is being developed in order to support cross-industry uses of distributed ledger technologies, most commonly associated with the exchange of cryptocurrency. [...] Over the past year, Hyperledger has formalized how blockchain projects can move from development to their first 1.0 release. This process now includes a number of security requirements, including meeting the demands of the Core Infrastructure Initiative (CII), which sets "best practice" requirements for open-source project security. In addition, up to three members of a project must be nominated to the Hyperledger security team to help triage and resolve vulnerabilities.
  • iconectiv Brings Device ID Expertise to the Linux Foundation
    The Bridgewater, New Jersey-based company iconectiv this week joined the Linux Foundation Networking Fund. iconectiv is perhaps most well-known as a Local Number Portability Administrator (LNPA). In this role the company handles the administrative work to enable people to port their phone numbers between different service providers. It operates as the LNPA for the majority of countries in the world. It was named as the LNPA for the United States in 2016, taking over the role from Neustar.