Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Device driver

From Wikipedia, the free encyclopedia
Software interface to attached devices
This article is about device drivers for hardware. For other software drivers, seeDriver (software).
Operating systems
Common features

In the context of anoperating system, adevice driver is acomputer program that operates or controls a particular type ofdevice that is attached to acomputer.[1] A driver provides a softwareinterface tohardware devices, enabling operating systems and other computer programs to access hardware functions without needing to know precise details about the hardware.

A driver communicates with the device through thecomputer bus or communications subsystem to which the hardware connects. When acalling program invokes aroutine in the driver, the driver issues commands to the device (drives it). Once the device sends data back to the driver, the driver may invoke routines in the original calling program.

Drivers are hardware-dependent and operating-system-specific. They usually provide theinterrupt handling required for any necessary asynchronous time-dependent hardware interface.[2]

Purpose

[edit]

The main purpose of device drivers is to providehardware abstraction by acting as a translator between a hardware device and the applications oroperating systems that use it.[1] Programmers can write higher-level application code independently of whatever specific hardware the end-user is using.

For example, a high-level application for interacting with aserial port may simply have two functions forsend data andreceive data. At a lower level, a device driver implementing these functions would communicate with the particular serial port controller installed on a user's computer. The commands needed to control a16550 UART are much different from the commands needed to control anUSB-to-serial adapter, but each hardware-specific device driver abstracts these details into the same (or similar) software interface.

Development

[edit]

Writing a device driver requires an in-depth understanding of how the hardware and the software work for a givenplatform function. Because drivers require low-level access to hardware functions in order to operate, drivers typically operate in a highlyprivileged environment and can cause system operational issues if something goes wrong. In contrast, misbehavior in most user-level software on modern operating systems can be stopped without greatly affecting the rest of the system. Even drivers executing inuser mode can crash a system if the device iserroneously programmed. These factors make it more difficult and dangerous to diagnose problems.[3]

The task of writing drivers thus usually falls tosoftware engineers orcomputer engineers who work for hardware-development companies. This is because they have better information than most outsiders about the design of their hardware. Moreover, it was traditionally considered in the hardwaremanufacturer's interest to guarantee that their clients can use their hardware in an optimal way. Typically, theLogical Device Driver (LDD) is written by the operating system vendor, while thePhysical Device Driver (PDD) is implemented by the device vendor. However, in recent years, non-vendors have written numerous device drivers for proprietary devices, mainly for use withfree and open source operating systems. In such cases, it is important that the hardware manufacturer provide information on how the device communicates. Although this information can instead be learned byreverse engineering, this is much more difficult with hardware than it is with software.

Windows uses a combination of driver and minidriver, where the full class/port driver is provided with the operating system, and miniclass/miniport drivers are developed by vendors and implement hardware- or function-specific subset of the full driver stack.[4] Miniport model is used byNDIS,WDM,WDDM,WaveRT,StorPort,WIA, andHID drivers; each of them uses device-specific APIs and still requires the developer to handle tedious device management tasks.

Microsoft has attempted to reduce system instability due to poorly written device drivers by creating a new framework for driver development, calledWindows Driver Frameworks (WDF). This includesUser-Mode Driver Framework (UMDF) that encourages development of certain types of drivers—primarily those that implement amessage-based protocol for communicating with their devices—as user-mode drivers. If such drivers malfunction, they do not cause system instability. TheKernel-Mode Driver Framework (KMDF) model continues to allow development of kernel-mode device drivers but attempts to provide standard implementations of functions that are known to cause problems, including cancellation of I/O operations, power management, and plug-and-play device support.

Apple has an open-source framework for developing drivers onmacOS, called I/O Kit.

InLinux environments, programmers can build device drivers as parts of thekernel, separately as loadablemodules, or as user-mode drivers (for certain types of devices where kernel interfaces exist, such as for USB devices).Makedev includes a list of the devices in Linux, including ttyS (terminal), lp (parallel port), hd (disk), loop, and sound (these includemixer,sequencer,dsp, and audio).[5]

Microsoft Windows.sys files andLinux .ko files can contain loadable device drivers. The advantage of loadable device drivers is that they can be loaded only when necessary and then unloaded, thus saving kernel memory.

Privilege levels

[edit]

Depending on the operating system, device drivers may be permitted to run at various differentprivilege levels. The choice of which level of privilege the drivers are in is largely decided by the type ofkernel an operating system uses. An operating system that uses amonolithic kernel, such as theLinux kernel, will typically run device drivers with the same privilege as all other kernel objects. By contrast, a system designed aroundmicrokernel, such asMinix, will place drivers as processes independent from the kernel but that use it for essentialinput-output functionalities and to pass messages between user programs and each other.[6]OnWindows NT, a system with ahybrid kernel, it is common for device drivers to run in eitherkernel-mode oruser-mode.[7]

The most common mechanism for segregating memory into various privilege levels is viaprotection rings. On many systems, such as those withx86 andARM processors, switching between rings imposes a performance penalty, a factor that operating system developers andembedded software engineers consider when creating drivers for devices which are preferred to be run with low latency, such asnetwork interface cards. The primary benefit of running a driver in user mode is improved stability since a poorly written user-mode device driver cannot crash the system by overwriting kernel memory.[8]

Applications

[edit]

Because of the diversity of modern[update] hardware and operating systems, drivers operate in many different environments.[9] Drivers mayinterface with:

Common levels of abstraction for device drivers include:

  • For hardware:
    • Interfacing directly
    • Writing to or reading from adevice control register
    • Using some higher-level interface (e.g.Video BIOS)
    • Using another lower-level device driver (e.g. file system drivers using disk drivers)
    • Simulating work with hardware, while doing something entirely different[10]
  • For software:
    • Allowing the operating system direct access to hardware resources
    • Implementing onlyprimitives
    • Implementing an interface for non-driver software (e.g.TWAIN)
    • Implementing a language, sometimes quite high-level (e.g.PostScript)

So choosing and installing the correct device drivers for given hardware is often a key component of computer system configuration.[11]

Virtual device drivers

[edit]
icon
This sectiondoes notcite anysources. Please helpimprove this section byadding citations to reliable sources. Unsourced material may be challenged andremoved.(October 2025) (Learn how and when to remove this message)

Virtual device drivers represent a particular variant of device drivers. They are used to emulate a hardware device, particularly invirtualization environments, for example when a guest operating system is run on aXen host. Instead of enabling the guest operating system to dialog with hardware, virtual device drivers take the opposite role and emulates a piece of hardware, so that the guest operating system and its drivers running inside avirtual machine can have the illusion of accessing real hardware. Attempts by the guest operating system to access the hardware are routed to the virtual device driver in the host operating system as e.g., function calls. The virtual device driver can also send simulated processor-level events likeinterrupts into the virtual machine.

Virtual devices may also operate in a non-virtualized environment. For example, a virtualnetwork adapter is used with avirtual private network, while a virtualdisk device is used withiSCSI. A good example for virtual device drivers can beDaemon Tools.

There are several variants of virtual device drivers, such asVxDs,VLMs, and VDDs.

Open source drivers

[edit]

Solaris descriptions of commonly used device drivers:

  • fas: Fast/wide SCSI controller
  • hme: Fast (10/100 Mbit/s) Ethernet
  • isp: Differential SCSI controllers and the SunSwift card
  • glm: (Gigabaud Link Module[14]) UltraSCSI controllers
  • scsi: Small Computer Serial Interface (SCSI) devices
  • sf: soc+ or social Fiber Channel Arbitrated Loop (FCAL)
  • soc: SPARC Storage Array (SSA) controllers and the control device
  • social: Serial optical controllers for FCAL (soc+)

APIs

[edit]

Identifiers

[edit]

A device on thePCI bus or USB is identified by two IDs which consist of twobytes each. The vendor ID identifies the vendor of the device. The device ID identifies a specific device from that manufacturer/vendor.

A PCI device has often an ID pair for the main chip of the device, and also a subsystem ID pair that identifies the vendor, which may be different from the chip manufacturer.

Security

[edit]

Computers often have many diverse and customized device drivers running in their operating system kernel which often contain variousbugs andvulnerabilities, making them a target forexploits.[18] ABring Your Own Vulnerable Driver (BYOVD) attacker installs any signed, old third-party driver with known vulnerabilities that allow malicious code to be inserted into the kernel.[19]Drivers that may be vulnerable include those for WiFi and Bluetooth,[20][21] gaming/graphics drivers,[22] and drivers for printers.[23]

There is a lack of effective kernel vulnerability detection tools, especially for closed-source operating systems such as Microsoft Windows[24] where the source code of the device drivers is mostlyproprietary and not available to examine,[25] and drivers often have many privileges.[26][27][28][29]

A group of security researchers considers the lack of isolation as one of themain factors underminingkernel security,[30] and published anisolation framework to protect operating system kernels, primarily themonolithicLinux kernel whose drivers they say get ~80,000commits per year.[31][32]

This section is an excerpt fromKernel (operating system) § Protection.[edit]

An important consideration in the design of a kernel is the support it provides for protection from faults (fault tolerance) and from malicious behaviours (security). These two aspects are usually not clearly distinguished, and the adoption of this distinction in the kernel design leads to the rejection of ahierarchical structure for protection.[33]

The mechanisms or policies provided by the kernel can be classified according to several criteria, including: static (enforced atcompile time) or dynamic (enforced atrun time); pre-emptive or post-detection; according to the protection principles they satisfy (e.g.,Denning[34][35]); whether they are hardware supported or language based; whether they are more an open mechanism or a binding policy; and many more.

See also

[edit]

References

[edit]
  1. ^ab"What is all device driver?".WhatIs.com. TechTarget.Archived from the original on 13 February 2021. Retrieved19 March 2018.
  2. ^EMC Education Services (2010).Information Storage and Management: Storing, Managing, and Protecting Digital Information. John Wiley & Sons.ISBN 9780470618332.Archived from the original on 2021-02-13. Retrieved2020-11-10.
  3. ^Burke, Timothy (1995).Writing device drivers: tutorial and reference. Digital Press.ISBN 9781555581411.Archived from the original on 2021-01-26. Retrieved2016-08-05.
  4. ^"Choosing a driver model". Microsoft. Retrieved2021-03-30.
  5. ^"MAKEDEV — Linux Command — Unix Command". Linux.about.com. 2009-09-11.Archived from the original on 2009-04-30. Retrieved2009-09-17.
  6. ^Tanenbaum, Andrew; Woodhull, Albert (2006).Operating Systems, Design and Implementation (3rd. ed.). Upper Saddle River, NJ: Pearson Pretence Hall. p. 256.ISBN 0-13-142938-8.
  7. ^Yosifovich, Pavel; Ionescu, Alex; Russinovich, Mark; Solomon, David (2017).Windows Internals, Part 1 (Seventh ed.). Redmond, Washington: Microsoft Press.ISBN 978-0-7356-8418-8.
  8. ^"Introduction to the User-Mode Driver Framework (UMDF)".Microsoft. 2006-10-10.Archived from the original on 2010-01-07. Retrieved2008-03-04.
  9. ^Deborah Morley (2009).Understanding Computers 2009: Today and Tomorrow. Cengage Learning.ISBN 9780324830132.Archived from the original on 2021-06-09. Retrieved2020-11-10.
  10. ^Computer Peripherals and Interfaces. Technical Publications Pune. January 2008. pp. 5–8.ISBN 978-8184314748. Retrieved2016-05-03.[permanent dead link]
  11. ^"What are Device Drivers and why do we need them?".drivers.com. April 17, 2015.Archived from the original on November 20, 2016. RetrievedMarch 19, 2018.
  12. ^"CCISS".SourceForge. 2010. Archived fromthe original on 2010-08-21. Retrieved2010-08-11.Drivers for the HP (previously Compaq) Smart Array controllers which provide hardware RAID capability.
  13. ^Russell, Steve; et al. (2003-10-21).Abbreviations and acronyms. IBM International Technical Support Organization. p. 207.ISBN 0-7384-2684-9. Retrieved2011-08-14.{{cite book}}:|work= ignored (help)[permanent dead link]
  14. ^"US Patent 5969841 - Gigabaud link module with received power detect signal". PatentStorm LLC. Archived fromthe original on 2011-06-12. Retrieved2009-09-08.An improved Gigabaud Link Module (GLM) is provided for performing bi-directional data transfers between a host device and a serial transfer medium.
  15. ^"Unified Audio Model (Windows CE 5.0)".Microsoft Developer Network. 14 September 2012.Archived from the original on 2017-06-22. Retrieved2016-09-19.
  16. ^Dell US."What are DCH drivers and why do you need to know about them? | Dell US".www.dell.com. Retrieved2020-10-29.
  17. ^"dxd - dynax driver framework: Main Page".dxd.dynax.at.Archived from the original on 2016-05-29. Retrieved2016-09-19.
  18. ^Talebi, Seyed Mohammadjavad Seyed; Tavakoli, Hamid; Zhang, Hang; Zhang, Zheng; Sani, Ardalan Amiri; Qian, Zhiyun (2018).Charm: Facilitating Dynamic Analysis of Device Drivers of Mobile Systems. pp. 291–307.ISBN 9781939133045.Archived from the original on 5 November 2022. Retrieved5 November 2022.
  19. ^Goodin, Dan (14 October 2022)."How a Microsoft blunder opened millions of PCs to potent malware attacks".Ars Technica.Archived from the original on 8 November 2022. Retrieved8 November 2022.
  20. ^Ridley, Jacob (9 February 2022)."You're going to want to update your Wi-Fi and Bluetooth drivers today".PC Gamer.Archived from the original on 5 November 2022. Retrieved5 November 2022.
  21. ^"Wireless 'BlueBorne' Attacks Target Billions of Bluetooth Devices".threatpost.com.Archived from the original on 5 November 2022. Retrieved5 November 2022.
  22. ^Spadafora, Anthony (12 January 2022)."Installing gaming drivers might leave your PC vulnerable to cyberattacks".TechRadar.Archived from the original on 5 November 2022. Retrieved5 November 2022.
  23. ^"HP patches vulnerable driver lurking in printers for 16 years".ZDNET.Archived from the original on 5 November 2022. Retrieved5 November 2022.
  24. ^Pan, Jianfeng; Yan, Guanglu; Fan, Xiaocao (2017).Digtool: A {Virtualization-Based} Framework for Detecting Kernel Vulnerabilities. USENIX Association. pp. 149–165.ISBN 9781931971409. Retrieved5 November 2022.
  25. ^King, Bertel (18 June 2022)."Closed Source vs. Open Source Hardware Drivers: Why It Matters".MUO.Archived from the original on 5 November 2022. Retrieved5 November 2022.
  26. ^Branscombe, Mary (7 April 2022)."How Microsoft blocks vulnerable and malicious drivers in Defender, third-party security tools and in Windows 11".TechRepublic.Archived from the original on 5 November 2022. Retrieved5 November 2022.
  27. ^Goodin, Dan (5 October 2022)."No fix in sight for mile-wide loophole plaguing a key Windows defense for years".Ars Technica.Archived from the original on 5 November 2022. Retrieved5 November 2022.
  28. ^Davenport, Corbin.""Bring Your Own Vulnerable Driver" Attacks Are Breaking Windows".How-To Geek.Archived from the original on 5 November 2022. Retrieved5 November 2022.
  29. ^"Windows 10 Security Alert: Vulnerabilities Found in Over 40 Drivers".BleepingComputer.Archived from the original on 5 November 2022. Retrieved5 November 2022.
  30. ^"Fine-grained kernel isolation".mars-research.github.io.Archived from the original on 15 September 2022. Retrieved15 September 2022.
  31. ^Fetzer, Mary."Automatic device driver isolation protects against bugs in operating systems".Pennsylvania State University via techxplore.com.Archived from the original on 15 September 2022. Retrieved15 September 2022.
  32. ^Huang, Yongzhe; Narayanan, Vikram; Detweiler, David; Huang, Kaiming; Tan, Gang; Jaeger, Trent; Burtsev, Anton (2022)."KSplit: Automating Device Driver Isolation"(PDF).Archived(PDF) from the original on 15 September 2022. Retrieved15 September 2022.
  33. ^Wulf 1974 pp.337–345
  34. ^Denning 1976
  35. ^Swift 2005, p.29 quote: "isolation, resource control, decision verification (checking), and error recovery."

External links

[edit]
General
Variants
Kernel
Architectures
Components
Process management
Concepts
Scheduling
algorithms
Memory management,
resource protection
Storage access,
file systems
Supporting concepts
International
National
Other
Retrieved from "https://en.wikipedia.org/w/index.php?title=Device_driver&oldid=1324285477"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp