From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-1.8 required=3.0 tests=DKIM_ADSP_CUSTOM_MED, DKIM_INVALID,DKIM_SIGNED,FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS, USER_AGENT_SANE_1 autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 3D44DC2D0DB for ; Wed, 22 Jan 2020 18:52:23 +0000 (UTC) Received: from shelob.surriel.com (shelob.surriel.com [96.67.55.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id CACDC21835 for ; Wed, 22 Jan 2020 18:52:21 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=fail reason="signature verification failed" (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="Qrs5PPYd" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org CACDC21835 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=gmail.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=kernelnewbies-bounces@kernelnewbies.org Received: from localhost ([::1] helo=shelob.surriel.com) by shelob.surriel.com with esmtp (Exim 4.92.3) (envelope-from ) id 1iuL6N-0004nc-WE; Wed, 22 Jan 2020 13:51:44 -0500 Received: from mail-ot1-x341.google.com ([2607:f8b0:4864:20::341]) by shelob.surriel.com with esmtps (TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (Exim 4.92.3) (envelope-from ) id 1iu7bh-0007qy-0s for kernelnewbies@kernelnewbies.org; Tue, 21 Jan 2020 23:27:09 -0500 Received: by mail-ot1-x341.google.com with SMTP id r27so5107678otc.8 for ; Tue, 21 Jan 2020 20:27:08 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=to:from:subject:message-id:date:user-agent:mime-version :content-transfer-encoding:content-language; bh=RcJFojvSv1E/fB4tklrYtft+zPomvJe6ckyp2Gu9N9o=; b=Qrs5PPYdzMOzBK/OBQHJofzd6jlDavPYqcy3ZOOeUKuSkGmotfCRZBMmG+oqpfJpXe tKJYtu1MhBOmYLGQApS4BGSXWQwNx2HHzunRgYY2oERMnM2NRzBOePkx304RK3Xtc/EX Y9SHxrr5HfsfDCfl/NBVRAy+Gjj2fmPDeQSyrIubI12Fvb6dvDG06DGM48WHcZvJ7prz p8J+zcYc74yN0QvaETSA6xHLe3KtQGlFX5PmTb3j07tQtr8/mUe33bsvvLIIaL1UIi/M i5P8nmxwQYwlS1jAZ2p8y6v+9jXUfAnsT+WaiEIcUyWST5Aw9X5onrn7MXljK6oxqu8X eo+A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:to:from:subject:message-id:date:user-agent :mime-version:content-transfer-encoding:content-language; bh=RcJFojvSv1E/fB4tklrYtft+zPomvJe6ckyp2Gu9N9o=; b=sVmunI592tgU/2hEFhgJMmitRAGqQtwTJ63JmglZZj1JJ3+8GNpbnXaN0VLIConSKX ipmF/2EfFvr0RS5RG4NWRZShJ1Mlj3WCBdBSRFWpahGzoehhhniB6ee7jmfvfeL6aOsY FXt6Ttm8Xu5l2A0YG+LxdEh7c/Y8xJBlOif78B0P/ocugJl5w/ef6wJEBU+E/0ffhl7S hZdJl8XvWSMyzAg+H/eOEy7q6Zu3fkhN1ULagO1jeml8MLjxQh7HOmGhwpqf2fA+pNti uaksnD7IxvbzWQBvJBXc5Enf5halD9Qp3tVUlW4wXKpU8s3IwJiR01lRmWX7zDyqm6zi PsLw== X-Gm-Message-State: APjAAAWWeqFbb9/ZshiGfceyXcGp68xm96wk95OoBrazEPhetl6H1HXH jvEZ5tvmRjtCzV02kmAyq3HZ7dlf X-Google-Smtp-Source: APXvYqz+Vykq9xvK4CiHTkd5AH6JCqQIjNL5eLHXlCgPrtT8AFWewMiLp1bsEs5j2nI3+RjALF2+Ig== X-Received: by 2002:a9d:2028:: with SMTP id n37mr6207156ota.127.1579667223556; Tue, 21 Jan 2020 20:27:03 -0800 (PST) Received: from [192.168.1.9] (cpe-66-69-233-105.austin.res.rr.com. [66.69.233.105]) by smtp.gmail.com with ESMTPSA id v23sm13440633otj.61.2020.01.21.20.27.02 for (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Tue, 21 Jan 2020 20:27:03 -0800 (PST) To: kernelnewbies@kernelnewbies.org From: WyoFlippa Subject: Kernel drivers and IOCTLs Message-ID: <8969dfce-a295-c351-201c-4d8a0e90ac58@gmail.com> Date: Tue, 21 Jan 2020 22:27:01 -0600 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:68.0) Gecko/20100101 Thunderbird/68.4.1 MIME-Version: 1.0 Content-Language: en-US X-Mailman-Approved-At: Wed, 22 Jan 2020 13:51:42 -0500 X-BeenThere: kernelnewbies@kernelnewbies.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: Learn about the Linux kernel List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Transfer-Encoding: 7bit Content-Type: text/plain; charset="us-ascii"; Format="flowed" Errors-To: kernelnewbies-bounces@kernelnewbies.org Hi, I'm working on a driver that would verify a Linux or U-Boot image is secure and I need to pass parameters such as the public key, starting address, etc. I'd heard in talking to developers that IOCTLs are frowned upon. I also found this article that seems to indicate that using sysfs or proc is a better way to go. https://www.linuxjournal.com/article/8110 but then I see this article from 2013 which is more recent than the article. https://www.kernel.org/doc/html/latest/process/botching-up-ioctls.html So are IOCTLs discouraged or not? Thanks, TW _______________________________________________ Kernelnewbies mailing list Kernelnewbies@kernelnewbies.org https://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies