The Design of the UNIX Operating SystemPrentice-Hall, 1986 - 471 Seiten This is the first, and still, the most comprehensive book to describe the sophisticated workings of the UNIX System V kernel--the internal algorithms, the structures that form the basis of the UNIX operating system, and their relationship to the programming interface. System programmers will gain a better understanding of how the kernel works and will be able to compare algorithms used in the UNIX system to algorithms used in other operating systems. Programmers on UNIX systems will gain a deeper understanding of how their programs interact with the system and can thereby code more efficient programs. |
Im Buch
79 Seiten stimmen mit dem Suchbegriff "lock" in diesem Buch überein.
Wo ist der Rest dieses Buches?
Ergebnisse 1-3 von 79
Inhalt
PREFACE xi | 7 |
INTRODUCTION TO THE KERNEL | 18 |
THE BUFFER CACHE | 38 |
Urheberrecht | |
12 weitere Abschnitte werden nicht angezeigt.
Häufige Begriffe und Wortgruppen
addr algorithm block number buffer cache byte offset Chapter char child process clist clock interrupt contains context layer context switch copy copy on write creates current directory data structures demand paging disk block example exec executable file exit fault handler file descriptor file name file system file table entry flag free inodes free list function hardware hash queue implementation increments inode number input interface interrupt handler invokes kernel allocates kernel mode line discipline linked list lock loop named pipe open system call output page table parameters parent process path name physical memory pointer priority Proc process executes process sleeps process table processor program in Figure reference count region table satellite process scheduling Section semaphore semaphore value setuid shared memory shell signal super block superuser swap device swapper text region UNIX system unlink user file descriptor user mode user-level waiting write
Verweise auf dieses Buch
Real-time Systems and Programming Languages: Ada 95, Real-time Java, and ... Alan Burns,Andrew J. Wellings Keine Leseprobe verfügbar - 2001 |
IT-Security and Privacy: Design and Use of Privacy-Enhancing ..., Ausgabe 1958 Simone Fischer-Hübner Keine Leseprobe verfügbar - 2001 |