The Design of the UNIX Operating SystemThis is the first, and still, the most comprehensive book to describe the sophisticated workings of the UNIX System V kernel--the internal algorithms, the structures that form the basis of the UNIX operating system, and their relationship to the programming interface. System programmers will gain a better understanding of how the kernel works and will be able to compare algorithms used in the UNIX system to algorithms used in other operating systems. Programmers on UNIX systems will gain a deeper understanding of how their programs interact with the system and can thereby code more efficient programs. |
From inside the book
Results 1-3 of 11
Page 227
... setuid program or when it invokes the setuid system call explicitly . A setuid program is an executable file that has the setuid bit set in its permission mode field . When a process execs a setuid program , the kernel sets the ...
... setuid program or when it invokes the setuid system call explicitly . A setuid program is an executable file that has the setuid bit set in its permission mode field . When a process execs a setuid program , the kernel sets the ...
Page 228
... setuid ( euid ) ; printf ( " after setuid ( % d ) : uid % d euid % d \ n " , euid , getuid , geteuid ( ) ) ; Figure 7.25 . Example of Execution of Setuid Program for the file , but the process can open file " maury " . After calling setuid ...
... setuid ( euid ) ; printf ( " after setuid ( % d ) : uid % d euid % d \ n " , euid , getuid , geteuid ( ) ) ; Figure 7.25 . Example of Execution of Setuid Program for the file , but the process can open file " maury " . After calling setuid ...
Page 229
... setuid system call , thus recalling its original , effective user ID . The login program executed by users when logging into the system is a typical program that calls the setuid system call . Login is setuid to root ( superuser ) and ...
... setuid system call , thus recalling its original , effective user ID . The login program executed by users when logging into the system is a typical program that calls the setuid system call . Login is setuid to root ( superuser ) and ...
Contents
PREFACE xi | 7 |
INTRODUCTION TO THE KERNEL | 18 |
THE BUFFER CACHE | 38 |
Copyright | |
12 other sections not shown
Common terms and phrases
addr algorithm block number buffer cache byte offset Chapter char child process clist clock interrupt contains context layer context switch copy copy on write creates current directory data structures demand paging disk block example exec executable file exit fault handler file descriptor file name file system file table entry flag free inodes free list function hardware hash queue implementation increments inode number input interface interrupt handler invokes kernel allocates kernel mode line discipline linked list lock loop named pipe open system call output page table parameters parent process path name physical memory pointer priority Proc process executes process sleeps process table processor program in Figure reference count region table satellite process scheduling Section semaphore semaphore value setuid shared memory shell signal super block superuser swap device swapper text region UNIX system unlink user file descriptor user mode user-level waiting write