Source Code Secrets
Authors: William Jolitz and Lynne Jolitz
Publisher: Peer-to-Peer Communications
Pages: 530 (hard cover)
Reviewer: Phil Hughes
Before you get too excited about a new book about the Linux kernel, let me clear the air—The Basic Kernel is about 386BSD. If you are a savvy OS person, you've already figured that out from the names of the authors; Bill and Lynne Jolitz are the creators of 386BSD. So, why review it? Because it is a good book that covers the internals of operating systems design—and 386BSD, the system it covers, is available in source code.
The Basic Kernel is the first volume in a series entitled Operating System Source Code Secrets. The second book in the series is titled Virtual Memory. The first thirty pages of the book explain why such a book is necessary, and define both what a kernel is and the notation used in the book.
The book then talks about what code needs to be done for the kernel, presenting code fragments with explanations. About 60 pages cover the assembly code necessary to interface to the 386 processor. Not being a 386 assembly language programmer (but having extensive systems programming experience), I had some problems here. The explanations were clearly for someone with an assembly language background. I would have liked to see more in the way of “how it works” explanations. However, if you are interested in 386 code, it is probably fine.
I felt more comfortable with the next chapter, covering C code. The beginning of that chapter is typical of what follows, so I will use it as an example. The trap.c routine is introduced, along with a listing and brief explanation of its functions, followed by a detailed explanation of what the functions are, how to call them and how they are implemented. The implementation details consist of code fragments with text explanations.
The book continues in this style, covering i386/trap.c, i386/cpu.c, kern/config.c, kern/malloc.c, kern/fork.c, kern/exit.c, kern/sig.c, kern/cred.c, kern/priv.c, kern/synch.c, kern/lock.c, kern/execve.c and kern/descrip.c. If you have looked at or worked with a POSIX kernel, you can probably guess what functions are found in these files.
Three appendices cover kernel source organization, network-level security and dynamic make files. The book ends with answers to the exercises included in the chapters, and an index with entries for all the functions described.
The book is well-written, and, I expect, accurate. If you want to know how the 386BSD kernel works, this book will tell you. And, if you want to know how to implement low-level functionality that requires dealing with 386 hardware, this book has a wealth of information on the subject.
What this book won't tell you is how Linux is implemented. While the same sort of tasks have to be done in Linux, different design decisions were made for 386BSD than for Linux. As I was reading the text, many times I was thinking, “Gee, I wonder if this is done the same way in Linux?” If that comparison is of interest to you, buying both The Basic Kernel and Linux Kernel Internals (reviewed in Linux Journal, December, 1996) would probably fill your needs.
Phil Hughes is the publisher of Linux Journal.
- Three EU Industries That Need HPC Now
- Preseeding Full Disk Encryption
- Chemistry on the Desktop
- William Rothwell and Nick Garner's Certified Ethical Hacker Complete Video Course (Pearson IT Certification)
- FinTech and SAP HANA
- Two Factors Are Better Than One
- Five HPC Cost Considerations to Maximize ROI
- HOSTING Monitoring Insights
- GRUB Boot from ISO
- Hodge Podge
Pick up any e-commerce web or mobile app today, and you’ll be holding a mashup of interconnected applications and services from a variety of different providers. For instance, when you connect to Amazon’s e-commerce app, cookies, tags and pixels that are monitored by solutions like Exact Target, BazaarVoice, Bing, Shopzilla, Liveramp and Google Tag Manager track every action you take. You’re presented with special offers and coupons based on your viewing and buying patterns. If you find something you want for your birthday, a third party manages your wish list, which you can share through multiple social- media outlets or email to a friend. When you select something to buy, you find yourself presented with similar items as kind suggestions. And when you finally check out, you’re offered the ability to pay with promo codes, gifts cards, PayPal or a variety of credit cards.Get the Guide