Source Code Secrets
Authors: William Jolitz and Lynne Jolitz
Publisher: Peer-to-Peer Communications
Pages: 530 (hard cover)
Reviewer: Phil Hughes
Before you get too excited about a new book about the Linux kernel, let me clear the air—The Basic Kernel is about 386BSD. If you are a savvy OS person, you've already figured that out from the names of the authors; Bill and Lynne Jolitz are the creators of 386BSD. So, why review it? Because it is a good book that covers the internals of operating systems design—and 386BSD, the system it covers, is available in source code.
The Basic Kernel is the first volume in a series entitled Operating System Source Code Secrets. The second book in the series is titled Virtual Memory. The first thirty pages of the book explain why such a book is necessary, and define both what a kernel is and the notation used in the book.
The book then talks about what code needs to be done for the kernel, presenting code fragments with explanations. About 60 pages cover the assembly code necessary to interface to the 386 processor. Not being a 386 assembly language programmer (but having extensive systems programming experience), I had some problems here. The explanations were clearly for someone with an assembly language background. I would have liked to see more in the way of “how it works” explanations. However, if you are interested in 386 code, it is probably fine.
I felt more comfortable with the next chapter, covering C code. The beginning of that chapter is typical of what follows, so I will use it as an example. The trap.c routine is introduced, along with a listing and brief explanation of its functions, followed by a detailed explanation of what the functions are, how to call them and how they are implemented. The implementation details consist of code fragments with text explanations.
The book continues in this style, covering i386/trap.c, i386/cpu.c, kern/config.c, kern/malloc.c, kern/fork.c, kern/exit.c, kern/sig.c, kern/cred.c, kern/priv.c, kern/synch.c, kern/lock.c, kern/execve.c and kern/descrip.c. If you have looked at or worked with a POSIX kernel, you can probably guess what functions are found in these files.
Three appendices cover kernel source organization, network-level security and dynamic make files. The book ends with answers to the exercises included in the chapters, and an index with entries for all the functions described.
The book is well-written, and, I expect, accurate. If you want to know how the 386BSD kernel works, this book will tell you. And, if you want to know how to implement low-level functionality that requires dealing with 386 hardware, this book has a wealth of information on the subject.
What this book won't tell you is how Linux is implemented. While the same sort of tasks have to be done in Linux, different design decisions were made for 386BSD than for Linux. As I was reading the text, many times I was thinking, “Gee, I wonder if this is done the same way in Linux?” If that comparison is of interest to you, buying both The Basic Kernel and Linux Kernel Internals (reviewed in Linux Journal, December, 1996) would probably fill your needs.
Phil Hughes is the publisher of Linux Journal.
Free Webinar: Hadoop
How to Build an Optimal Hadoop Cluster to Store and Maintain Unlimited Amounts of Data Using Microservers
Realizing the promise of Apache® Hadoop® requires the effective deployment of compute, memory, storage and networking to achieve optimal results. With its flexibility and multitude of options, it is easy to over or under provision the server infrastructure, resulting in poor performance and high TCO. Join us for an in depth, technical discussion with industry experts from leading Hadoop and server companies who will provide insights into the key considerations for designing and deploying an optimal Hadoop cluster.
Some of key questions to be discussed are:
- What is the “typical” Hadoop cluster and what should be installed on the different machine types?
- Why should you consider the typical workload patterns when making your hardware decisions?
- Are all microservers created equal for Hadoop deployments?
- How do I plan for expansion if I require more compute, memory, storage or networking?
|Dynamic DNS—an Object Lesson in Problem Solving||May 21, 2013|
|Using Salt Stack and Vagrant for Drupal Development||May 20, 2013|
|Making Linux and Android Get Along (It's Not as Hard as It Sounds)||May 16, 2013|
|Drupal Is a Framework: Why Everyone Needs to Understand This||May 15, 2013|
|Home, My Backup Data Center||May 13, 2013|
|Non-Linux FOSS: Seashore||May 10, 2013|
- Dynamic DNS—an Object Lesson in Problem Solving
- Making Linux and Android Get Along (It's Not as Hard as It Sounds)
- Using Salt Stack and Vagrant for Drupal Development
- New Products
- Drupal Is a Framework: Why Everyone Needs to Understand This
- Validate an E-Mail Address with PHP, the Right Way
- A Topic for Discussion - Open Source Feature-Richness?
- Download the Free Red Hat White Paper "Using an Open Source Framework to Catch the Bad Guy"
- The Secret Password Is...
- New Products
3 hours 32 min ago
- Keeping track of IP address
5 hours 23 min ago
- Roll your own dynamic dns
10 hours 36 min ago
- Please correct the URL for Salt Stack's web site
13 hours 48 min ago
- Android is Linux -- why no better inter-operation
16 hours 3 min ago
- Connecting Android device to desktop Linux via USB
16 hours 31 min ago
- Find new cell phone and tablet pc
17 hours 29 min ago
18 hours 58 min ago
- Automatically updating Guest Additions
20 hours 7 min ago
- I like your topic on android
20 hours 53 min ago