Linux Kernel Architecture
Chapter 11: Extended Attributes and Access Control Lists error = ext3_set_acl(handle, inode, ACL_TYPE_ACCESS, clone); } } posix_ ...
Chapter 11: Extended Attributes and Access Control Lists If the ACL is not yet cached, then firstext3_xattr_getis called to retr ...
Chapter 11: Extended Attributes and Access Control Lists struct posix_acl_entry *pa, *pe; /* assert(atomic_read(acl->a_refcou ...
Chapter 11: Extended Attributes and Access Control Lists ext3_check_acl ext3_get_acl posix_acl_permission Figure 11-12: Code flo ...
Networks That Linux is a child of the Internet is beyond contention. Thanks, above all, to Internet communi- cation, the develop ...
Chapter 12: Networks........................................................ backbone of the network subsystem, and it is theset ...
Chapter 12: Networks Contents Network Layer Transport Layer Application Layer Transport layer Network Access Layer Data link lay ...
Chapter 12: Networks The network layer is also responsible for additional connection details such as splitting the data to be tr ...
Chapter 12: Networks A very large number of standard protocols are defined for the Internet. Usually, they are defined inRequest ...
Chapter 12: Networks 12.3 Communication via Sockets From the programmer’s view, external devices are simply regular files under ...
Chapter 12: Networks communication. For example, only TCP (for streams) or UDP (for datagram services) can be used as the transp ...
Chapter 12: Networks analogs for little endian values. They are all defined in<types.h>. Note that both little and big end ...
Chapter 12: Networks printf("\nBytes received: %u\n", bytes); printf("Text: ’%s’\n", buf); /* End communication (i.e. close sock ...
Chapter 12: Networks Echo Server How sockets are used for server processes differs slightly from how they are used in clients. T ...
Chapter 12: Networks printf("Bytes received: %u\n", bytes); printf("Text: ’%s’\n", buf); /* Send response */ write(clientfd, buf ...
Chapter 12: Networks A 4-tuple notation (192.168.1.20:7777, 192.168.1.10:3506) is used to uniquely identify a connection. The fi ...
Chapter 12: Networks Comparing TCP and UDP is like comparing the postal service with the telephone network. TCP corre- sponds to ...
Chapter 12: Networks calls. This is unavoidable because of the numerous ways in which the layers can be combined — but this does ...
Chapter 12: Networks The figure clearly illustrates that part of the bandwidth is inevitably sacrificed to accommodate control i ...
Chapter 12: Networks ❑ Since each namespace can contain different network devices, this must also be reflected in the contents o ...
«
34
35
36
37
38
39
40
41
42
43
»
Free download pdf