Thursday, December 27, 2007

Difference betn vfork & fork

quick question: what’s the difference between fork() and vfork() system calls ?

quick answer: vfork() system call creates a process that shares the memory address space of its parent.

details:

fork() is implemented by linux as a clone() system call whose flags parameter specifies both a SIGCHLD signal and all the clone flags cleared and whose child_stack parameter is 0.

vfork() is implemented by linux as a clone() system call whose flags parameter specifies both a SGCHLD signal and flags CLONE_VM and CLONE_VFORK and whose second parameter is 0.

[ discussion: copy on write ]

This is a concept of making the process creation using fork() efficient in that instead of copying the parent’s address space while process creation, it is shared but as soon as either of them write on the page, kernel allocates a new page and assigns it to the writer process.

Most of the time, forking is required just to run a new process in which case it’s a waste to copy the whole parent address space.



source* http://whatilearned2day.wordpress.com/2007/02/05/fork-and-vfork/



Some systems have a system call vfork(), which was originally
designed as a lower-overhead version of fork(). Since
fork() involved copying the entire address space of the process,
and was therefore quite expensive, the vfork() function was
introduced (in 3.0BSD).



However, since vfork() was introduced, the
implementation of fork() has improved drastically, most notably
with the introduction of `copy-on-write', where the copying of the
process address space is transparently faked by allowing both processes
to refer to the same physical memory until either of them modify
it. This largely removes the justification for vfork(); indeed, a
large proportion of systems now lack the original functionality of
vfork() completely. For compatibility, though, there may still be
a vfork() call present, that simply calls fork() without
attempting to emulate all of the vfork() semantics.



As a result, it is very unwise to actually make use of any of the
differences between fork() and vfork(). Indeed, it is
probably unwise to use vfork() at all, unless you know exactly
why you want to.



The basic difference between the two is that when a new process is
created with vfork(), the parent process is temporarily
suspended, and the child process might borrow the parent's address
space. This strange state of affairs continues until the child process
either exits, or calls execve(), at which point the parent
process continues.



This means that the child process of a vfork() must be careful to
avoid unexpectedly modifying variables of the parent process. In
particular, the child process must not return from the function
containing the vfork() call, and it must not call
exit() (if it needs to exit, it should use _exit();
actually, this is also true for the child of a normal fork()).


Source* http://www.unixguide.net/unix/programming/1.1.2.shtml


During the fork() system call the Kernel makes a copy of the parent process�s address space and attaches it to the child process.But the vfork() system call do not makes any copy of the parent�s address space, so it is faster than the fork() system call. The child process as a result of the vfork() system call executes exec() system call. The child process from vfork() system call executes in the parent�s address space (this can overwrite the parent�s data and stack ) which suspends the parent process until the child process exits.


Source* http://www.kyapoocha.com/unix-interview-questions/difference-between-the-fork-and-vfork-system-call/



During the fork() system call the Kernel makes a copy of the parent process’s address space and attaches it to the child process.
But the vfork() system call do not makes any copy of the parent’s address space, so it is faster than the fork() system call. The child process as a result of the vfork() system call executes exec() system call. The child process from vfork() system call executes in the parent’s address space (this can overwrite the parent’s data and stack ) which suspends the parent process until the child process exits.

Source* http://www.technicalinterview.info/difference-between-the-fork-and-vfork-system-call/

Saturday, December 22, 2007

Kernel Compiletion (make target)

Informational Targets


Target

Description

kernelrelease

Displays the current kernel version, as determined by the build system.

kernelversion

Displays the current kernel version, as told by the main Makefile. This differs from the kernelrelease target in that it doesn’t use any additional version information based on configuration options or localversion files.


Cleaning Targets


Target

Description

clean

Removes most of the files generated by the kernel build system, but keeps the kernel configuration.

mrproper

Removes all of the generated files by the kernel build system, including the configuration and some various backup files.

distclean

Does everything mrproper does and removes some editor backup and patch leftover files.



Configuration Targets


Target

Description

config

Updates the current kernel configuration by using a line-oriented program.

menuconfig

Updates the current kernel configuration by using a text-based menu program.

xconfig

Updates the current kernel configuration by using a QT-based graphical program.

gconfig

Updates the current kernel configuration by using a GTK+-based graphical program.

oldconfig

Updates the current kernel configuration by using the current .config file and prompting for any new options that have been added to the kernel.

silentoldconfig

Just like oldconfig, but prints nothing to the screen except when a question needs to be answered.

randconfig

Generates a new kernel configuration with random answers to all of the different options.

defconfig

Generates a new kernel configuration with the default answer being used for all options. The default values are taken from a file located in the arch/$ARCH/defconfig file, where $ARCH

refers to the specific architecture for which the kernel is being built.

allmodconfig

Generates a new kernel configuration in which modules are enabled whenever possible.

allyesconfig

Generates a new kernel configuration with all options set to yes.

allnoconfig

Generates a new kernel configuration with all options set to no.



Build Targets


Target

Description

all

Builds all of the different targets needed for this kernel to be able to be used. This includes both the modules and the static portion of the kernel.

vmlinux

Builds just the static portion of the kernel, not any loadable modules.

modules

Builds all of the loadable kernel modules for this configuration.

modules_install

Installs all of the modules into the specified location. If no location is specified with the INSTALL_MODULE_PATH environment variable, they are installed in the default root

directory of the machine.

dir/

Builds all of the files in the specified directory and in all subdirectories below it.

dir/file.[o|i|s]

Builds only the specified file.

dir/file.ko

Builds all of the needed files and links them together to form the specified module.

tags

Builds all of the needed tags that most common text editors can use while editing the source code.

TAGS

Builds all of the needed tags that most common text editors can use while editing the source code.

cscope

Builds a cscope image, useful in source tree searches, of the source tree for the architecture specified by the configuration file (not all of the kernel source files).



Environment variables


Variable

Value

Description

V

0

This tells the build system to run in a quiet manner, showing only the file that is currently being built, and not the entire command that is running in order to build that file. This is the default option for the build system.

V

1

This tells the build system to operate in a verbose way, showing the full command that is being used to generate each of the specific files.

O

dir

This tells the build system to locate all output files in the dir directory, including the kernel configuration files. This allows the kernel to be built from a read-only filesystem and have the output placed in another location.

C

1

This checks all C files that are about to be built with the sparse tool, which detects common programming errors in the kernel source files. sparse can be downloaded using git from

git://git.kernel.org/pub/scm/devel/sparse/sparse.git. Nightly snapshots can be found at

http://www.codemonkey.org.uk/projects/git-snapshots/sparse/. More information on how

to use sparse can be found in the Documentation/sparse.txt file in the kernel source tree.

C

2

This forces all C files to be checked with the sparse tool, even if they did not need to be built.



Packaging Targets


Target

Description

rpm

Builds the kernel first and then packages it up as a RPM package that can be installed.

rpm-pkg

Builds a source RPM package containing the base kernel.

binrpm-pkg

Builds a RPM package that contains a compiled kernel and modules.

deb-pkg

Builds a Debian package that contains the compiled kernel and modules.

tar-pkg

Builds a tarball that contains the compiled kernel and modules.

targz-pkg

Builds a gzip-compressed tarball that contains the compiled kernel and modules.

tarbz2-pkg

Builds a bzip2-compressed tarball that contains the compiled kernel and modules.


Documentation Targets


Target

Description

xmldocs

Builds the kernel documentation as XML DocBook files.

psdocs

Builds the kernel documentation as PostScript files.

pdfdocs

Builds the kernel documentation as PDF files.

htmldocs

Builds the kernel documentation as HTML files.

mandocs

Builds the kernel documentation as a set of manpages, which can then be installed with the installmandocs target.



Architecture-Specific Targets


Target

Description

bzImage

Creates a compressed kernel image and places it in the arch/i386/boot/bzImage file. This is the default target for the i386 kernel build.

install

Installs the kernel image using the distribution-specific /sbin/installkernel program. Note that this does not install the kernel modules; that must be done with the modules_install target.

bzdisk

Creates a boot floppy image and writes it to the /dev/fd0 device.

fdimage

Creates a boot floppy image and places it in the file arch/i386/boot/fdimage. The mtools package must be present on your system in order for this to work properly.

isoimage

Creates a CD-ROM boot image and places it in the file arch/i396/boot/image.iso. The syslinux package must be present on your system in order for this to work properly.



Analysis Targets


Target

Description

checkstack

Generate a list of the functions that use the most of the kernel stack space.

namespacecheck

Generate a list of all of the kernel symbols and their namespaces. This will be a large list.






Friday, December 21, 2007

Process States

R ------> running.
S -----> sleeping in an interruptible wait.
D ------> waiting in interruptible disk sleep.
Z ------> zombie.
T ----> traced or stopped (on a signal).
W ----> paging.

Monday, December 3, 2007

Linux Signals

Signal

Description

Default Action

SIGABRT

Generated by the abort system call (POSIX)

Process terminates and dumps core

SIGALRM


A timer signal generated by the alarm system call (POSIX)

Process terminates

SIGBUS

Process attempted to use mis-or

unaligned memory (4.2 BSD)

Process terminates and dumps core.

SIGCHLD


A child has stopped or terminated (POSIX)

Ignore

SIGCONT

Process continues if it is stopped

(POSIX)

Continue (ignore if process is not

stopped)

SIGEMT


Bus (hardware) error

Process terminates and dumps core

SIGFPE


Floating-point exception (POSIX)

Process terminates and dumps core

SIGHUP

Process received a hang-up on its controlling terminal or its controlling process died

Process terminates

SIGILL


Illegal instruction (POSIX)

Process terminates and dumps core

SIGINFO


The same as SIGPWR

Ignore

SIGINT


User generated a keyboard interrupt (POSIX)

Process terminates

SIGIO


Asynchronous I/O received (4.2 BSD)

Ignore

SIGIOT


I/O trap. Same as SIGABRT (4.2 BSD)

Process terminates and dumps core

SIGKILL

Kill (POSIX)

Process terminates, cannot catch or ignore

SIGLOST

Process lost a file lock

Process terminates

SIGPIPE

Process attempted to write to a pipe with no readers (POSIX)

Process terminates

SIGPOLL


Pollable event occured (System V)

Process terminates

SIGPROF


Profiling alarm clock set on a segment of code expired (4.2 BSD)

Process terminates

SIGPWR

System detected a power failure (System V)

Ignore




SIGQUIT


User generated a keyboard quit (POSIX)

Process terminates and dumps core

SIGSEGV

Process attempted to reference inaccessible memory (POSIX)

Process terminates and dumps core

SIGSTKFLT

Process generated a stack fault ("blew the stack")

Process terminates

SIGSTOP

Stop signal (POSIX)

Stop, cannot catch or ignore

SIGSYS


Bad argument to routine

Process terminates and dumps core

SIGTERM

Process received a termination signal (POSIX)

Process terminates

SIGTRAP

Process hit a trace or breakpoint trap (usually during debugging) (POSIX)

Process terminates and dumps core

SIGTSTP

User generated a stop from the keyboard (POSIX)

Stop

SIGTTIN


Process attempted to read from stdin while running in the background (POSIX)

Stop

SIGTTOU


Process attempted to write Stop to stdout while running in the background (POSIX)


SIGUNUSED

Unused signal

Process terminates

SIGURG


Urgent condition on socket (4.2 BSD)

Ignore

SIGUSR1

User-defined signal 1 (POSIX)

Process terminates

SIGUSR2


User-defined signal 2 (POSIX)

Process terminates

SIGVTALRM

Interval alarm clock expired (4.2 BSD)

Process terminates

SIGWINCH

The size of a terminal window changed (4.3 BSD, Sun)

Ignore

SIGXCPU

Process exceeded the amount of CPU time it can use (4.2 BSD)

Process terminates and dumps core

SIGXFSZ


Process tried to access or manipulate a file larger than the syste file size limit (4.2 BSD)

Process terminates and dumps core


bits/signum.h

System Call Error Codes

Error No.

Error

Description

1

EPERM


The process lacks sufficient permissions to perform the operation it is attempting to perform.

2

ENOENT


The process is attempting to access a file or directory that does not exist.

3

ESRCH

No such process exists.

4

EINTR

A system call was interrupted.

5

EIO


Some sort of (usually hardware-related) I/O error occurred.

6

ENXIO

The I/O device or address does not exist.

7

E2BIG


The argument list passed to an exec call was too long.

8

ENOEXEC


The format of a binary that a process attempted to execute was incorrect (such as trying to run a SPARC binary on an x86 processor).

9

EBADF

An invalid file number was passed to a function that opens/close/reads/writes a file.

10

ECHILD


The process had no child process on which to wait.

11

EAGAIN

A process attempted to perform non-blocking I/O when no input was available.

12

ENOMEM


Insufficient memory is available for the requested operation.

13

EACCESS

Access to a file or other resource would be denied.

14

EFAULT

A bad pointer (one that points to inaccessible memory) was passed to a system call.

15

ENOTBLK

A process attempted to mount a device that is not a block device.

16

EBUSY

A process attempted to mount a device that is already mounted or attempted to unmount a filesystem currently in use.

17

EEXIST

Returned when you try to create a file that already exists.

18

EXDEV

Returned by the link call if the source and destination files are not on the same filesystem.

19

ENODEV

A process attempted to use a filesystem type that the kernel does not support.

20

ENOTDIR

A directory component in a pathname is not, in fact, a directory.

21

EISDIR

The filename component of a pathname is a directory, not a filename.

22

EINVAL

A process passed an invalid argument to a system call.

23

ENFILE

The system has reached the maximum number of open files it supports.

24

EMFILE

The calling process cannot open any more files because it has already opened the maximum number allowed.

25

ENOTTY

A process attempted to do terminal style I/O on a device or file that is not a terminal. This error is the famous "not a typewriter" message.

26

ETXTBSY

A process attempted to open a binary or library file that is currently in use.

27

EFBIG

The calling process attempted to write a file longer than the system maximum or the process's resource limits permit.

28

ENOSPC

A filesystem or device is full.

29

ESPIPE

A process attempted to lseek on a non-seekable file.

30

EROFS

A process attempted to write on a read-only filesystem.

31

EMLINK

The file being linked has reached the maximum number of links allowed.

32

EPIPE

The read end of a pipe is closed and SIGPIPE is being ignored or trapped.

33

EDOM

Set by math functions when an argument exceeds the function's domain.

34

ERANGE

Set by math functions when the result of the function can't be represented by the function's return type.

36

ENAMETOOLONG

A path or filename is too long.

38

ENOSYS

The system call invoked has not been implemented.

39

ENOTEMPTY

A directory on which rmdir was called is not empty.

40

ELOOP

A path involves too long a chain of symbolic links.

Saturday, December 1, 2007

Manpages

Number

Description

1

Executable programs or shell commands.

2

System calls (functions provided by the kernel)

3

Library calls (functions within program libraries)

4

Special files (usually found in /dev)

5

File formats and conventions (/etc/fstab, /proc)

6

Games

7

Miscellaneous (including macro packages and conventions), for example, man(7), groff(7)

8

System administration commands (usually only for root)

9

Kernel routines (nonstandard)