Главная | Соглашение | Публикация статей

Memory management Freebsd
Категория: English version

Each process begins with the execution of the three segments of memory: the code (text), and the stack. Segment data is divided into initialized data and uninitialized data (also known as BSS). Segment text is a segment of read-only, and is usually divided among all the processes running the file, while in the field of data and the stack can be achieved record and individually for each process. Segment text and initialized data to be read out of the executable file. The executable file is different in that it is normal file (and not a catalog, special file or symbolic link) and it installed one or more bits to allow access for execution. Each executable file is the title of exec, containing the magic number denoting the type of executable file. FreeBSD supports a number of executable formats, including the following. Files that should be read as interpreter. Files that can be performed directly, including AOUT, ELF and compressed gzip ELF. The executable file is first analyzed the structure of the revitalization of the image (imgact). The title of the file to be executed, passed on a list of registered activators image to detect a suitable format. When a suitable format is found, activates the appropriate way of preparing a file to perform U file into the first category, magic number (2 occupies the first byte file) is a sequence of two characters «#!», Followed by the path name to the interpreter, to be be used. This path name is currently limited to a constant-time compilation of 128 characters. For example, #! / Bin / sh refers to the Bourne shell. Activator image, which will be selected, handles call interpreters. It will download and run this interpreter, passed as an argument to the file name to be interpreted. To prevent infinite loop FreeBSD allows only one level of interpretation, and the interpreter file can not be interpreted For reasons of productivity, most files are in the second category and are immediately carried out. The information in the header directly execute the file includes architecture and operating system for which the executable file was created, and indicates whether it is statically configured or using shared libraries. Selected activator can be used in information such as knowledge of operating system, which was compile an executable file that otkonfigurirovat nucleus for the use of appropriate interpretation system calls during the program. For example, an executable file, built to run on Linux, can easily run on FreeBSD vector using redirects calls to emulation system calls Linux. The title also indicates the size of segments of text, initialized data, uninitialized data and additional information for debugging. Debug information is not used by the kernel or running the program. In the title should be a segment of text, followed by the image of initialized data. Uninitialized data does not contain executable files, because they can be created on demand using zeros memory filled. More detail you can see the domestic appliance in the library of BSD Unix documentation
Memory management Freebsd

Статьи по теме:

Tame your registration with the Windows software cleaning registry
The company Janet Systems Llc Presented Soa-Platform The exhibition «E-Kazakhstan»
Downloading multiple operating systems
Access
Restoring files myth or reality?
Concentrators Ethernet NetGear
Developing databases, Inside View
Installing Windows Xp on a network without the use of Ris
Enabling Windows XP
Development of Software Development Projects
Hackers can control a PC without the knowledge of their owners
SWISH Max or Flash animation effects
Availability of Linux: The importance of today's world
The destruction of computer data
Threats to Security Modern Networks
Productivity billing system
The company Janet Systems Llc Presented Soa-Platform Ijanet Framework Ultra The exhibition «Kitel 2008»
Working in Windows Vista
Inkjet Plotters (SP, INK-JET PLOTTER)
Using Protection Agency to maintain the security Professional
Introducing the expense of medical software - to allow for medical centers
Three Training from well-known vendors: Especially for «antiviral Decisions»
Best Antivirus
LIBCOM-2007: new items of high technology from the company «Alee Software»
Marking + control autopsy with labels B-367
Architecture Risc Computational kernels
The process of software development, the Program for Business
The total points in the organization LAN
Increases user rights
The new search software
Repair & servicing Windows registry
Basics With Virtualdub
Zao «Light Kommunikeyshn» confirm its status «Microsot Gold Certified Partner» In 2008
Why work for a computer is harmful to human health
Desk Microsoft Windows XP
The situation for the computer
Legal and technical documents
The development control information tools for PADS
Classification of computers
Classification LAN (LCS)
Maintenance of computers in the Framework for IT outsourcing
The possibility of CompactPCI have more than 8 slots
Sugarcrm In Russia
Loading the alternative mode
Visual work for the computer and its consequences
The structure of the PC
The reverse side of the coin Spyware
Robot Helps Salamandra Razgadyvat Riddles Evolution
Hide your important documents, a computer in seconds
TYPES LKS
Linux: Gentoo Vs Ubuntu Functionality
On Legalization. Price Errors!
The advent of IBM PC
Advantages of Mobile Commerce
Client accounting, Accounting orders - the most popular Software