System-Level I/O „ I Have Modified Them and Added New Slides

Total Page:16

File Type:pdf, Size:1020Kb

System-Level I/O „ I Have Modified Them and Added New Slides JDEP 284H Giving credit where credit is due Foundations of Computer Systems Most of slides for this lecture are based on slides created by Drs. Bryant and O’Hallaron, Carnegie Mellon University. System-Level I/O I have modified them and added new slides. Dr. Steve Goddard [email protected] http://cse.unl.edu/~goddard/Courses/JDEP284 2 Topics A Typical Hardware System CPU chip register file Unix I/O ALU Robust reading and writing system bus memory bus Reading file metadata I/O main bus interface Sharing files bridge memory I/O redirection Standard I/O I/O bus Expansion slots for other devices such USB graphics disk as network adapters. controller adapter controller mouse keyboard monitor disk 3 4 Reading a Disk Sector: Step 1 Reading a Disk Sector: Step 2 CPU chip CPU chip CPU initiates a disk read by writing a Disk controller reads the sector and register file command, logical block number, and register file performs a direct memory access (DMA) destination memory address to a port transfer into main memory. ALU ALU (address) associated with disk controller. main main bus interface bus interface memory memory I/O bus I/O bus USB graphics disk USB graphics disk controller adapter controller controller adapter controller mouse keyboard monitor mouse keyboard monitor disk disk 5 6 Page 1 Reading a Disk Sector: Step 3 Unix Files CPU chip When the DMA transfer completes, the register file disk controller notifies the CPU with an A Unix file is a sequence of m bytes: interrupt (i.e., asserts a special “interrupt” B , B , .... , B , .... , B ALU 0 1 k m-1 pin on the CPU) All I/O devices are represented as files: /dev/sda2 (/usr disk partition) main bus interface /dev/tty2 (terminal) memory Even the kernel is represented as a file: I/O bus /dev/kmem (kernel memory image) /proc (kernel data structures) USB graphics disk controller adapter controller mouse keyboard monitor disk 7 8 Unix File Types Unix I/O Regular file The elegant mapping of files to devices allows kernel to Binary or text file. export simple interface called Unix I/O. Unix does not know the difference! Key Unix idea: All input and output is handled in a Directory file consistent and uniform way. A file that contains the names and locations of other files. Basic Unix I/O operations (system calls): Character special and block special files Opening and closing files Terminals (character special) and disks ( block special) z open()and close() Changing the current file position (seek) FIFO (named pipe) z lseek (not discussed) A file type used for interprocess comunication Reading and writing a file Socket z read() and write() A file type used for network communication between processes 9 10 Opening Files Closing Files Opening a file informs the kernel that you are getting Closing a file informs the kernel that you are finished ready to access that file. accessing that file. int fd; /* file descriptor */ int fd; /* file descriptor */ if ((fd = open(“/etc/hosts”, O_RDONLY)) < 0) { int retval; /* return value */ perror(“open”); exit(1); if ((retval = close(fd)) < 0) { } perror(“close”); exit(1); } Returns a small identifying integer file descriptor fd == -1 indicates that an error occurred Closing an already closed file is a recipe for disaster in threaded programs (more on this later) Each process created by a Unix shell begins life with three open files associated with a terminal: Moral: Always check return codes, even for seemingly 0: standard input benign functions such as close() 1: standard output 2: standard error 11 12 Page 2 Reading Files Writing Files Reading a file copies bytes from the current file Writing a file copies bytes from memory to the current file position to memory, and then updates file position. position, and then updates current file position. char buf[512]; char buf[512]; int fd; /* file descriptor */ int fd; /* file descriptor */ int nbytes; /* number of bytes read */ int nbytes; /* number of bytes read */ /* Open the file fd ... */ /* Open file fd ... */ /* Then write up to 512 bytes from buf to file fd */ /* Then read up to 512 bytes from file fd */ if ((nbytes = write(fd, buf, sizeof(buf)) < 0) { if ((nbytes = read(fd, buf, sizeof(buf))) < 0) { perror(“write”); perror(“read”); exit(1); exit(1); } } Returns number of bytes written from buf to file fd. Returns number of bytes read from file fd into buf nbytes < 0 indicates that an error occurred. nbytes < 0 indicates that an error occurred. As with reads, short counts are possible and are not errors! short counts (nbytes < sizeof(buf) ) are possible and are not errors! Transfers up to 512 bytes from address buf to file fd 13 14 Unix I/O Example Dealing with Short Counts Copying standard input to standard output one byte at a Short counts can occur in these situations: time. Encountering (end-of-file) EOF on reads. Reading text lines from a terminal. #include "csapp.h" Reading and writing network sockets or Unix pipes. int main(void) { Short counts never occur in these situations: char c; Reading from disk files (except for EOF) while(Read(STDIN_FILENO, &c, 1) != 0) Write(STDOUT_FILENO, &c, 1); Writing to disk files. exit(0); } How should you deal with short counts in your code? Use the RIO (Robust I/O) package from your textbook’s Note the use of error handling wrappers for read and csapp.c file (Appendix B). write (Appendix B). 15 16 The RIO Package Unbuffered RIO Input and Output RIO is a set of wrappers that provide efficient and robust I/O in Same interface as Unix read and write applications such as network programs that are subject to short counts. Especially useful for transferring data on network RIO provides two different kinds of functions sockets Unbuffered input and output of binary data z rio_readn and rio_writen #include “csapp.h” Buffered input of binary data and text lines ssize_t rio_readn(int fd, void *usrbuf, size_t n); z rio_readlineb and rio_readnb ssize_t rio_writen(nt fd, void *usrbuf, size_t n); z Cleans up some problems with Stevens’s readline and readn Return: num. bytes transferred if OK, 0 on EOF (rio_readn only), -1 on error functions. z Unlike the Stevens routines, the buffered RIO routines are thread- safe and can be interleaved arbitrarily on the same descriptor. rio_readn returns short count only it encounters EOF. Download from rio_writen never returns a short count. http://csapp.cs.cmu.edu/public/code.html http://csapp.cs.cmu.edu/public/ics/code/include/csapp.h Calls to rio_readn and rio_writen can be interleaved http://csapp.cs.cmu.edu/public/ics/code/src/csapp.c arbitrarily on the same descriptor. 17 18 Page 3 Implementation of rio_readn Buffered RIO Input Functions /* * rio_readn - robustly read n bytes (unbuffered) */ Efficiently read text lines and binary data from a file ssize_t rio_readn(int fd, void *usrbuf, size_t n) partially cached in an internal memory buffer { size_t nleft = n; #include “csapp.h” ssize_t nread; char *bufp = usrbuf; void rio_readinitb(rio_t *rp, int fd); while (nleft > 0) { ssize_t rio_readlineb(rio_t *rp, void *usrbuf, size_t maxlen); if ((nread = read(fd, bufp, nleft)) < 0) { ssize_t rio_readnb(rio_t *rp, void *usrbuf, size_t n); if (errno == EINTR) /* interrupted by sig handler return */ nread = 0; /* and call read() again */ Return: num. bytes read if OK, 0 on EOF, -1 on error else return -1; /* errno set by read() */ rio_readlineb reads a text line of up to maxlen bytes from } file fd and stores the line in usrbuf. else if (nread == 0) break; /* EOF */ z Especially useful for reading text lines from network sockets. nleft -= nread; rio_readnb reads up to n bytes from file fd. bufp += nread; } Calls to rio_readlineb and rio_readnb can be interleaved return (n - nleft); /* return >= 0 */ arbitrarily on the same descriptor. } z Warning: Don’t interleave with calls to rio_readn z Note: your text has a typo on this topic, pg 784. 19 20 RIO Example File Metadata Copying the lines of a text file from standard input to Metadata is data about data, in this case file data. standard output. Maintained by kernel, accessed by users with the stat and fstat functions. #include "csapp.h" /* Metadata returned by the stat and fstat functions */ int main(int argc, char **argv) struct stat { { dev_t st_dev; /* device */ int n; ino_t st_ino; /* inode */ rio_t rio; char buf[MAXLINE]; mode_t st_mode; /* protection and file type */ nlink_t st_nlink; /* number of hard links */ rio_readinitb(&rio, STDIN_FILENO); uid_t st_uid; /* user ID of owner */ while((n = rio_readlineb(&rio, buf, MAXLINE)) != 0) gid_t st_gid; /* group ID of owner */ rio_writen(STDOUT_FILENO, buf, n); dev_t st_rdev; /* device type (if inode device) */ exit(0); off_t st_size; /* total size, in bytes */ } unsigned long st_blksize; /* blocksize for filesystem I/O */ unsigned long st_blocks; /* number of blocks allocated */ time_t st_atime; /* time of last access */ time_t st_mtime; /* time of last modification */ time_t st_ctime; /* time of last change */ }; 21 22 How the Unix Kernel Represents Example of Accessing File Metadata Open Files /* statcheck.c - Querying and manipulating a file’s meta data */ #include "csapp.h" Two descriptors referencing two distinct open disk int main (int argc, char **argv) bass> ./statcheck statcheck.c files. Descriptor 1 (stdout) points to terminal, and { type: regular, read: yes struct stat stat; bass> chmod 000 statcheck.c descriptor 4 points to open disk file. char *type, *readok; bass> ./statcheck statcheck.c type: regular, read: no Descriptor table Open file table v-node table stat(argv[1], &stat); [one table per process] [shared by all processes] [shared by all processes] if (S_ISREG(stat.st_mode)) /* file type*/ File A (terminal) type = "regular"; else if (S_ISDIR(stat.st_mode)) stdin fd 0 File access stdout type = "directory"; fd 1 File pos File size Info in else stderr fd 2 stat fd 3 refcnt=1 File type struct type = "other"; ..
Recommended publications
  • Fundamentals of UNIX Lab 5.4.6 – Listing Directory Information (Estimated Time: 30 Min.)
    Fundamentals of UNIX Lab 5.4.6 – Listing Directory Information (Estimated time: 30 min.) Objectives: • Learn to display directory and file information • Use the ls (list files) command with various options • Display hidden files • Display files and file types • Examine and interpret the results of a long file listing • List individual directories • List directories recursively Background: In this lab, the student will use the ls command, which is used to display the contents of a directory. This command will display a listing of all files and directories within the current directory or specified directory or directories. If no pathname is given as an argument, ls will display the contents of the current directory. The ls command will list any subdirectories and files that are in the current working directory if a pathname is specified. The ls command will also default to a wide listing and display only file and directory names. There are many options that can be used with the ls command, which makes this command one of the more flexible and useful UNIX commands. Command Format: ls [-option(s)] [pathname[s]] Tools / Preparation: a) Before starting this lab, the student should review Chapter 5, Section 4 – Listing Directory Contents b) The student will need the following: 1. A login user ID, for example user2, and a password assigned by their instructor. 2. A computer running the UNIX operating system with CDE. 3. Networked computers in classroom. Notes: 1 - 5 Fundamentals UNIX 2.0—-Lab 5.4.6 Copyright 2002, Cisco Systems, Inc. Use the diagram of the sample Class File system directory tree to assist with this lab.
    [Show full text]
  • Copy on Write Based File Systems Performance Analysis and Implementation
    Copy On Write Based File Systems Performance Analysis And Implementation Sakis Kasampalis Kongens Lyngby 2010 IMM-MSC-2010-63 Technical University of Denmark Department Of Informatics Building 321, DK-2800 Kongens Lyngby, Denmark Phone +45 45253351, Fax +45 45882673 [email protected] www.imm.dtu.dk Abstract In this work I am focusing on Copy On Write based file systems. Copy On Write is used on modern file systems for providing (1) metadata and data consistency using transactional semantics, (2) cheap and instant backups using snapshots and clones. This thesis is divided into two main parts. The first part focuses on the design and performance of Copy On Write based file systems. Recent efforts aiming at creating a Copy On Write based file system are ZFS, Btrfs, ext3cow, Hammer, and LLFS. My work focuses only on ZFS and Btrfs, since they support the most advanced features. The main goals of ZFS and Btrfs are to offer a scalable, fault tolerant, and easy to administrate file system. I evaluate the performance and scalability of ZFS and Btrfs. The evaluation includes studying their design and testing their performance and scalability against a set of recommended file system benchmarks. Most computers are already based on multi-core and multiple processor architec- tures. Because of that, the need for using concurrent programming models has increased. Transactions can be very helpful for supporting concurrent program- ming models, which ensure that system updates are consistent. Unfortunately, the majority of operating systems and file systems either do not support trans- actions at all, or they simply do not expose them to the users.
    [Show full text]
  • Administering Unidata on UNIX Platforms
    C:\Program Files\Adobe\FrameMaker8\UniData 7.2\7.2rebranded\ADMINUNIX\ADMINUNIXTITLE.fm March 5, 2010 1:34 pm Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta UniData Administering UniData on UNIX Platforms UDT-720-ADMU-1 C:\Program Files\Adobe\FrameMaker8\UniData 7.2\7.2rebranded\ADMINUNIX\ADMINUNIXTITLE.fm March 5, 2010 1:34 pm Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Notices Edition Publication date: July, 2008 Book number: UDT-720-ADMU-1 Product version: UniData 7.2 Copyright © Rocket Software, Inc. 1988-2010. All Rights Reserved. Trademarks The following trademarks appear in this publication: Trademark Trademark Owner Rocket Software™ Rocket Software, Inc. Dynamic Connect® Rocket Software, Inc. RedBack® Rocket Software, Inc. SystemBuilder™ Rocket Software, Inc. UniData® Rocket Software, Inc. UniVerse™ Rocket Software, Inc. U2™ Rocket Software, Inc. U2.NET™ Rocket Software, Inc. U2 Web Development Environment™ Rocket Software, Inc. wIntegrate® Rocket Software, Inc. Microsoft® .NET Microsoft Corporation Microsoft® Office Excel®, Outlook®, Word Microsoft Corporation Windows® Microsoft Corporation Windows® 7 Microsoft Corporation Windows Vista® Microsoft Corporation Java™ and all Java-based trademarks and logos Sun Microsystems, Inc. UNIX® X/Open Company Limited ii SB/XA Getting Started The above trademarks are property of the specified companies in the United States, other countries, or both. All other products or services mentioned in this document may be covered by the trademarks, service marks, or product names as designated by the companies who own or market them. License agreement This software and the associated documentation are proprietary and confidential to Rocket Software, Inc., are furnished under license, and may be used and copied only in accordance with the terms of such license and with the inclusion of the copyright notice.
    [Show full text]
  • System Calls System Calls
    System calls We will investigate several issues related to system calls. Read chapter 12 of the book Linux system call categories file management process management error handling note that these categories are loosely defined and much is behind included, e.g. communication. Why? 1 System calls File management system call hierarchy you may not see some topics as part of “file management”, e.g., sockets 2 System calls Process management system call hierarchy 3 System calls Error handling hierarchy 4 Error Handling Anything can fail! System calls are no exception Try to read a file that does not exist! Error number: errno every process contains a global variable errno errno is set to 0 when process is created when error occurs errno is set to a specific code associated with the error cause trying to open file that does not exist sets errno to 2 5 Error Handling error constants are defined in errno.h here are the first few of errno.h on OS X 10.6.4 #define EPERM 1 /* Operation not permitted */ #define ENOENT 2 /* No such file or directory */ #define ESRCH 3 /* No such process */ #define EINTR 4 /* Interrupted system call */ #define EIO 5 /* Input/output error */ #define ENXIO 6 /* Device not configured */ #define E2BIG 7 /* Argument list too long */ #define ENOEXEC 8 /* Exec format error */ #define EBADF 9 /* Bad file descriptor */ #define ECHILD 10 /* No child processes */ #define EDEADLK 11 /* Resource deadlock avoided */ 6 Error Handling common mistake for displaying errno from Linux errno man page: 7 Error Handling Description of the perror () system call.
    [Show full text]
  • Filesystems HOWTO Filesystems HOWTO Table of Contents Filesystems HOWTO
    Filesystems HOWTO Filesystems HOWTO Table of Contents Filesystems HOWTO..........................................................................................................................................1 Martin Hinner < [email protected]>, http://martin.hinner.info............................................................1 1. Introduction..........................................................................................................................................1 2. Volumes...............................................................................................................................................1 3. DOS FAT 12/16/32, VFAT.................................................................................................................2 4. High Performance FileSystem (HPFS)................................................................................................2 5. New Technology FileSystem (NTFS).................................................................................................2 6. Extended filesystems (Ext, Ext2, Ext3)...............................................................................................2 7. Macintosh Hierarchical Filesystem − HFS..........................................................................................3 8. ISO 9660 − CD−ROM filesystem.......................................................................................................3 9. Other filesystems.................................................................................................................................3
    [Show full text]
  • System Programming Processes, Memory and Communication
    System Programming Processes, memory and communication Thomas Ropars [email protected] 2021 1 The slides are available at: https://m1-mosig-os.gitlab.io/ 2 References Main references: • Advanced Programming in the Unix Environment by R. Stevens • The Linux Programming Interface by M. Kerrish • Operating Systems: Three Easy Pieces by R. Arpaci-Dusseau and A. Arpaci-Dusseau (introduction chapter) • Computer Systems: A Programmer's Perspective by R. Bryant and D. O'Hallaron The content of these lectures is inspired by: • The lecture notes of Prof. J.F. Mehaut. • The lecture notes of R. Lachaize. 3 Agenda What is an operating system? Unix File System The Shell Processes Inputs/Outputs 4 Agenda What is an operating system? Unix File System The Shell Processes Inputs/Outputs 5 Purpose of an operating system Operations run by a program: • Executing instructions • Reading/writing to memory • Reading/writing files • Accessing devices The operating system is here to make it easier to write and run programs, and to manage resources. 6 What is an operating system? Figure by R. Bryant and D. O'Hallaron The operating system is a layer of software interposed between the application program and the hardware Application programs Software Operating system Processor Main memory I/O devices Hardware Two main roles: • Virtualization • Resource management 7 Virtualization Transforms the physical resources into virtualized resources: • It hides the low-level interface of the hardware and provides higher-level abstractions: I easy to use I more general (hides the differences between different hardwares) I powerful I prevents programs from misusing the hardware It provides an API (Application Programming Interface) that allows user programs to interact with OS services: • A set of libraries • System calls 8 Resource management The OS allows several programs to run on the machine at the same time.
    [Show full text]
  • GNU Findutils Finding Files Version 4.8.0, 7 January 2021
    GNU Findutils Finding files version 4.8.0, 7 January 2021 by David MacKenzie and James Youngman This manual documents version 4.8.0 of the GNU utilities for finding files that match certain criteria and performing various operations on them. Copyright c 1994{2021 Free Software Foundation, Inc. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled \GNU Free Documentation License". i Table of Contents 1 Introduction ::::::::::::::::::::::::::::::::::::: 1 1.1 Scope :::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 1 1.2 Overview ::::::::::::::::::::::::::::::::::::::::::::::::::::::: 2 2 Finding Files ::::::::::::::::::::::::::::::::::::: 4 2.1 find Expressions ::::::::::::::::::::::::::::::::::::::::::::::: 4 2.2 Name :::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 4 2.2.1 Base Name Patterns ::::::::::::::::::::::::::::::::::::::: 5 2.2.2 Full Name Patterns :::::::::::::::::::::::::::::::::::::::: 5 2.2.3 Fast Full Name Search ::::::::::::::::::::::::::::::::::::: 7 2.2.4 Shell Pattern Matching :::::::::::::::::::::::::::::::::::: 8 2.3 Links ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 8 2.3.1 Symbolic Links :::::::::::::::::::::::::::::::::::::::::::: 8 2.3.2 Hard Links ::::::::::::::::::::::::::::::::::::::::::::::: 10 2.4 Time
    [Show full text]
  • GNU Find Utility Manual
    Finding Files Edition 4.5.11-git, for GNU find version 4.5.11-git 17 November 2012 by David MacKenzie and James Youngman This file documents the GNU utilities for finding files that match certain criteria and per- forming various operations on them. Copyright c 1994, 1996, 1998, 2000, 2001, 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011 Free Software Foundation, Inc. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, with no Front-Cover Texts, and with no Back-Cover Texts. A copy of the license is included in the section entitled “GNU Free Documentation License”. i Table of Contents 1 Introduction..................................... 1 1.1 Scope .......................................................... 1 1.2 Overview ...................................................... 2 1.3 find Expressions ............................................... 3 2 Finding Files .................................... 5 2.1 Name .......................................................... 5 2.1.1 Base Name Patterns ....................................... 5 2.1.2 Full Name Patterns........................................ 5 2.1.3 Fast Full Name Search..................................... 7 2.1.4 Shell Pattern Matching .................................... 8 2.2 Links .......................................................... 9 2.2.1 Symbolic Links ...........................................
    [Show full text]
  • CIS18A: Introduction to Linux/Unix CLASSROOM ATC
    http://voyager.deanza.fhda.edu/~lalitha/cis18a/cis18a.html CIS18A: Introduction to Linux/Unix CLASSROOM ATC 204 WINTER 2015 : Section INFO: 00444 CIS -018A-61Y College academic Calendar: Winter 2015 http://deanza.fhda.edu/calendar/winterdates.html Instructor Information Name: Lalitha Krishnamurthy Office Hours: Not applicable ie None Email: krishnamurthylalitha at fhda dot edu Online Lab Hours: Wednesdays 845PM-10PM Lecture timings for CIS18A : M/W 6 PM - 750 PM Course Description This course is designed to discuss Linux/Unix Operating environment and its features. Linux/Unix commands, file structure, Regular expressions, shell features will be discussed Introduction to the features of the UNIX/LINUX operating system including text editing, text file manipulation, electronic mail, Internet utilities, directory structures, input/output handling, and shell features are part of the course curriculum CIS18A Student Learning Outcome Statements (SLO) Use the Unix/Linux Operating System utilities and shell features for basic file manipulation, networking, and communication. Course Objectives Edit text using the vi editor Maintain file and directory system Establish security and file permission, Perform basic file maintenance and use information utilities Utilize the shells Run shell commands, Implement quoting rules Communicate with email and communication utilities Apply filters and use implement basic regular expression Use basic utilities to explore system data, user data, and common tasks: exit, passwd, who, whoami, finger, w, tty, stty, uname, clear,
    [Show full text]
  • Part Workbook 5. the Linux Filesystem Table of Contents
    Part Workbook 5. The Linux Filesystem Table of Contents 1. File Details ................................................................................................................... 5 Discussion .............................................................................................................. 5 How Linux Save Files ...................................................................................... 5 What's in an inode? .......................................................................................... 6 Viewing inode information with the stat command ................................................. 9 Viewing inode information with the ls command .................................................. 10 Identifying Files by Inode ................................................................................ 10 Examples .............................................................................................................. 11 Example 1. Comparing file sizes with ls -s and ls -l ............................................... 11 Example 2. Listing files, sorted by modify time ..................................................... 11 Example 3. Decorating listings with ls -F ............................................................. 12 Online Exercises .................................................................................................... 13 Online Exercise 1. Viewing file metadata ............................................................. 13 Specification .........................................................................................
    [Show full text]
  • What Is Unix?
    Unix vs. Linux • Age – Unix: born in 1970 at AT&T/Bell Labs – Linux: born in 1992 in Helsinki, Finland • Sun, IBM, HP are the 3 largest vendors of Unix – These Unix flavors all run on custom hardware • Linux is FREE! (Speech vs. Beer) – Linux was written for Intel/x86, but runs on many platforms – Reference by U of Washington CS department The Command Prompt • Commands are the way to “do things” in Unix • A command consists of a command name and options called “flags” • Commands are typed at the command prompt • In Unix, everything (including commands) is case-sensitive [prompt]$ <command> <flags> <args> fiji:~$ ls –l -a unix-tutorial (Optional) arguments Command Prompt Command (Optional) flags Note: Many Unix commands will print a message only if something went wrong. Be careful with rm and mv. Two Basic Commands • The most useful commands you’ll ever learn: – man (short for “manual”) – info • They help you find information about other commands – man <cmd> or info <cmd> retrieves detailed information about <cmd> – man –k <keyword> searches the man page summaries (faster, and will probably give better results) – Or use flag –-help to find the manual fiji:/u15/awong$ man –k password passwd (5) - password file xlock (1) - Locks the local X display until a password is entered fiji:/u15/awong$ passwd Two Basic Commands (info) • Info, as opposed to man, is category based • Documents are hyperlinked – info <cmd> retrieves detailed information about <cmd> – info by itself will give instructions on its usage – Type q to quit. – Type h for help.
    [Show full text]
  • System-Level I/O October 13, 2009 System-Level I/O October 13, 2009
    15-213 “The course that gives CMU its Zip!” System-LevelSystem-Level I/OI/O OctoberOctober 13,13, 20092009 Topics Unix I/O Robust reading and writing Reading file metadata Sharing files I/O redirection Standard I/O lecture-13.ppt UnixUnix FilesFiles A Unix file is a sequence of m bytes: B0, B1, .... , Bk , .... , Bm-1 All I/O devices are represented as files: /dev/sda2 (/usr disk partition) /dev/tty2 (terminal) Even the kernel is represented as a file: /dev/kmem (kernel memory image) /proc (kernel data structures) –2– 15-213, F’09 UnixUnix FileFile TypesTypes Regular file File containing user/app data (binary, text, whatever) OS does not know anything about the format z other than “sequence of bytes”, akin to main memory Directory file A file that contains the names and locations of other files Character special and block special files Terminals (character special) and disks ( block special) FIFO (named pipe) A file type used for inter-process communication Socket A file type used for network comm. between processes –3– 15-213, F’09 UnixUnix I/OI/O Key Features Elegant mapping of files to devices allows kernel to export simple interface called Unix I/O. Important idea: All input and output is handled in a consistent and uniform way. Basic Unix I/O operations (system calls): Opening and closing files z open()and close() Reading and writing a file z read() and write() Changing the current file position (seek) z indicates next offset into file to read or write z Lseek () B0 B1 ••• Bk-1 Bk Bk+1 ••• –4– Current File Position
    [Show full text]