⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 intro.2

📁 早期freebsd实现
💻 2
📖 第 1 页 / 共 2 页
字号:
.It Er 61 ECONNREFUSED Em "Connection refused" .No connection could be made because the target machine activelyrefused it.  This usually results from trying to connectto a service that is inactive on the foreign host..It Er 62 ELOOP Em "Too many levels of symbolic links" .A path name lookup involved more than 8 symbolic links..It Er 63 ENAMETOOLONG Em "File name too long" .A component of a path name exceeded 255.Pq Dv MAXNAMELENcharacters, or an entirepath name exceeded 1023.Pq Dv MAXPATHLEN Ns -1characters..It Er 64 EHOSTDOWN Em "Host is down" .A socket operation failed because the destination host was down..It Er 65 EHOSTUNREACH Em "No route to host" .A socket operation was attempted to an unreachable host..It Er 66 ENOTEMPTY Em "Directory not empty" .A directory with entries other than.Ql \&.and.Ql \&..was supplied to a remove directory or rename call..It Er 67 EPROCLIM Em "Too many processes" ..It Er 68 EUSERS Em "Too many users" .The quota system ran out of table entries..It Er 69 EDQUOT Em "Disc quota exceeded" .A .Xr writeto an ordinary file, the creation of adirectory or symbolic link, or the creation of a directoryentry failed because the user's quota of disk blocks wasexhausted, or the allocation of an inode for a newlycreated file failed because the user's quota of inodeswas exhausted..It Er 70 ESTALE Em "Stale NFS file handle" .An attempt was made to access an open file (on an.Tn NFSfilesystem)which is now unavailable as referenced by the file descriptor.  This may indicate the file was deleted on the.Tn NFS server or some other catastrophic event occurred..It Er 72 EBADRPC Em "RPC struct is bad" .Exchange of.Tn RPCinformation was unsuccessful..It Er 73 ERPCMISMATCH Em "RPC version wrong" .The version of.Tn RPCon the remote peer is not compatible withthe local version..It Er 74 EPROGUNAVAIL Em "RPC prog. not avail" .The requested program is not registered on the remote host..It Er 75 EPROGMISMATCH Em "Program version wrong" .The requested version of the program is not available on the remote host.Pq Tn RPC ..It Er 76 EPROCUNAVAIL Em "Bad procedure for program" .An.Tn RPCcall was attempted for a procedure which doesn't existin the remote program..It Er 77 ENOLCK Em "No locks available" .A system-imposed limit on the number of simultaneous file locks was reached..It Er 78 ENOSYS Em "Function not implemented" .Attempted a system call that is not available on this system..Sh DEFINITIONS.Bl -tag -width Ds.It  Process ID .Each active process in the system is uniquely identified by a non-negativeinteger called a process ID.  The range of this ID is from 0 to 30000..It  Parent process IDA new process is created by a currently active process; (see.Xr fork 2 ) .The parent process ID of a process is initially the process ID of its creator.If the creating process exits,the parent process ID of each child is set to the ID of a system process,.Xr init ..It  Process GroupEach active process is a member of a process group that is identified bya non-negative integer called the process group ID.  This is the processID of the group leader.  This grouping permits the signaling of relatedprocesses (see.Xr termios 4 )and the job control mechanisms of.Xr csh 1 ..It SessionA session is a set of one or more process groups.A session is created by a successful call to.Xr setsid 2 ,which causes the caller to become the only member of the only processgroup in the new session..It Session leaderA process that has created a new session by a successful call to.Xr setsid 2 ,is known as a session leader.Only a session leader may acquire a terminal as its controlling terminal (see.Xr termios 4 ) ..It Controlling processA session leader with a controlling terminal is a controlling process..It Controlling terminalA terminal that is associated with a session is known as the controllingterminal for that session and its members..It  "Terminal Process Group ID"A terminal may be acquired by a session leader as its controlling terminal.Once a terminal is associated with a session, any of the process groupswithin the session may be placed into the foreground by settingthe terminal process group ID to the ID of the process group.This facility is usedto arbitrate between multiple jobs contending for the same terminal;(see.Xr csh 1and.Xr tty 4 ) ..It  "Orphaned Process Group"A process group is considered to be.Em orphanedif it is not under the control of a job control shell.More precisely, a process group is orphanedwhen none of its members has a parent process that is in the same sessionas the group,but is in a different process group.Note that when a process exits, the parent process for its childrenis changed to be.Xr init ,which is in a separate session.Not all members of an orphaned process group are necessarily orphanedprocesses (those whose creating process has exited).The process group of a session leader is orphaned by definition..It "Real User ID and Real Group ID"Each user on the system is identified by a positive integertermed the real user ID..PpEach user is also a member of one or more groups. One of these groups is distinguished from others andused in implementing accounting facilities.  The positiveinteger corresponding to this distinguished group is termed the real group ID..PpAll processes have a real user ID and real group ID.These are initialized from the equivalent attributesof the process that created it..It "Effective User Id, Effective Group Id, and Group Access List"Access to system resources is governed by two values:the effective user ID, and the group access list.The first member of the group access list is also known as theeffective group ID.(In POSIX.1, the group access list is known as the set of supplementarygroup IDs, and it is unspecified whether the effective group ID isa member of the list.).PpThe effective user ID and effective group ID are initially theprocess's real user ID and real group ID respectively.  Eithermay be modified through execution of a set-user-ID or set-group-IDfile (possibly by one its ancestors) (see.Xr execve 2 ) .By convention, the effective group ID (the first member of the group accesslist) is duplicated, so that the execution of a set-group-ID programdoes not result in the loss of the original (real) group ID..PpThe group access list is a set of group IDsused only in determining resource accessibility.  Access checksare performed as described below in ``File Access Permissions''..It  "Saved Set User ID and Saved Set Group ID"When a process executes a new file, the effective user ID is setto the owner of the file if the file is set-user-ID, and the effectivegroup ID (first element of the group access list) is set to the groupof the file if the file is set-group-ID.The effective user ID of the process is then recorded as the saved set-user-ID,and the effective group ID of the process is recorded as the saved set-group-ID.These values may be used to regain those values as the effective useror group ID after reverting to the real ID (see.Xr setuid 2 ) .(In POSIX.1, the saved set-user-ID and saved set-group-ID are optional,and are used in setuid and setgid, but this does not work as desiredfor the super-user.).It  Super-userA process is recognized as a.Em super-userprocess and is granted special privileges if its effective user ID is 0..It  Special ProcessesThe processes with process IDs of 0, 1, and 2 are special.Process 0 is the scheduler.  Process 1 is the initialization process.Xr init ,and is the ancestor of every other process in the system.It is used to control the process structure.Process 2 is the paging daemon..It  DescriptorAn integer assigned by the system when a file is referencedby.Xr open 2or.Xr dup 2 ,or when a socket is created by.Xr pipe 2 ,.Xr socket 2or.Xr socketpair 2 ,which uniquely identifies an access path to that file or socket froma given process or any of its children..It  File NameNames consisting of up to 255.Pq Dv MAXNAMELENcharacters may be used to namean ordinary file, special file, or directory..PpThese characters may be selected from the set of all.Tn ASCIIcharacterexcluding 0 (NUL) and the.Tn ASCIIcode for.Ql \&/(slash).  (The parity bit,bit 7, must be 0.).PpNote that it is generally unwise to use.Ql \&* ,.Ql \&? ,.Ql \&[or.Ql \&]as part offile names because of the special meaning attached to these charactersby the shell..It  Path NameA path name is a.Tn NUL Ns -terminatedcharacter string starting with anoptional slash.Ql \&/ ,followed by zero or more directory names separatedby slashes, optionally followed by a file name.The total length of a path name must be less than 1024.Pq Dv MAXPATHLENcharacters..PpIf a path name begins with a slash, the path search begins at the.Em rootdirectory.Otherwise, the search begins from the current working directory.A slash by itself names the root directory.  An emptypathname refers to the current directory..It  DirectoryA directory is a special type of file that contains entriesthat are references to other files.Directory entries are called links.  By convention, a directorycontains at least two links,.Ql \&.and.Ql \&.. ,referred to as.Em dotand.Em dot-dotrespectively.  Dot refers to the directory itself anddot-dot refers to its parent directory..It "Root Directory and Current Working Directory"Each process has associated with it a concept of a root directoryand a current working directory for the purpose of resolving pathname searches.  A process's root directory need not be the rootdirectory of the root file system..It  File Access PermissionsEvery file in the file system has a set of access permissions.These permissions are used in determining whether a processmay perform a requested operation on the file (such as openinga file for writing).  Access permissions are established at thetime a file is created.  They may be changed at some later timethrough the .Xr chmod 2call. .PpFile access is broken down according to whether a file may be: read,written, or executed.  Directory files use the executepermission to control if the directory may be searched. .PpFile access permissions are interpreted by the system asthey apply to three different classes of users: the ownerof the file, those users in the file's group, anyone else.Every file has an independent set of access permissions foreach of these classes.  When an access check is made, the systemdecides if permission should be granted by checking the accessinformation applicable to the caller..PpRead, write, and execute/search permissions ona file are granted to a process if:.PpThe process's effective user ID is that of the super-user. (Note:even the super-user cannot execute a non-executable file.).PpThe process's effective user ID matches the user ID of the ownerof the file and the owner permissions allow the access..PpThe process's effective user ID does not match the user ID of theowner of the file, and either the process's effectivegroup ID matches the group IDof the file, or the group ID of the file is inthe process's group access list,and the group permissions allow the access..PpNeither the effective user ID nor effective group IDand group access list of the processmatch the corresponding user ID and group ID of the file,but the permissions for ``other users'' allow access..PpOtherwise, permission is denied..It  Sockets and Address Families.PpA socket is an endpoint for communication between processes.Each socket has queues for sending and receiving data..PpSockets are typed according to their communications properties.These properties include whether messages sent and receivedat a socket require the name of the partner, whether communicationis reliable, the format used in naming message recipients, etc..PpEach instance of the system supports somecollection of socket types; consult.Xr socket 2for more information about the types available andtheir properties..PpEach instance of the system supports some number of sets ofcommunications protocols.  Each protocol set supports addressesof a certain format.  An Address Family is the set of addressesfor a specific group of protocols.  Each socket has an addresschosen from the address family in which the socket was created..Sh SEE ALSOintro(3), perror(3)

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -