home *** CD-ROM | disk | FTP | other *** search
Latex Auxiliary File | 1995-04-01 | 7.2 KB | 76 lines |
- \relax
- \@writefile{toc}{\protect \contentsline {section}{\protect \numberline {1}Introduction}{2}}
- \@writefile{toc}{\protect \contentsline {section}{\protect \numberline {2}Half-duplex UNIX Pipes}{3}}
- \@writefile{toc}{\protect \contentsline {subsection}{\protect \numberline {2.1}Basic Concepts}{3}}
- \@writefile{toc}{\protect \contentsline {subsection}{\protect \numberline {2.2}Creating Pipes in C}{4}}
- \@writefile{toc}{\protect \contentsline {subsection}{\protect \numberline {2.3}Pipes the Easy Way!}{9}}
- \@writefile{toc}{\protect \contentsline {subsection}{\protect \numberline {2.4}Atomic Operations with Pipes}{14}}
- \@writefile{toc}{\protect \contentsline {subsection}{\protect \numberline {2.5}Notes on half-duplex pipes:}{14}}
- \@writefile{toc}{\protect \contentsline {section}{\protect \numberline {3}Named Pipes (FIFOs - First In First Out)}{14}}
- \@writefile{toc}{\protect \contentsline {subsection}{\protect \numberline {3.1}Basic Concepts}{14}}
- \@writefile{toc}{\protect \contentsline {subsection}{\protect \numberline {3.2}Creating a FIFO}{15}}
- \@writefile{toc}{\protect \contentsline {subsection}{\protect \numberline {3.3}FIFO Operations}{16}}
- \@writefile{toc}{\protect \contentsline {subsection}{\protect \numberline {3.4}Blocking Actions on a FIFO}{18}}
- \@writefile{toc}{\protect \contentsline {subsection}{\protect \numberline {3.5}The Infamous SIGPIPE Signal}{18}}
- \@writefile{toc}{\protect \contentsline {section}{\protect \numberline {4}System V IPC}{18}}
- \@writefile{toc}{\protect \contentsline {subsection}{\protect \numberline {4.1}Fundamental Concepts}{18}}
- \@writefile{toc}{\protect \contentsline {subsubsection}{\protect \numberline {4.1.1}IPC Identifiers}{18}}
- \@writefile{toc}{\protect \contentsline {subsubsection}{\protect \numberline {4.1.2}IPC Keys}{19}}
- \@writefile{toc}{\protect \contentsline {subsubsection}{\protect \numberline {4.1.3}The {\protect \tt ipcs} Command}{20}}
- \@writefile{toc}{\protect \contentsline {subsubsection}{\protect \numberline {4.1.4}The {\protect \tt ipcrm} Command}{20}}
- \@writefile{toc}{\protect \contentsline {subsection}{\protect \numberline {4.2}Message Queues}{21}}
- \@writefile{toc}{\protect \contentsline {subsubsection}{\protect \numberline {4.2.1}Basic Concepts}{21}}
- \@writefile{toc}{\protect \contentsline {subsubsection}{\protect \numberline {4.2.2}Internal and User Data Structures}{21}}
- \@writefile{toc}{\protect \contentsline {paragraph}{Message buffer}{21}}
- \@writefile{toc}{\protect \contentsline {paragraph}{Kernel {\protect \tt msg} structure}{22}}
- \@writefile{toc}{\protect \contentsline {paragraph}{Kernel {\protect \tt msqid\protect \relax \protect \_ds} structure}{23}}
- \@writefile{toc}{\protect \contentsline {paragraph}{Kernel {\protect \tt ipc\protect \relax \protect \_perm} structure}{24}}
- \@writefile{toc}{\protect \contentsline {subsubsection}{\protect \numberline {4.2.3}SYSTEM CALL: msgget()}{25}}
- \@writefile{toc}{\protect \contentsline {subsubsection}{\protect \numberline {4.2.4}SYSTEM CALL: msgsnd()}{26}}
- \@writefile{toc}{\protect \contentsline {subsubsection}{\protect \numberline {4.2.5}SYSTEM CALL: msgctl()}{30}}
- \@writefile{toc}{\protect \contentsline {subsubsection}{\protect \numberline {4.2.6}msgtool: An interactive message queue manipulator}{32}}
- \@writefile{toc}{\protect \contentsline {paragraph}{Background}{33}}
- \@writefile{toc}{\protect \contentsline {paragraph}{Command Line Syntax}{33}}
- \@writefile{toc}{\protect \contentsline {subparagraph}{Sending Messages }{33}}
- \@writefile{toc}{\protect \contentsline {subparagraph}{Retrieving Messages}{33}}
- \@writefile{toc}{\protect \contentsline {subparagraph}{Changing the Permissions (mode)}{33}}
- \@writefile{toc}{\protect \contentsline {subparagraph}{Deleting a Queue}{33}}
- \@writefile{toc}{\protect \contentsline {paragraph}{Examples}{33}}
- \@writefile{toc}{\protect \contentsline {paragraph}{The Source}{33}}
- \@writefile{toc}{\protect \contentsline {subsection}{\protect \numberline {4.3}Semaphores}{37}}
- \@writefile{toc}{\protect \contentsline {subsubsection}{\protect \numberline {4.3.1}Basic Concepts}{37}}
- \@writefile{toc}{\protect \contentsline {subsubsection}{\protect \numberline {4.3.2}Internal Data Structures}{38}}
- \@writefile{toc}{\protect \contentsline {paragraph}{Kernel {\protect \tt semid\protect \relax \protect \_ds} structure}{38}}
- \@writefile{toc}{\protect \contentsline {paragraph}{Kernel {\protect \tt sem} structure}{39}}
- \@writefile{toc}{\protect \contentsline {subsubsection}{\protect \numberline {4.3.3}SYSTEM CALL: semget()}{39}}
- \@writefile{toc}{\protect \contentsline {subsubsection}{\protect \numberline {4.3.4}SYSTEM CALL: semop()}{41}}
- \@writefile{toc}{\protect \contentsline {subsubsection}{\protect \numberline {4.3.5}SYSTEM CALL: semctl()}{42}}
- \@writefile{toc}{\protect \contentsline {subsubsection}{\protect \numberline {4.3.6}semtool: An interactive semaphore manipulator}{47}}
- \@writefile{toc}{\protect \contentsline {paragraph}{Background}{47}}
- \@writefile{toc}{\protect \contentsline {paragraph}{Command Line Syntax}{47}}
- \@writefile{toc}{\protect \contentsline {subparagraph}{Creating a Semaphore Set}{47}}
- \@writefile{toc}{\protect \contentsline {subparagraph}{Locking a Semaphore}{47}}
- \@writefile{toc}{\protect \contentsline {subparagraph}{Unlocking a Semaphore}{47}}
- \@writefile{toc}{\protect \contentsline {subparagraph}{Changing the Permissions (mode)}{47}}
- \@writefile{toc}{\protect \contentsline {subparagraph}{Deleting a Semaphore Set}{47}}
- \@writefile{toc}{\protect \contentsline {paragraph}{Examples}{47}}
- \@writefile{toc}{\protect \contentsline {paragraph}{The Source}{48}}
- \@writefile{toc}{\protect \contentsline {subsubsection}{\protect \numberline {4.3.7}semstat: A semtool companion program}{53}}
- \@writefile{toc}{\protect \contentsline {subsection}{\protect \numberline {4.4}Shared Memory}{55}}
- \@writefile{toc}{\protect \contentsline {subsubsection}{\protect \numberline {4.4.1}Basic Concepts}{55}}
- \@writefile{toc}{\protect \contentsline {subsubsection}{\protect \numberline {4.4.2}Internal and User Data Structures}{55}}
- \@writefile{toc}{\protect \contentsline {paragraph}{Kernel {\protect \tt shmid\protect \relax \protect \_ds} structure}{55}}
- \@writefile{toc}{\protect \contentsline {subsubsection}{\protect \numberline {4.4.3}SYSTEM CALL: shmget()}{57}}
- \@writefile{toc}{\protect \contentsline {subsubsection}{\protect \numberline {4.4.4}SYSTEM CALL: shmat()}{58}}
- \@writefile{toc}{\protect \contentsline {subsubsection}{\protect \numberline {4.4.5}SYSTEM CALL: shmctl()}{59}}
- \@writefile{toc}{\protect \contentsline {subsubsection}{\protect \numberline {4.4.6}SYSTEM CALL: shmdt()}{59}}
- \@writefile{toc}{\protect \contentsline {subsubsection}{\protect \numberline {4.4.7}shmtool: An interactive shared memory manipulator}{60}}
- \@writefile{toc}{\protect \contentsline {paragraph}{Background}{60}}
- \@writefile{toc}{\protect \contentsline {paragraph}{Command Line Syntax}{60}}
- \@writefile{toc}{\protect \contentsline {subparagraph}{Writing strings to the segment}{60}}
- \@writefile{toc}{\protect \contentsline {subparagraph}{Retrieving strings from the segment}{60}}
- \@writefile{toc}{\protect \contentsline {subparagraph}{Changing the Permissions (mode)}{60}}
- \@writefile{toc}{\protect \contentsline {subparagraph}{Deleting the segment}{60}}
- \@writefile{toc}{\protect \contentsline {paragraph}{Examples}{60}}
- \@writefile{toc}{\protect \contentsline {paragraph}{The Source}{60}}
-