Torvalds on aliasing
See also PLOS article, pointer alias in C and remarks on the purpose of C. From: LKML From Linus Torvalds <> Date Tue, 5 Jun 2018 10:30:21 -0700 Subject Re: [GIT PULL] Device properties framework update for v4.18-rc1 On Mon, Jun
The replicated state machine method of fault tolerance from 1980s
The first time I saw this method was when I went to work for Parallel Computer Systems, , later called Auragen, in the famous tech startup center of Englewood Cliffs, New Jersey. I commuted there from the East Village. (True story: I
The Auragen file system.
This article on the interesting Wave Transactional File System inspired me to look up an earlier file system that also used copy on write semantics. From: Anita Borg, Wolfgang Blau, Wolfgang Graetsch, Ferdinand Herrmann, and Wolfgang Oberle. 1989. Fault tolerance
What does the UNIX file system do?
Unix, Linux, Windows and other operating systems and the world wide web all support file systems with the familiar path file names like “/home/snowden/travel/boardingpass.pdf” or “/system/passwords/secret/dontread.txt” although sometimes with different separator characters between the individual “flat” file names. For example,
Update of UNIX filesystem paper
download the paper
A claimed validated operating system.
The claim: we have demonstrated the comprehensive formal verification of the seL4 microkernel, with a complete proof chain from precise, formal statements of high-level security and safety properties to the binary executable code. GD The L4 base is useful –
Real-time Linux
My opinion has always been that the Linux-RT project was based on an unfixable engineering error. A few words on the status and the future of RT: ———————————————– The situation since last years RTLWS (https://lwn.net/Articles/572740/) has not improved at
Free Software Patents: Alan Cox
1. A method, comprising: storing, by one or more processors, confidential data in a confidential section of virtual memory, wherein storing the confidential data in the confidential section of virtual memory comprises: mapping the confidential section of virtual memory to
The multics file system
The design proposed in this paper is ubiquitous. A file is simply an ordered sequence of elements, where an element could be a machine word, a character, or a bit, depending upon the implementation. A user may create, modify or