Under the hood

From the developerWorks archives

Peter Seebach

Date archived: September 8, 2016 | First published: May 17, 2011

Part 2 of this series details how pseudo's root emulation works by tracking the path of an intercepted call to the database and back. Get a detailed explanation of various mechanisms in pseudo; the basic IPC model, interactions with the database, and an analysis of what exactly happens when the client needs to talk to the server. If you want to replace open(2) with your own code, this is where you find out how.

This content is no longer being updated or maintained. The full article is provided "as is" in a PDF file. Given the rapid evolution of technology, some steps and illustrations may have changed.

Zone=Open source, Linux
ArticleTitle=All about pseudo, Part 2: Under the hood