Loading AI tools
Skip to table of contents |
Please place new discussions at the bottom of the talk page. |
This is the talk page for discussing improvements to the Operating system article. This is not a forum for general discussion of the article's subject. |
Article policies
|
Find sources: Google (books · news · scholar · free images · WP refs) · FENS · JSTOR · TWL |
Archives: 1, 2, 3, 4, 5, 6Auto-archiving period: 180 days |
This level-4 vital article is rated C-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | |||||||||||||||||||||
|
This article is written in American English, which has its own spelling conventions (color, defense, traveled) and some terms that are used in it may be different or absent from other varieties of English. According to the relevant style guide, this should not be changed without broad consensus. |
This edit request by an editor with a conflict of interest has now been answered. |
Please replace the current contents of the "security" subsection with the following:
Extended content |
---|
Security means protecting users from other users of the same computer, as well as from those who seeking remote access to it over a network.[1] Operating systems security rests on achieving the CIA triad: confidentiality (unauthorized users cannot access data), integrity (unauthorized users cannot modify data), and availability (ensuring that the system remains available to authorized users, even in the event of a denial of service attack).[2] As with other computer systems, isolating security domains—in the case of operating systems, the kernel, processes, and virtual machines—is key to achieving security.[3] Other ways to increase security include simplicity to minimize the attack surface, locking access to resources by default, checking all requests for authorization, principle of least authority (granting the minimum privilege essential for performing a task), privilege separation, and reducing shared data.[4] Some operating system designs are more secure than others. Those with no isolation between the kernel and applications are least secure, while those with a monolithic kernel like most general-purpose operating systems are still vulnerable if any part of the kernel is compromised. A more secure design features microkernels that separate the kernel's privileges into many separate security domains and reduce the consequences of a single kernel breach.[5] Unikernels are another approach that improves security by minimizing the kernel and separating out other operating systems functionality by application.[5] Most operating systems are written in C or C++, which can cause vulnerabilities. Despite various attempts to protect against them, a substantial number of vulnerabilities are caused by buffer overflow attacks, which are enabled by the lack of bounds checking.[6] Hardware vulnerabilities, some of them caused by CPU optimizations, can also be used to compromise the operating system.[7] Programmers coding the operating system may have deliberately implanted vulnerabilities, such as back doors.[8] Operating systems security is hampered by their increasing complexity and the resulting inevitability of bugs.[9] Because formal verification of operating systems may not be feasible, operating systems developers use hardening to reduce vulnerabilities,[10] such as address space layout randomization, control-flow integrity,[11] access restrictions,[12] and other techniques.[13] Anyone can contribute code to open source operating systems, which have transparent code histories and distributed governance structures.[14] Their developers work together to find and eliminate security vulnerabilities, using techniques such as code review and type checking to avoid malicious code.[15][16] Andrew S. Tanenbaum advises releasing the source code of all operating systems, arguing that it prevents the developer from falsely believing it is secret and relying on security by obscurity.[17] References
|
Please add the following references to the "further reading" section:
Reasons: add refs, rewrite according to due weight in reliable sources, cover security concerns of open source operating systems
Thank you Buidhe paid (talk) 03:58, 2 February 2024 (UTC)
This edit request by an editor with a conflict of interest has now been answered. |
Please remove the top-level section on "real-time operating systems" (they will be covered under "types of operating systems") and change the content of the "Types of operating systems" section to the following:
Extended content |
---|
Multicomputer operating systemsWith multiprocessors multiple CPUs share memory. A multicomputer or cluster computer has multiple CPUs, each of which has its own memory. Multicomputers were developed because large multiprocessors are difficult to engineer and prohibitively expensive;[1] they are universal in cloud computing because of the size of the machine needed.[2] The different CPUs often need to send and receive messages to each other;[3] to ensure good performance, the operating systems for these machines need to minimize this copying of packets.[4] Newer systems are often multiqueue—separating groups of users into separate queues—to reduce the need for packet copying and support more concurrent users.[5] Another technique is remote direct memory access, which enables each CPU to access memory belonging to other CPUs.[3] Multicomputer operating systems often support remote procedure calls where a CPU can call a procedure on another CPU,[6] or distributed shared memory, in which the operating system uses virtualization to generate shared memory that does not actually exist.[7] Distributed systemsA distributed system is a group of distinct, networked computers—each of which might have their own operating system and file system. Unlike multicomputers, they may be dispersed anywhere in the world.[8] Middleware, an additional software layer between the operating system and applications, is often used to improve consistency. Although it functions similarly to an operating system, it is not a true operating system.[9] EmbeddedEmbedded operating systems are designed to be used in embedded computer systems, whether they are internet of things objects or not connected to a network. Embedded systems include many household appliances. The distinguishing factor is that they do not load user-installed software. Consequently, they do not need protection between different applications, enabling simpler designs. Very small operating systems might run in less than 10 kilobytes,[10] and the smallest are for smart cards.[11] Examples include Embedded Linux, QNX, VxWorks, and the extra-small systems RIOT and TinyOS.[12] Real-timeA real-time operating system is an operating system that guarantees to process events or data by or at a specific moment in time. Hard real-time systems require exact timing and are common in manufacturing, avionics, military, and other similar uses.[12] With soft real-time systems, the occasional missed event is acceptable; this category often includes audio or multimedia systems, as well as smartphones.[12] In order for hard real-time systems be sufficiently exact in their timing, often they are just a library with no protection between applications, such as eCos.[12] Virtual machineA virtual machine is an operating system that runs as an application on top of another operating system.[13] The virtual machine is unaware that it is an application and operates as if it had its own hardware.[13][14] Virtual machines can be paused, saved, and resumed, making them useful for operating systems research, development,[15] and debugging.[16] They also enhance portability by enabling applications to be run on a computer even if they are not compatible with the base operating system.[13] References
|
Also, please add the following source to further reading:
Reason: fix unsourced text, add a concise summary of virtual machines. I removed the "Single- and multi-user" section because it duplicates information that is in the new "Concurrency" section. Buidhe paid (talk) 02:57, 10 February 2024 (UTC)
This edit request by an editor with a conflict of interest has now been answered. |
Please add the following content directly after the lead:
Extended content |
---|
Definition and purposeAn operating system is difficult to define,[1] but has been called "the layer of software that manages a computer's resources for its users and their applications".[2] Operating systems include the software that is always running, called a kernel—but can include other software as well.[1][3] The two other types of programs that can run on a computer are system programs—which are associated with the operating system, but may not be part of the kernel—and applications—all other software.[3] There are three main purposes that an operating system fulfills:[4]
References
|
Reason: all OS textbooks that I was able to access started out by defining what an OS is and explaining its purpose. This section is missing in the current article. Buidhe paid (talk) 20:52, 2 February 2024 (UTC)
Part of an edit requested by an editor with a conflict of interest has been implemented. [see below] |
Please change the section header titled "multitasking" to "concurrency". Reason: this is a more commonly used term in OS textbooks (see here for evidence).
Also, please change the content of the section (including the hatnote) to:
Extended content |
---|
ConcurrencySee also: Computer multitasking and Process management (computing)
Concurrency refers to the operating system's ability to carry out multiple tasks simultaneously.[1] Virtually all modern operating systems support concurrency.[2] Threads enable splitting a process' work into multiple parts that can run simultaneously.[3] The number of threads is not limited by the number of processors available. If there are more threads than processors, the operating system kernel schedules, suspends, and resumes threads, controlling when each thread runs and how much CPU time it receives.[4] During a context switch a running thread is suspended, its state is saved into the thread control block and stack, and the state of the new thread is loaded in.[5] Historically, on many systems a thread could run until it relinquished control (cooperative multitasking). Because this model can allow a single thread to monopolize the processor, most operating systems now can interrupt a thread (preemptive multitasking).[6] Threads have their own thread ID, program counter (PC), a register set, and a stack, but share code, heap data, and other resources with other threads of the same process.[7][8] Thus, there is less overhead to create a thread than a new process.[9] On single-CPU systems, concurrency is switching between processes. Many computers have multiple CPUs.[10] Parallelism with multiple threads running on different CPUs can speed up a program, depending on how much of it can be executed concurrently.[11] SynchronizationMain article: Synchronization (computer science)
Given that threads usually share data with other threads from the same process, the order in which threads are executed could impact the result.[12] There are no guarantees about the order of execution between different threads.[13] This makes debugging multithreaded processes much more difficult.[14][15] If a program produces a different result depending on the order in which threads are executed, this is called a race condition.[16] There are different ways of avoiding race conditions. A simple option is atomic operations that cannot be interrupted or interleaved with other processes.[17] Shared objects (sometimes called monitors)[18] encapsulating heap-allocated memory into an object. The synchronization status is built into the object and hidden from the programmer, but enables the object to be locked while in use by another thread.[19] Condition variables enable a thread to wait until a lock has been released.[20] Locks can only be used by one thread at a time, often reducing performance.[21] In an attempt to increase parallelism and improve performance, programmers can split a shared object into multiple shared objects. However, this approach can cause unexpected results from interactions across objects.[21] The use of multiple locks can cause a deadlock where multiple threads are waiting for each other to finish and release their lock on a resource, thus halting execution.[22] Many operating systems include deadlock detection and recovery features,[23] for example, killing processes,[24] interrupting a process,[25] taking advantage of checkpoints to move back in the execution of a program.[26] Although the operating system can almost never prevent deadlocks, some use heuristics similar to the banker's algorithm to avoid some cases.[27] Communication deadlocks occur when two processes are waiting for a reply from each other. Timeouts are often employed to break these deadlocks.[28] References
|
Reason: fix unsourced text and ensure that topics are covered according to their prominence in reliable sources (please see the summary of several OS textbooks on my sandbox talk page).
Thank you Buidhe paid (talk) 19:30, 3 February 2024 (UTC)
Extended content |
---|
Original: Threads have their own thread ID, program counter (PC), a register set, and a stack, but share code, heap data, and other resources with other threads of the same process.
Threads have their own thread ID, program counter (PC), register set, and stack, but share code, heap data, and other resources with other threads of the same process.
Shared objects (sometimes called monitors)[18] encapsulating heap-allocated memory into an object.
Many operating systems include deadlock detection and recovery features, for example, killing processes, interrupting a process, taking advantage of checkpoints to move back in the execution of a program.
Many operating systems include deadlock detection and recovery features. These include killing processes, interrupting processes, and taking advantage of checkpoints to move back in the execution of a program.
|
This edit request by an editor with a conflict of interest has now been answered. |
Please replace the current "Disk access and file systems" and "Disk drivers" sections with the following text under the heading "File system":
Extended content |
---|
Main article: File system
See also: Virtual file system
Permanent storage devices used in twenty-first century computers, unlike volatile dynamic random-access memory (DRAM), are still accessible after a crash or power failure. Permanent (non-volatile) storage is much cheaper per byte, but takes several orders of magnitude longer to access, read, and write.[1][2] The two main technologies are a hard drive consisting of magnetic disks, and flash memory (a solid state drive that stores data in electrical circuits). The latter is more expensive but faster and more durable.[3][4] File systems are an abstraction used by the operating system to simplify access to permanent storage. They provide human-readable filenames and other metadata, increase performance via amortization of accesses, prevent multiple threads from accessing the same section of memory, and include checksums to identify corruption.[5] File systems are composed of files (named collections of data, of an arbitrary size) and directories (also called folders) that list human-readable filenames and other directories.[6] An absolute file path begins at the root directory and lists subdirectories divided by punctuation, while a relative path defines the location of a file from a directory.[7][8] System calls (which are sometimes wrapped by libraries) enable applications to create, delete, open, and close files, as well as link, read, and write to them. All these operations are carried out by the operating system on behalf of the application.[9] The operating system's efforts to reduce latency include storing recently requested blocks of memory in a cache and prefetching data that the application has not asked for, but might need next.[10] Device drivers are software specific to each input/output (I/O) device that enables the operating system to work without modification over different hardware.[11][12] Another component of file systems is a dictionary that maps a file's name and metadata to the data block where its contents are stored.[13] Most file systems use directories to convert file names to file numbers. To find the block number, the operating system uses an index (often implemented as a tree).[14] Separately, there is a free space map to track free blocks, commonly implemented as a bitmap.[14] Although any free block can be used to store a new file, many operating systems try to group together files in the same directory to maximize performance, or periodically reorganize files to reduce fragmentation.[15] Maintaining data reliability in the face of a computer crash or hardware failure is another concern.[16] File writing protocols are designed with atomic operations so as not to leave permanent storage in a partially written, inconsistent state in the event of a crash at any point during writing.[17] Data corruption is addressed by redundant storage (for example, RAID—redundant array of inexpensive disks)[18][19] and checksums to detect when data has been corrupted. With multiple layers of checksums and backups of a file, a system can recover from multiple hardware failures. Background processes are often used to detect and recover from data corruption.[19] References
|
Reason: add sources, improve high-level explanation, harmonize coverage proprortionate to reliable sources. Giving disk drivers a separate section seems UNDUE given that they are only a couple paragraphs in some of the text books (A&D, Silberschatz et al.) and given no more than two pages (in Tanenbaum). Buidhe paid (talk) 00:41, 4 February 2024 (UTC)
This edit request by an editor with a conflict of interest has now been answered. |
Please replace the content of the "Memory management" and "Virtual memory" sections, after the hatnote under "Memory management", with: (note that the virtual memory section in my version is a subheading of "memory management")
Extended content |
---|
Memory hierarchy is the principle that a computer has multiple stocks of memory, from expensive, volatile (not retaining information in case of power shutoff), and fast cache memory, to less expensive, volatile, and slower main memory, and finally most of the computer's storage in the form of nonvolatile (persistent) and inexpensive, but less quickly accessed solid-state drive or magnetic disk.[1] The memory manager is the part of the operating system that manages volatile memory.[1] Cache memory is typically managed by hardware, while main memory is typically managed by software.[2] Early computers had no virtual addresses. Multiple programs could not be loaded in memory at the same time, so during a context switch the entire contents of memory would be saved to nonvolatile storage, then the next program loaded in.[2] Virtual address space provided increased security by preventing applications from overwriting memory needed by the operating system or other processes[3][4] and enabled multiple processes to run simultaneously.[5] Virtual address space creates the illusion of nearly unlimited memory available to each process, even exceeding the hardware memory.[6] Address translation is the process by which virtual addresses are converted into physical ones by the memory management unit (MMU).[7][8] To cope with the increasing amounts of memory and storage in modern computers, the MMU often contains a multi-level page table that can resolve any address along with a translation lookaside buffer (TLB) that caches the latest memory lookups for increased speed.[9] As part of address translation, the MMU prevents a process from accessing memory in use by another process (memory protection).[10] Virtual memoryMain article: Virtual memory
Often the amount of memory requested by processes will exceed the computer's total memory.[11] One strategy is that after a process runs for a while, it will be put on idle and its memory swapped to permanent storage. Then, the memory can be reused for another process.[12] The downside of this approach is that over time the physical memory becomes fragmented because not all processes use the same amount of physical address space.[13] Also, the user may want to run a process too large to fit in memory.[14] Free blocks are tracked either with bitmaps or free lists.[15] The most common option of managing overflow from memory is dividing each process' memory usage into segments called pages.[14] All of the memory is backed up in disk storage, [16] and not all of the process' pages need to be in memory for execution to go ahead.[14] If the process requests an address that is not currently in physical memory (page fault), the operating system will fetch the page and resume operation.[8] References
|
Reason: Add sources, more closely harmonize the amount of detail for each subtopic with the amount of coverage in reliable sources Buidhe paid (talk) 06:26, 4 February 2024 (UTC)
This edit request by an editor with a conflict of interest has now been answered. |
Please replace the current content of the "User interface" section, after the hatnote and the image, with the following text:
Extended content |
---|
On personal computers, user input typically comes from a keyboard, mouse, trackpads, and/or touchscreen, which are connected to the operating system with specialized software.[1] Programmers often prefer output in the form of plain text, which is simple to support.[2] In contrast, other users often prefer graphical user interfaces (GUIs), which are supported by most PCs.[3] GUIs may be implemented with user-level code or by the operating system itself, and the software to support it is much more complex. They are also supported by specialized hardware in the form of a graphics card that usually contains a graphics processing unit (GPU).[4] References
|
Reason: the current section is UNDUE, as major operating systems textbooks lack a top-level chapter about user interface, and cover the topic briefly if at all. My version exploits summary style to improve conciseness, and also resolves the issue of uncited text. Buidhe paid (talk) 06:16, 5 February 2024 (UTC)
"A user interface (UI) is required to operate a computer, i.e. for human interaction to be supported. The two most common user interfaces are
For personal computers (PCs), user input is typically from a combination of keyboard, mouse, and trackpad or touchscreen, all of which are connected to the operating system with specialized software.[139] PC users who are not software developers or coders often prefer GUIs for both input and output; GUIs are supported by most PCs. The software to support GUIs is more complex than a command line for input and plain text output.[141] Plain text output is often preferred by programmers, and is easy to support.[140]"
This edit request by an editor with a conflict of interest has now been answered. |
Please remove the unsourced section "Networking". Reason: only one of the operating systems textbooks has a section on networking. I checked the source and it is a brief overview of networking in general, and does not cover how operating systems support networking (which makes up the current content of the section). Thus, I believe the section should be removed both for verifiability reasons as well as for being UNDUE. Buidhe paid (talk) 06:29, 5 February 2024 (UTC)
This edit request by an editor with a conflict of interest has now been answered. |
Please replace the current content of the "History" section, including the hatnote, with:
Extended content |
---|
Main article: History of operating systems
The first computers in the late 1940s and 1950s were directly programmed in machine code inputted via plugboards or punch cards, without programming languages or operating systems.[1] After the introduction of the transistor in the mid-1950s, mainframes began to be built. These still needed professional operators[1] but had rudimentary operating systems such as Fortran Monitor System (FMS) and IBSYS.[2] In the 1960s, IBM introduced the first series of intercompatible computers (System/360). All of them ran the same operating system—OS/360—which consisted of millions of lines of assembly language that had thousands of bugs. The OS/360 also was the first popular operating system to support multiprogramming, such that the CPU could be put to use on one job while another was waiting on input/output (I/O). Holding multiple jobs in memory necessitated memory partitioning and safeguards against one job accessing the memory allocated to a different one.[3] Around the same time, terminals were invented so multiple users could access the computer simultaneously. The operating system MULTICS was intended to allow hundreds of users to access a large computer. Despite its limited adoption, it can be considered the precursor to cloud computing. The UNIX operating system originated as a development of MULTICS for a single user.[4] Because UNIX's source code was available, it became the basis of other, incompatible operating systems, of which the most successful were AT&T's System V and the University of California's Berkeley Software Distribution (BSD).[5] To increase compatibility, the IEEE released the POSIX standard for system calls, which is supported by most UNIX systems. MINIX was a stripped-down version of UNIX, developed in 1987 for educational uses, that inspired the commercially available, free software Linux. Since 2008, MINIX is used in controllers of most Intel microchips, while Linux is widespread in data centers and Android smartphones.[6] MicrocomputersThe invention of large scale integration enabled the production of personal computers (initially called microcomputers) from around 1980.[7] For around five years, the CP/M (Control Program for Microcomputers) was the most popular operating system for microcomputers.[8] Later, IBM bought the DOS (Disk Operating System) from Bill Gates. After modifications requested by IBM, the resulting system was called MS-DOS (MicroSoft Disk Operating System) and was widely used on IBM microcomputers. Later versions increased their sophistication, in part by borrowing features from UNIX.[8] Steve Jobs' Macintosh, which after 1999 used the UNIX-based (via FreeBSD)[9] macOS, was the first popular computer to use a graphical user interface (GUI). The GUI proved much more user friendly than the text-only command-line interface earlier operating systems had used. Following the success of Macintosh, MS-DOS was updated with a GUI overlay called Windows. Windows later was rewritten as a stand-alone operating system, borrowing so many features from another (VAX VMS) that a large legal settlement was paid.[10] In the twenty-first century, Windows continues to be popular on personal computers but has less market share of servers. UNIX operating systems, especially Linux, are the most popular on enterprise systems and servers but are also used on mobile devices and many other computer systems.[11] On mobile devices, Symbian OS was dominant at first, being usurped by BlackBerry OS (introduced 2002) and iOS for iPhones (from 2007). Later on, the open-source, UNIX-based Android (introduced 2008) became most popular.[12] References
|
Reasons: make it more concise, use summary style, fix uncited text Buidhe paid (talk) 06:58, 6 February 2024 (UTC)
getpwnam()
and getpwuid()
, which are mostly implemented in a user-mode library, although they do perform system calls to read from a file or send requests to or receive replies from a directory server.The UNIX operating system originated as a development of MULTICS for a single user, is based on the source:
Ken Thompson... found a small PDP-7 minicomputer that no one was using and set out to write a stripped-down, one-user version of MULTICS. This work later developed into the UNIX operating system. Perhaps there is a more informative concise phrasing, but I do not see how that is contradicted by what you are saying.
Were the first microprocessors based on LSI or VLSI?He does not mention VLSI
Despite its enormous size and problems, OS/360 and the similar third-generation operating systems produced by other computer manufacturers actually satisfied most of their customers reasonably well. They also popularized several key techniques absent in second-generation operating systems. Probably the most important of these was multiprogramming.
Yes, the PDP-6 supported multiprogrammingAnd memory protection/address relocation. Guy Harris (talk) 17:04, 3 June 2024 (UTC)
After the introduction of the transistor in the mid-1950s, mainframes began to be built. These still needed professional operators[1] but had rudimentary operating systems such as Fortran Monitor System (FMS) and IBSYS.[2] In the 1960s, vendors began to offer multiprogramming operating systems. In 1964, IBM introduced the first series of intercompatible computers (System/360)..
This edit request by an editor with a conflict of interest has now been answered. |
Please replace the current sections "Examples" and "Market share" with one section called "Popular operating systems", with the following content:
Extended content |
---|
Further information: Usage share of operating systems and Comparison of operating systems
In the personal computer market, as of September 2023[update], Microsoft Windows has the highest market share, around 68%. macOS by Apple Inc. is in second place (20%), and the varieties of Linux, including ChromeOS, are collectively in third place (7%).[3] In the mobile sector (including smartphones and tablets), as of September 2023[update], Android's share is 68.92%, followed by Apple's iOS and iPadOS with 30.42%, and other operating systems with .66%.[4] LinuxMain article: Linux
Linux is a free software distributed under the GNU General Public License (GPL), which means that all of its derivatives are legally required to release their source code.[5] Linux was designed by programmers for their own use, thus emphasizing simplicity and consistency, with a small number of basic elements that can be combined in nearly unlimited ways, and avoiding redundancy.[6] Its design is similar to other UNIX systems not using a microkernel.[7] It is written in C[8] and uses UNIX System V syntax, but also supports BSD syntax. Linux supports standard UNIX networking features, as well as the full suite of UNIX tools, while supporting multiple users and employing preemptive multitasking. Initially of a minimalist design, Linux is a flexible system that can work in under 16 MB of RAM, but still is used on large multiprocessor systems.[7] Similar to other UNIX systems, Linux distributions are composed of a kernel, system libraries, and system utilities.[9] Linux has a graphical user interface (GUI) with a desktop, folder and file icons, as well as the option to access the operating system via a command line.[10] Android is a partially open-source operating system closely based on Linux and has become the most widely used operating system by users, due to its popularity on smartphones and, to a lesser extent, embedded systems needing a GUI, such as "smart watches, automotive dashboards, airplane seatbacks, medical devices, and home appliances".[11] Unlike Linux, much of Android is written in Java and uses object-oriented design.[12] Microsoft WindowsMain article: Microsoft Windows
Windows is a proprietary operating system that is widely used on desktop computers, laptops, tablets, phones, workstations, enterprise servers, and Xbox consoles.[14] The operating system was designed for "security, reliability, compatibility, high performance, extensibility, portability, and international support"—later on, energy efficiency and support for dynamic devices also became priorities.[15] Windows Executive works via kernel-mode objects for important data structures like processes, threads, and sections (memory objects, for example files).[16] The operating system supports demand paging of virtual memory, which speeds up I/O for many applications. I/O device drivers use the Windows Driver Model.[16] The NTFS file system has a master table and each file is represented as an record with metadata.[17] The scheduling includes preemptive multitasking.[18] Windows has many security features;[19] especially important are the use of access-control lists and integrity levels. Every process has an authentication token and each object is given a security descriptor. Later releases have added even more security features.[17] References
|
Reason: The only two OS textbooks with case studies have Linux and Windows, so if we're going to include a section with specific examples, that's probably the ones that should be there. This is a top level article and information about specific operating systems likely belongs in their own article or other subarticles such as comparison of operating systems. My version improves summary style and also fixes unsourced content issues. Buidhe paid (talk) 04:00, 7 February 2024 (UTC)
This edit request by an editor with a conflict of interest has now been answered. |
Please remove the unsourced "modes" section and replace the first paragraph of the "Kernel" section with the following text, which also covers modes:
Extended content |
---|
The kernel is the part of the operating system that provides protection between different applications and users. This protection is key to improving reliability by keeping errors isolated to one program, as well as security by limiting the power of malicious software and protecting private data, and ensuring that one program cannot monopolize the computer's resources.[1] Most operating systems have two modes of operation:[2] in user mode, the hardware checks that the software is only executing legal instructions, whereas the kernel has unrestricted powers and is not subject to these checks.[3] The kernel also manages memory for other processes and controls access to input/output devices.[4] References
|
Thanks Buidhe paid (talk) 07:09, 14 February 2024 (UTC)
The text If a program tries to access memory that is not in its current range of accessible memory, but nonetheless has been allocated to it, the kernel is interrupted in the same way as it would if the program were to exceed its allocated memory. (See section on memory management.) This kind of interrupt is referred to as a page fault.
has multiple issues.
At first I was planning to just through in a reference to segmentation, but that would not address the other issues. Can someone come up with an accurate and clean rewording that takes into account such issues:
without going into too much detail? -- Shmuel (Seymour J.) Metz Username:Chatul (talk) 15:16, 30 May 2024 (UTC)
Summary of changes as a result of the Wiki99 project (before, after, diff):
Further possibilities for improvement:
Buidhe paid (talk) 07:24, 5 August 2024 (UTC)
There are multiple parts where info is just wrong. Darwin uses modified utilitities ffrom FreeBSD for compatibility, but the kernel and core of the OS is completely different. Android is not UNIX based, it's based on Linux which makes it Unix-like not actual UNIX. A VM is a virtualized or emulated computer, not an OS, it is typically used to run a seperate OS from the host machine's OS but it isn't an OS. Please fix these and other errors. Squid4572 (talk) 02:53, 21 September 2024 (UTC)
Seamless Wikipedia browsing. On steroids.
Every time you click a link to Wikipedia, Wiktionary or Wikiquote in your browser's search results, it will show the modern Wikiwand interface.
Wikiwand extension is a five stars, simple, with minimum permission required to keep your browsing private, safe and transparent.