User Space  and Kernal Space & types of Processes in Linux
User Space & Kernal Space, Different types of processes in Linux

User Space and Kernal Space & types of Processes in Linux

User and kernel spaces in Linux:

Kernal Space:

The Kernal is the heart of the operating system.

It is responsible for scheduling and running programs, file management, and security. The kernel's job is to support the user's programs which are running in the user's space like a web browser or similar programs.

User's Space:

User's space programs interact with the kernel through special devices or system calls that they make.

An individual running program is called a process and each process has its own private virtual memory space. It runs as a particular user and a set of groups so that it can access files in the file system.

A process also has its state that describes whether it is currently running, waiting to run, waiting for a resource user by other processes, or maybe in a blocked state.

How do we identify the process? A process is identified by its unique ID which we commonly call a PID.

Types of processes in Linux:

There are different types of processes in Linux systems:

User Processes:

User Processes are processes that are associated with a particular user. They are started through a shell prompt, They print the output to the terminal and the input from the terminal.

If they are taking input from the terminal then we call that process a full grunt process, because they control the shell prompt.

It is possible for a process to be put in the background, in that case, they are not taking any input from the terminal but they can display output to the terminal.

Daemon Processes:

We have a second class of processes called daemon processes. These processes are not associated with the terminal at all. They are started when the system starts and provide services like networking, or other types of special tasks to keep the system running.

Kernal Threads:

We have a third class of processes called kernel threads. These are the parts of the kernel that are running as if they are regular user processes or system demons but are not associated with the terminal. They are the parts of the kernel but they are still scheduled as if they were regular processes.

We can get information about the processes running in a system by using the ps command in Linux.

Type ps you will see processes associated with the shell.

You will see PID (process ID) TTY (Tele Type) Time and the command that represents the particular process id.

These are not all the processes that are running on your system. You can use different options with the ps command in order to display different processes.

ps -ef

e shows us information about all the processes, the f provides us detailed information, it displays the data (formats the data) in different columns

You will see:

UID It is a user ID it may be the root or other user

PID Process

PPID Parent Process ID

C

STIME

TTY if you see? below the running process then it represents the demon process. It means that this process is not attached to the terminal.

TIME

CMD /usr/lib/systemd/system

These are the third class of kernel threads, that still appear in the output of the ps command.


I will add more information later....

CHESTER SWANSON SR.

Realtor Associate @ Next Trend Realty LLC | HAR REALTOR, IRS Tax Preparer

1 å¹´

@Thanks for Sharing.

要查看或添加评论,请登录

Hazrat U.的更多文章

  • MAC Address, How to change it, and Different Network Interfaces explained.

    MAC Address, How to change it, and Different Network Interfaces explained.

    MAC stands for Media Access Control. It is also called hardware address, Burned-in address, or physical address.

  • WPS PIN Attack through reaver

    WPS PIN Attack through reaver

    In this article, I will be sharing with you a WPN PIN Attack through Reaver First, change your wireless adapter mode to…

  • Different Wireless Network Interface Card (NIC) Modes and How to Enable Monitor Mode? Why do we need Monitor Mode?

    Different Wireless Network Interface Card (NIC) Modes and How to Enable Monitor Mode? Why do we need Monitor Mode?

    Types of Modes of Wireless Network Interface Card (NIC) Managed Mode Monitor Mode Ad-hoc Mode Master/Slave (AP) Mode…

  • How to Hack Wifi using Airodump-ng, Aircrack-ng

    How to Hack Wifi using Airodump-ng, Aircrack-ng

    Hacking Wi-Fi passwords using Airodump-ng, Aircrack-ng There are many ways to hack wifi passwords, but here in this…

    2 条评论
  • Windows Commands

    Windows Commands

    Following are the lists of Windows commands that will boost your productivity. Command to clean your windows Command…

    4 条评论
  • Merging different wifi networks to get high-speed internet connectivity

    Merging different wifi networks to get high-speed internet connectivity

    Merging different wifi networks to get high-speed internet connectivity In this article, I will show you a trick to…

    6 条评论
  • Why you shouldn't use weak passwords

    Why you shouldn't use weak passwords

    Usage of weak passwords is an open invitation to hackers. It can be easily cracked.

  • Microsoft Security Copilot

    Microsoft Security Copilot

    Microsoft Security Copilot It is an AI Powered Chatbot that uses Chat GPT-4 Technology and also Microsoft Threat…

    2 条评论
  • Authentication & Authorization

    Authentication & Authorization

    Authorization: It is the process of allowing somebody to access a specific object Restriction Criteria for…

    1 条评论
  • Security Controls

    Security Controls

    Security Controls: Control is a countermeasure that is created to maintain the confidentiality, Integrity, and…

    1 条评论

社区洞察

其他会员也浏览了