Course Schedule
Date | Lecturer | Topic |
---|---|---|
October 24, 2001 | D. P. Bovet | How to compile the kernel and make a boot floppy disk |
October 31, 2001 | D. P. Bovet | How to boot from disk; How to add new configuration flags |
November 7, 2001 | D. P. Bovet | How to make a patch, Inside system calls, How to modify the sysctl() system call |
November 14, 2001 | D. P. Bovet | How to make a brand new system call |
November 21, 2001 | D. P. Bovet | An introduction to proc files, How to make a new simple proc file |
November 28, 2001 | D. P. Bovet | An introduction to modules, How to re-implement the brand new system call as a module |
December 5, 2001 | D. P. Bovet | More on modules, How to re-implement the simple new proc file as a module |
December 12, 2001 | M. Cesati | Kernel debugging, part 1: understanding what's gone wrong (snooping into the kernel with standard Unix commands, getting and using kernel oops kernel messages) |
January 16, 2002 | M. Cesati | Kernel debugging, part 2: when things become hairy (forcing the kernel to respond with the magic keys) |
January 23, 2002 | M. Cesati | Kernel debugging, part 3: debugging a "live" kernel (implementing a new magic key for debug (continuing), debugging through the serial line, using a debugger on the running kernel) |
January 30, 2002 | D.P. Bovet | An introduction to I/O drivers |
February 6, 2002 | V. Garofalo | The led card: a first example of I/O driver |
February 13, 2002 | V. Garofalo | Reading the temperature from a thermometer card |
February 20, 2002 | M. Vegni | Implementing a driver for a sound card (part 1) |
February 27, 2002 | M. Vegni | Implementing a driver for a sound card (part 2) |
March 6, 2002 | C. Comella | Internet security: how to implement packet filtering (part 1) |
March 13, 2002 | C. Comella | Internet security: how to implement packet filtering (part 2) |
March 20, 2002 | C. Comella | Internet security: how to implement packet filtering (part 3) |
March 27, 2002 | A. Arcangeli | SMP in the Linux kernel |
April 17, 2002 | A. Rubini | Input management in current GNU/Linux systems |
April 24, 2002 | D. P. Bovet & M. Cesati | Kernel hackers' favorite spot: the scheduling algorithm |
End of lectures: April 24, 2002.