next up previous contents
Next: Permission check Up: Algorithms Previous: Overload   Contents

Hash table

The used hash function will be the lower byte of the inode number of the executable.



Biondi Philippe 2000-12-15