In the study of Linux system, we want to see the file, generally on the cat command execution, the execution of large files, it is not good to make;Less and more can achieve your dream, can help you to view the large file content,More commands:[Email protected] ~]# more/etc/man_db.conf### This file was used by the MAN-DB package to configure, the man and cat paths.# It is also used to provide a manpath for those without one by examining# their PATH en
1.Cgroup section (all cgroup subsystem configuration parameters can be dynamically obtained or adjusted via Lxc-cgroup command)
LXC uses Cgroup for resource management of containers, so each subsystem of cgroup can be used. The Mount None-t cgroup/cgroup Mount Cgroup must be performed before the LXC is actually used, or the echo "None/cgroup cgroup defaults 0 0" >>/etc/fstab is used to allow the system to be restarted each time Dynamic automatic Moun
Document directory
More than meets the eye
DDX: People's favourite barking tree
Mesa dri DRIVER: The Invisible Hero
DRM: bridge to the hardware
All together now
Now, lets make it complicated
So, now you know
From: http://yangman.ca/blog/2009/10/linux-graphics-driver-stack-explained/
We get this question a lot about radeonhd: "When is 3D going to be supported ?"
The short answer: Never; 3D accelerat
, kill two commands to detect memory usage and recycle. Use the command "Ps" when using superuser privileges, which lists all running program names, and the corresponding process number (PID). The KILL command works by sending a system operation signal and a program's process number (PID) to the kernel of the Linux operating system.Application Examples:In order to efficiently reclaim memory you can use the command PS parameter V: [[Email protected] ~]
In the remote linux system just configured, the CSS file can be read in firefox but cannot be explained. IE is normal! -- Linux general technology-Linux technology and application information. For details, refer to the following section. In the remote linux system just confi
space is full . root partition select / ext3 size is generally 5000mb; Span style= " font-family: ' the song body ';> 5GB; another Boot partition /boot don't need too much There are generally 100MB enough to use the files such as the storage System boot file and the kernel use the The file system is also EXT3; then create the/swap partition , swap the partition . File System Selection Swap type . Swap does not require a mount point . so it's gray. , cannot choose
Some common shutdown/Restart commands under Linux are shutdown, halt, reboot, and Init, all of which can be used to reboot the system, but each command has a different internal working process.Linux CentOS Restart command:1, reboot2. shutdown-r now reboot (root user)3, Shutdown-r 10 over 10 minutes automatic restart (root user use)4, Shutdown-r 20:35 restart at 20:35 time (root user use)If you set the restart through the shutdown command, you can canc
protected] home]# setfacl--set u::rw,u:tom:rw,g::r,o::-bo/9. Backup and Restore ACLs1. The main file Operations Command CP and MV both support ACLs, but the CP command needs to be prefixed with the-p parameter. However, common backup tools, such as tar, do not preserve ACL information for directories and files[Email protected] data]# Getfacl-r testdir/> Acl.txt[Email protected] data]# Setfacl-r-B testdir/[Email protected] data]# setfacl-r--set-file=acl.txt testdir/[Email protected] data]# Getfa
FailureThere are two signals to stop a process: Sigterm and Sigkill. Sigterm is friendly and the process captures the signal and shuts down the program according to your needs. Before you close the program, you can end the open record file and complete the task you are doing. In some cases, if the process is working and cannot be interrupted, the process can ignore the sigterm signal.For Sigkill signals, the process cannot be ignored. This is a "I don't care what you are doing, stop immediately
From left to right, the first digit represents the permissions of the file owner, the second digit represents the permissions of the same group of users, and the third digit represents the permissions of the other user.And the specific permissions are represented by a number, the Read permission equals 4, with R, the permission to write is equal to 2, with W, the execution of the permission equals 1, denoted by x;Through the combination of 4, 2, 1, the following permissions are obtained: 0 (no p
many segments, while $NF is the last, and NR is the line number.5. Mathematical operations in awkAwk can also perform mathematical operations on the values of individual segments:[Email protected] ~]# awk-f: ' {(tot=tot+$3)}; END {print tot}; ' passwd 1720The end of this is to note that all the rows have been executed, which is the syntax specific to awk, in fact awk, along with SED, can be written as a script file, with their own syntax, using if judgment in awk, and for loops is OK.example, i
The command line pipeline (pipelines) specifically explainsThis address: http://blog.csdn.net/caroline_wendy/article/details/24249529The pipe operator "|"is able to send the standard output (stdout)of a command to the standard input (stdin) of a command.Filteris the combination of multiple commands together to form a pipe.Main command:Sort : sorting;Uniq, UNIQue, output data without repeated rows; The number of "-D" can output repeated lines;WC, Word counting (word count); The number of "-L", on
last 10 rowsHead- N -3/etc/passwd|Tail- N Ten //Display the last 10 lines in the first 20 rowsHead- N -/etc/passwd|Tail- N Ten //start from line 11th, but show only the first 10 rowsTail- N + One/etc/passwd|Head- N Ten //Starts from line 11th, but does not contain the last 3 rowsTail- N + One/etc/passwd|Head- N -3//Display the first 10 lines in the last 13 rowsTail- N -/etc/passwd|Head- N Ten //Show the top 10 rows in the last 13 rows except the 3 lines at the endTail- N -/etc/passwd|Head- N
# PS aux | MoreUSER PID%cpu%MEM VSZ RSS TTY STAT START time COMMANDAimin 13362 99.1 13.6 12942520 12641232? R 13:12 445:48/usr/local/lib64/r/bin/exec/rAimin 23413 0.0 0.0 100344 1784? R 20:02 0:00 sshd: [Email PROTECTED]/3Aimin 24489 1.0 0.0 110244 1152 PTS/3 r+ 20:42 0:00 PS auxAimin 24490 0.0 0.0 103252 924 PTS/3 s+ 20:42 0:00 grep-w Rexplanations of the columns:Users of the user process;The ID of the PID process;Percentage of CPU consumed by the%CPU process;%MEM% of memory occupied;VSZ The am
File Testgrep content:1. Show all rows that contain sans2. Show all the lines where the name of the person who started with J3. Show all lines ending with 7004. Show all lines that do not include 8345. Show all birthdays on December lines6. Show all such lines: it contains an uppercase letter followed by four lowercase letters, a colon, a space, and aA capital letter8. Show rows whose last name begins with K or K9. Display a line with a salary of six digits, and add the line number in front10. D
the main execution program that is connected under/usr/local/bin.· All settings of the system are in/etc directory.· Do not modify anything in the root directory ("/") or/usr directory unless you really know what to do. These directories are best kept consistent with Linux publishing.· Most tools and applications are installed in the directory:/bin,/usr/sbin,/sbin,/usr/x11/bin,/usr/local/bin.· All the files are under a single directory tree. There is
DanielCmnD_alias usercmd =/usr/sbin/useradd,/usr/sbin/userdel,/user/bin/passwd [a-za-z]*,/bin/chown,/bin/chmodCmnd_Alias Diskcmd =/sbin/fdisk,/sbin/partedcmnd_alias netcmd =/sbin/ifconfig,/etc/init.d/networkcmnd_alias CTRLCMD =/US R/sbin/reboot,/usr/sbin/haltrunnas_alias OP = root, daniel# #ADMINS all= (All) Usercmd, Netcmd, Ctrlcmdnetadmins All= (OP) nopasswd:netcmduseradmins all= (OP) nopasswd:usercmd #NOPASSWD, indicating that after the input is not required to enter the password, the de
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.