1. Question: How Linux executes the main function.This article uses a simple C program (SIMPLE.C) as an example to explain. Code as follows,
int Main ()
{
return(0);
}
2. Compiling~ #gcc-O simple simple.c3. View basic
1. Introduction to Documents-"What is a file:File concepts, generalized files, narrow files (disk files),Common use actions for files (use scenarios where the command line demonstrates file operations).-"What is a path:Simply put, in the system, to
file Read To introduce the background, before the server on the need for a long time tail a log, before often through a terminal connected to the server, but for a long time to observe, it is not convenient: always have to open the terminal, can not
The data in memory is temporary and will be lost when the program ends. In order to save a large amount of data in perpetuity, the C language provides the operation of the file.
1. Files and Streams
c simply stream each file as a sequential byte (as
Write for so many years code, address this thing will use every day, so today summed up the origin of the address this thing.This article refers to the reference to the "Programmer's Self-cultivation," a book.First look at the following
The types of elf files under Linux are divided into the following ways:
1, can reposition files, such as SIMPLESECTION.O;
2, executable files, such as/bin/bash;
3, share the target file, such as/lib/libc.so.
In the next article, we'll use
Using the file command to view the dynamic link library, you get the following results:
#/usr/libx32$ file. /lib32/libgomp.so.1.0.0.. /lib32/libgomp.so.1.0.0: ELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), Dynamically link Ed,
As a database, in the system resources (CPU, memory, SSD, disk, etc.) certain premise, we want to:
stored data more: using compression, the world has a variety of compression algorithms;
Faster access: faster compression (write)/extract
One, process identificationProcess ID 0 is the dispatch process, often referred to as the interchange process (swapper). The process does not execute any program on disk-it is part of the kernel and is therefore referred to as a system process.
First Test whether the standard input can be lseek operation[email protected] 03]# cat ex03-lseek-01.c/* File ex03-lseek-01.c,Use the Lseek function to test whether the standard input can be used for seek operations */#include #include #include
Normal file Descriptor:Under Linux, after opening the file with open, a file descriptor is returned, the file descriptor points to a file table, and the node pointer in the file table points to the node table. See:Open a file's kernel data
File descriptor: A non-negative integer that is the index of the kernel Open file table.
Each process has its own file descriptor, the kernel maintains an open file table, a different descriptor points to the kernel File open table, and points to
There are a lot of input and output functions in Linux and UNIX, and sometimes it really makes the rookie who wants to have a little bit of a relationship at their wits ' end. First to see what functions, through the analysis and summary, to see if
Most file I/O in a Linux system uses only 5 functions: Open,read,write,lseek and close. The functions covered in this topic are called I/O with no buffering, and without buffering, read or read are implemented through a system call to the kernel,
How to use:You can use the commands dump , append and to restore copy data between target memory and a file. dump append The and commands write data to a file, and the restore command reads data from a file back into the inferior ' s M Emory. Files
22.2 Parent-Child Process action fileFile operations are made up of two modes:IO System invoke Operation fileStandard C IO Operation fileLook at the code:1#include 2#include string.h>3#include 4#include 5#include 6 7 intG_val = -;//global variables,
On an article we talked about APK to prevent anti-compilation technology in the shell technology, if there is not clear can view my previous blog http://my.oschina.net/u/2323218/blog/393372. Next we will introduce another technique to prevent the
On an article we talked about APK to prevent anti-compilation technology in the shell technology, if there is not clear can view my previous blog http://my.oschina.net/u/2323218/blog/393372. Next we will introduce another technique to prevent the
@ words don't say much, directly on the code#import //must import//photo original path # define Koriginalphotoimagepath [[ Nssearchpathfordirectoriesindomains (Nscachesdirectory, Nsuserdomainmask, YES) objectatindex:0] stringbyappendingpathcomponent:
Oracle 11g restart uard undo restore environment: OS: centos5.5db: oracle11g datauardversion: 11.2.0.2.0 shrink data file size in primary ALTER DATABASE DATAFILE '/oracle/oradata/skatedb/undotbs03.dbf 'resize 1024 M; www.2cto.com will receive an
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.