Linux kernel code, a lot of online, such as http://docs.huihoo.com/doxygen/linux/kernel/3.7/include_2linux_2types_8h_source.htmlOrHttp://lxr.free-electrons.com/source/drivers/gpu/drm/radeon/mkregtable.cMost of the two-way linked list operations are basically defined in this file.Analysis of this file.First macro definition, gets the offset of a member variable in
1. Linux Distributions Publisher URL:Red hat:http://www.redhat.comfedora:http://fedoraproject.org/Mandriva:http://www.mandriva.comNovell suse:http://www.novell.com/linux/debian:http://www.debian.org/slackware:http://www.slackware.com/gentoo:http://www.gentoo.org/ubuntu:http://www.ubuntu.com/centos:http://www.centos.org/2. Linux Kernel:http://www.kernel.org/3. GNU
..."/usr/sbin/useradd-g users $ USER if [$? = 0]; then/usr/bin/passwd $ USER else echo "Sorry, User addition failed" fi Perl basically, Perl can be seen as a Turing on UNIX and Windows systems) complete programming language. Perl refers to the Practical Extraction and Report Language ). Perl is a general programming language. it was originally developed for text processing and is widely used in many scenarios, including system management, Web development, network programming, and even GUI develo
Linux text mode command list-Linux general technology-Linux technology and application information, the following is a detailed description. 1. restart the system: shutdown, reboot, and init;
2. Copy files or folders between two Linux machines: scp, for example, scp-p use
The list of Linux software corresponding to Windows-Linux general technology-Linux technology and application information. The following is a detailed description. [Table = 85%] [tr] [td = 30%,]
Windows Software[/Td] [td = 1, 1, 70%]
Linux Equivalent[/Td] [/tr] [tr = # ddddd
In linux, ftp cannot view the file list.
After ftp is configured on the linux server today, logon is normal. After ftp is used to log on, all directories can be accessed by manually writing paths, but no data is visible to folders and file lists.
Later, I analyzed the cause and found that the result was related to selinux. So after selinux is disabled, I tried to
Original address: http://xiaod.in/read.php?77My CentOS VPS above do not know how many accounts added, I would like to clean up today, but have not seen the list of Linux users, Google a bit, find convenient to put:In general,CAT/ETC/PASSWD can view a list of all usersW can view the list of currently active usersCat/etc
Original address: http://xiaod.in/read.php?77My CentOS VPS above do not know how many accounts added, I would like to clean up today, but have not seen the list of Linux users, Google a bit:In general,CAT/ETC/PASSWD can view a list of all usersW can view the list of currently active usersCat/etc/group Viewing user grou
Linux User space link list dhlistCheungmine 2018-2-04
/** * dhlist.h *-deque list and hash list from Linux Kernel * * to Linux Kernel * for Windows and Linux * * mo Dified by Cheungmi
after this operation, you can compile nohup sigtest 3 and shell, the content is as follows: sigtest in fact, any way to turn the process into an orphan process can be done, including fork's immediate termination of the parent process.2. sigchld SignalAfter a sub-process dies, it sends a sigchld signal to the parent process.When a process calls the exit command to end its own life, it is not actually destroyed, but it leaves a data structure called Zombie (the system calls exit, it is used to
Configure the access control list (ACL) of Linux)
Using Liunx with permission control is a simple task. It can define the permissions of any user, group, and other. Whether on a desktop computer or without many virtual Linux instances, or when users do not want to share files between them, this is a great job. However, if you are in a large organization, you run
:0xbffff24c0x0804b0180x123456780x000000110x804b018:0x0804b0080xbffff24c0xabcdef010x00020fe1This is represented by a graphic (representing only the first member).If you look at the second member of these three addresses, you will become such a graphicThe same observation of the second push_back, and the reference to the list of code, you will get this conclusion.1. List has two members, the first member poin
I often see the list head in the Linux kernel. Sometimes I am not very familiar with it. I plan to understand it very early. After compiling the SDK this time, I am a little idle. Let's just take it out.
Simple Linked List Implementation
#include
Next, let's analyze the functions and macro definitions in this list h
Solution to the linux Argument list too long error, argumentlong
Solution to the linux Argument list too long error
Delete all files in the/tmp directory today. The number of files is large.
Ls-lt/tmp | wc-l385412
When rm * is used, the system prompts the error Argument lis
standard output.The-exec:find command executes the shell command given by the parameter to the matching file. The corresponding command is in the form of ' command ' {} \;, note the space between {} and \;-ok: The same as-exec, except that the shell command given by the parameter is executed in a more secure mode, prompting the user to determine whether to execute before executing each command.#-print output of the found file to standard output#-exec command {} \; -the command operation for the
Log listDescribes the log files and descriptions that are common to SUSE Linux operating systems.The list of log files common to SuSE Linux operating systems is shown in table 1.Table 1 SuSE Linux common Log list logDescription/var/log/boot.msgThe screen information that is
List some of the most popular Linux-general Linux technology-Linux technology and application information. The following is a detailed description. For example, now Linux kernel 2.6.29-rc7-git1, tomorrow I don't know if it is, try not to mention it, the change is too fast.
Article Title: List of Linux security tools. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Sxid
Check the suid, sgid, and files without the master in the system.
Skey
One-time
that replaces syslog◆ Scandns: a dns check and Tracing Tool◆ Whisker: Cgi Scanner◆ Snoopy: The Command executed by tracing the execve system call records◆ Linux kernel patch: kernel security patch to prevent Buffer Overflow.◆ Krnsniff: A kernel-based Listening Module◆ Iptable: used to replace the ipchains package filtering Firewall◆ Imsafe: detects buffer overflow and other problems by tracking system calls.◆ Iplog: logs of incoming and outgoing pack
I'm using two sets . LinuxLinuxa IP : 192.168.10.101LINUXB IP : 192.168.10.102First, we are Linuxa Mount the optical drive and install FTP Serverthen install FTP server (on the same platform, i.e. Linuxa on)Modify FTP The main configuration file (add a word anon_root=/media/cdrom/packages )Last to configure LINUXB on the Yum Listinto the /etc/yum.repos.d/ this directoryModify (vi Centos-media.repo) fileHere I'll talk about where to modify! (First change the baseurl back to:baseurl=ftp://ftp 192.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.