1 downloadSource code, Decompress the package to/usr/src/Linux-version.
Create a soft link ln-S/usr/src/Linux-version/usr/src/Linux
2. Install the kernel patch for download and place it in the source.CodeDirectory, go to the source code directory
ForProgramGenerally, we can use call tools such as GDB to set breakpoints for calling. However, the Linux system provides many tracking tools, so that we do not haveSource codeThe tracing program executes system calls, dynamic library calls, stack
TCP has a timeout retransmission mechanism, which should be familiar to everyone. TCP is a reliable transmission protocol, so this mechanism is essential. So today we are going to discuss how the protocol stack processes the data when the sending
Although the man is detailed, sometimes you may not want to go to man or take notes for future use.
The basic command format is as follows: TCPDUMP [-package display format parameters] [-capture control parameters] 'filter matching condition'
Post:
In ubuntu, the file location is not the same as the Windows Address Bar (location item) by default, but is displayed as a combination of path names (path bar), which is inconvenient for obtaining and copying file paths. For example, to obtain
DF allows you to view the size, usage ratio, file system, and its mount point of a level-1 folder, but there is nothing to do with files.
Du allows you to view the file and folder size.
They are very effective when used in combination. For example,
(1) memory ingLinux provides a complex Storage Management System for processors that provide MMU (Storage Manager, which assists the operating system in memory management and hardware support such as virtual/real address translation, the memory that
**********************************************************
Install Samba in Linux
**********************************************************
To share resources between a Windows host and a Linux server, the Linux operating system provides the samba
Developing C Programs and even GUI programs in Linux may require complicated command line parameters. A sound and reliable processing mechanism for complex command line parameters makes the program easy to use and more professional. In Linux, almost
Grep-IRN "int socket" path_4_linux_src Or you can use a tool similar to souceinsight. After reading this section, we found that the BIND ---> sys_bind search is as follows:** Author: anhk* Date: 2007-5-23** This is the note for learning the network
Source: http://blog.csdn.net/lwhsyit
I. Introduction
Generally, the link to the function library is completed during the compilation period (compile time. All related object files
(Object File) and the library involved are linked to form an
1. Date and day background knowledge
UTC time: to translate into Coordinated Universal Time, the precise atomic clock in the world needs to determine the second, and adjust the leap second according to the speed of the Earth's rotation.
Tool 1 SAR
The SAR command is included in the sysstat toolkit and provides numerous statistics about the system. Its commands vary in different systems. Here we only talk about its network data monitoring parameters.
Sar-N [Dev | EDEV | sock]
The blog has been migrated to: http://kulv.sinaapp.com /.
The following functions show how the kernel address space is combined with the process address space.
/* * this routine handles page faults. it determines the address, * and the problem,
It has been a while since Linux was last used. This is mainly because of two reasons: on the one hand, I have graduated from college, and I am busy writing my papers to find a job. I have no time to take care of my hobbies. On the other hand, I am
Recently, I have done some experiments in Linux. Yes, I have done it today. It mainly serves some network services, such as DNS service, FTP service, mail service, and SAMBA service. The reason is that the previous experiment was performed because
The working principle of Linux system startup is also a good way to gain a deep understanding of the core working principles of Linux.Start Step 1 -- load BIOSWhen you turn on the computer power, the computer will first load the BIOS information,
Function Description: Controls shell program resources.
Syntax: ulimit [-ahs] [-C ] [-D ] [-F ] [-M ] [-n ] [-P ] [-S ] [-T ] [-u ] [-v ]
Note: ulimit is a shell built-in command that can be used to control shell execution program
Basic concepts:1> tty (collectively referred to as the terminal device ):Tty is derived from teletypes or teletypewriters. Originally, it refers to a telex typewriter, which reads and sends messages through a printer keyboard through a serial line.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service