Original works reproduced please specify the source + "Linux kernel analysis" MOOC course http://mooc.study.163.com/course/USTC-1000029000Author: Zangjie RivieraTake the execution of the LS command under the shell as an example of how Linux executes
Describe Create an empty file or update the file timestampCommon Command Parameters-R Sets the date and time of the specified document or directory to the same date and time as the reference document or directory.-T uses the specified date time
First, use the command to detect whether the SSH service has been installed on the Linux system: (Command:rpm-qa |grep ssh)If you do not have an SSH package installed, you can install it via the Yum or RPM installation package (command:yum install
1. Pipelines are an important means of inter-process communication and are not used in Linux specifically data structure, instead of the file structure of the filesystem and the VFS index node inode. The two file structure points to the same
Original works reproduced please specify the source + "Linux kernel analysis" MOOC course http://mooc.study.163.com/course/USTC-1000029000The main content of this week is the loading of executable programs.First, let's take a look at the process of
When I started using Linux and built a Linux virtual machine on my own, when using Yum install, it was often a mistake to not connect.Always thought it was the problem of the virtual machine that I built, and later found some information on the
Linux under the Group Management Command detailed
Groupadd command, add Group commandFormat: groupadd [options] Group nameOption:-G: Specify GID
-R: Add System GroupExample: groupadd-g Willow Create Willow Group and GID is
Pan JunyangOriginal works reproduced please indicate the source"Linux kernel Analysis" MOOC course http://mooc.study.163.com/course/USTC-1000029000Experimental Purpose:Use GDB to track the processing of SYS_EXECVE kernel functions, analyze the
today, the directory and its files are compressed:/usr/local/test# tar-cvf/usr/local/auto_bak/test.tar/usr/local/testPackage only, do not compress# tar-zcvf/usr/local/auto_bak/test.tar.gz/usr/local/testAfter packaging, the compressed file name after
7.1. User Configuration file7.2. User Management Related documents7.3. User Management commands7.4. User Group Management CommandDelete user Userdel [[email protected] ~]# Userdel [-r] Username//must add-r, delete home directoryIn addition to
One, the file Search commandwhich display the directory where the system commands are locatedwhich [command name]Whereis Ibid.find find Files or directories (This command is pretty much a resource to keep in the evenings, the site visits are
by 21035130 WangkuandongHow the Linux kernel loads and launches an executable programI.. EIF file Format:1. elf Head at the beginning of the file, describe the overall format of the file, save the roadmap, describe the organization of the file,
Linux kernel analysis How do you get the executable program?Compiler preprocessing (responsible for the inclusion of the file included and macro replacement work), compiled into assembly code, the compiler compiled into the target code, and then
Epol Study Notes
Epoll-related system calls
Epoll_create ()
Epoll_ctl ()
Epoll_wait ()
Int epoll_create (int size );
Create an epoll handle.
The size parameter has been ignored since linux2.6.8.
After an epoll handle is created, it occupies an fd
Turn Raspberry Pi into your home Firewall
In the past, we used our own home firewall to install an Nic on a obsolete desktop host, install a stable Linux release version, and then configure it slightly. However, with Raspberry Pi, we can implement
Install Python3.5 on CentOS 7
Install Python3.5 in CentOS 7
• Possible dependencies for installing python3.5
Yum install openssl-devel bzip2-devel expat-devel gdbm-devel readline-devel sqlite-devel
• Go to the python official website to find the
Memcached memory management and deletion MechanismIntroduction
Note: The maximum value of Memcache can only be 1 MB. Data larger than 1 MB cannot be saved (modify memcache source code ).
Note: memory fragmentation always exists, but which method can
An invalid httpHandlers configuration solution for the Linux ASP. net mvc website
Linux ASP. NET users, the Web. the httpHandlers configuration added to config is used to process custom types, but the expected results are not displayed during
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service