Process virtual address space is an important abstraction of Linux. The system provides a 4 GB virtual address space for each running Linux Process without interfering with each other, you can only access your own virtual address space address. The
Device Drivers--- SCSI Device Support SCSI disk support SCSI generic support
Device Drivers--- USB support Ohci hcd support USB Mass Storage support[*] USB Mass Storage write-protected media detection (experimental)[*] Freecom USB/atapi Bridge
Sendmail is the most important Email transmission proxy.Program. Understanding the working mode of email is very important. Generally, the email program is divided into user agents, transmission agents, and delivery agents. The specific command to
Currently, in addition to the Linux standard file system ext2/ext3/ext4, there are many file systems, such as reiserfs, XFS, Windows vfat NTFS, network File System NFS and FLASH file system jffs2, yaffs/yaffs2 ubifs. Linux provides perfect support
The periodic scheduler is implemented in scheduler_tick. If the system is active, the kernel automatically calls the function at the frequency Hz. If no process is waiting for scheduling, you can disable the scheduler to reduce power consumption
The author's blog address: http://blog.sina.com.cn/samzhen1977
By Sam (zhufeng) sam_code@hotmail.com
(HCI protocol introduction, HCIImplementation in bluez and HCI Programming Interface)
1. HCI Layer Protocol Overview:
HCI provides a unified
Because you often need to download and install software, and the software that provides download is usually packaged and compressed, it is very important to package the compressed tar command, I found an article on "example and explanation of tar
Analysis of the ramdisk root file system creation process in Linux
This article describes how to create the ramdisk root file system in Linux.
1. modify an existing File System
Set the file system compressed file to ramdisk.gz.
1. Extract
# Cd
1. Diff
--------------------NameDiff-find differences between two filesSynopsisDiff [Options] From-file to-file--------------------
The diff function is used to compare the differences between the two files, and then record them, that is, the
1) The/etc/services file records the network service names and their corresponding port numbers and protocols. 2) Format
Each row in the file corresponds to a service. It consists of four fields separated by tabs or spaces, service name, port used,
As a system administrator, you may need to add users to a machine frequently, either by adding many users to a machine or by adding the same user to many machines.
I am such a system engineer. Every time a new employee enters the company, he has
Sina Weibo: @ song Baohua Barry at @ micro disk shared the "Linux device driver development details" 2nd version 1080p electronic version, intends to upgrade to version 3rd, 3.6 kernel, Cortex-A9 SMP, Device Tree, dvfs, suspend/hibernation, big.
Chapter 9 Backup Recovery
Linux uses the dump and restore commands to execute file system backup and recovery jobs, while Solaris uses ufsdump and ufsrestore.Quote:
Linux
#/Sbin/Dump-0u-F/dev/st0/home# Cd/home# Restore RF/dev/st0
Solaris
#
This is an after-school exercise for advanced programming in UNIX environments. You are not allowed to use fcntl. You can't think of a more efficient method. Here, I will post my own practices, I hope some heroes can tell me an efficient way of
Absolute and relative Linux paths
The absolute path in Linux is from the root directory. For example,/dev/somedir /..
The relative path starts from the current directory ./
There are four relative paths:
Current
Operations related to process information are in the unistd. h file. The following functions are commonly used.
Getuid
Function prototype: uid_t getuid (void );
Function: gets the ID of the user who calls the process.
Function return: the ID of the
Passwd
CommandFor the sake of system security, in Linux, each user has a user name and password. Therefore, when you use the useradd command to add a new user, you also need to use the passwd command to set a password for each new user. Later, you
Gpasswd commandFunction: Manage groupsUsage: gpasswd [-a user] [-D user] [-a user,...] [-M User,...] [-R] [-R] groupnameParameters:-A: Add a user to a group-D: delete a user from a group.-A: Specifies the administrator.-M: the specified group member
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service