linux orphan process

1. Concept We know that in unix/linux, under normal circumstances, the child process is created through the parent process, and the child process is creating a new process. The end of the child process and the operation of the parent process are asynchronous processes, that is, the parent process can never predict when the child process will e ...

Added by Sarok on Wed, 09 Feb 2022 05:08:55 +0200

Using LD_PRELOAD analyzes HACK Linux user mode memory usage

LD_PRELOAD is an environment variable, which is used to load the dynamic library. The priority of dynamic library loading is the highest. Generally, its loading order is LD_PRELOAD > LD_ LIBRARY_ PATH > /etc/ld. so. cache > /lib>/usr/lib. In the program, we often call some functions of external libraries Take malloc / free as an e ...

Added by nonaguy on Wed, 09 Feb 2022 03:52:57 +0200

Linux learning record IV - operation files and directories

preface Why learn to use these command-line programs? It is much easier to use the graphics file manager to perform some tasks performed by these commands. However, although using the graphics file manager can easily realize simple file operations, it is easier to use the command-line program for complex tasks, because the command-line p ...

Added by legohead6 on Wed, 09 Feb 2022 02:34:50 +0200

Linux system IO function

1. open function Function prototype: int open(const char *pathname,int flags); int open(const char *pathname,int flags,mode_t mode); pathname: the relative or absolute path of the fileflags: open mode Required (the three methods are mutually exclusive) O_RDONLY: read only openO_WRONLY: write only openO_RDWR: read / write open Op ...

Added by mckinney3 on Wed, 09 Feb 2022 01:08:48 +0200

Create BPF mapping method

💡 How to create a BPF map Programmers often send messages to programs to cause program behavior to be called. The most magical function of bpf is the code running in the kernel, and the program loading these codes can realize real-time communication through message passing. BPF mapping is that key values are stored in the kernel and can be ...

Added by onlyican on Tue, 08 Feb 2022 23:41:32 +0200

Wargames customs clearance notes - Bandit

Range link: https://overthewire.org/wargames/ In the process, most of them will not directly appear the customs clearance password, which may be attached at the end of the text ssh bandit0@bandit.labs.overthewire.org -p 2220 Then enter the password according to the prompt and log in successfully cat readme You can get the next lev ...

Added by Iceman512 on Tue, 08 Feb 2022 17:18:16 +0200

iptables of Linux Firewall

Iptables is located in / sbin/iptables. It is a tool used to manage firewall rules. It is called the user state of Linux firewall. The firewall for packet filtering mainly works in the network layer, and for IP packets, it reflects the processing of the IP address port in the packet. From the application layer of the external network t ...

Added by stebbi on Tue, 08 Feb 2022 14:07:28 +0200

FastDSF installation and simple use

FastDFS distributed file system Link to Baidu online disk of the same version: https://pan.baidu.com/s/1a6XgywCoAyM3CiVS-rrVAA Extraction code: qq13 1, Introduction to FastDFS (Fast Distribution File System) FastDFS is an open source distributed file system. Its functions mainly include: file storage, file synchronization, file access ( ...

Added by nwoottonn on Tue, 08 Feb 2022 13:00:04 +0200

521 that night, the younger martial sister confessed to me in order to learn KVM virtualization technology from me

catalogue brief introduction structure characteristic Environmental preparation 1. Experimental description 2. Check whether the hardware information supports virtualization 3. Closure of essential services Install and configure KVM service 1. Install kvm dependent packages 2. Start libvirtd service 3. Create virtual machine 4.KVM v ...

Added by WebGeek182 on Tue, 08 Feb 2022 12:35:56 +0200

Playing with Linux Haproxy to build clusters

Objectives: Understand the characteristics of HaproxyEasily use Haproxy to build clusters Content: 1, HAProxy features: Support two proxy modes: TCP (layer 4) and HTTP (layer 7), and support virtual host;It can supplement some shortcomings of Nginx, such as Session retention, Cookie guidance and so onSupport url detection, back-end server ...

Added by phparray on Tue, 08 Feb 2022 11:42:10 +0200