linux orphan process
1. Concept
We know that in unix/linux, under normal circumstances, the child process is created through the parent process, and the child process is creating a new process. The end of the child process and the operation of the parent process are asynchronous processes, that is, the parent process can never predict when the child process will e ...
Added by Sarok on Wed, 09 Feb 2022 05:08:55 +0200
Using LD_PRELOAD analyzes HACK Linux user mode memory usage
LD_PRELOAD is an environment variable, which is used to load the dynamic library. The priority of dynamic library loading is the highest. Generally, its loading order is LD_PRELOAD > LD_ LIBRARY_ PATH > /etc/ld. so. cache > /lib>/usr/lib. In the program, we often call some functions of external libraries
Take malloc / free as an e ...
Added by nonaguy on Wed, 09 Feb 2022 03:52:57 +0200
Linux learning record IV - operation files and directories
preface
Why learn to use these command-line programs? It is much easier to use the graphics file manager to perform some tasks performed by these commands. However, although using the graphics file manager can easily realize simple file operations, it is easier to use the command-line program for complex tasks, because the command-line p ...
Added by legohead6 on Wed, 09 Feb 2022 02:34:50 +0200
Linux system IO function
1. open function
Function prototype:
int open(const char *pathname,int flags);
int open(const char *pathname,int flags,mode_t mode);
pathname: the relative or absolute path of the fileflags: open mode
Required (the three methods are mutually exclusive)
O_RDONLY: read only openO_WRONLY: write only openO_RDWR: read / write open Op ...
Added by mckinney3 on Wed, 09 Feb 2022 01:08:48 +0200
Create BPF mapping method
💡 How to create a BPF map
Programmers often send messages to programs to cause program behavior to be called. The most magical function of bpf is the code running in the kernel, and the program loading these codes can realize real-time communication through message passing.
BPF mapping is that key values are stored in the kernel and can be ...
Added by onlyican on Tue, 08 Feb 2022 23:41:32 +0200
Wargames customs clearance notes - Bandit
Range link: https://overthewire.org/wargames/ In the process, most of them will not directly appear the customs clearance password, which may be attached at the end of the text
ssh bandit0@bandit.labs.overthewire.org -p 2220
Then enter the password according to the prompt and log in successfully
cat readme
You can get the next lev ...
Added by Iceman512 on Tue, 08 Feb 2022 17:18:16 +0200
iptables of Linux Firewall
Iptables is located in / sbin/iptables. It is a tool used to manage firewall rules. It is called the user state of Linux firewall.
The firewall for packet filtering mainly works in the network layer, and for IP packets, it reflects the processing of the IP address port in the packet.
From the application layer of the external network t ...
Added by stebbi on Tue, 08 Feb 2022 14:07:28 +0200
FastDSF installation and simple use
FastDFS distributed file system
Link to Baidu online disk of the same version: https://pan.baidu.com/s/1a6XgywCoAyM3CiVS-rrVAA Extraction code: qq13
1, Introduction to FastDFS (Fast Distribution File System)
FastDFS is an open source distributed file system. Its functions mainly include: file storage, file synchronization, file access ( ...
Added by nwoottonn on Tue, 08 Feb 2022 13:00:04 +0200
521 that night, the younger martial sister confessed to me in order to learn KVM virtualization technology from me
catalogue
brief introduction
structure
characteristic
Environmental preparation
1. Experimental description
2. Check whether the hardware information supports virtualization
3. Closure of essential services
Install and configure KVM service
1. Install kvm dependent packages
2. Start libvirtd service
3. Create virtual machine
4.KVM v ...
Added by WebGeek182 on Tue, 08 Feb 2022 12:35:56 +0200
Playing with Linux Haproxy to build clusters
Objectives:
Understand the characteristics of HaproxyEasily use Haproxy to build clusters
Content:
1, HAProxy features:
Support two proxy modes: TCP (layer 4) and HTTP (layer 7), and support virtual host;It can supplement some shortcomings of Nginx, such as Session retention, Cookie guidance and so onSupport url detection, back-end server ...
Added by phparray on Tue, 08 Feb 2022 11:42:10 +0200