1/ Download the installation package 2/ decompress the installation package 3/ Compile the installation package 4/ After the compilation, two programs are generated in the...
Yesterday afternoon, my colleague was studying the virtual address mapping in Linux system (classic book "Programmer self-training - Link, load and library"). When he saw...
Many friends asked Uncle Ben about scheduling and switching. In the opinion of FAE, he did not understand the scheduling and switching thoroughly and was...
The concept COW has many applications, such as in. File management systems such as Linux also use copy-on-write strategies. Applying Linux fork() When creating a...
This was also encountered when writing and sending the wechat script of the enterprise. Parsing the URL failed, presumably because of the DNS configuration. Pinging...
1, query which process occupy CPU2, process which thread occupy CPU3, query thread stack information preface CPU surge high, basic is three plate axe can...
Check the disk information create LVM1 step1step2step3step4step5step6 format disk partition to create disk partition. Initialize physical disks as physical volumes. 2. Create a volume group...
Introduction A friend asked how the space continues to be occupied after deleting files in Linux. This situation has never happened to me before. At...
There are many tools available for finding hardware specifications on Linux systems. Here, I've listed four of the most commonly used tools to capture almost...
I recently encountered a disk-related online failure to summarize some of my previously unknown knowledge about Linux disk caching. In general, there are two reasons...
The previous article covered disk partitioning, formatting, and mounting. This article will cover RAID and LVM technologies. Disk management operations are mainly used by o&M...
Logical Volume Manager (LVM), also translated as Logical Volume Manager, Logical sector Manager, Logical disk Manager, is a Logical Volume management function provided by the...
Linux is attacked, the attacker file can not operate one, the problem suddenly received a similar message for several days, thought it was a security...
Nuggets is a community that helps developers grow. It's Hacker News for developers, Designer News for designers, and Medium for product managers. The technical articles...
Ext2 file systems are formatted into block groups, each with its own inode/block/superblock system. The block group consists of six parts: Data block is used...