Linux C/C + + implementation of crash exception capture for SIGBUS, SIGSEGV, etc

Some time ago, we published a similar try catch implementation, but the implementation itself has limitations, because they can't ignore SIGSEGV, SIGSYS, sigrap and other crash signals, and can't process some 3RD codes at all (these codes have no source code, only libraries, and it's always impossible to statically decompile and reassemble) or ...

Posted by sneakyimp on Fri, 28 Jan 2022 17:15:13 +0100

Keepalived deployment and configuration

I introduce Keepalived The software was originally designed for LVS load balancing software to manage and monitor the status of each service node in LVS cluster system. Later, VRRP function which can realize high availability was added. Therefore, in addition to managing LVS software, Keepalived can also be used as high availability solution s ...

Posted by frost on Fri, 28 Jan 2022 07:53:20 +0100

linux foundation 37 - zone lock

1. Concept Scoped locking is not a type of lock, but a pattern of lock use. The term is Douglas C. Schmidt in his paper in 1998 Scoped Locking Proposed and used in ACE framework. However, as a design idea, this lock mode should have been widely used in the industry earlier. Area locks are actually RAII Specific application of mode on lock. RA ...

Posted by rhock_95 on Fri, 28 Jan 2022 07:40:46 +0100

C tutorial ------ > on the sixth day, the secondary pointer, the relationship between pointer and array, and the position sorting

1. Secondary pointer: Two dimensional array Array of arrays Secondary pointer? --- " Pointer to pointer Concept: the secondary pointer stores the address of the primary pointer (definition means space) If there is space, there will be an address)    Format: Define the format of the first level pointer: Storage type * data type * pointer ...

Posted by simrx11 on Fri, 28 Jan 2022 06:04:31 +0100

001 Pulsar new generation message queue. Are you sure you want to see how to build a test cluster with a single machine?

0 origin Pulsar is a high-performance message oriented middleware that supports multi tenancy.The initial production environment will be put into use in mid November 2018.On Pulsar's official website, the deployment tutorial documents are not very detailed. The tutorials on the network are basically translated versions of the official website. ...

Posted by DrAxeman on Fri, 28 Jan 2022 02:31:59 +0100

docker deployment project

1. Install the yum utils package. yum install -y yum-utils device-mapper-persistent-data lvm2 2. Before installing Docker engine community on the new host for the first time, you need to set up the Docker warehouse. After that, you can install and update Docker from the warehouse. yum-config-manager --add-repo http://mirrors.aliyun.com/dock ...

Posted by emediastudios on Fri, 28 Jan 2022 01:26:14 +0100

grep command of Linux

grep (global search regular expression(RE) and print out the line) is a powerful text search tool. It can use regular expressions to search text and print out matching lines. Specific characters used for filtering / searching. Regular expressions can be used. They can be used with a variety of commands and are very flexible.Command formatgrep [ ...

Posted by gin on Fri, 28 Jan 2022 00:37:42 +0100

[Linux] basic usage of log management

1. Basic introduction Log file is an important system information file, which records many important system events, including user login information, system startup information, system security information, mail related information, various service related information, etc.Log is also very important for security. It records all kinds of th ...

Posted by Cagez on Thu, 27 Jan 2022 22:56:08 +0100

[Linux RK] change network card name | CSDN creative punch in

background When ifconfig checks the network interface information, there are network interfaces eth0 and eth1. How are the name drivers of the two ports allocated? How to change the standard eth1 and eth0 to LAN and WAN (or users can define their own names). When ifconfig is displayed again, LAN and WAN network cards are displayed. The pr ...

Posted by Duje_KH on Thu, 27 Jan 2022 22:56:09 +0100

TC source code analysis II, the location of flow control code in the kernel

tc source code analysis II, the location of flow control code in the kernel Kernel version used Linux 4.3 Problem exploration We should study the source code. In addition to being curious about the way the code is written, we are most concerned about the actual logic of the code, so that we can easily understand what is happening inside. Be ...

Posted by mysterbx on Thu, 27 Jan 2022 22:27:53 +0100