Network Troubleshooting in Linux

The packet reception process of the Linux network card is as follows: The network card receives the data packet. The data packet is moved from the network card hardware buffer to the server memory (using DMA, without going through the CPU). A hardware interrupt notifies the CPU to process it. The CPU notifies the kernel … Read more

Linux Dressed as Windows 11 Has Arrived, Super Shocking!

It is well known that Ubuntu is one of the most popular Linux distributions. After Microsoft embraced Linux, Windows became the best Linux distribution (not really). What kind of sparks would fly if the two were combined? Introduction to Wubuntu Wubuntu, also known as “Windows Ubuntu”, is an operating system developed based on Ubuntu, characterized … Read more

Linux Memory Management: Huge Pages

1. IntroductionRecently, a group member in our WeChat group encountered a problem: on an ARMv8 architecture CPU, after the Linux system starts, when dynamically enabling 1G huge pages, the maximum contiguous memory allocated is only 32M.This has caused confusion among everyone, and with this issue in mind, today we will discuss huge pages.2. What are … Read more

Linux – Regular Expressions

Regular expressions include basic and extended regular expressions. ★ Basic Regular Expressions (BRE) Executed using the grep command grep/sed/awk support basic regular expressions 01- ^ indicates lines starting with… ## cat -A can display spaces and other placeholders$ cat -A oldboy2.txtI am oldboy teacher!$I teach linux.$$I like badminton ball ,billiard ball and chinese chess!$my blog … Read more

Linux Guide (Part 10): Files, Everything is a File

What is a file? 01 In the Linux system, a file is an abstract representation of various resources (such as data, hardware devices, inter-process communication, etc.), following the principle of “everything is a file.” Whether it is ordinary data, directories, hardware devices, or inter-process communication interfaces, they all exist in the form of files and … Read more

Essential Linux Commands for Embedded Development

w- Displays the currently logged-in user information in the system. ab- Apache server performance testing tool. ld- Links object files to create an executable program. xz- A tool for POSIX platform development with high compression rates. ln- Used to create links for files. ar- Creates or modifies archive files, or extracts from archive files. fg- … Read more

Linux | Native WeChat Installation Tutorial

1. System Information Operating System: Ubuntu 20.04.6 LTSKernel: Linux 5.19.0-051900-genericArchitecture: x86-64 2. Installation Method 1. Install Flatpak Flatpak is a technology for packaging and deploying Linux applications, allowing applications to run in isolated containers across various Linux distributions without relying on specific libraries or versions. Flatpak provides a secure, simple, and reliable way for developers … Read more

Lyon, France Switches to Linux and OnlyOffice: Is Microsoft Worried?

Lyon, France Switches to Linux and OnlyOffice: Is Microsoft Worried? Recently, I came across a joke in a small circle that described the situation as – “In the future, civil servants in Lyon, France won’t even be nostalgic for the blue screen anymore.” Upon reading it, I realized this is no joke. The third largest … Read more

Overview and Software Architecture of the Linux cpuidle Framework

[Image] Follow us for the latest technology news! [Image]1. Introduction In a computer system, the function of the CPU is to execute programs, which can be summarized as the processes we learn in textbooks: fetching instructions, decoding, and executing. So the question arises, what should the CPU do when there are no programs to execute? … Read more

Critical Sudo Vulnerabilities Allow Local Users to Gain Root Access on Linux, Affecting Major Distributions

Cybersecurity researchers have disclosed two security vulnerabilities in the Sudo command-line utility for Linux and Unix-like operating systems, which could allow local attackers to escalate their privileges to root access on vulnerable machines. The vulnerabilities are briefly described as follows: CVE-2025-32462 (CVSS Score: 2.8) – Sudo versions prior to 1.9.17p1, when used with a sudoers … Read more