Subscribe
Tutorial search

User space memory access from the Linux kernel - Linux tutorial


As the kernel and user space exist in different virtual address spaces, there are special considerations for moving data between them. Explore the ideas behind virtual address spaces and the kernel APIs for data movement to and from user space, and learn some of the other mapping techniques used to map memory.
Category: Linux > Administration - Difficulty:


More cool Linux tutorials:



The power of Network Installation Manager
The power of Network Installation Manager
If you have an environment with many AIX systems, then you know that installing, upgrading, and maintaining the software can take a considerable amount of time. The AIX Network Installation Manager can help you with installation and software maintenance in a client and server environment.
Difficulty:
how to get information about a database in Sybase
how to get information about a database in Sybase
how to get information about a database in Sybase
Difficulty:
Postfix Backup MX eMail Server Anti-Spam Configuration
Postfix Backup MX eMail Server Anti-Spam Configuration
According to RFC2821 the lowest-numbered records are the most preferred MX for domain. So a target Postfix backup server is used to keep the messages in a queue waiting for the primary server to become available. This ensures that if my primary MX goes down you do not loss any emails. However, spammers are connects to backup MX to avoid anti spam filters that are running on the primary MX server. This also hides their real IP from my primary MX. This tutorial shows how to configure anti-spam and anti-virus for Red Hat / CentOS Linux ver5.3 based Postfix mx server.
Difficulty:
Linux File Permissions
Linux File Permissions
Learn how linux file permission works. Chmod, chown and chgrp commands explained with examples.
Difficulty:
Configuring an NTP Client
Configuring an NTP Client
Configuring an NTP Client
Difficulty: