Đang chuẩn bị liên kết để tải về tài liệu:
Red Hat Enterprise Linux 5.0 Deployment
Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
The Linux kernel has two primary functions: to control access to physical devices on the com- puter and to schedule when and how processes interact with these devices. The /proc/ direct- ory — also called the proc file system — contains a hierarchy of special files which represent the current state of the kernel — allowing applications and users to peer into the kernel's view of the system. Within the /proc/ directory, one can find a wealth of information detailing the system hardware and any processes currently running. In addition, some of the files within the /proc/ directory tree can be manipulated by users and applications to. | Red Hat Enterprise Linux 5.0.0 Red Hat Enterprise Linux Deployment Guide Red Hat Enterprise Linux 5.0.0: Red Hat Enterprise Linux De- ployment Guide Copyright © 2007 Red Hat, Inc. This Deployment Guide documents relevant information regarding the deployment, configura- tion and administration of Red Hat Enterprise Linux 5.0.0. 1801 Varsity Drive Raleigh, NC 27606-2072 USA Phone: +1 919 754 3700 Phone: 888 733 4281 Fax: +1 919 754 3701 PO Box 13588 Research Triangle Park, NC 27709 USA Documentation-Deployment Copyright © 2007 by Red Hat, Inc. This material may be distributed only subject to the terms and conditions set forth in the Open Publication License, V1.0 or later (the latest version is presently available at ht- tp://www.opencontent.org/openpub/). Distribution of substantively modified versions of this document is prohibited without the explicit permission of the copy- right holder. Distribution of the work or derivative of the work in any standard (paper) book form for commercial purposes is prohib- ited unless prior permission is obtained from the copyright holder. Red Hat and the Red Hat "Shadow Man" logo are registered trademarks of Red Hat, Inc. in the United States and other countries. All other trademarks referenced herein are the property of their respective owners. The GPG fingerprint of the security@redhat.com key is: CA 20 86 86 2B D6 9D FC 65 F6 EC C4 21 91 80 CD DB 42 A6 0E Table of Contents Introduction xxii 1. Document Conventions . xxii 2. Send in Your Feedback . xxv I. File Systems . 1 1. File System Structure .