Red Hat ENTERPRISE LINUX 4 - DEVELOPER TOOLS GUIDE manuals
ENTERPRISE LINUX 4 - DEVELOPER TOOLS GUIDE
Table of contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- I. Tuning and Optimizing Red Hat Enterprise Linux for Oracle Database 9i and 10g
- Introduction
- General
- The 64 bit Architecture
- Kernel Upgrades
- Kernel Boot Parameters
- Memory Usage and Page Cache
- Swap Space
- Checking Swap Space Size and Usage
- Setting Shared Memory
- Setting SHMMNI Parameter
- Removing Shared Memory
- Setting Semaphores
- The SEMOPM Parameter
- Setting File Handles
- Adjusting Network Settings
- Flow Control for e1000 Network Interface Cards
- Setting Shell Limits for the Oracle User
- Limiting Maximum Number of Processes Available for the Oracle User
- Enabling Asynchronous I/O and Direct I/O Support
- Relinking Oracle 10g to Enable Asynchronous I/O Support
- Tuning Asynchronous I/O for Oracle 9i and 10g
- Verifying Asynchronous I/O Usage
- Configuring I/O for Raw Partitions
- Basics of Raw Devices
- Using Raw Devices for Oracle Databases
- Large Memory Optimization, Big Pages, and Huge Pages
- Usage of Big Pages and Huge Pages in Oracle 9i and 10g
- Configuring Huge Pages in Red Hat Enterprise Linux 3
- Configuring Huge Pages in Red Hat Enterprise Linux 4 or 5
- Huge Pages and Shared Memory File System in Red Hat Enterprise Linux 3
- Growing the Oracle SGA to 2.7 GB in x86 Red Hat Enterprise Linux 2.1 Without VLM
- Lowering the SGA Attach Address for Shared Memory Segments in Oracle 9i
- Libraries
- Without VLM
- Oracle 10g SGA Sizes in Red Hat Enterprise Linux 3, 4 or 5
- Lowering the SGA Attach Address in Oracle 10g
- Using Very Large Memory (VLM)
- Configuring Very Large Memory (VLM)
- II. Installing the Oracle Database 10g on Red Hat Enterprise Linux
- Downloading and Unpacking Oracle 10g Installation Files
- Pre-Installation Preparation and Verification
- Verifying Kernel Parameters
- g R2 on Red Hat Enterprise Linux 4 and 5 x86-64 version
- Oracle 10g R1 and R2 on Red Hat Enterprise Linux 3 (x86)
- Oracle 10g R1 on Red Hat Enterprise Linux 2.1 (x86)
- Sizing Disk Space for Oracle 10g
- Setting Shell Limits for Your Oracle User
- Creating Oracle User Accounts
- Creating Oracle Directories
- Setting Oracle Environments
- Installing Oracle Database 10g
- Starting Oracle Universal Installer
- Using Oracle Universal Installer (OUI)
- Updating after the Oracle Universal Installer
- Oracle Post Installation Tasks
- Tips and Hints for Oracle 10g on Red Hat Enterprise Linux
- Oracle 10g and Linux Installation Errors and Troubleshooting
- III. Installing the Oracle9i 32 bit Database on Red Hat Enterprise Linux
- Preparing Red Hat Enterprise Linux for an Oracle Database Installation
- Examining Temporary(/tmp) Space
- Verifying Required Packages(RPMs)
- Required Packages for Red Hat Enterprise Linux 4
- Setting Up a Working Environment for Oracle
- Starting runInstaller
- Installing Oracle9i R2 (9.2.0.4.0) on Red Hat Enterprise Linux 3
- Patching Oracle9i to 9.2.0.4.0 on Red Hat Enterprise Linux 3
- Patching Oracle Intelligent Agent on Red Hat Enterprise Linux 3
- Installing Oracle9i R2 (9.2.0.6.0) on Red Hat Enterprise Linux 4
- Patching Oracle9i R2 to 9.2.0.6.0 on Red Hat Enterprise Linux 4
- Starting and Shutting down the Oracle9i Database
- Oracle Installation Errors
- Reference List
- A. Revision History
ENTERPRISE LINUX 4 - DEVELOPER TOOLS GUIDE
Table of contents
- Table Of Contents
- Table Of Contents
- Steps to Get You Started
- Basic Overview of the Boot Method
- Using ISO Images for NFS Installs
- Installing under z/VM
- Installing on a zSeries LPAR: Preparation
- Interactive Setup
- Installing in an LPAR without the Red Hat Enterprise Linux for S/390 CD-ROMs
- Do You Have Enough Disk Space
- Installing Red Hat Enterprise Linux
- Using the Keyboard to Navigate
- Running the Installation Program
- Installation using VNC
- Installing via NFS
- Installing via FTP
- Installing via HTTP
- Welcome to Red Hat Enterprise Linux
- Disk Partitioning Setup
- Partitioning Your System
- Graphical Display of DASD Device(s)
- Recommended Partitioning Scheme
- Editing Partitions
- Network Configuration
- Firewall Configuration
- Language Support Selection
- Time Zone Configuration
- Set Root Password
- Package Group Selection
- Preparing to Install
- Installing Packages
- A. Removing Red Hat Enterprise Linux
- B. Sample Parameter Files
- C. Upgrading Your Current System
- Upgrading Your System
- Upgrading Packages
- D. Troubleshooting Your Installation of Red Hat Enterprise Linux
- Other Partitioning Problems
- Problems After Installation
- Problems When You Try to Log In
- E. Additional Boot Options
- mdadm
- IPL the SCSI Disk
- Adding a Network Device
- Quick Reference for Adding Network Devices
- Kernel-Related Information
- Index
ENTERPRISE LINUX 4 - DEVELOPER TOOLS GUIDE
Table of contents
ENTERPRISE LINUX 4 - DEVELOPER TOOLS GUIDE
Table of contents
- red hat enterprise linux
- Table Of Contents
- Table Of Contents
- document conventions
- Configuration Basics
- Installing Red Hat Cluster software
- Conga
- system-config-cluster Cluster Administration GUI
- Cluster Configuration Tool
- Cluster Status Tool
- Command Line Administration Tools
- Enabling IP Ports on Cluster Nodes
- Enabling IP Ports on Computers That Run luci
- Examples of iptables Rules
- Configuring ACPI For Use with Integrated Fence Devices
- Disabling ACPI Soft-Off with chkconfig Management
- Disabling ACPI Soft-Off with the BIOS
- Disabling ACPI Completely in the grub.conf File
- Configuring max_luns
- Considerations for Using Quorum Disk
- Red Hat Cluster Suite and SELinux
- General Configuration Considerations
- Starting luci and ricci
- Creating A Cluster
- Global Cluster Properties
- Configuring Fence Devices
- Creating a Shared Fence Device
- Modifying or Deleting a Fence Device
- Adding a Member to a Running Cluster
- Deleting a Member from a Cluster
- Configuring a Failover Domain
- Adding a Failover Domain
- Modifying a Failover Domain
- Adding Cluster Resources
- Adding a Cluster Service to the Cluster
- Configuring Cluster Storage
- Managing Red Hat Cluster With Conga
- Managing Cluster Nodes
- Managing High-Availability Services
- Diagnosing and Correcting Problems in a Cluster
- Configuring Red Hat Cluster With system-config-cluster
- Starting the Cluster Configuration Tool
- Configuring Cluster Properties
- Adding and Deleting Members
- Adding a Member to a Running DLM Cluster
- Deleting a Member from a DLM Cluster
- Adding a GULM Client-only Member
- Adding or Deleting a GULM Lock Server Member
- Removing a Failover Domain
- Removing a Member from a Failover Domain
- Propagating The Configuration File: New Cluster
- Managing Red Hat Cluster With system-config-cluster
- Modifying the Cluster Configuration
- Backing Up and Restoring the Cluster Database
- Disabling the Cluster Software
- A. Example of Setting Up Apache HTTP Server
- A.3. Installing and Configuring the Apache HTTP Server
- B. Fence Device Parameters
- C. Revision History
- Index
ENTERPRISE LINUX 4 - DEVELOPER TOOLS GUIDE
Table of contents
- Table Of Contents
- Device Mapper Multipathing
- Storage Array Support
- DM-Multipath Setup Overview
- Multipath Devices
- Multipath Device Attributes
- Setting Up DM-Multipath
- Ignoring Local Disks when Generating Multipath Devices
- Adding Devices to the Multipathing Database
- The DM-Multipath Configuration File
- Configuration File Blacklist
- Configuration File Defaults
- Multipaths Device Configuration Attributes
- Configuration File Devices
- DM-Multipath Administration and Troubleshooting
- Multipath Queries with multipath Command
- Determining Device Mapper Entries with the dmsetup Command
- Resizing an Online Multipathed Device (RHEL 4.8 and later)
- A. Revision History
- Index
ENTERPRISE LINUX 4 - DEVELOPER TOOLS GUIDE
Table of contents
- Table Of Contents
- Table Of Contents
- Performance, Scalability, and Economy
- Performance, Scalability, Moderate Price
- Economy and Performance
- GFS Functions
- Before Setting Up GFS
- Red Hat Cluster Suite
- Fibre Channel Storage Devices
- Installing GFS
- Initial Setup Tasks
- Mounting a File System
- Unmounting a File System
- GFS Quota Management
- Displaying Quota Limits and Usage
- Synchronizing Quotas
- Disabling/Enabling Quota Enforcement
- Growing a File System
- Adding Journals to a File System
- Direct I/O
- GFS Directory Attribute
- Configuring atime Updates
- Mount with noatime
- Suspending Activity on a File System
- Displaying Extended GFS Information and Statistics
- Repairing a File System
- Context-Dependent Path Names
- A. Upgrading GFS
- B. Revision History
- Index
ENTERPRISE LINUX 4 - DEVELOPER TOOLS GUIDE
Table of contents
ENTERPRISE LINUX 4 - DEVELOPER TOOLS GUIDE
Table of contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Debugging with gdb
- Summary of gdb
- Contributors to gdb
- A Sample gdb Session
- Getting In and Out of gdb
- Choosing modes
- Quitting gdb
- gdb Commands
- Getting help
- Running Programs Under gdb
- Your program's arguments
- Your program's environment
- Your program's working directory
- Debugging an already-running process
- Debugging programs with multiple threads
- Debugging programs with multiple processes
- Stopping and Continuing
- Setting watchpoints
- Setting catchpoints
- Deleting breakpoints
- Disabling breakpoints
- Break conditions
- Breakpoint command lists
- Breakpoint menus
- Cannot insert breakpoints
- Signals
- Stopping and starting multi-thread programs
- Examining the Stack
- Backtraces
- Selecting a frame
- Information about a frame
- Examining Source Files
- Choosing your editor
- Specifying source directories
- Source and machine code
- Examining Data
- Program variables
- Output formats
- Examining memory
- Automatic display
- Print settings
- Value history
- Convenience variables
- Registers
- Vector Unit
- Attributes
- Character Sets
- C Preprocessor Macros
- Tracepoints
- Enable and Disable Tracepoints
- Tracepoint Action Lists
- Listing Tracepoints
- Using the collected data
- tdump
- filename
- Debugging Programs That Use Overlays
- Overlay Commands
- Automatic Overlay Debugging
- Overlay Sample Program
- Using gdb with Different Languages
- Setting the working language
- Type and range checking
- An overview of range checking
- Supported languages
- Objective-C
- Modula-2
- Examining the Symbol Table
- Altering Execution
- Continuing at a different address
- Returning from a function
- Patching programs
- gdb Files
- Debugging Information in Separate Files
- Specifying a Debugging Target
- Remote debugging
- Debugging remote programs
- program
- Implementing a remote stub
- What you must do for the stub
- HP-UX
- Features for Debugging MS Windows PE executables
- Embedded Operating Systems
- H8/500
- MIPS Embedded
- HP PA Embedded
- Architectures
- Controlling gdb
- Screen size
- Optional warnings and messages
- Optional messages about internal happenings
- Canned Sequences of Commands
- Commands for controlled output
- Command Interpreters
- gdb Text User Interface
- TUI Key Bindings
- Using gdb under gnu Emacs
- The gdb/mi Interface
- gdb/mi Output Syntax
- Simple Examples of gdb/mi Interaction
- gdb/mi Compatibility with CLI
- gdb/mi Out-of-band Records
- Introduction
- Command
- Program termination
- Command Descriptions
- 26.11.7. The -exec-next-instruction
- 26.11.12. The -exec-step-instruction
- gdb Command
- gdb/mi Symbol Query Commands
- gdb/mi Variable Objects
- Description And Use of Operations on Variable Objects
- What is an Annotation
- Frames
- Annotation for gdb Input
- Errors
- Displaying Source
- Annotations We Might Want in the Future
- Reporting Bugs in gdb
- Command Line Editing
- Readline Movement Commands
- Readline Arguments
- Readline Init File
- Sample Init File
- Bindable Readline Commands
- Commands For Manipulating The History
- Commands For Changing Text
- Killing And Yanking
- Specifying Numeric Arguments
- Keyboard Macros
- Readline vi Mode
- Using History Interactively
- Word Designators
- A. Formatting Documentation
- B. Installing gdb
- B.1. Compiling gdb in another directory
- B.2. Specifying names for hosts and targets
- C. Maintenance Commands
- D.1. Overview
- D.2. Packets
- D.3. Stop Reply Packets
- D.4. General Query Packets
- D.5. Register Packet Format
- D.7. File-I/O remote protocol extension
- D.7.5. Memory transfer
- D.7.8. The isatty(3) call
- D.7.12. Constants
- D.7.13. File-I/O Examples
- E.1. General Bytecode Design
- E.2. Bytecode Descriptions
- E.3. Using Agent Expressions
- E.5. Tracing on Symmetrix
- E.6. Rationale
- F.1. Preamble
- F.2. How to Apply These Terms to Your New Programs
- G.1. ADDENDUM: How to use this License for your documents
- Index
ENTERPRISE LINUX 4 - DEVELOPER TOOLS GUIDE
Table of contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Logical Volumes
- LVM Architecture Overview
- Running LVM in a Cluster
- Document Overview
- LVM Physical Volume Layout
- Multiple Partitions on a Disk
- LVM Logical Volumes
- Striped Logical Volumes
- Mirrored Logical Volumes
- Snapshot Volumes
- Logical Volume Creation Overview
- Growing a File System on a Logical Volume
- Physical Volume Administration
- Creating Physical Volumes
- Displaying Physical Volumes
- Preventing Allocation on a Physical Volume
- Creating Volume Groups
- Adding Physical Volumes to a Volume Group
- Scanning Disks for Volume Groups to Build the Cache File
- Changing the Parameters of a Volume Group
- Removing Volume Groups
- Renaming a Volume Group
- Recreating a Volume Group Directory
- Persistent Device Numbers
- Resizing Logical Volumes
- Displaying Logical Volumes
- Extending a Striped Volume
- Shrinking Logical Volumes
- Controlling LVM Device Scans with Filters
- Online Data Relocation
- Activating Logical Volumes on Individual Nodes in a Cluster
- Format Control
- Object Selection
- Sorting LVM Reports
- Specifying Units
- LVM Configuration Examples 5.1. Creating an LVM Logical Volume on Three Disks
- Creating the File System
- Creating the Volume Group
- Splitting a Volume Group
- Splitting the Volume Group
- Activating and Mounting the Original Logical Volume
- Moving Extents to a New Disk
- Creating a Mirrored LVM Logical Volume in a Cluster
- Displaying Information on Failed Devices
- Recovering from LVM Mirror Failure
- Recovering Physical Volume Metadata
- Replacing a Missing Physical Volume
- Removing Lost Physical Volumes from a Volume Group
- LVM Administration with the LVM GUI
- A. The Device Mapper
- B. The LVM Configuration Files
- C. LVM Object Tags
- C.3. Controlling Activation with Tags
- D. LVM Volume Group Metadata
- D.3. Sample Metadata
- E. Revision History
- Index
ENTERPRISE LINUX 4 - DEVELOPER TOOLS GUIDE
Table of contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- The Philosophy of System Administration
- Document Everything
- Communicate as Much as Possible
- Know Your Resources
- Know Your Users
- The Risks of Social Engineering
- Expect the Unexpected
- Documentation and Communication
- Additional Resources
- Resource Monitoring
- Monitoring System Capacity
- Monitoring CPU Power
- Monitoring Storage
- free
- vmstat
- The Sysstat Suite of Resource Monitoring Tools
- Related Books
- Bandwidth and Processing Power
- Datapaths
- Potential Bandwidth-Related Solutions
- Processing Power
- Improving a CPU Shortage
- Monitoring Bandwidth on Red Hat Enterprise Linux
- Monitoring CPU Utilization on Red Hat Enterprise Linux
- Physical and Virtual Memory
- CPU Registers
- Hard Drives
- Off-Line Backup Storage
- Page Faults
- The Working Set
- Worst Case Performance Scenario
- Installed Documentation
- Managing Storage
- Access Arms
- Storage Addressing Concepts
- Block-Based Addressing
- Mass Storage Device Interfaces
- Present-Day Industry-Standard Interfaces
- Hard Drive Performance Characteristics
- Mechanical/Electrical Limitations
- I/O Loads and Performance
- Making the Storage Usable
- Partitions/Slices
- File Systems
- Directory Structure
- Enabling Storage Access
- RAID-Based Storage
- Logical Volume Management
- Storage Management Day-to-Day
- Monitoring Free Space
- Disk Quota Issues
- File-Related Issues
- Adding/Removing Storage
- A Word About Backups
- File System Basics
- Mounting File Systems
- Network-Accessible Storage Under Red Hat Enterprise Linux
- etc/fstab
- Implementing Disk Quotas
- Creating RAID Arrays
- Managing User Accounts and Resource Access
- Passwords
- Access Control Information
- Managing Accounts and Resource Access Day-to-Day
- Managing User Resources
- Where Users Access Shared Data
- What Barriers Are in Place To Prevent Abuse of Resources
- Files Controlling User Accounts and Groups
- User Account and Group Applications
- Useful Websites
- Printers and Printing
- Impact Printers
- Daisy-Wheel Printers
- Inkjet Consumables
- Laser Printer Consumables
- Printer Languages and Technologies
- Planning for Disaster
- Software Failures
- Environmental Failures
- Human Errors
- Different Data: Different Backup Needs
- Backup Software: Buy Versus Build
- Types of Backups
- Backup Media
- Storage of Backups
- Disaster Recovery
- Creating, Testing, and Implementing a Disaster Recovery Plan
- Backup Sites: Cold, Warm, and Hot
- Availability of Backups
- Software Support
- Index
- Colophon
ENTERPRISE LINUX 4 - DEVELOPER TOOLS GUIDE
Table of contents
- red hat enterprise linux
- Table Of Contents
- document conventions
- Red Hat Cluster Suite Overview
- Red Hat Cluster Suite Introduction
- Cluster Infrastructure
- Lock Management
- Cluster Configuration System
- High-availability Service Management
- Red Hat GFS
- Superior Performance and Scalability
- Economy and Performance
- Cluster Logical Volume Manager
- Global Network Block Device
- Linux Virtual Server
- Two-Tier LVS Topology
- Three-Tier LVS Topology
- Routing Methods
- direct routing
- Persistence and Firewall Marks
- Cluster Administration Tools
- Cluster Administration GUI
- cluster status tool
- Command Line Administration Tools
- Linux Virtual Server Administration GUI
- CONTROL/MONITORING
- GLOBAL SETTINGS
- REDUNDANCY
- VIRTUAL SERVERS
- the virtual server subsection
- real server subsection
- edit monitoring scripts subsection
- Red Hat Cluster Suite Component Summary
- Man Pages
- Compatible Hardware
- A. Revision History
- Index
ENTERPRISE LINUX 4 - DEVELOPER TOOLS GUIDE
Table of contents
- Table Of Contents
- Table Of Contents
- SELinux Architectural Overview
- SELinux, an Implementation of Flask
- SELinux Policy Overview
- Where is the Policy
- Policy Role in Boot
- File System Security Contexts
- Object Classes and Permissions
- TE Rules - Attributes
- TE Rules - Types
- TE Rules - Access Vectors
- Policy Macros
- SELinux Users and Roles
- TE Rules - Constraints
- Special Interfaces and File Systems
- Targeted Policy Overview
- Files and Directories of the Targeted Policy
- Understanding the File Contexts Files
- Common Macros in the Targeted Policy
- II. Working With SELinux
- Controlling and Maintaining SELinux
- Administrator Control of SELinux
- Analyst Control of SELinux
- Policy Writer Control of SELinux
- Tools for Manipulating and Analyzing SELinux
- Using seaudit for Audit Log Analysis
- Using apol for Policy Analysis
- Performance Tuning
- Compiling SELinux Policy
- What Happens During Policy Build
- General Policy Troubleshooting Guidelines
- Writing New Policy for a Daemon
- Deploying Customized Binary Policy
- References
- III. Appendix
- A. Brief Background and History of SELinux
- Index
- Colophon
ENTERPRISE LINUX 4 - DEVELOPER TOOLS GUIDE
Table of contents
- Table Of Contents
- Table Of Contents
- Overview
- The preprocessing language
- Include Operation
- Search Path
- Computed Includes
- Macros
- Function-like Macros
- Macro Arguments
- Variadic Macros
- Directives Within Macro Arguments
- Operator Precedence Problems
- Swallowing the Semicolon
- Duplication of Side Effects
- Self-Referential Macros
- Argument Prescan
- Newlines in Arguments
- Conditional Uses
- Conditionals
- Else
- Diagnostics
- Line Control
- Pragmas
- Other Directives
- Preprocessor Output
- Traditional Mode
- Traditional miscellany
- Assertions
- Invocation
- Environment Variables
- GNU Free Documentation License
- ADDENDUM: How to use this License for your documents
- Index of Directives
- Option Index
- Concept Index
ENTERPRISE LINUX 4 - DEVELOPER TOOLS GUIDE
Table of contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Getting Started
- Introductory Terms
- Logging In
- Graphical Interface
- Documentation and Help
- Logging Out
- Shutting Down your Computer
- Using the Graphical Desktop
- Using the Desktop
- Using the Panel
- Using the Applications and Actions Menus
- Customizing your GNOME session
- Switching Desktops
- Managing Files and Directories
- Managing Files
- File Compression and Archiving
- Managing Directories
- Shell Prompt Basics
- Basics
- Leaving your Current Working Directory
- Locating Files and Directories
- Manipulating Information from the Shell
- Using Multiple Commands
- II. Using Your System
- Connecting to the Internet
- Creating a Dial-Up Connection
- Creating a High Speed Connection
- Creating a Wireless Connection
- Web Browsing
- Email Applications
- Evolution
- Thunderbird
- Plain Text Email Clients
- Working with Other Text Applications
- Audio, Video, and Games
- Playing Digital Audio Files
- Troubleshooting Your Sound Card
- Troubleshooting Your Video Card
- Games
- Finding Games Online
- Working with Digital Cameras
- Working with Images
- Editing and Creating Images with the GIMP
- Diskettes and CD-ROMs
- CD- and DVD-ROMs
- CD/DVD-Rs and CD/DVD-RWs
- Additional Resources
- III. Troubleshooting Your System
- Frequently Asked Questions
- Forgotten user Password
- Finding Commands Quickly
- Accessing a Windows Partition
- Error Messages During Installation of RPMs
- IV. Appendix
- A.1. Customizing KDE
- A.2. Introducing Konqueror
- A.3. Using Konqueror
- A.4. Using the KDE Desktop
- A.5. Using the Panel
- A.6. Browsing the Web with Konqueror
- A.7. Using Konqueror to View Images
- A.8. KMail
- A.9. Logging Out of KDE
- B.2. Warning Messages
- B.5. Exporting your Public Key
- B.6. Importing a Public Key
- B.7. What Are Digital Signatures
- Index
- Colophon
ENTERPRISE LINUX 4 - DEVELOPER TOOLS GUIDE
Table of contents
- Table Of Contents
- Table Of Contents
- Overview
- Invocation
- Environment Variables
- Basic Linker Script Concepts
- Simple Linker Script Example
- Simple Linker Script Commands
- Commands Dealing with Object File Formats
- Assigning Values to Symbols
- PROVIDE
- SECTIONS Command
- Output Section Name
- Input Section Description
- Output Section Keywords
- Output Section Discarding
- Output Section Attributes
- Overlay Description
- MEMORY Command
- PHDRS Command
- VERSION Command
- Constants
- Builtin Functions
- Implicit Linker Scripts
- How It Works: An Outline of BFD
- Reporting Bugs
- A. MRI Compatible Script Files
- B.1. ADDENDUM: How to use this License for your documents
- Index
ENTERPRISE LINUX 4 - DEVELOPER TOOLS GUIDE
Table of contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Overview
- The GNU Assembler
- Command Line
- Output (Object) File
- Command-Line Options
- Whitespace
- Symbols
- Constants
- Number Constants
- Sections and Relocation
- Linker Sections
- Assembler Internal Sections
- bss Section
- Labels
- Dollar Local Labels
- The Special Dot Symbol
- Symbol Attributes for SOM
- Expressions
- abort
- abs-expr , abs-expr
- offset
- def name
- endfunc
- fail expression
- symbol
- count ]]
- mri val
- long expressions
- altmacro
- noaltmacro
- popsection
- rept count
- ELF Version
- COFF Version
- symver
- parent
- Options
- Floating Point
- Alpha Dependent Features
- Syntax
- Alpha Assembler Directives
- Special Characters
- ARC Machine Directives
- Opcodes
- ARM Dependent Features
- Register Names
- Mapping Symbols
- CRIS Dependent Features
- Symbols in position-independent code
- Assembler Directives
- D10V Dependent Features
- D30V Dependent Features
- Guarded Execution
- Addressing Modes
- H8/300 Dependent Features
- H8/300 Machine Directives
- H8/500 Machine Directives
- HPPA Dependent Features
- ESA/390 Dependent Features
- ESA/390 Assembler Directives
- Dependent Features
- Instruction Naming
- Memory References
- Handling of Jump Instructions
- Intel's MMX and AMD's 3DNow! SIMD Operations
- Specifying CPU Architecture
- Intel i860 Dependent Features
- i860 Machine Directives
- Intel 80960 Dependent Features
- i960 Machine Directives
- callj
- IP2K Dependent Features
- M32R Dependent Features
- M32R Directives
- M32R Warnings
- M680x0 Dependent Features
- Branch Improvement
- M68HC11 and M68HC12 Dependent Features
- Motorola M88K Dependent Features
- MIPS Dependent Features
- MIPS ECOFF object code
- Directives for debugging information
- Directives to control generation of MIPS ASE instructions
- MMIX Dependent Features
- Macros
- Assembler Extensions
- MSP 430 Machine Directives
- PDP-11 Dependent Features
- CPU Model Options
- Machine Model Options
- PDP-11 Assembly Language Syntax
- Synthetic Instructions
- picoJava Dependent Features
- PowerPC Dependent Features
- PowerPC Assembler Directives
- Renesas / SuperH SH Dependent Features
- SH Machine Directives
- SH64 Machine Directives
- SPARC Dependent Features
- Sparc Machine Directives
- TIC54X Dependent Features
- Local Labels
- Math Builtins
- Extended Addressing
- Memory-mapped Registers
- VAX Dependent Features
- VAX Floating Point
- VAX Opcodes
- v850 Dependent Features
- V850 Machine Directives
- Command Line Options
- Xtensa Optimizations
- Automatic Instruction Alignment
- Function Call Relaxation
- Directives
- density
- longcalls
- literal_position
- frame
- Reporting Bugs
- Acknowledgements
- A.1. ADDENDUM: How to use this License for your documents
ENTERPRISE LINUX 4 - DEVELOPER TOOLS GUIDE
Table of contents
- red hat enterprise linux
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- document conventions
- I. A General Introduction to Security
- Security Overview
- Computer Security Timeline
- Security Today
- Standardizing Security
- Technical Controls
- Attackers and Vulnerabilities
- Threats to Network Security
- Unpatched Services
- Threats to Workstation and Home PC Security
- II. Configuring Red Hat Enterprise Linux for Security
- Security Updates
- Using the Red Hat Errata Website
- Installing Signed Packages
- Applying the Changes
- Workstation Security
- Boot Loader Passwords
- Password Security
- Creating Strong Passwords
- Creating User Passwords Within an Organization
- password aging
- Administrative Controls
- Allowing Root Access
- Limiting Root Access
- Available Network Services
- Risks To Services
- Insecure Services
- Personal Firewalls
- Security Enhanced Communication Tools
- Enhancing Security With TCP Wrappers
- Enhancing Security With xinetd
- Securing Portmap
- Securing NIS
- Edit the /var/yp/securenets File
- Use Kerberos Authentication
- Do Not Use the no_root_squash Option
- Do Not Remove the IncludesNoExec Directive
- Anonymous Access
- User Accounts
- Limiting a Denial of Service Attack
- vpns and red hat enterprise linux
- IPsec Installation
- IPsec Network-to-Network configuration
- Netfilter and iptables
- Basic Firewall Policies
- Saving and Restoring iptables Rules
- FORWARD and NAT Rules
- DMZs and iptables
- iptables and Connection Tracking
- Additional Resources
- vulnerability assessment
- Defining Assessment and Testing
- Establishing a Methodology
- Nessus
- Nikto
- IDS Types
- Host-based IDS
- Other Host-based IDSes
- Snort
- Creating an Incident Response Plan
- The Computer Emergency Response Team (CERT)
- Implementing the Incident Response Plan
- Collecting an Evidential Image
- Restoring and Recovering Resources
- V. Appendixes
- A. Hardware and Network Protection
- A.1.2. Transmission Considerations
- A.1.4. Network Segmentation and DMZs
- B. Common Exploits and Attacks
- C. Common Ports
- D. Revision History
- Index
ENTERPRISE LINUX 4 - DEVELOPER TOOLS GUIDE
Table of contents
- red hat enterprise linux
- Table Of Contents
- Table Of Contents
- document conventions
- A Basic LVS Configuration
- Data Replication and Data Sharing Between Real Servers
- LVS Scheduling Overview
- Scheduling Algorithms
- Server Weight and Scheduling
- Routing Methods
- Direct Routing
- Persistence and Firewall Marks
- Firewall Marks
- LVS Components
- initial lvs configuration
- Setting a Password for the Piranha Configuration Tool
- Configuring the Piranha Configuration Tool Web Server Port
- Turning on Packet Forwarding
- setting up lvs
- Routing on the Real Servers
- Enabling NAT Routing on the LVS Routers
- Direct Routing and arptables_jf
- Direct Routing and iptables
- Putting the Configuration Together
- General LVS Networking Tips
- Assigning Firewall Marks
- Configuring FTP
- Creating Network Packet Filter Rules
- Saving Network Packet Filter Settings
- Logging Into the Piranha Configuration Tool
- CONTROL/MONITORING
- GLOBAL SETTINGS
- REDUNDANCY
- VIRTUAL SERVERS
- The VIRTUAL SERVER Subsection
- REAL SERVER Subsection
- EDIT MONITORING SCRIPTS Subsection
- Synchronizing Configuration Files
- Synchronizing sysctl
- A. Using LVS with Red Hat Cluster
- B. Revision History
- Index
ENTERPRISE LINUX 4 - DEVELOPER TOOLS GUIDE
Table of contents
- red hat enterprise linux
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Introduction
- Programming Languages Supported by GCC
- Language Standards Supported by GCC
- GCC Command Options
- Options Controlling the Kind of Output
- Compiling C++ Programs
- Options Controlling C++ Dialect
- Options Controlling Objective-C Dialect
- Options to Control Diagnostic Messages Formatting
- Options for Debugging Your Program or GCC
- Options That Control Optimization
- Options Controlling the Preprocessor
- Passing Options to the Assembler
- Specifying subprocesses and the switches to pass to them
- Specifying Target Machine and Compiler Version
- IBM RS/6000 and PowerPC Options
- Darwin Options
- IA-64 Options
- Options for Code Generation Conventions
- Environment Variables Affecting GCC
- Using Precompiled Headers
- Running Protoize
- Translation
- Integers
- Arrays and pointers
- Preprocessing directives
- Extensions to the C Language Family
- Locally Declared Labels
- Labels as Values
- Nested Functions
- Constructing Function Calls
- typeof
- Double-Word Integers
- Hex Floats
- Structures With No Members
- Non-Constant Initializers
- Cast to a Union Type
- Attribute Syntax
- The Character [ESC] in Constants
- M32R/D Variable Attributes
- i386 Type Attributes
- Assembler Instructions with C Expression Operands
- Multiple Alternative Constraints
- Constraints for Particular Machines
- Controlling Names Used in Assembler Code
- Specifying Registers for Local Variables
- Alternate Keywords
- Function Names as Strings
- Object Size Checking Builtins
- X86 Built-in Functions
- PowerPC AltiVec Built-in Functions
- Pragmas Accepted by GCC
- Darwin Pragmas
- Thread-Local Storage
- ISO/IEC 14882:1998 Edits for Thread-Local Storage
- Extensions to the C++ Language
- Restricting Pointer Aliasing
- Vague Linkage
- pragma interface and implementation
- Where's the Template
- Extracting the function pointer from a bound pointer to member function
- Strong Using
- Java Exceptions
- Backwards Compatibility
- Constant string objects
- compatibility_alias
- Binary Compatibility
- Invoking gcov
- Actual Bugs We Haven't Fixed Yet
- Fixed Header Files
- Name lookup, templates, and accessing members of base classes
- Temporaries May Vanish Before You Expect
- warning messages and error messages
- funding free software
ENTERPRISE LINUX 4 - DEVELOPER TOOLS GUIDE
Table of contents
- red hat enterprise linux
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- document conventions
- What are Kickstart Installations
- Kickstart Options
- Advanced Partitioning Example
- Pre-installation Script
- Example
- Post-installation Script
- Making the Kickstart File Available
- Making the Kickstart File Available on the Network
- Making the Installation Tree Available
- basic configuration
- Installation Method
- Boot Loader Options
- Partition Information
- Creating Partitions
- Network Configuration
- Authentication
- Firewall Configuration
- SELinux Configuration
- Video Card
- Monitor
- Package Selection
- Chroot Environment
- PXE Boot Configuration
- Command Line Configuration
- Adding a Custom Boot Message
- Diskless Environments
- Finish Configuring the Diskless Environment
- Booting the Hosts
- Basic System Recovery
- Reinstalling the Boot Loader
- Booting into Emergency Mode
- II. File Systems
- The ext3 File System
- Converting to an ext3 File System
- Reverting to an ext2 File System
- Logical Volume Manager (LVM)
- What is LVM2
- LVM Configuration
- Manual LVM Partitioning
- Creating the /boot/ Partition
- Creating the LVM Physical Volumes
- Creating the LVM Volume Groups
- Creating the LVM Logical Volumes
- Redundant Array of Independent Disks (RAID)
- Software RAID
- Software RAID Configuration
- Creating the RAID Devices and Mount Points
- Swap Space 11.1. What is Swap Space
- Extending Swap on an LVM2 Logical Volume
- Creating a Swap File
- Removing an LVM2 Logical Volume for Swap
- Moving Swap Space
- Viewing the Partition Table
- Creating a Partition
- Removing a Partition
- LVM Partition Management
- Remounting the File Systems
- Assigning Quotas per User
- Assigning Quotas per Group
- Reporting on Disk Quotas
- Additional Resources
- access control lists
- Setting Default ACLs
- Retrieving ACLs
- Compatibility with Older Systems
- Useful Websites
- RPM Design Goals
- Using RPM
- Uninstalling
- Upgrading
- Freshening
- Verifying
- Checking a Package's Signature
- Verifying Signature of Packages
- Installed Documentation
- red hat network
- Establishing an Ethernet Connection
- Establishing an ISDN Connection
- Establishing a Modem Connection
- Establishing an xDSL Connection
- Establishing a Token Ring Connection
- Establishing a Wireless Connection
- Managing DNS Settings
- Managing Hosts
- Working with Profiles
- Device Aliases
- Saving and Restoring the Network Configuration
- IPTables Overview
- Security Level Configuration Tool
- Enabling and Disabling the Firewall
- Other Ports
- Using IPTables
- Saving and Restoring IPTables Rules
- FORWARD and NAT Rules
- Postrouting and IP Masquerading
- DMZs and IPTables
- IPTables and Connection Tracking
- Related Documentation
- controlling access to services
- TCP Wrappers
- Services Configuration Tool
- ntsysv
- chkconfig
- Related Books
- Configuring an OpenSSH Server
- Configuring an OpenSSH Client
- Using the sftp Command
- Mounting NFS File Systems using /etc/fstab
- Mounting NFS File Systems using autofs
- Using TCP
- Exporting NFS File Systems
- Hostname Formats
- Why Use Samba
- Encrypted Passwords
- Starting and Stopping the Server
- Command Line
- Mounting the Share
- Configuring a DHCP Server
- Lease Database
- DHCP Relay Agent
- apache http server configuration
- Apache HTTP Server Configuration 24.1. Basic Settings
- Default Settings
- Logging
- Environment Variables
- Directories
- Virtual Hosts Settings
- Adding and Editing a Virtual Host
- Server Settings
- Performance Tuning
- Saving Your Settings
- Apache HTTP Secure Server Configuration 25.1. Introduction
- An Overview of Certificates and Security
- Using Pre-Existing Keys and Certificates
- Types of Certificates
- Generating a Key
- Generating a Certificate Request to Send to a CA
- Creating a Self-Signed Certificate
- Testing The Certificate
- Authentication Configuration
- Command Line Version
- V. System Configuration
- Console Access
- Disabling Console Program Access
- Enabling Console Access for Other Applications
- The floppy Group
- Date and Time Configuration
- Network Time Protocol (NTP) Properties
- Time Zone Configuration
- Keyboard Configuration
- Mouse Configuration
- X Window System Configuration
- Display Hardware Settings
- Dual Head Display Settings
- Users and Groups
- Adding a New User
- Modifying User Properties
- Adding a New Group
- Modifying Group Properties
- User and Group Management Tools
- Adding a Group
- Explaining the Process
- Standard Users
- Standard Groups
- User Private Groups
- Shadow Passwords
- Printer Configuration
- Adding a Local Printer
- Adding an IPP Printer
- Adding a Samba (SMB) Printer
- Adding a JetDirect Printer
- Confirming Printer Configuration
- Modifying Existing Printers
- Managing Print Jobs
- Configuring Cron Tasks
- Controlling Access to Cron
- Configuring Batch Jobs
- Additional Command Line Options
- Viewing Log Files
- Adding a Log File
- Examining Log Files
- overview of kernel packages
- Preparing to Upgrade
- Downloading the Upgraded Kernel
- Performing the Upgrade
- Verifying the Initial RAM Disk Image
- Itanium Systems
- IBM eServer iSeries Systems
- kernel modules
- Persistent Module Loading
- Mail Transport Agent (MTA) Configuration
- VI. System Monitoring
- Gathering System Information
- Memory Usage
- File Systems
- Hardware
- OProfile
- Configuring OProfile
- Setting Events to Monitor
- sampling rate
- Separating Kernel and User-space Profiles
- Starting and Stopping OProfile
- Using opreport
- Using opreport on a Single Executable
- Using opannotate
- Understanding /dev/oprofile
- Graphical Interface
- Installed Docs
- VII. Appendix
- A. Revision History
- Index
Related products
ENTERPRISE LINUX 4 - STEP BY STEP GUIDEENTERPRISE LINUX 3 - STEP BY STEP GUIDEENTERPRISE LINUX 3 - SECURITY GUIDEENTERPRISE LINUX 4.5.0 -ENTERPRISE LINUXENTERPRISE LINUX 6Enterprise Linux 2.1ENTERPRISE LINUX 4 - DM MULTIPATHENTERPRISE LINUX 4 - USING BINUTILSENTERPRISE LINUX AS 2.1 -Red Hat categories
More Red Hat categoriesmanualsdatabase
Your AI-powered manual search engine