Debian-Reference.En.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

Debian-Reference.En.Pdf Debian Reference i Debian Reference Osamu Aoki Debian Reference ii Copyright © 2013-2021 Osamu Aoki This Debian Reference (version 2.85) (2021-09-17 09:11:56 UTC) is intended to provide a broad overview of the Debian system as a post-installation user’s guide. It covers many aspects of system administration through shell-command examples for non- developers. Debian Reference iii COLLABORATORS TITLE : Debian Reference ACTION NAME DATE SIGNATURE WRITTEN BY Osamu Aoki September 17, 2021 REVISION HISTORY NUMBER DATE DESCRIPTION NAME Debian Reference iv Contents 1 GNU/Linux tutorials 1 1.1 Console basics .................................................... 1 1.1.1 The shell prompt ............................................... 1 1.1.2 The shell prompt under GUI ......................................... 2 1.1.3 The root account ............................................... 2 1.1.4 The root shell prompt ............................................. 3 1.1.5 GUI system administration tools ....................................... 3 1.1.6 Virtual consoles ................................................ 3 1.1.7 How to leave the command prompt ..................................... 3 1.1.8 How to shutdown the system ......................................... 4 1.1.9 Recovering a sane console .......................................... 4 1.1.10 Additional package suggestions for the newbie ............................... 4 1.1.11 An extra user account ............................................. 5 1.1.12 sudo configuration .............................................. 5 1.1.13 Play time ................................................... 6 1.2 Unix-like filesystem .................................................. 6 1.2.1 Unix file basics ................................................ 6 1.2.2 Filesystem internals ............................................. 7 1.2.3 Filesystem permissions ............................................ 8 1.2.4 Control of permissions for newly created files: umask ........................... 10 1.2.5 Permissions for groups of users (group) ................................... 11 1.2.6 Timestamps .................................................. 11 1.2.7 Links ..................................................... 13 1.2.8 Named pipes (FIFOs) ............................................. 14 1.2.9 Sockets .................................................... 14 1.2.10 Device files .................................................. 14 1.2.11 Special device files .............................................. 15 1.2.12 procfs and sysfs ................................................ 15 1.2.13 tmpfs ..................................................... 16 1.3 Midnight Commander (MC) ............................................. 16 Debian Reference v 1.3.1 Customization of MC ............................................. 17 1.3.2 Starting MC .................................................. 17 1.3.3 File manager in MC ............................................. 17 1.3.4 Command-line tricks in MC ......................................... 17 1.3.5 The internal editor in MC .......................................... 18 1.3.6 The internal viewer in MC .......................................... 18 1.3.7 Auto-start features of MC .......................................... 18 1.3.8 FTP virtual filesystem of MC ........................................ 19 1.4 The basic Unix-like work environment ........................................ 19 1.4.1 The login shell ................................................ 19 1.4.2 Customizing bash ............................................... 20 1.4.3 Special key strokes .............................................. 20 1.4.4 Mouse operations ............................................... 20 1.4.5 The pager ................................................... 21 1.4.6 The text editor ................................................ 22 1.4.7 Setting a default text editor .......................................... 22 1.4.8 Using vim ................................................... 22 1.4.9 Recording the shell activities ......................................... 23 1.4.10 Basic Unix commands ............................................ 23 1.5 The simple shell command .............................................. 24 1.5.1 Command execution and environment variable ............................... 24 1.5.2 The ”$LANG” variable ............................................ 26 1.5.3 The ”$PATH” variable ............................................ 27 1.5.4 The ”$HOME” variable ............................................ 27 1.5.5 Command line options ............................................ 28 1.5.6 Shell glob ................................................... 28 1.5.7 Return value of the command ........................................ 29 1.5.8 Typical command sequences and shell redirection .............................. 29 1.5.9 Command alias ................................................ 30 1.6 Unix-like text processing ............................................... 31 1.6.1 Unix text tools ................................................ 31 1.6.2 Regular expressions ............................................. 32 1.6.3 Replacement expressions ........................................... 33 1.6.4 Global substitution with regular expressions ................................. 33 1.6.5 Extracting data from text file table ...................................... 34 1.6.6 Script snippets for piping commands ..................................... 35 Debian Reference vi 2 Debian package management 37 2.1 Debian package management prerequisites ...................................... 37 2.1.1 Package configuration ............................................ 37 2.1.2 Basic precautions ............................................... 38 2.1.3 Life with eternal upgrades .......................................... 39 2.1.4 Debian archive basics ............................................ 40 2.1.5 Debian is 100% free software ........................................ 43 2.1.6 Package dependencies ............................................ 44 2.1.7 The event flow of the package management ................................. 45 2.1.8 First response to package management troubles ............................... 46 2.2 Basic package management operations ........................................ 46 2.2.1 apt vs. apt-get / apt-cache vs. aptitude ............................. 46 2.2.2 Basic package management operations with the commandline ....................... 47 2.2.3 Interactive use of aptitude .......................................... 49 2.2.4 Key bindings of aptitude ........................................... 49 2.2.5 Package views under aptitude ........................................ 50 2.2.6 Search method options with aptitude ..................................... 51 2.2.7 The aptitude regex formula .......................................... 51 2.2.8 Dependency resolution of aptitude ...................................... 53 2.2.9 Package activity logs ............................................. 53 2.3 Examples of aptitude operations ........................................... 53 2.3.1 Listing packages with regex matching on package names .......................... 53 2.3.2 Browsing with the regex matching ...................................... 54 2.3.3 Purging removed packages for good ..................................... 54 2.3.4 Tidying auto/manual install status ...................................... 54 2.3.5 System wide upgrade ............................................. 55 2.4 Advanced package management operations ..................................... 56 2.4.1 Advanced package management operations with commandline ....................... 56 2.4.2 Verification of installed package files .................................... 56 2.4.3 Safeguarding for package problems ..................................... 58 2.4.4 Searching on the package meta data ..................................... 58 2.5 Debian package management internals ........................................ 58 2.5.1 Archive meta data .............................................. 58 2.5.2 Top level ”Release” file and authenticity ................................... 59 2.5.3 Archive level ”Release” files ......................................... 59 2.5.4 Fetching of the meta data for the package .................................. 60 2.5.5 The package state for APT .......................................... 61 2.5.6 The package state for aptitude ........................................ 61 2.5.7 Local copies of the fetched packages ..................................... 61 Debian Reference vii 2.5.8 Debian package file names .......................................... 61 2.5.9 The dpkg command .............................................. 62 2.5.10 The update-alternatives command ...................................... 63 2.5.11 The dpkg-statoverride command ....................................... 63 2.5.12 The dpkg-divert command .......................................... 63 2.6 Recovery from a broken system ........................................... 63 2.6.1 Incompatibility with old user configuration ................................. 64 2.6.2 Different packages with overlapped files .................................. 64 2.6.3 Fixing broken package script ......................................... 64 2.6.4 Rescue with the dpkg command ....................................... 65 2.6.5 Recovering package selection
Recommended publications
  • Asciispec Userguide Table of Contents
    AsciiSpec Userguide Table of Contents ..................................................................................................................................................................... iv 1. Document Structure ........................................................................................................................................... 1 1.1. Sections .............................................................................................................................................. 1 1.1.1. Styling Sections ........................................................................................................................... 1 2. Blocks ........................................................................................................................................................... 2 2.1. Titles & attributes ................................................................................................................................... 2 2.2. Delimiters ............................................................................................................................................. 3 2.3. Admonition Blocks .................................................................................................................................. 3 2.4. Nesting Blocks ...................................................................................................................................... 4 2.5. Block Macro ........................................................................................................................................
    [Show full text]
  • Resurrect Your Old PC
    Resurrect your old PCs Resurrect your old PC Nostalgic for your old beige boxes? Don’t let them gather dust! Proprietary OSes force users to upgrade hardware much sooner than necessary: Neil Bothwick highlights some great ways to make your pensioned-off PCs earn their keep. ardware performance is constantly improving, and it is only natural to want the best, so we upgrade our H system from time to time and leave the old ones behind, considering them obsolete. But you don’t usually need the latest and greatest, it was only a few years ago that people were running perfectly usable systems on 500MHz CPUs and drooling over the prospect that a 1GHz CPU might actually be available quite soon. I can imagine someone writing a similar article, ten years from now, about what to do with that slow, old 4GHz eight-core system that is now gathering dust. That’s what we aim to do here, show you how you can put that old hardware to good use instead of consigning it to the scrapheap. So what are we talking about when we say older computers? The sort of spec that was popular around the turn of the century. OK, while that may be true, it does make it seem like we are talking about really old hardware. A typical entry-level machine from six or seven years ago would have had something like an 800MHz processor, Pentium 3 or similar, 128MB of RAM and a 20- 30GB hard disk. The test rig used for testing most of the software we will discuss is actually slightly lower spec, it has a 700MHz Celeron processor, because that’s what I found in the pile of computer gear I never throw away in my loft, right next to my faithful old – but non-functioning – Amiga 4000.
    [Show full text]
  • Tinn-R Team Has a New Member Working on the Source Code: Wel- Come Huashan Chen
    Editus eBook Series Editus eBooks is a series of electronic books aimed at students and re- searchers of arts and sciences in general. Tinn-R Editor (2010 1. ed. Rmetrics) Tinn-R Editor - GUI forR Language and Environment (2014 2. ed. Editus) José Cláudio Faria Philippe Grosjean Enio Galinkin Jelihovschi Ricardo Pietrobon Philipe Silva Farias Universidade Estadual de Santa Cruz GOVERNO DO ESTADO DA BAHIA JAQUES WAGNER - GOVERNADOR SECRETARIA DE EDUCAÇÃO OSVALDO BARRETO FILHO - SECRETÁRIO UNIVERSIDADE ESTADUAL DE SANTA CRUZ ADÉLIA MARIA CARVALHO DE MELO PINHEIRO - REITORA EVANDRO SENA FREIRE - VICE-REITOR DIRETORA DA EDITUS RITA VIRGINIA ALVES SANTOS ARGOLLO Conselho Editorial: Rita Virginia Alves Santos Argollo – Presidente Andréa de Azevedo Morégula André Luiz Rosa Ribeiro Adriana dos Santos Reis Lemos Dorival de Freitas Evandro Sena Freire Francisco Mendes Costa José Montival Alencar Junior Lurdes Bertol Rocha Maria Laura de Oliveira Gomes Marileide dos Santos de Oliveira Raimunda Alves Moreira de Assis Roseanne Montargil Rocha Silvia Maria Santos Carvalho Copyright©2015 by JOSÉ CLÁUDIO FARIA PHILIPPE GROSJEAN ENIO GALINKIN JELIHOVSCHI RICARDO PIETROBON PHILIPE SILVA FARIAS Direitos desta edição reservados à EDITUS - EDITORA DA UESC A reprodução não autorizada desta publicação, por qualquer meio, seja total ou parcial, constitui violação da Lei nº 9.610/98. Depósito legal na Biblioteca Nacional, conforme Lei nº 10.994, de 14 de dezembro de 2004. CAPA Carolina Sartório Faria REVISÃO Amek Traduções Dados Internacionais de Catalogação na Publicação (CIP) T591 Tinn-R Editor – GUI for R Language and Environment / José Cláudio Faria [et al.]. – 2. ed. – Ilhéus, BA : Editus, 2015. xvii, 279 p. ; pdf Texto em inglês.
    [Show full text]
  • Debian GNU/Linux 4.0 (“Etch”) (Mips )
    Debian GNU/Linux 4.0 (“etch”) JJー スノー( (Mips 用) Josip Rodin, Bob Hilliard, Adam Di Carlo, Anne Bezemer, Rob Bradford, Frans Pop (現在.AS&*), Andreas Barth (現在.AS&*), Javier Fernández-Sanguino Peña (現在.AS&*), Steve Langasek (現在.AS&*) <[email protected]> $Id: release-notes.en.sgml,v 1.312 2007-08-16 22:24:38 jseidel Exp $ i 目目目 hhh 1 //はじじじめAA+++ 1 1.1 この£書+¯するバグR報告する ...........................1 1.2 アップグレー)についての報告をする .........................2 1.3 この£書.ソース .....................................2 2 Debian GNU/Linux 4.0 ...最最最新新新情ss報報報 3 2.1 Mips +¯する最新情報 .................................4 2.2 ディストリビューション.最新情報 ..........................4 2.2.1 パッケージ管理 ..................................5 2.2.2 debian-volatile がGwサービス+ .......................6 2.3 システム.改, ......................................6 2.4 カー-K¯c.®要*¼f点 ..............................7 2.4.1 カーネルパッケージングにおける¼f ....................8 2.4.2 新しい initrd 生成Fーティリティ .......................8 2.4.3 #¿* /dev 管理(/ードウェア検õ .....................8 3 イイインSンスススト((ーーーKKルシシシススステ&&@@@ 11 3.1 インストールシステム.最新情報 ........................... 11 3.1.1 ®要*¼f点 ................................... 11 3.1.2 r#インストーK ................................ 13 3.2 ®気コンテスト ...................................... 14 4 )))MMM...JJJJJJーーースススかかからIIアアアッ##77プグググレLLーーー)))すすするKK 15 4.1 アップグレー).準& .................................. 15 4.1.1 あらゆる'ータD設¡s報Rバックアップする ............... 15 目 h ii 4.1.2 _M+Fーザ+通知する ............................ 16 4.1.3 復!.準& .................................... 16 4.1.4 アップグレー)用.!Q*環@.準& .................... 17 4.1.5 2.2 系カー-K/サポー(されなくなりました ................ 17 4.2 システム.x態Rチェックする ............................. 17 4.2.1 パッケージマネージャU.? ?.アクションRGx ........... 17 4.2.2 APT . pin 機能R\Iにする .......................... 18 4.2.3 パッケージ.x態Rチェックする ....................... 18 4.2.4 "Gw*ソース(バックポー( ........................ 19 4.3 パッケージ.>ークR±ù[')す .........................
    [Show full text]
  • Computer Science & Information Technology 33
    Computer Science & Information Technology 33 Dhinaharan Nagamalai Sundarapandian Vaidyanathan (Eds) Computer Science & Information Technology Fifth International Conference on Computer Science, Engineering and Applications (CCSEA-2015) Dubai, UAE, January 23 ~ 24 - 2015 AIRCC Volume Editors Dhinaharan Nagamalai, Wireilla Net Solutions PTY LTD, Sydney, Australia E-mail: [email protected] Sundarapandian Vaidyanathan, R & D Centre, Vel Tech University, India E-mail: [email protected] ISSN: 2231 - 5403 ISBN: 978-1-921987-26-7 DOI : 10.5121/csit.2015.50201 - 10.5121/csit.2015.50218 This work is subject to copyright. All rights are reserved, whether whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the International Copyright Law and permission for use must always be obtained from Academy & Industry Research Collaboration Center. Violations are liable to prosecution under the International Copyright Law. Typesetting: Camera-ready by author, data conversion by NnN Net Solutions Private Ltd., Chennai, India Preface Fifth International Conference on Computer Science, Engineering and Applications (CCSEA-2015) was held in Dubai, UAE, during January 23 ~ 24, 2015. Third International Conference on Data Mining & Knowledge Management Process (DKMP 2015), International Conference on Artificial Intelligence and Applications (AIFU-2015) and Fourth International Conference on Software Engineering and Applications (SEA-2015) were collocated with the CCSEA-2015. The conferences attracted many local and international delegates, presenting a balanced mixture of intellect from the East and from the West.
    [Show full text]
  • Oracle® Linux 7 Monitoring and Tuning the System
    Oracle® Linux 7 Monitoring and Tuning the System F32306-03 October 2020 Oracle Legal Notices Copyright © 2020, Oracle and/or its affiliates. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs) and Oracle computer documentation or other Oracle data delivered to or accessed by U.S. Government end users are "commercial computer software" or "commercial computer software documentation" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, reproduction, duplication, release, display, disclosure, modification, preparation of derivative works, and/or adaptation of i) Oracle programs (including any operating system, integrated software, any programs embedded, installed or activated on delivered hardware, and modifications of such programs), ii) Oracle computer documentation and/or iii) other Oracle data, is subject to the rights and limitations specified in the license contained in the applicable contract.
    [Show full text]
  • The Elinks Manual the Elinks Manual Table of Contents Preface
    The ELinks Manual The ELinks Manual Table of Contents Preface.......................................................................................................................................................ix 1. Getting ELinks up and running...........................................................................................................1 1.1. Building and Installing ELinks...................................................................................................1 1.2. Requirements..............................................................................................................................1 1.3. Recommended Libraries and Programs......................................................................................1 1.4. Further reading............................................................................................................................2 1.5. Tips to obtain a very small static elinks binary...........................................................................2 1.6. ECMAScript support?!...............................................................................................................4 1.6.1. Ok, so how to get the ECMAScript support working?...................................................4 1.6.2. The ECMAScript support is buggy! Shall I blame Mozilla people?..............................6 1.6.3. Now, I would still like NJS or a new JS engine from scratch. .....................................6 1.7. Feature configuration file (features.conf).............................................................................7
    [Show full text]
  • Linux Toolsettoolset (Part(Part A)A)
    [Software[Software Development]Development] LinuxLinux ToolSetToolSet (part(part A)A) Davide Balzarotti Eurecom – Sophia Antipolis, France 1 If Unix can Do It, You Shouldn't As a general rule: Don't implement your own code unless you have a solid reason why common tools won't solve the problem Modern Linux distributions are capable of performing a lot of tasks Most of the hard problems have already been solved (by very smart people) for you... … you just need to know where to look … and choose the right tool for your job 2 Different Tools for Different Jobs Locate the data Extract the data Filter the data Modify the data 3 Getting Help Any Linux distribution comes with thousands of files in /usr/bin Knowing each command is difficult Knowing each option of each command is practically impossible The most useful skill is to know where to look for help Google knows all the answers (if you know how to pose the right questions) help ± documentation for the shell builtin commands cmd --help ± most of the programs give you some help if you ask 4 The Manual Unix man pages were introduced in 1971 to have an online documentation of all the system commands The pages are organized in 8 sections: 1. general commands 5. file formats 2. system calls 6. games 3. C functions 7. misc 4. special files 8. admin commands CAL(1) BSD General Commands Manual CAL(1) NAME cal, ncal - displays a calendar and the date of easter SYNOPSIS cal [-3jmy] [[month] year] ncal [-jJpwy] [-s country_code] [[month] year] ncal [-Jeo] [year] DESCRIPTION The cal utility displays a simple calendar in traditional format and ncal offers an alternative layout, more options and the date of easter 5 Other forms of Help info ± access the Info pages Official documentation of the GNU project Simple hypertext apropos ± searches for keywords in the header lines of all the manpages balzarot:~> apropos calendar cal (1) - displays a calendar and the date of easter calendar (1) - reminder service gcal (1) - a program for calculating and printing calendars.
    [Show full text]
  • IJCNLP 2011 Proceedings of the Workshop on Advances in Text Input Methods (WTIM 2011)
    IJCNLP 2011 Proceedings of the Workshop on Advances in Text Input Methods (WTIM 2011) November 13, 2011 Shangri-La Hotel Chiang Mai, Thailand IJCNLP 2011 Proceedings of the Workshop on Advances in Text Input Methods (WTIM 2011) November 13, 2011 Chiang Mai, Thailand We wish to thank our sponsors Gold Sponsors www.google.com www.baidu.com The Office of Naval Research (ONR) Department of Systems Engineering and The Asian Office of Aerospace Research and Devel- Engineering Managment, The Chinese Uni- opment (AOARD) versity of Hong Kong Silver Sponsors Microsoft Corporation Bronze Sponsors Chinese and Oriental Languages Information Processing Society (COLIPS) Supporter Thailand Convention and Exhibition Bureau (TCEB) We wish to thank our sponsors Organizers Asian Federation of Natural Language National Electronics and Computer Technolo- Processing (AFNLP) gy Center (NECTEC), Thailand Sirindhorn International Institute of Technology Rajamangala University of Technology Lanna (SIIT), Thailand (RMUTL), Thailand Chiang Mai University (CMU), Thailand Maejo University, Thailand c 2011 Asian Federation of Natural Language Proceesing vii Preface Welcome to the IJCNLP Workshop on Advances in Text Input Methods (WTIM 2011)! Methods of text input have entered a new era. The number of people who have access to computers and mobile devices is skyrocketing in regions where people do not have a convenient method of inputting their native language. It has also become commonplace to input text not through a keyboard but through different modes such as voice and handwriting recognition. Even when people input text using a keyboard, it is done differently from only a few years ago – adaptive software keyboards, word auto- completion and prediction, and spell correction are just a few examples of such recent changes in text input experience.
    [Show full text]
  • The Linux Command Line
    The Linux Command Line Fifth Internet Edition William Shotts A LinuxCommand.org Book Copyright ©2008-2019, William E. Shotts, Jr. This work is licensed under the Creative Commons Attribution-Noncommercial-No De- rivative Works 3.0 United States License. To view a copy of this license, visit the link above or send a letter to Creative Commons, PO Box 1866, Mountain View, CA 94042. A version of this book is also available in printed form, published by No Starch Press. Copies may be purchased wherever fine books are sold. No Starch Press also offers elec- tronic formats for popular e-readers. They can be reached at: https://www.nostarch.com. Linux® is the registered trademark of Linus Torvalds. All other trademarks belong to their respective owners. This book is part of the LinuxCommand.org project, a site for Linux education and advo- cacy devoted to helping users of legacy operating systems migrate into the future. You may contact the LinuxCommand.org project at http://linuxcommand.org. Release History Version Date Description 19.01A January 28, 2019 Fifth Internet Edition (Corrected TOC) 19.01 January 17, 2019 Fifth Internet Edition. 17.10 October 19, 2017 Fourth Internet Edition. 16.07 July 28, 2016 Third Internet Edition. 13.07 July 6, 2013 Second Internet Edition. 09.12 December 14, 2009 First Internet Edition. Table of Contents Introduction....................................................................................................xvi Why Use the Command Line?......................................................................................xvi
    [Show full text]
  • Increasing Automation in the Backporting of Linux Drivers Using Coccinelle
    Increasing Automation in the Backporting of Linux Drivers Using Coccinelle Luis R. Rodriguez Julia Lawall Rutgers University/SUSE Labs Sorbonne Universites/Inria/UPMC/LIP6´ [email protected] [email protected] [email protected], [email protected] Abstract—Software is continually evolving, to fix bugs and to a kernel upgrade. Upgrading a kernel may also require add new features. Industry users, however, often value stability, experience to understand what features to enable, disable, or and thus may not be able to update their code base to the tune to meet existing deployment criteria. In the worst case, latest versions. This raises the need to selectively backport new some systems may rely on components that have not yet been features to older software versions. Traditionally, backporting has merged into the mainline Linux kernel, potentially making it been done by cluttering the backported code with preprocessor impossible to upgrade the kernel without cooperation from the directives, to replace behaviors that are unsupported in an earlier version by appropriate workarounds. This approach however component vendor or a slew of partners that need to collaborate involves writing a lot of error-prone backporting code, and results on developing a new productized image for a system. As an in implementations that are hard to read and maintain. We example, development for 802.11n AR9003 chipset support consider this issue in the context of the Linux kernel, for which on the mainline ath9k device driver started on March 20, older versions are in wide use. We present a new backporting 2010 with an early version of the silicon, at which point the strategy that relies on the use of a backporting compatability most recent major release of the Linux kernel was v2.6.32.
    [Show full text]
  • Contributor's Guidelines
    Contributor’s Guidelines Release 17.11.10 Feb 27, 2020 CONTENTS 1 DPDK Coding Style1 1.1 Description.......................................1 1.2 General Guidelines..................................1 1.3 C Comment Style...................................1 1.4 C Preprocessor Directives..............................2 1.5 C Types.........................................4 1.6 C Indentation......................................7 1.7 C Function Definition, Declaration and Use.....................9 1.8 C Statement Style and Conventions......................... 11 1.9 Python Code...................................... 13 2 Design 14 2.1 Environment or Architecture-specific Sources.................... 14 2.2 Library Statistics.................................... 15 2.3 PF and VF Considerations.............................. 16 3 Managing ABI updates 18 3.1 Description....................................... 18 3.2 General Guidelines.................................. 18 3.3 What is an ABI..................................... 18 3.4 The DPDK ABI policy................................. 19 3.5 Examples of Deprecation Notices.......................... 20 3.6 Versioning Macros................................... 20 3.7 Setting a Major ABI version.............................. 21 3.8 Examples of ABI Macro use............................. 21 3.9 Running the ABI Validator............................... 25 4 DPDK Documentation Guidelines 27 4.1 Structure of the Documentation........................... 27 4.2 Role of the Documentation.............................
    [Show full text]