When a Linux system encounters a fault, the Administrator must first locate the error. Now there are many tools in Linux that can help users find the error and learn to use them to identify the problem. These tools include dmesg, lspci, lsmod,
@ For & ever 2010-07-03
When developing and Compiling different environment platforms, We need to compile different ant compilation scripts.
Then, how can we automatically select the appropriate compilation options for the build. xml script
NM command[In the content provided by the gnu c language library, an interface can be used to do this. Run the following command to View Details:Nm-D/lib/libc. so.6 | grep log]
The nm command is relatively simple and powerful. It is used to
I. Linux configuration and compilation
Linux has the following advantages:
1. Clear temporary files, intermediate files, and configuration files
(1) make clean: delete most of the generated files, but keep the configuration file
(2) Make
Linux Redhat 9 unzip ", download it to Linux and decompress it. In XWindow, right-click" Unzip ..", Haha, I am too lazy to think about the annoying commands in Linux. Before that, you 'd better do some work first, or the compilation below will go
1. Download arm-linux-gcc-3.4.1.tar.bz2 to any directory and download it to my personal folder/home/WRQThe arm-linux-gcc-3.4.1.tar.bz2 is as follows: http://www.handhelds.org/download/projects/toolchain/arm-linux-gcc-3.4.1.tar.bz2
2. Extract
I. kernel data types
It can be divided into the Standard C language type, the determined size type, and the type of the specific kernel object.
1) Standard C language type
When "A 2-byte padding character" or "representing something with a 4-byte
Not long ago, anjuta was installed using the yum command in fedora 9, but it crashed for the first time. The phenomenon is as follows: anjuta cannot start after modifying the glade file, and anjuta cannot start any more, the Glade file loaden has
I. measurement time difference
1. There is a constant "HZ" in the Linux kernel, and Hz is a constant unrelated to the architecture. It is used to configure the number of system interruptions per second. The value range is 50-1200 (meaning 50 to 1200
Command name: chmod
Permission: All Users
Usage: chmod [-CFVR] [-- help] [-- version] mode file...
Note: file access permissions for Linux/Unix are classified into three levels: file owner, group, and others. Chmod can be used to control how files
The previous article was boot. S. This is head. S. The role of head. S is
The head. s program runs in 32-bit protection mode, including the initial setting code, the Process Code for clock interruption int 0x08, and the system call interruption
Using the top tool, we can see that SuSE Linux has a high memory usage, which may be more than 97%. I know this is a Linux memory usage mechanism. First, we can manage the entire memory, when necessary, it is allocated to a single process. However,
Gentoo:
* Use emerge to install ApacheEmerge Apache
* Compile and install the h264 ModuleCD/tmpWget http://h264.code-shop.com/download/apache_mod_h264_streaming-2.2.7.tar.gzTar-zxvf apache_mod_h264_streaming-2.2.7.tar.gzD/tmp/mod_h264_streaming-2.2.
In Win32, you can use dllmain to initialize and ~ Initialize the dynamic library, but Linux does not have a function that exactly corresponds to it, but some methods can be used to simulate some of its functions. Some people may say that it is very
Inter-process communication in Linux (2): Signal (I)
I. Signal and Signal Source
Signal nature
A signal is a simulation of the interrupt mechanism at the software level. In principle, a process receives a signal and the processor receives an
1. Set a breakpoint)
We use the break command to set breakpoints. There are several ways to set breakpoints on the front:
Break Stops when you enter the specified function. In C ++, you can use the class: function or function (type, type) format to
Recently, some development programs are closely related to Linux users. I have never done any relevant learning before. I just stayed at useradd under shell,Passwd command, but has little knowledge about user authentication and password management.
In addition to the ability to read and write devices, most drivers also need the ability to control hardware.
1. In user space, useIOCTL system calls to control devicesThe prototype is as follows:
Int IOCTL (int fd, unsigned long cmd ,...); /* FD:
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service