From:http://www.kerneltravel.net/jiaoliu/kern-rbtree.html
red and black trees in Linux kernel
Author: Western Mail Wang Cong
The red-black tree is a kind of balanced binary tree, it has a very good nature, the nodes in the tree are orderly,
X86 platform: The Linux system compiles the configuration kernel and starts the kernel
This article turns from: http://blog.chinaunix.net/uid-25811099-id-1704590.html
PC System: Windows XP Virtual machine: VMware 6.5.1 build-126130 Virtual machine
Author: Sandy Original works reproduced please indicate the source"Linux kernel Analysis" MOOC course http://mooc.study.163.com/course/USTC-1000029000 "Experimental environment: C+linux64 bit (32-bit system may result in different)In accordance with
Each operating system is made up of thousands of different kinds of files. The system itself includes files, users ' own files, shared files, and so on. Sometimes we often forget where a file is on the hard drive.
Reprinted from http://blog.csdn.net/
1. Overview
The only way that a user-space program accesses the kernel during a system call, GLIBC (C library) provides a set of encapsulation routines that, in addition to the library functions required by the standard C specification, are
Author: Sandy Original works reproduced please indicate the source "Linux kernel Analysis" MOOC course http://mooc.study.163.com/course/USTC-1000029000 " Experimental Environment: c+ Linux64 bit (32-bit system may result in different) in
Above, configure the compile gadget HID module
Build G_hid.ko in Driver/usb/gadget directory after make modules
To execute the load command:
root@xxx:/mnt# insmod G_hid.ko
insmod:can ' t insert ' G_hid.ko ': No such deviceHint error.
In the TI
Reproduced from: http://my.oschina.net/renhc/blog/53580
LinuxTry to avoid using system. Once, it was tortured by the system () function because the system () function was not well understood. Simply knowing how to execute a system command with
1. Activating the device
The first thing to have is a Bluetooth adapter, which, needless to say, is typically a USB interface type.
Lsusb View the Bluetooth devices connected in the system
hciconfig View the details of the
Use the scene: often we install their own module after the start to discover that a certain port is occupied, in order to ensure that their process can start normally, need to find out who occupied the port, and kill the process, and then start
Author: Sandy Original works reproduced please indicate the source"Linux kernel Analysis" MOOC course http://mooc.study.163.com/course/USTC-1000029000 "Experimental environment: C+linux64 bit (32-bit system may result in different)In accordance with
Sed is a good file processing tool, itself is a pipe command, mainly in the behavior unit, you can replace, delete, add, select and other specific work, the following first understand the use of SEDThe SED command line format is:sed [-nefri] '
first, introduce the common API of network programming through socket based on TCP protocol
1, if the reader is not very familiar with, you can first read a few blog before I wrote, there are sockets, address structure of understanding, more
I got a lot of information, but I didn't find it. Get 4G signal Strength application code
There's no way, I can only write it myself.
First you need to know what the AT command is. This can refer to the following
One of the more difficult aspects of kernel development than user space development is the difficulty of kernel debugging. Kernel errors often cause the system to go down and it is difficult to keep the scene when the error occurs. The key to
This article mainly talk about how to compile your own development of the kernel module. Because drivers are often compiled into kernel modules, the content of the article also applies to drive compilation.
Because the ability is very limited,
Common commands:
Table 1-1
Command
Description
Directory and file Processing:Before we explain, we'll get to know a couple of funny symbols.. : Small point live in the present, namely the current directory. For
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service