Part 1 arm assembly syntax in Linux
Although it is convenient to use C or C ++ to write programs in Linux, the assembler source program is used for the most basic initialization of the system, such as initializing the stack pointer, setting the page table, and operating the arm coprocessor. After initialization, you can jump to C code execution. Note that the GNU assembler follows att's Assembly syntax and can download the relevant specifications from
When you compile a t.c file with MIPS64EL-UNKNOWN-LINUX-GNU-GCC,
The contents of t.c are as follows:
#include
int main ()
{
return 0;
}
Mybox ~ # mips64el-unknown-linux-gnu-gcc-c T.CMybox ~ # Mips64el-unknown-linux-gnu-ld-o-M ELF64LTSMIP t T.OMips64el-unknown-linux-gnu-ld:cannot find elf64ltsmip:no such file or
News source: http://gcc.gnu.org/gcc-4.4/GCC (GNUCompilerCollection, GNU compiler set) is a set of programming language compilers developed by GNU. It is a set of free software issued with GPL and LGPL licenses. it is also a key part of the GNU program and a free Unix-like and Apple computer M
News source: http://gcc.gnu.org/gcc-4.4/
GCC (
GNU assembler (gas)
GNU assembler (called gas) is the most popular assembler in UNIX environments.
Unlike most other development software packages, the GNU assembler is not released in a separate package. It is bundled with other development software in the GNU binutils package. The binutils package contains the follow
1, GNU, what is GNU,GNU full name: GNU ' s not unixGNU's important components (Emacs,gcc,bash,gawk, etc.), together with its own kernel, constitute the GNU own system---> uselessNow some of the important software in Linux is the GNU
Release date:Updated on:
Affected Systems:RedHat Enterprise Linux 6RedHat Enterprise Linux 5.0RedHat Fedora 17RedHat Fedora 16Description:--------------------------------------------------------------------------------Bugtraq id: 54982Cve id: CVE-2012-3480
Glibc is the implementation of C libraries in most Linux operating systems.
GNU glibc has multiple buffer overflow vulnerabilities. Local attackers can exploit these vulnerabilities to execute arbit
GNU a2ps Arbitrary Command Execution Vulnerability (CVE-2014-0466)
Release date:Updated on:
Affected Systems:GNU a2ps 4.14Description:--------------------------------------------------------------------------------Bugtraq id: 66660CVE (CAN) ID: CVE-2014-0466GNU a2ps is a filter that converts files to PostScript.Fixps scripts in a2ps 4.14 do not use the-dSAFER option when running gs, which allows an attacker with independent context to execute arbitr
/*************************************** ******************************* Function: Test daemon process* Author: Samson* Date: 11/30/2011* Test Platform:* GNU Linux version 2.6.29.4* GCC version 4.4.0 20090506 (Red Hat 4.4.0-4) (GCC)**************************************** ****************************/
# Include # Include # Include # Include # Include
IntMain (){Int frokret, fatherid;If (frokret = fork ())){Fatherid = getppid ();Printf ("Father proces
The following lists all the parameter definitions of GNU make 3.80. The other Linux versions are similar to those of the manufacturer's make. However, for details about the parameters of make, see the product documentation.
"-B""-M"The two parameters are used to ignore the compatibility with other versions of make.
"-B""-Always-make"All goals must be updated (re-compiled ).
"-C
""-Directory ="Specifies the directory for reading makefile. If multiple "
The basic file formats of the arm system are commonly used in ARM-based embedded system development.There are three basic file formats for the arm system:1) bin, flat-board binary format, which is generally used for Directly Writing to flash and loading to the monitor program.2) Elf, executable and linkable format, a common object file format, generally generated by GNU Compiler Collection (GCC.3) axf, an extended version in Bin format. The main part
GPROF Introduction
GPROF is the GNU profiler tool. It can display the "flat profile" of the program running, including the number of calls to each function and the processor time consumed by each function. You can also display the "Call diagram", including the call relationship of the function, and the time consumed by each function call. You can also display the "annotated source code", which is a copy of the program source code, marking the number o
I used GCJ to compile itext and used itext to write many small programs (pdfrotate and nup_pdf can be obtained from the Internet now). Here I will only introduce how to obtain the GCJ compiling environment.
GCJ is a Java editor based on the GNU protocol. It supports the following compilation methods:Java Source Code directly compiles the local machine code. On windows, the exe executable program (separated from JRE) is used );Java source code is comp
Use GNU parallelCreate cron tasks in batches:
# Host. lst is the host list# View the current cron taskParallel -- nonall-j0 -- slf host. lst "hostname; crontab-l"# View/var/spool/cron filesParallel -- nonall-j0 -- slf host. lst "hostname; ls-l/var/spool/cron"# Set a cron taskParallel -- nonall-j0 -- slf host. lst echo '"0 0 **** cd/root/nmon;/root/nmon-f-s600-c144">/var/spool/cron/root'
-- The tag parameter adds a tag for the output row
# Whe
file Form-radio_signal.dat
4. Show it in "Waterfall Chart" form
5. Here is the waterfall diagram, which is the first "unlock" signal, followed by the opposite signal.
Now I can simply replay these signals, in order to analyze these signals in more detail, I have tried to use audacity clip these signals, Audacity is a free audio processing software, while it can edit the wireless signal, but the author said here will not reveal too much, but can refer to this: click MyThis is the lo
memory Stores may is globally visible yet, and previous memory loads may not yet be satisfied.
void __sync_lock_release (
type
*ptr, ...)
This
builtin releases the lock acquired by
__sync_lock_test_and_set . Normally this means writing the constant 0 to
*
ptr .
This builtin was not a full barrier, but rather a release barrier. This means-all previous memory stores is globally visible, and all previous memory loads has bee
I wrote a simple general makefile template to compile CPP or CProgramSee the next log.
Http://blog.csdn.net/felixit0120/article/details/7663756
GNU make learning summary:
1. $ (patsubst pattern, replacement, text)Function: search for words separated by spaces in "text" and replace pattern with replacement. The pattern wildcard % can be used in the pattern parameter to represent several characters in a word. If the replacement parameter also c
it depends on. Target: dependency
The backslash \ is a line break of a command.
Indicates that the tab key is used for the indentation on the left when the command is executed. In this example, the left side of the CC command is tab indent. In other cases, spaces are used for the interval.
The preceding example is from top to bottom:
File edit depends on some. O target files
Create the edit execution file, and CC-O continuously links some. O files.
(After executing the make command, find the ma
[Do not perform O M without _ 11] Precautions for permission setting during GNU/Linux NFS server deploymentMeasure the test taker's knowledge about how to delete massive data files in seconds during O M.Http://www.bkjia.com/ OS /201304/203155.htmlNFS, simply put, is a file serverIn the deployment process, the read and write permissions of files are more error-prone than the tutorial.This blog is based on the following six aspects, but focuses on fil
Search for large files occupying hard disks in GNU/Linux (1) Search for files larger than 50 MB from the root directory, and display the first 10 files in the size list: [plain] [root @ Rocky ~] # Find/-printf "% k % p \ n" | sort-g-k 1,1 | \ awk '{if ($1> 50000) print $1/1024 "MB" "$2} '| tail-n 10 111.968 MB/mnt/hgfs/vmshare/Disk1/oms/Disk1/stage/Components/oracle. sysman. agent. download/10.2.0.1.0/1/DataFiles/filegroup5.1.1.jar 250.258 Mbit/u01/ap
/$create _vg_name/$lv _namemount/dev/$create _vg_name/$lv _name $mount _piont: Mount file systemLvextend-l 2g/dev/vg01/lv01 to expand to 2G (expanded physical boundary)Resize2fs-p/dev/vg01/lv01 to expand to 2G (the logical boundary after expansion)The following is a blog written by others as a supplement, provenance http://dreamfire.blog.51cto.com/418026/1084729If a piece of disk or partition fails, how to quickly transfer data to the same volume group other space.1. Transfer spatial data via Pv
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.