1. The i386 applies to all 32-bit CPUs of Intel and AMD, as well as via a 32 Cpu.intel platform using the X86 architecture including 8086,80286,80386,80486, Pentium Series (1.2.3.4), Celeron series, Pentium D series and Centrino P-m,core duo and so on.
2. x86_64 applies to Intel's Core 2 Duo, Centrino Core 2 Duo, and Xeon and AMD Athlon64/x2, SEMPRON64/X2, Duron64, and 64-bit CPUs with X86 architecture.
3
Solaris x86-64 Oracle hits 11.2.0.3.8 Patch:
Correct steps:
1.bug6880880, Opatch patch
2.bug16902043,11.2.0.3.8 Patch
Feeling is to practice ah look at the easy things also twists-like Opatch version of the problem in the installation of 11.2.0.3.8 patch before the hint, be careful alas.
MOS is still very easy to use haha.
Installation process:
1. Environmental inspection
-bash-3.2$ ls
16902043 Alert_byssolaris.log
Desktop P16902043_112030_s
Install MariaDB 10.0.20 using the RPM package [offline], based on the CentOS 6.6-x86-64 MinimalHunan Zhu Health 2015-07-01 in Shenzhen Futianqq:872007255 mariadb AC Group: 198111730Document Description:1. There are many web-based Mariadb/mysql Database installation technology blog documents, mainly source code compiled installation and Yum source installation, some are very well written, but very few of the offline RPM package installed.2. Source code
Summary
Introduction
Learn about Android for x86
Ndk compilation tool
Compile
Check apk
Install a simulator
Debug apk
IntroductionDear developers, Android tablets Based on INTEL x86 architecture are coming soon. Please read this article carefully to make your applications run properly on x86 devices.
Understanding Android for
Preface
32-bit and 64-bit systems are often mentioned in the computer field, but many people do not know the difference between 32-bit and 64-bit systems. Therefore, I have compiled some documents online, I hope to share with you. For 32-bit and 64-bit, this article will explain from the processor, operating system, and JVM respectively.
IA Introduction
Introduction
Speaking of processors, most people use Intel's processors. Therefore, this article mainly explains 32-bit and 64-bit processors fr
I don't know how many Android developers have a problem with the tragic performance of Android virtual machines, anyway, my opinion is: That's too much speed!
Why are Android virtual machines much slower than iOS and WP7 's virtual machine? For the following reasons:
1. The Android simulator simulates the ARM architecture (Arm-eabi), while the target architecture for iOS and WP7 simulators is x86, and the App running in iOS emulator is compiled to
VirtualBox Security Android-x86 4.0 graphic tutorial
Why are Android virtual machines much slower than iOS and WP7 virtual machines? The reason is as follows:
1. the Android Simulator simulates the ARM architecture (arm-eabi), while the target architecture of iOS and WP7 simulators is x86, in addition, the App running in the iOS simulator is also compiled into x86
These days when you do MDT, you will always encounter x86\x64\ia64 these several folders. The first two are common, and are often encountered since the Win7 system appears. So I guess IA64 should also be some kind of architecture or version of the CPU. Now to the three made a summary.
x86 or 80x86 is the general term of a microprocessor architecture that Intel first developed and manufactured. The older pro
code specified for the ASM segment. the ANSI C specification uses the keyword __asm__ to replace the keyword ASM when using inline assembly statements, because the ANSI C keyword ASM is used for other purposes. as follows: __asm__ ("Addl $, result\n\t" "Subl $, result\n\t");The Basic ASM format provides a simple style for creating assembly code, but there are some limitations. First, all input and output values must use the global variables of the C program, as seen in the example abo
same time, the PC completes the automatic addition of one operation, forming the address of the next operation instruction, that is, address No. 1th.
Second instruction: With the first instruction, the PC sends the second instruction address to mar, commands the memory to do the reading operation, sends the 1th unit content to the MDR, also has the MDR sends to the IR, then the CU analyzes the operation code, if is the multiplication instruction, the CU sends the reading command to the memor
first input parameter is located in the indirect addressing position 8 (%EBP) Addl (%EBP),%eax # The second parameter is located in%ebp movl%eax,%ebx # puts and values in the%EBX register, and finally returns the MOVL%EBP as a program return value,%esp popl%ebp retThe compile output after make is as follows:$./func $ echo $?108Assembly language, like the C language, functions can be defined in a separate file and finally connected to the main program file. A separate function
"Copyright Notice: respect for the original, reproduced please retain the source: blog.csdn.net/shallnet, the article only for learning Exchange, do not use for commercial purposes"loops are also a way to change the order in which instructions are executed, repeating the execution until the condition is met. We can use conditional jump directives to create loops, but in fact there is a simpler series of loop instructions in assembly language. The loop instruction uses the ECX register as the cou
. The best use of the STOs directive is to work with the rep directive, copying a string value into a large string value several times, such as copying a space character to a 256-byte buffer area. The following example:# stos.s.section. DataSpace: . ASCII "". Section. BSS . Lcomm buffer, 256.section. Text.globl _start_start: NOP Leal Space,%esi Leal buffer,%edi movl $256,%ecx cld LODSB Rep STOSB Movl $,%eaxAfter make debug run as follows:Breakpoint 1, _start () at s
What is NX Bit?
Its a exploit mitigation technique which makes certain areas of memory non executable and makes an executable area, non w Ritable. Example:data, stack and heap segments is made non executable while the text segment is made non writable. List the header information for an elf programReadelf-l Vuln
How to bypass NX bit and achieve arbitrary code execution?
NX bit can is bypassed using an attack technique called "return-to-libc". Here return address was overwrit
What are Off-by-one bugs?
Copying source string to destination buffer could result in off-by-one when
Source string length is equal to destination buffer length.
When source string length was equal to destination buffer length, a single NULL byte gets copied just above the destination Buffer. Here since the destination buffer are located in stacks, the single NULL byte could overwrite the least significant bit (LSB ) of caller's EBP stored in the stacks and this could leads
differences between C and C + +// add _init segment in native code void _init (void) {}Note: _init is not a section, just an export function. The NDK generates the corresponding segment and merges it into a large section, so you can't see it from the Section table.Let's take a simple example of libhello.so as an example HELLO.C code as follows#include void_init (void) { }/** JNI Specifies that the local method name Java_ calls the package name of the local method class _ Class Name _ Method nam
In C, a union (union) is a bit like a struct, which organizes different types of data, but unlike structs, each member of a struct has its own memory space, and the total length of a struct object is the sum of the lengths of each member. In a union, each member shares a memory space, and the length of a Union object is equal to the longest length of each member.As described above, a consortium should have a multifaceted nature, that is, at the assembly level, it sometimes shows the structure's
generally have home,menu and back three standard buttons, if not, it is necessary to simulate:(1) When you press and hold the right side of the status bar, you will be prompted to open the status bar to simulate the function of the button: when open, click the status bar to indicate home, press the mouse button on the status bar and swipe from left to right to indicate menu, press the mouse button on the status bar and swipe right to left to indicate back. The same method also turns off the sta
1. The overall process of booting from boot to start_kernel underX86 architectureA brief overview of this process is:Boot-->bios-->grub/lilo-->linux KernelIts running flowchart and important functions are as follows: 2, load the Linux Kernel (based on X86) memory layout map| |0a0000 +--------------------------+| Reserved for BIOS |Do not use. Reserved for BIOS Ebda.09a000 +--------------------------+| Command Line || Stack/heap | For use by the kernel
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.