Knowledge push: (for knowledge, refer to the private kitchen of laruence)
Let's review the role of MBR: the MBR contains the primary guide.ProgramAccording to the partition table, the kernel image of the operating system is loaded into the memory
Select defaults for the options during mounting.
Automatic mounting
It is too cumbersome to run the mount command every time you access windows partitions at startup. Why not use the mount command to access other Linux partitions?In fact, during
I. Cross tool chain
What is a cross tool chain: the cross tool chain runs on the host machine (the machine you used during development ).ProgramOnly applications compiled using the cross-tool chain can run on the target machine. Otherwise, the
After Linux is installed, the development environment and help documentation are missing by default. You can use the following command to configure the basic development environment:
1. install necessary development tools and environments (dpkg-Dev,
I. uboot directory structure:
1. Board, files related to the Development Board
2. Common: commands supported by uboot
3. CPU, processor-relatedCode
4. Disk: disk support
5. Doc, document directory
6. Drivers supported by drivers and
1. There are three types of socket:
(1) stream socket: sock_stream.
Stream sockets use the TCP protocol to provide reliable and connection-oriented communication streams.
(2) datagram socket: sock_dgram.
The datagram socket uses the UDP protocol to
I. module functions
1. Differences between kernel module programming and Linux application development:
(1) In kernel module programming, there is no main function (2) in kernel module programming, we use printk to print, without printf
2. program
I. chicken ribs:
1. GDB is a Linux-based program debugging tool launched by GNU. GDB mainly completes the following tasks: (1) start the program to be debugged (2) let the program to be debugged stop at the breakpoint (3) after stopping at the
I. process 4 elements
1. There is a program for execution. This program is not necessarily dedicated to a specific process and can be shared with other processes.
2. Process-specific kernel space Stack
3. There is a task_struct data structure in the
Document directory
1. How to describe the device number in the kernel?
2. How to extract the master device number from dev_t
3. How to extract the device number from dev_t
4. How do I assign a master device number?
5. Cancel the device number
When discuzx2.5 is bound to QQ, a network error is always reported, but the domain name can be resolved or pinged. Later, I checked the network and found that it was a system time problem.
After the Linux synchronization time, I got it done, but I
Common compression file extensions:
*. Z: The file compressed by the compress program. (expired)
*. Bz2: Files compressed by Bzip2;
*. GZ: the files compressed by the gzip program;
*. Zip
*. Tar: The data packaged by the tar program has not been
From: http://blog.csdn.net/guosha/archive/2008/09/17/2943615.aspx
Linux provides many interfaces for signal processing, which seem to be complicated. However, after clarifying the relationship between signals, it is still very organized. It is
Busybox is not included in the default Android system, so you cannot use busybox ifconfig to view and modify MTU values. In fact, the MTU value of the NIC is saved in the/sys/class/NET/eth0/MTU file. Therefore, you can modify the MTU by viewing and
Linux network performance management commands route, netstat, and tcpdump
This article describes network performance management techniques for Linux systems. It mainly describes how to use Route, netstat, and tcpdump network management test tools
Build an assembly development environment. Minimum tools:
Assembler
Linker
Debugger
There is also an assembly process for advanced language programs:
Advanced Language compiler
Target code reassembler
Simple file generation tool for
Ikely () and unlikely () are everywhere in the 2.6 kernel. Why use them? What are the differences between them?
First, it is clear:
If (likely (value) is equivalent to If (value)
If (likely (A> B )){
Fun1 ();
If (unlikely (value) is equivalent to
System calling is a service provided by the operating system of the operating system. User Programs reference various services provided by the kernel through various system calls. The execution of system calls puts user programs into the kernel,
Learning the exec () function of process control functions
When we watch horror movies, there are often such scenarios: when a person is put behind a ghost, the human body is still the same as before, but his soul and thoughts have been possessed by
1. For SSH and FTP, first install the server and then the client2. Example: Install the vsftpd serviceStep 1: first check whether vsftpd RPM packages have been installedRpm-Qa | grep vsftpdStep 2: mount the ISO image to the hard disk1. First, create
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service