Recently transplanted linux2.6.25, follow the previous step in the transplantation manual embedded in the day. A problem occurs during startup: Free init gets stuck after 120kb
Analysis: 1. kernel transplantation may fail.
2. It may also be that
When programming, we often want to count how many lines we have written.
CodeWhat should I do at this time?
Although vim and other editors have lines of code displayed, they cannot be opened one by one and then added up?
The WC tool is required
What is a triplet, such as R-X, rwx, ---, and-WX Are All triplet.
Used to indicate the user's permissions on files or folders.Any file or folder contains three tuples, which are for the owner, group, and other users.The operations in each triple
SELF: http://blog.csdn.net/eroswang/article/details/4131034
Linux can be considered as a resource managementProgramWhile other applications run on it, Linux manages the application memory allocation, recovery, and so on. For management, it first
How to load a dynamic link library in Linux: the following uses a touch screen as an example to describe how to load a shared library.First, let's look at the following functions:Dlopen ()Function: open a dynamic link library.Include header file:#
From: http://blog.csdn.net/linweig/article/details/5085487
LinuxMonolithic Kernel)That is, most of the functions of the operating system are calledKernelAnd run in privileged mode. It correspondsMicro KernelDifferent, the latter only runs the basic
From: http://blog.yaabou.com /? P = 82
_ User indicates a pointer to a user space, so the kernel cannot be used directly.
# Ifdef _ checker __# DEFINE _ User _ attribute _ (noderef, address_space (1 )))# DEFINE _ KERNEL/* default address space */#
This article from: http://www.dzsc.com/data/html/2009-12-22/81040.html
Author: Liu Hongtao,Hua Qing vision embedded college lecturer.
I. Overview
Speaking of writing I2C drivers in Linux, there are currently two main methods: one is to treat I2C
Main functions:
Hacker defenseBased on the Web intrusion exception detection technology, safe3 web application firewall provides comprehensive and in-depth defense for Web applications, effectively identifies and prevents increasingly popular web
Inotify is a file system event monitoring mechanism and is planned to be included in the forthcoming Linux kernel as an effective replacement for dnotify. Dnotify is a file monitoring mechanism supported by earlier kernels. Inotify is a powerful,
Network structure. The computer of the Linux router is identified as a. It is connected to three network segments, 192.168.1.0/24, 10.0.0.0/8, and 172.16.0.0/16.
Computer A must have three NICs connected to the three network segments.
Chapter 4 compiling high-quality GNU/Linux software
1. Interaction with the running environment
Get parameters: getopt and getopt_long functions are used.
Header file # include or
Function prototype int getopt (INT argc, char * const argv [],
Turn: http://tech.techweb.com.cn/thread-437185-1-1.html
1. About/etc/host, host name and IP configuration file 9'6 V: L + q "X (f''Hosts-the static table lookup for host name (host name query static table): Z. Y3 V/{4 m'p3 G & E :~ 0 w $
Abstract: http://cicikasa.blog.163.com/blog/static/137575355201021992145582/
/Etc/hosts must have a behavior of 127.0.0.1. What is its role?
Features:
(1) 127.0.0.1 is not only a UNIX system, but also a Linux system or a Windows system.(2) In the IP
I. Time Zone1. view the current time zoneDate-R2. Modify the time zoneMethod (1) tzselectMethod (2) Limited to RedHat Linux and centosTimeconfigMethod (3) applicable to DebianDpkg-reconfigure tzdata3. Copy the corresponding time zone file to replace
#! /Bin/bash# Chkconfig: 35 99 05# Description: Test chkconfig# File:/etc/init. d/fooEnv>/tmp/envlog35: Which runlevel is started?99: s99foo is generated under rc3.d and rc5.d.05: k05f00 is generated under rc0.d, rc1.d, rc2.d, rc4.d, and rc6.d.S:
The network configuration of RedHat Linux is basically implemented by modifying several configuration files. Although you can also use ifconfig to set IP addresses, use route to configure the default gateway, and use hostname to configure the host
Main files in Linux:/Bin: Bin is short for binary. This directory follows the UNIX system habits and stores the most frequently used commands. For example, CP, ls, and CAT./Boot: some core files used to start Linux are stored here./Dev: Dev is the
0. Import code to the repository
SVN import/home/user/import file: // home/svnroot/Repository/projectname-M "Initial import"Assume the original code stored in/home/user/import. /Home/svnroot/Repository/projectname is the svn repository.
1. Checkout
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service