Liu Chang Original works reproduced please indicate the source "Linux kernel Analysis" MOOC course http://mooc.study.163.com/course/USTC-1000029000write in frontThis experiment focuses on the process of loading and starting an executable program in the Linux kernel, including the analysis of executables, the loading an
Main reference: https://www.linux.cn/article-6137-1.html1. Locate the required kernel version from the http://kernel.ubuntu.com/~kernel-ppa/mainline/and enter the corresponding file path.2. Select the. deb file, follow the operating system type, 32-bit Select i386 suffix, 64-bit select AMD suffix. Select which filesReference: Https://wiki.ubuntu.com/Kernel/Mainli
ARM Linux size kernel switch -cortex-a7 big. LITTLE size switch Code Analysis8-core CPUs or more cores, these CPUs may not be completely symmetrical. There are 4 A15 and 4 A7, or 4 A57 and 4 A53, even like HiSilicon Kylin 935 processor (4 Core A53 2.2 GHz + 4 core A53 1.5 GHz), the frequencies of these 8 cores may not be the same, then the use of the process requires the size of the core switch (high frequ
About the data structures used in the kernel this series will have five articles,
Introduced separately
Linked list
Queue
Hash
Mapping
Red and black Treesfirst, the introduction of the core linked list
The linked list defined in the kernel is a two-way list, in the previous article--libevent source code Analysis--queue.h in the understanding of tail Q_Q Ueue describes how to define a linked list queue in Fr
The SELinux parameter was modified today when a software was installed. Modify the SELinux parameter value to disable. Causes the Linux system to fail to boot. The following error occurred Kernel Panic-not syncing:attempted to kill init!After the group to ask friends and their own operation and internet search, finally found a solution.When the Linux boot interfa
Communication code
Kernel
A core subsystem such as a scheduler
Lib
Same kernel function
Mm
Memory management subsystem and VMS
Net
Network subsystem
Samples
Example, demo code
Scripts
Scripts used to compile the kernel
Security
)
Now, let's briefly introduce the following parts:1. Bootloader:The boot loader of the PC follows the Linux boot protocol 2.03, And the boot loader in the PC is run by the BIOS (And the Operating System Boot Loader (such as Lilo and grub) located in the hard disk MBR. BiosAfter hardware detection and resource allocation, read the boot loader in the hard disk MBR to the system ram, and then give the control to the operating system boot.Loader. Boot
Refer to this How to Remove the old (or new) kernelshttp://ubuntuhandbook.org/index.php/2015/08/install-latest-kernel-script/1. In Ubuntu with a graphical interface:1.1 Installing synaptic Package Manager in Ubuntu Software Center1.2 Deleting packages using Synaptic Package Manager:
Click the Reload button in the want to remove the new kernel.
Select Status-installed on the left pane to make se
"copyright notice: respect for the original, reproduced please retain the source: blog.csdn.net/shallnet. The article is for academic communication only and should not be used for commercial purposes " the memory image of a process consists of the following parts: code snippet, data segment, BSS segmentand Stack segments. And the area of the memory map,memory-mapped function mmap (), which is responsible for mapping the contents of the file to the virtual memory space of the process, through rea
The long and dark Prehistoric Age finally came to setup. In the setup Assembly function, Linux completes the transformation from prehistoric civilization to modern civilization by setting the PE bit of the Cr0 register (switching from the real mode to the protection mode. During the setup period, Linux has learned that the available memory resources in the world are far more than 1 MB. At this time, Linux's
Chen Chaojan Original works reproduced please specify the source "Linux kernel Analysis" MOOC course http://mooc.study.163.com/course/USTC-1000029000First, using the virtual machine of the experimental building, observe the relationship between the mykernel of a dead loop and the clock interrupt.步骤:cd LinuxKernel/linux-3.9.4qemu -
(1) Configuring the kernelHow to configure the kernel1. Make config text-based interactive configuration2. Make Menuconfig menu-based configuration in text modeConfiguring the kernel with make MenuconfigIn the configuration Blank is not selected, * means select and compile into kernel image file, M will compile into kernel module.Configuration results are saved i
list, while there are a,b,c 3 threads frequently access this list.So when a,b,c 3 threads access the list at the same time, if a gets a lock, then the B,C thread can only wait for a to release the lock before accessing the linked list.If A,b,c 3 threads are accessing different nodes of this list (for example, A is a modified node lista,b is a delete node listb,c is an append node LISTC),And these 3 nodes are not contiguous, then 3 threads running at the same time are not problematic.In this cas
The Linux Kernel provides the copy_from_user ()/copy_to_user () function to copy the kernel state and user State data. However, these two functions cause blocking and cannot be used in hard or soft interruptions. These two special copy functions are generally used in functions similar to system calls.
In the following code, the
when the Linux kernel is programmed, kernel code execution can only directly access the data in memory, and the file system on the hard disk must be indirectly read and written by the kernel. General kernel operation file read and write in three ways: 1. Through the/proc/fi
20135311 Fu DongAnalyzing the process of creating a new process in the Linux kernel learning contentProcess Control block--PCB TASK_STRUCT data structureThe PCB task_struct contains:进程状态、进程打开的文件、进程优先级信息操作系统管理的三个功能:1.进程管理 2.内存管理 3.文件系统Status of the Linux process:Process State Analysis:The long state is the running status of the process, 1 is not executed, 0 is in
used locks to protect your data ), these non-atomic bitwise functions may execute faster than the atomic bitwise functions.
2. spin lock
The most common lock in Linux kernel is spin lock ). A spin lock can only be held by one executable thread. If an execution thread tries to obtain a contention (held) spin lock, the thread will keep repeating-Rotating-waiting for the lock to be available again.
S
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.