pico의 라이센스 기간이 만료된 관계로 다음 계약까지 사용을 못하게 되었다. How to reorder or rename logical interface names in LinuxOne of the problems of Linux is that the order of the network interfaces is unpredictable. Between reboots it usually stays the same, but often after an upgrade to a new kernel or the addition or replacement of a network card (NIC) the order of all network interfaces changes. For example, what used to be eth0 now becomes eth1 or eth2 or visa versa. Obviously there is some logic to which network interface gets which name, but Linux documentation states that this may change and no user or program should ever assume anything about this. This is annoying, in particular if your management interface is at eth1 at one node in a cluster and at eth2 in another node of the same cluster (which we have experienced). I personally like to have my (primary) management interface always to be eth0. Thankfully, there are ways to achieve this. They can be divided in four methods: 1. Order the network interfaces based on physical properties of the NIC. (e.g. the physical location in the machine) 2. Order the network interfaces based on the MAC address of the NIC. 3. Order the network interfaces based on the driver of the NIC. 4. Order the network interfaces based on the physical location of the NIC in the computer So you have to pick a method that suits you. I recommend either to use ifrename (based on physcial properties, especially useful if you often change network cards in your hosts) or writing a udev rule (based on the MAC address). However, I listed the other methods as well. Be aware that the last two methods mentioned in this article are only for the masochistic (you will scream and shoot to get those to work). Note: Linux kernels up to 2.4 did only probe for the first Ethernet card, ignoring other NICs. We assume you use a 2.6 or higher kernel or already fixed this, for example by specifying ether=0,0,eth1 as kernel parameter∞. Based on the physical propertiesPerhaps the most elegant way to name the ethernet NIC is to do so based on their physical properties, like link speed and port type. Using the ifrename toolIfrename is a tool specifically designed to (re)name network interfaces based on characteristics like MAC address (wildcards supported), bus information, and hardware settings. It uses a control file (/etc/iftab) to specify rules about how the interfaces will be named. (thanks to Matt Baron for this tip.) # Example /etc/iftab file eth2 mac 08:00:09:DE:82:0E eth3 driver wavelan interrupt 15 baseaddress 0x390 eth4 driver pcnet32 businfo 0000:02:05.0 # wildcard name: pick the lowest available name of air0, air1, air2, etc. air* mac 00:07:0E:* arp 1 Using the ethtool and ip programsIt is possible to check the NIC properties using the ethtool program, and to change the name using the ip program (thanks to Jollynn Schmidt for this tip): if ethtool eth0 | grep -q "Port: FIBRE"; then ip link set dev eth0 name not_eth0 ip link set dev eth1 name eth0 ip link set dev not_eth0 name eth1 fi The disadvantage of ethtool is that it can only be run by root, even when you're only using it to query for information. Though this is a minor annoyance of ethtool, it doesn't matter in this case, since you want to set a device name and thus need to be root anyway. Based on the MAC addressSecondly, it is also possible to name the network interface based on the MAC address of each NIC. The advantage is that it is possible to use this method if you have two NICs which use the same driver (unlike the next method: based on driver). First, you must determine the MAC address of your interfaces. You can do this locally on a machine running ifconfig -a The MAC address is listed as "hwaddr" (hardware address). Alternatively, you can even determine MAC addresses remotely using ping and /sbin/arp. There are three ways to map the MAC address to the logical interface name. Either by using the udev rules, with the get-mac-address.sh script, or by using the nameif program. The udev method should work on all recent Linux distributions, and is recommended. The get-mac-address.sh script and the nameif program are know to work with Debian, while on Red Hat, you can change the interface configuration file. Using udev rulesudev replaced devfs in Linux 2.6. First make sure that your Linux system has udev installed, rather then devfs. If you have a /etc/udev directory, but not /etc/devfs directory, you are probably fine. If not, be aware that changing your kernel from devfs to udev is possible, but is not just a matter of adding a new module. Perhaps for now, another method is easier for you.Now that you have udev, it is rather simple. You only need to create a udev rule mapping the MAC address to the interface name. Store this in a file inside the /etc/udev/rules.d/ directory: KERNEL=="eth?", SYSFS{address}=="00:37:e9:17:64:af", NAME="eth0" # MAC of first NIC in lowercase KERNEL=="eth?", SYSFS{address}=="00:21:e9:17:64:b5", NAME="eth1" # MAC of second NIC in lowercase Most distibutions already come with an example config file for you. E.g. /etc/udev/rules.d/network-devices.rules or /etc/udev/rules.d/010_netinterfaces.rules. More information can be found at http://www.reactivated.net/writing_udev_rules.html∞ or http://www.debianhelp.co.uk/udev.htm∞. (Thanks to Casey Scott and Ron Hermsen for the pointers.) Using the interface configuration fileIf you run a Red-Hat-based distribution, you can simply add the MAC addres in the interface configuration file /etc/sysconfig/network-scripts/ifcfg-eth0:DEVICE=eth0 HWADDR=00:37:e9:17:64:af You can give it any DEVICE name you want, like DEVICE=ethmgmt, as long as you remember to rename the config file: /etc/sysconfig/network-scripts/ifcfg-ethmgmt Source: http://forums.serverwatch.com/showthread.php?t=18476∞ Using the get-mac-address.sh scriptAnother solution is to use the get-mac-address.sh script to map interface names by MAC address. On Debian, this script is distributed as part of the ifupdown package∞ (in /usr/share/doc/ifupdown/examples/get-mac-address.sh). Copy this script to a saner place (e.g. /usr/local/bin), and you can setup /etc/network/interfaces in this manner:auto lo eth0 eth1 iface lo inet loopback mapping eth0 eth1 script /usr/local/bin/get-mac-address.sh map 00:37:E9:17:64:AF netA map 00:21:E9:17:64:B5 netB iface netA inet static address etc... iface netB inet static address etc... Source: https://www.gelato.unsw.edu.au/archives/gelato-technical/2004-February/000334.html∞ The disadvantage of this method is that defines a mapping, rather then changing the actual logical interface name. Using the nameif programAlternative to the get-mac-address.sh script, you can also use the slightly more convenient nameif program, which is distributed as part of the net-tools package∞ on Debian. The advantage of nameif is that you can specify the interface names in the /etc/mactab file: ethmgnt 00:37:E9:17:64:AF ethwireless 00:21:E9:17:64:B5 It is not possible to rename an interface to a name of an existing interface. So you can't rename eth1 to eth0 as long as eth0 still exists. It is possible to still swap the names eth0 and eth1 by using a temporary name (e.g. first rename eth1 to ethfoo, then eth0 to eth1 and finally ethfoo to eth0). Note that this method may lead to problems if you use common names such as eth0 and eth1. If you upgrade a kernel, the names may be different than you expected, and you may rename a NIC to eth0 while eth0 still exists, leading to name collisions. Therefor, it is recommended to use other names like "ethmgmnt", "ethwired", "ethwireless" and "eth10ge", as shown in the example above. Based on the driverWarning: This only works if the driver is available as a loadable module. Not if it is built into the kernel. This is a relative easy method, since it does not rely on external scripts. The idea is to just load the kernel module for your eth0 interface before the modules for other network cards. First of all, you must determine which driver is used for each network card. Thankfully Linux does have a system to load the appropriate driver automatically, based on the PCI ID∞ of the network card. Unfortunately, there is no single command to simply get the driver (and other information like the link speed) based on just the interface name in Linux. Your best bet is to look for kernel messages: dmesg | grep eth This should give you a good estimate of the driver name. You can verify if the name indeed does exist and is loaded: lsmod Note: lsmod gave: e1000 84868 0 tg3 70816 0 However, the 0 indicates that these drivers are not controlling any device! That is strange, since modprobe -r tg3 and modprobe -r e1000 do disable the network cards. Apparently, this is a flaw in lsmod. Note that running modprobe tg3 en then modprobe e1000 does bring them up in the correct order, with the correct interface names. This is a good check if this approach (using the driver to decide the interface name) can work. Red HatIn Red Hat, if the driver is called "tg3" (the Tigon driver), you simply specify the network name by adding this enty in /etc/modules.conf:~alias eth0 tg3 DebianOn a Debian system, /etc/modules.conf is generated automatically and should not be edited directly. Instead, create a file in the subdirectory /etc/modules/ (do not use /etc/modprobe.d/, that seems out-of-date). For example, create the file /etc/modutils/interfaces and add the appropriate modules. For example:alias eth0 tg3 alias eth1 e1000 Next, update /etc/modules.conf by running: update-modules Alternative method: I have encountered scenario's where the kernel did already load the modules for the drivers, even before /etc/modules.conf was read. The result was that in effect, the specification in /etc/modules.conf was ignored, and this method did not work. As an alternative, it is possible to also list the drivers, in the appropriate order, in /etc/modules (thus not /etc/modules.conf): tg3 e1000 The result will be that the tg3 driver is loaded before the e1000 kernel. Since /etc/modules only exists for Debian, this trick will most likely not work for other distributions. Based on the physical location in the computerWarning: This only works if the driver is built into the kernel, not as a loadable module. Note: It is relatively hard to get this to work, and we encountered problems with it. The other methods are recommended. It is possible to name the network interfaces based on the interrupt (IRQ) and memory address. This should work if you have network cards in PCI busses, and it involves appending the proper parameters to the "ether=" or "netdev=" kernel parameters. First of all, you can detect the PCI slot of the devices using lspci -v For LILO, you need to add an add line to the appropriate boot configuration. For example: append="netdev=irq=21,io=0x2040,name=eth0 netdev=irq=20,io=0x3000,name=eth1 netdev=irq18,io=0x2000,name=eth2" Under grub, it can just be listed as parameter. e.g.: kernel /boot/vmlinuz netdev=irq=24,name=eth0 More Informationhttp://www.tldp.org/HOWTO/Ethernet-HOWTO-8.html∞http://www.tldp.org/HOWTO/BootPrompt-HOWTO-11.html∞ Written by Freek Dijkstra. Licensed under public domain. (That is, feel free to modify, redistribute, cripple, or even sell it as your own work, and there is no need to mention the source, even though you are of course welcome to do so.) CategoriesCategorySysAdminCategoryProcedures http://www.science.uva.nl/research/air/wiki/LogicalInterfaceNames |
ifconfig eth0 down
ifconfig eth0 up 192.168.0.3 netmask 255.255.255.0 route add default gw 192.168.0.1 mkdir /root/nfs mount -t nfs -o nolock -o udp -o rsize=1024,wsize=8192 192.168.0.1:/filesystem/SoCMaster3 /root/nfs cd nfs/itsoc cd pico_driver ./test_pico.sh cd .. cd ./init |
3.1. Modules vs Programs3.1.1. How modules begin and endA program usually begins with a main() function, executes a bunch of instructions and terminates upon completion of those instructions. Kernel modules work a bit differently. A module always begin with either the init_module or the function you specify with module_init call. This is the entry function for modules; it tells the kernel what functionality the module provides and sets up the kernel to run the module's functions when they're needed. Once it does this, entry function returns and the module does nothing until the kernel wants to do something with the code that the module provides. All modules end by calling either cleanup_module or the function you specify with the module_exit call. This is the exit function for modules; it undoes whatever entry function did. It unregisters the functionality that the entry function registered. Every module must have an entry function and an exit function. Since there's more than one way to specify entry and exit functions, I'll try my best to use the terms `entry function' and `exit function', but if I slip and simply refer to them as init_module and cleanup_module, I think you'll know what I mean. 3.1.2. Functions available to modulesProgrammers use functions they don't define all the time. A prime example of this is printf(). You use these library functions which are provided by the standard C library, libc. The definitions for these functions don't actually enter your program until the linking stage, which insures that the code (for printf() for example) is available, and fixes the call instruction to point to that code. Kernel modules are different here, too. In the hello world example, you might have noticed that we used a function, printk() but didn't include a standard I/O library. That's because modules are object files whose symbols get resolved upon insmod'ing. The definition for the symbols comes from the kernel itself; the only external functions you can use are the ones provided by the kernel. If you're curious about what symbols have been exported by your kernel, take a look at /proc/kallsyms. One point to keep in mind is the difference between library functions and system calls. Library functions are higher level, run completely in user space and provide a more convenient interface for the programmer to the functions that do the real work---system calls. System calls run in kernel mode on the user's behalf and are provided by the kernel itself. The library function printf() may look like a very general printing function, but all it really does is format the data into strings and write the string data using the low-level system call write(), which then sends the data to standard output. Would you like to see what system calls are made by printf()? It's easy! Compile the following program:
with gcc -Wall -o hello hello.c. Run the exectable with strace hello. Are you impressed? Every line you see corresponds to a system call. strace[1] is a handy program that gives you details about what system calls a program is making, including which call is made, what its arguments are what it returns. It's an invaluable tool for figuring out things like what files a program is trying to access. Towards the end, you'll see a line which looks like write(1, "hello", 5hello). There it is. The face behind the printf() mask. You may not be familiar with write, since most people use library functions for file I/O (like fopen, fputs, fclose). If that's the case, try looking at man 2 write. The 2nd man section is devoted to system calls (like kill() and read(). The 3rd man section is devoted to library calls, which you would probably be more familiar with (like cosh() and random()). You can even write modules to replace the kernel's system calls, which we'll do shortly. Crackers often make use of this sort of thing for backdoors or trojans, but you can write your own modules to do more benign things, like have the kernel write Tee hee, that tickles! everytime someone tries to delete a file on your system. 3.1.3. User Space vs Kernel SpaceA kernel is all about access to resources, whether the resource in question happens to be a video card, a hard drive or even memory. Programs often compete for the same resource. As I just saved this document, updatedb started updating the locate database. My vim session and updatedb are both using the hard drive concurrently. The kernel needs to keep things orderly, and not give users access to resources whenever they feel like it. To this end, a CPU can run in different modes. Each mode gives a different level of freedom to do what you want on the system. The Intel 80386 architecture has 4 of these modes, which are called rings. Unix uses only two rings; the highest ring (ring 0, also known as `supervisor mode' where everything is allowed to happen) and the lowest ring, which is called `user mode'. Recall the discussion about library functions vs system calls. Typically, you use a library function in user mode. The library function calls one or more system calls, and these system calls execute on the library function's behalf, but do so in supervisor mode since they are part of the kernel itself. Once the system call completes its task, it returns and execution gets transfered back to user mode. 3.1.4. Name SpaceWhen you write a small C program, you use variables which are convenient and make sense to the reader. If, on the other hand, you're writing routines which will be part of a bigger problem, any global variables you have are part of a community of other peoples' global variables; some of the variable names can clash. When a program has lots of global variables which aren't meaningful enough to be distinguished, you get namespace pollution. In large projects, effort must be made to remember reserved names, and to find ways to develop a scheme for naming unique variable names and symbols. When writing kernel code, even the smallest module will be linked against the entire kernel, so this is definitely an issue. The best way to deal with this is to declare all your variables as static and to use a well-defined prefix for your symbols. By convention, all kernel prefixes are lowercase. If you don't want to declare everything as static, another option is to declare a symbol table and register it with a kernel. We'll get to this later. The file /proc/kallsyms holds all the symbols that the kernel knows about and which are therefore accessible to your modules since they share the kernel's codespace. 3.1.5. Code spaceMemory management is a very complicated subject---the majority of O'Reilly's `Understanding The Linux Kernel' is just on memory management! We're not setting out to be experts on memory managements, but we do need to know a couple of facts to even begin worrying about writing real modules. If you haven't thought about what a segfault really means, you may be surprised to hear that pointers don't actually point to memory locations. Not real ones, anyway. When a process is created, the kernel sets aside a portion of real physical memory and hands it to the process to use for its executing code, variables, stack, heap and other things which a computer scientist would know about[2]. This memory begins with $0$ and extends up to whatever it needs to be. Since the memory space for any two processes don't overlap, every process that can access a memory address, say 0xbffff978, would be accessing a different location in real physical memory! The processes would be accessing an index named 0xbffff978 which points to some kind of offset into the region of memory set aside for that particular process. For the most part, a process like our Hello, World program can't access the space of another process, although there are ways which we'll talk about later. The kernel has its own space of memory as well. Since a module is code which can be dynamically inserted and removed in the kernel (as opposed to a semi-autonomous object), it shares the kernel's codespace rather than having its own. Therefore, if your module segfaults, the kernel segfaults. And if you start writing over data because of an off-by-one error, then you're trampling on kernel code. This is even worse than it sounds, so try your best to be careful. By the way, I would like to point out that the above discussion is true for any operating system which uses a monolithic kernel[3]. There are things called microkernels which have modules which get their own codespace. The GNU Hurd and QNX Neutrino are two examples of a microkernel. 3.1.6. Device DriversOne class of module is the device driver, which provides functionality for hardware like a TV card or a serial port. On unix, each piece of hardware is represented by a file located in /dev named a device file which provides the means to communicate with the hardware. The device driver provides the communication on behalf of a user program. So the es1370.o sound card device driver might connect the /dev/sound device file to the Ensoniq IS1370 sound card. A userspace program like mp3blaster can use /dev/sound without ever knowing what kind of sound card is installed. 3.1.6.1. Major and Minor NumbersLet's look at some device files. Here are device files which represent the first three partitions on the primary master IDE hard drive:
Notice the column of numbers separated by a comma? The first number is called the device's major number. The second number is the minor number. The major number tells you which driver is used to access the hardware. Each driver is assigned a unique major number; all device files with the same major number are controlled by the same driver. All the above major numbers are 3, because they're all controlled by the same driver. The minor number is used by the driver to distinguish between the various hardware it controls. Returning to the example above, although all three devices are handled by the same driver they have unique minor numbers because the driver sees them as being different pieces of hardware. Devices are divided into two types: character devices and block devices. The difference is that block devices have a buffer for requests, so they can choose the best order in which to respond to the requests. This is important in the case of storage devices, where it's faster to read or write sectors which are close to each other, rather than those which are further apart. Another difference is that block devices can only accept input and return output in blocks (whose size can vary according to the device), whereas character devices are allowed to use as many or as few bytes as they like. Most devices in the world are character, because they don't need this type of buffering, and they don't operate with a fixed block size. You can tell whether a device file is for a block device or a character device by looking at the first character in the output of ls -l. If it's `b' then it's a block device, and if it's `c' then it's a character device. The devices you see above are block devices. Here are some character devices (the serial ports):
If you want to see which major numbers have been assigned, you can look at /usr/src/linux/Documentation/devices.txt. When the system was installed, all of those device files were created by the mknod command. To create a new char device named `coffee' with major/minor number 12 and 2, simply do mknod /dev/coffee c 12 2. You don't have to put your device files into /dev, but it's done by convention. Linus put his device files in /dev, and so should you. However, when creating a device file for testing purposes, it's probably OK to place it in your working directory where you compile the kernel module. Just be sure to put it in the right place when you're done writing the device driver. I would like to make a few last points which are implicit from the above discussion, but I'd like to make them explicit just in case. When a device file is accessed, the kernel uses the major number of the file to determine which driver should be used to handle the access. This means that the kernel doesn't really need to use or even know about the minor number. The driver itself is the only thing that cares about the minor number. It uses the minor number to distinguish between different pieces of hardware. By the way, when I say `hardware', I mean something a bit more abstract than a PCI card that you can hold in your hand. Look at these two device files:
By now you can look at these two device files and know instantly that they are block devices and are handled by same driver (block major 2). You might even be aware that these both represent your floppy drive, even if you only have one floppy drive. Why two files? One represents the floppy drive with 1.44 MB of storage. The other is the same floppy drive with 1.68 MB of storage, and corresponds to what some people call a `superformatted' disk. One that holds more data than a standard formatted floppy. So here's a case where two device files with different minor number actually represent the same piece of physical hardware. So just be aware that the word `hardware' in our discussion can mean something very abstract. |
IT-SoC 디자인 컨테스트에 참가해 오늘 데모를 하기로 했다. |
#include <stdio.h> #define AHB_HBURST_SINGLE 0x0 #define AHB_HWRITE_READ 0x0 next.htrans = AHB_HTRANS_IDLE; wait_for = period; } next.htrans = AHB_HTRANS_IDLE; wait_for = period; wait_for = delay; void advanceClock(){ void convHexToBinary(char* dst, int data, int size){ char c = '0' + ((data>>i) & 0x00000001); void printSignal(void){ convHexToBinary(htrans,curr.htrans,2); fprintf(fp,"%s.htrans\t<= %s;\n",sig_name,htrans); fprintf(fp,"wait for %d ns;\n",wait_for); int main(){ setWriteDataInt32((int*)0x9000000,0x00000030); setWaitFor(200); setReadDataInt32((int*)0x9000000); setWaitFor(200); setWriteDataInt32((int*)0x9010000,0x0000000a); setWriteDataInt32((int*)0x9010004,0x00000002); setWriteDataInt32((int*)0x9000000,0x00000003); setWaitFor(200); } |
ifconfig eth0 down
ifconfig eth0 up 192.168.0.3 netmask 255.255.255.0 route add default gw 192.168.0.1 mkdir /root/nfs mount -t nfs -o nolock -o udp -o rsize=1024,wsize=8192 192.168.0.1:/filesystem/SoCMaster3 /root/nfs ------ nfs 마운트시 옵션 매우 중요. read, write buffer 사이즈 설정. |
LDD(1) NAME SYNOPSIS DESCRIPTION OPTIONS -v --verbose -d --data-relocs -r --function-relocs --help Usage information. BUGS ldd does not work with some extremely old a.out programs which were built before ldd support was added to the compiler releases. If you use ldd on one of these programs, the program AUTHOR SEE ALSO |
Working with Ramdisk, Initrd, and FilesystemsWorking with Ext2 ImagesFirst, when we talk about a ramdisk, we're usually talking about an image of an ext2 filesystem and not necessarily the ramdisk device driver. We often use the ramdisk device driver, copying in the ramdisk image, mounting the filesystem, etc., but we could also use the flash block device driver or the loopback driver. These instructions tell how to use the loopback device to access an ext2 image, in which case ramdisk is not really involved at all. Given an uncompressed filesystem image, you can mount it either through a ramdisk device or through the loopback filesystem type. Via ramdisk:
Or via loopback:
In both of these cases, we omitted the '-t fstype' option from mount because it will read the superblock to determine the filesystem type. I've found that I often need to supply the type when mounting fat filesystems, but maybe that's just me. Finally, we almost always compress the image before making copies of it, and we install the compressed filesystem image for the initial ramdisk, because the initrd driver knows how to recognize and unzip compressed filesystem images. We use the highest level of compression to minimize xmodem download times. A small note: if you did some work (copied, moved, deleted files), the ramdisk will have some dirty blocks. Those blocks are not in use by the ext2 filesystem, but they still have the original file contents, and hence aren't that easy compressable as empty blocks (i.e. blocks only containing zeros). To get a smaller compressed image, you can copy the contents of the ramdisk to a clean ramdisk. Create a second ramdisk (or loopback device) and mount it. Suppose we have the original ramdisk mounted on /tmp/orig and the new one on /tmp/new, we just copy the contents:
Unmount the ramdisks, extract the new ramdisk, compress it, and you'll have a smaller compressed image with exactly the same contents. Example 1. Modifying an existing ext2 filesystem image
Example 2. Creating a new ext2 filesystem image
Example 3. Creating an ext2 filesystem on a device
Example 4. Going from a device to a file
will read the entire special file into a plain file, e.g.:
But remember to unmount it before you extract it, or it can be out-of-sync (i.e.: the kernel hasn't flushed all data to disk yet). And of course the "mounted" bit is set if it is still mounted, so the next time you mount it you'll get a warning about dirty filesystems. Working With CramfsAccessing cramfs is similar to ext2 ramdisk, except that cramfs is a readonly filesystem. It's new to 2.4.x so most 2.2.x-based development machines do not support it. Since cramfs is readonly, you cannot 'mkfs -t cramfs' and then populate. The mkcramfs utility creates an image of a cramfs filesystem from a directory tree. Linux 2.4.x Desktop Computer
Now get to the boot loader and load the file where it belongs. Linux 2.2.x Desktop ComputerSince 2.2 does not support cramfs filesystems, you cannot mount the cramfs filesystem. You will need the 'src' tar ball, e.g. root-src-2-40.tar.gz
Now get to the boot loader and load the file where it belongs. Working With RamfsRamfs is new to 2.4.x. It is a filesystem which keeps all files in RAM. It allows read and write access. Ramfs grows and shrinks to accomodate the files it contains, in contrast to a 'ext2 ramdisk', which gets allocated a fixed amount of RAM. To use ramfs, type:
Cloning an iPAQ InstallationMany people have asked me how to clone an iPAQ. Here is one way to clone an iPAQ that is a little scary because it involves reading and writing the raw device under a mounted JFFS2 filesystem. Several of us have used this mechanism with good results. Example 5. Cloning a filesystem with dd On the ipaq to be cloned, mount a filesystem on a card or network (via NFS). For the sake of argument, let us assume an IDE card mounted that filesystem on /mnt/hda. Assuming the standard Familiar root filesytem mounted on /dev/mtdblock/1, execute the following command:
Example 6. Cloning a filesystem using the bootldr The bootldr can write to CF/IDE partitions or to VFAT filesytems. Using this mechanism, one can make a copy of the root filesystem image.
Example 7. Option A: Restoring a filesystem with dd On the clonee ipaq, with at least task-bootstrap installed, insert the IDE card and mount the filesystem. Again, let us assume it is installed on /mnt/hda.
Now push the reset button. Trying to execute commands afterwards Example 8. Option B: Restoring a filesystem via the bootldr This method currently only works with H3600 or H3700 and VFAT filesystems. On the clonee ipaq, install bootldr 2.18.16 or newer.
First, detect and attach the sleeve driver with the sleeve insert. In this example, it is a Compaq dual pcmcia sleeve.
Next, detect and attach the driver for the PCMCIA card. In this example, it is a 340MB IBM Microdrive CF card.
Now mount the partition:
Now read the file, named in the lowercase 8.3 format, into DRAM. The following command will read the roughly 32MB snapshot into DRAM at address 32MB (requiring 64MB in the iPAQ):
Now program the root partition with the data that was read into DRAM:
...
...
Filesystems Recommended for Removable MediaJFFS2 is designed for linear flash, not for Compact Flash cards, which already have a wear-leveling mechanism internally, nor for hard drives, which do not require a wear-leveling mechanism. Ext2 is not so great, because it is hard to remember to unmount the filesytem before pulling the card out, which leads to running fsck and loss of data. Ext3 is good because it enables you to journal directory and file data. Reiserfs is also good for removable block devices because it is a journaling filesystem. |
리눅스 Changing Your MAC Address In Window XP/Vista, Linux And Mac OS X First let me explain a few things about MAC addresses. MAC stands for Media Access Control and in a sense the MAC address is a computer뭩 true name on a LAN. An Ethernet MAC address is a six byte number, usually expressed as a twelve digit hexadecimal number (Example: 1AB4C234AB1F). IPs are translated to MAC address by a protocol called ARP (Address Resolution Protocol). Let뭩 say a computer with and IP of 192.168.1.1 wants to send information to another computer on the LAN that has an IP of 192.168.1.2 . First 192.168.1.1 will send out a broadcast to all stations on the LAN asking who has the IP 192.168.1.2. Then the box that has 192.168.1.2 will respond to 192.168.1.1 with it뭩 MAC address which is cached in 192.168.1.1뭩 ARP table for later use. To put this in Socratic Dialog form (with just a touch of Stallone): Host 1 (192.168.1.1): Yo everyone on the LAN (FF:FF:FF:FF:FF:FF), who has the IP 192.168.1.2? My MAC is DE:AD:BE:EF:CA:FE so you can respond back to me. Host 2 (192.168.1.2): Hello DE:AD:BE:EF:CA:FE, I have IP 192.168.1.2 and my MAC address is 12:34:56:78:90:12 so you can send your IP packets to me. You can see the ARP table of a box by dropping out to a command prompt and typing 밶rp 뻕?in Windows or just 밶rp?in Linux. ARP can also work the other way by a host on the LAN sending its MAC address to another machine on the LAN for preemptive caching unless the host is configured to not accept un-requested ARP replies. A person might want to change the MAC address of a NIC for many reasons:
Linux To change your MAC address in Linux (and most *nix system) is easy as pie. All it takes is two easy to script commands: ifconfig eth0 down hw ether 00:00:00:00:00:01 ifconfig eth0 up These two little commands would set your eth0 interface to use the MAC 00:00:00:00:00:01. Just plug in the NIC you want to set and the MAC address you want to use into the commands above and your done. Changing your MAC address is one of those things that is much easier to do in Linux then under Windows. Mac OS X For versions of OS X before Tiger (OS X 10.4) you will need this patch: http://slagheap.net/etherspoof/ Then you use a command like: sudo ifconfig en0 lladdr 00:00:00:00:00:01 I'm not much of a Macintosh guy, so I pulled most of this info from: http://www.macgeekery.com/gspot/2006-04/mac_address_spoofing My understanding is that there are complications with some AirPort cards so you may also want to read: http://rgov.org/airport-spoof/ Windows 2000/XP/Vista: The Hard Way In XP you can use the regedit to edit the registry from a GUI or the reg command to edit it from the console, I뭠l be using regedit. Information on all your NICs can be found the registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\ Class\{4D36E972-E325-11CE-BFC1-08002bE10318}\ . Under this key you will find a bunch of sub keys labeled as 0000, 00001, 0002 and so forth. We can assume any MAC address we want by finding the key that controls the NIC we want to change, putting in a string value called 밡etworkAddress?and setting it to the MAC address we want to use formatted as a twelve digit hex number (example: 000000000001). To find out which key is which we can search through them for the value 밆riverDesc?until we find the one that matches the NIC we wish to alter. After you set 밡etworkAddress?to the address you want just restart the NIC by disabling it then enabling it (or in the case of PCMCIA cards, just eject and reinsert). You can confirm the MAC address change by using the 밽etmac?or 밿pconfig /all?commands. Windows 2000/XP/Vista: The Easy Way Use Mac Makeup ( http://www.gorlani.com/publicprj/macmakeup/macmakeup.asp ), MadMACs (http://www.irongeek.com/i.php?page=security/madmacs-mac-spoofer), Smac ( http://www.klcconsulting.net/smac/ ) or Etherchange (http://ntsecurity.nu/toolbox/etherchange/ ). Mac Makeup is a cool little GUI and Command line tool that's freeware, the creator also offers a Plugin for Bart's PE builder. MadMACs is a tool to randomize your MAC address and host name on every reboot. Smac has a nice GUI and was free but has since gone commercial, there's no reason to bother with it as there are free tools that are just as good. I use MadMACs since I wrote it and it lets me keep my host information randomized. Have fun with your MAC addresses switching, but be careful not to cause network problems. My favorite MAC address is DEADBEEFCAFE, for other interesting MACs see: http://www.binrev.com/forums/index.php?showtopic=15942 Enjoy. |
maxcpus=0 .
|