To help compiling programs for Loongson CPU on my many x86 boxes, I need a cross compile toolchain.
In gentoo, it can be done by using crossdev program, first "emerge crossdev" and then "crossdev -t mips64el-unknown-linux-gnu --g 4.4.0_pre9999 --l 2.9_p20081201-r2 --k 2.6.27-r2"
This will build a cross compile toolchain on x86/amd64 boxes for cross compiling Loongson box (with the help of distcc). Problem occurs in the building of glibc, as the toolchain is built in the order:
binutils -> kernel-headers -> glibc -> gcc
But at the stage when it is going to compile glibc, it requires a compiler which supports the target architecture, it is not a problem if we just make for existing platforms, but for Loongson, it requires a latest gcc, which is not there yet.
Workaround is to skip some steps and rearrange the order of making, as described here.
http://forums.gentoo.org/viewtopic-p-5147128.html?sid=99c56c7a5b05b2bb66a08bbdbf548a46#5147128
Finally I got a distcc node with cross compiler for Loongson, running as a guest system under RHEL 5.3 :-)
關於我
2009/02/23
2009/02/20
Eric Kwok's Leet Collection
星期三下班經過唱片店,買了 Eric Kwok 的 Leet Collection,全部都是他這些年來的作曲/作詞的精選歌曲。
不過到今天還沒時間去聽一下,周末才慢慢欣賞吧。
不過到今天還沒時間去聽一下,周末才慢慢欣賞吧。
2009/02/16
Reminder: how to reset oracle application server password
Reset the oc4jadmin password using the following procedure while you are logged in as the user who installed the Oracle Application Server instance:
1. Stop OC4J and the Application Server Control.
$ORACLE_HOME/opmn/bin/opmnctl stopall
2. Locate and open the following file in a text editor:
$ORACLE_HOME/j2ee/home/config/system-jazn-data.xml
3. Locate the line that defines the credentials property for the oc4jadmin user.
jazn.com
.
.
.
oc4jadmin
OC4J Administrator
OC4J Administrator
{903}4L50lHJWIFGwLgHXTub7eYK9e0AnWLUH
4. Replace the existing encrypted password with the new password.
Be sure to prefix the password with an exclamation point (!). For example:
!mynewpassword123
1. Stop OC4J and the Application Server Control.
$ORACLE_HOME/opmn/bin/opmnctl stopall
2. Locate and open the following file in a text editor:
$ORACLE_HOME/j2ee/home/config/system-jazn-data.xml
3. Locate the line that defines the credentials property for the oc4jadmin user.
jazn.com
.
.
.
oc4jadmin
OC4J Administrator
OC4J Administrator
{903}4L50lHJWIFGwLgHXTub7eYK9e0AnWLUH
4. Replace the existing encrypted password with the new password.
Be sure to prefix the password with an exclamation point (!). For example:
!mynewpassword123
2009/02/14
2009/02/11
Street Fighter IV
2009/02/08
Renewing SSL certificates
As my home server's SSL certificates are going to expire soon, I need to renew them.
But it has been over one year since the certificates are created, I've forgotten how to make them, so I've done some research, to be record, here are the steps:
1. Generating RSA private key
openssl genrsa -des3 -out server.key 1024
2. Making certificate request
openssl req -new -key server.key -out server.csr
3. Go to CACert.org to generate the certificate, using the server.csr file.
4. Or self sign using openssl command
openssl x509 -req -days 365 -in server.csr -signkey server.key -out server.crt
Then a certificate file is generated.
To use the certificate in Apache:
SSLCertificateFile /etc/apache2/ssl/server.crt
SSLCertificateKeyFile /etc/apache2/ssl/server.pem
To use the certificate in Postfix:
smtpd_tls_CAfile = /etc/ssl/postfix/cacert.pem
smtpd_tls_cert_file=/etc/ssl/postfix/home.cert
smtpd_tls_key_file=/etc/ssl/postfix/home.pem
To use the certificate in Courier IMAP:
Make a server.key, with contents from server.crt and server.pem combined, like:
-----BEGIN CERTIFICATE-----
[encoded data]
-----END CERTIFICATE-----
-----BEGIN RSA PRIVATE KEY-----
[encoded data]
-----END RSA PRIVATE KEY-----
Then configure in imapd-ssl
TLS_CERTFILE=/etc/courier-imap/imapd.crt
But it has been over one year since the certificates are created, I've forgotten how to make them, so I've done some research, to be record, here are the steps:
1. Generating RSA private key
openssl genrsa -des3 -out server.key 1024
2. Making certificate request
openssl req -new -key server.key -out server.csr
3. Go to CACert.org to generate the certificate, using the server.csr file.
4. Or self sign using openssl command
openssl x509 -req -days 365 -in server.csr -signkey server.key -out server.crt
Then a certificate file is generated.
To use the certificate in Apache:
SSLCertificateFile /etc/apache2/ssl/server.crt
SSLCertificateKeyFile /etc/apache2/ssl/server.pem
To use the certificate in Postfix:
smtpd_tls_CAfile = /etc/ssl/postfix/cacert.pem
smtpd_tls_cert_file=/etc/ssl/postfix/home.cert
smtpd_tls_key_file=/etc/ssl/postfix/home.pem
To use the certificate in Courier IMAP:
Make a server.key, with contents from server.crt and server.pem combined, like:
-----BEGIN CERTIFICATE-----
[encoded data]
-----END CERTIFICATE-----
-----BEGIN RSA PRIVATE KEY-----
[encoded data]
-----END RSA PRIVATE KEY-----
Then configure in imapd-ssl
TLS_CERTFILE=/etc/courier-imap/imapd.crt
2009/02/05
ATEN KVM CS-62U
2009/02/03
熱血的<赤壁>
訂閱:
文章 (Atom)