当前位置:网站首页>Rockchip3399 start auto load driver
Rockchip3399 start auto load driver
2022-07-03 01:45:00 【mayday_ eighty】
It was previously verified on the development board of Jiuding
Find the relevant configuration file .mk ( If the file system does not support direct copy, use this method )
stay device In the catalog rockchip In the catalog rk3399 Of androidproducts.mk Seen inside ( Mongolia ) **
** This mk It includes the following mk
Open one of them mk Look dimly
It's about ko How to package files filesystem in Write a reference to yourself mk Or in the existing mk Add modification above ( It's all up to Mongolia )
And then in init.xx.rc or init.rc Write in file insmod
边栏推荐
- View of MySQL
- [understanding of opportunity -36]: Guiguzi - flying clamp chapter - prevention against killing and bait
- 数学知识:能被整除的数—容斥原理
- 小程序开发黑马购物商城中遇到的问题
- [Cao gongzatan] after working in goose factory for a year in 2021, some of my insights
- Types of map key and object key
- C语言课程信息管理系统
- Wordinsert formula /endnote
- Vant 实现简单的登录注册模块以及个人用户中心
- uniapp组件-uni-notice-bar通告栏
猜你喜欢
Take you ten days to easily complete the go micro service series (II)
Vant 实现简单的登录注册模块以及个人用户中心
CF1617B Madoka and the Elegant Gift、CF1654C Alice and the Cake、 CF1696C Fishingprince Plays With Arr
C application interface development foundation - form control (3) - file control
STM32 - GPIO input / output mode
PS remove watermark details
"Jetpack - livedata parsing"
[data mining] task 5: k-means/dbscan clustering: double square
Meituan dynamic thread pool practice ideas, open source
[机缘参悟-36]:鬼谷子-飞箝篇 - 面对捧杀与诱饵的防范之道
随机推荐
Introduction to kotlin collaboration
word插入公式/endnote
网络安全-漏洞与木马
Take you ten days to easily complete the go micro service series (II)
Openresty cache
简易分析fgui依赖关系工具
Network security - cracking system passwords
什么是调。调的故事
[data mining] task 3: decision tree classification
Tâche 6: regroupement DBSCAN
网络安全-ACL访问控制列表
Network security - Information Collection
传输层 TCP主要特点和TCP连接
自定义组件、使用npm包、全局数据共享、分包
[QT] encapsulation of custom controls
Related concepts of GDB in embedded system
View of MySQL
After reading this article, I will teach you to play with the penetration test target vulnhub - drivetingblues-9
Why can't the start method be called repeatedly? But the run method can?
Wireshark data analysis and forensics a.pacapng