slack kernel modules obfuscation?!?!
Hi
i am using slack 9.1 and i am quit happy with it. But i dont understand within the slack boot concept is how the hell thise kernel modules are getting loaded. modules.conf, modprobe.conf are empty.What about this hotplug things???!??! I have googled for it, and have also searched this board for it, with no result :| Please shed some light on this, wanna learn more about hardware and kernel things.... |
which modules are loaded and ill see if i can help.
by default the kernel has module autoloading built in so if it finds some thing it needs it will load the module it needs. |
This are my loaded modules
Code:
0 19:24:29 root@uranos:~ $ lsmod |
study the scripts in /etc/rc.d rc.modules is where the modules are loaded, unless they are put in modules.conf, which gets read first.
After the kernel finishes loading (look for 'VFS' in dmesg) init is started. inti starts by reading /etc/inittab then starts running the scripts in /etc/rc.d Thart's where all the action takes place. If you do a 'ps -x' you can see the order in which the processes are started. |
All times are GMT -5. The time now is 09:37 PM. |