kernel
风竹夜
github: https://github.com/fengzhuye
开源软件, github,c/c++, linux,orocos,ros,ethercat,canopen, matlab etc.
展开
-
eBPF related
获取c++函数名字objdump--syms/path/to/binary|grepminor_collection_begin。原创 2022-07-25 12:20:19 · 470 阅读 · 0 评论 -
Networking Stack & Simple Network Driver 实现 & 以太网协议数据包结构
Linux 的网络结构如图:see link: http://www.cubrid.org/blog/dev-platform/understanding-tcp-ip-network-stack/ 在 Driver 层只负责数据的收发,而上层则负责 Network Stack 的处理。 如果不想发送 TCP/IP 数据帧,可以创建 raw socket (man 7 packet),自己构造以原创 2016-11-11 12:47:23 · 2705 阅读 · 0 评论 -
kernel build & preempt-rt patch & xenomai
提前准备好 linux 内核源码,如果是 x86 系统,可以去下载原生内核(Vanilla kernel): wget https://www.kernel.org/pub/linux/kernel/v3.x/linux-3.18.17.tar.gz如果是arm系统,或者其他系统,则下载厂商定制过的内核源码。如果有需要,patch内核,如 preempt-rt 补丁:(注意补丁版本必须与内核版本对原创 2015-07-06 10:35:52 · 6087 阅读 · 6 评论 -
编译 linux kernel + xenomai 2/3(在orocos中需要注意资源配置)
尊重原作,从github拷贝的,以免翻墙或者找不到。 原作链接:https://github.com/kuka-isir/rtt_lwr/blob/rtt_lwr-2.0/docs/source/rtpc/xenomai.rstXenomai 2.6.5 on Ubuntu 14.04/16.04Nvidia Drivers are NOT supported (creates a lot of原创 2015-07-03 08:34:58 · 8283 阅读 · 2 评论 -
虚拟地址/物理地址——virtual address(memory)/physical address: 树莓派 mmap example
通常: If you want to find a way for access physical memory in Linux there are only two solutions. The first is to develop a module running in kernel space with the correct privileges to access physical原创 2015-10-30 23:43:53 · 8164 阅读 · 0 评论 -
How Debuger works Mark&Learn
好文齐分享。。。https://eli.thegreenplace.net/2011/01/23/how-debuggers-work-part-1https://eli.thegreenplace.net/2011/01/27/how-debuggers-work-part-2-breakpointshttps://eli.thegreenplace.net/2011/02/07/how...转载 2019-05-10 10:48:40 · 221 阅读 · 0 评论 -
How Mutex&Lock works? mark...
mutex is just an integer in memory. But how it works?https://mortoray.com/2019/02/20/how-does-a-mutex-work-what-does-it-cost/https://eli.thegreenplace.net/2018/basics-of-futexes/原创 2019-06-27 16:29:31 · 215 阅读 · 0 评论 -
How ELF file maped in virtual memory? mark
ELF 文件的 .text .data .bss 等各个段是如何map到内存中的?程序运行时是如何access各个段?check this link: https://gist.github.com/CMCDragonkai/10ab53654b2aa6ce55c11cfc5b2432a4...原创 2019-07-05 16:21:22 · 279 阅读 · 0 评论