firmware | humble hacker firmware
kandi X-RAY | firmware Summary
kandi X-RAY | firmware Summary
Please see the wiki for instructions.
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of firmware
firmware Key Features
firmware Examples and Code Snippets
Community Discussions
Trending Discussions on firmware
QUESTION
We have a uwp windows 10 store app and its licensed per device. we throw an error when that license is already applied on any device. user may uninstall the app and install it again on the same device and same license key works fine.
But for every few days i noticed the HWID(hardwareId ) generated by the following is not unique which fails license key when user uninstalls app and installs on the same device.
...ANSWER
Answered 2021-Jun-15 at 09:50The ASHWID provides a strong binding between the app/packag, which is not affected by OS re-installs and version updates for an app. But sometimes there are also other reasons can affect it, it is difficult to know which causes the change of the ASHWID.
Therefore, if you want to get the unique id to distinguish the device, maybe you could use SystemIdentification.GetSystemIdForPublisher method, the identifier returned by this method is specific to the app publisher on the current device. In other words, all apps by the same publisher will get the same value for this ID (for all users).
QUESTION
Note: I'm new to network and dpdk, so there might be some misunderstanding in fundamental concepts...
I want to run 2 instances of dpdk-testpmd
on the same host to send and receive traffic over separate NIC.
Configuration:
NIC:
- PMD: MLX5
- version: 5.0-1.0.0.0
- firmware-version: 16.26.1040 (MT_0000000011)
- NUMA-Socket: same
- PCIe: 0000:3b:00.0, 0000:3b:00.1
Update
- DPDK Version: 20.11.1
- Hugepage Total: 32768
- Hugepage Free: 32768
TESTPMD Logs:
...ANSWER
Answered 2021-Jun-13 at 05:04Note: I highly recommend reading about dpdk testpmd as it covered all your questions in detail. As per the StackOverflow guideline multiple sub-questions make answering difficult. Please use well-formatted and formed question for better reach and answers.
@Alexcured since you have mentioned you know how to run 2 separate instances of dpdk-testpmd
. I will only recommend heavily reading up on dpdk-testpmd URL which has answers to most of your questions too.
The assumption is made, both the PCIe NIC are working properly and interconnect between 2 are tested with either arping or ping (Kernel Driver). After binding both PCIe devices to DPDK supported drivers, one should use options for DPDK 20.11.1 such as
- use file-prefix option as unique names
- set socket-memory to fetch memory from the desired NUMA-SOCKET
- set socket-limit to prevent ballooning of huge page mmap
- use w|b option to whitelist|blacklist PCIe devices (0000:3b:00.0 and 0000:3b:00.1)
- Since it is separate physical devices ensure there physical cable connection between 2 PCIe ports.
[Q.1] How to set the MAC address of instance 2's port in instance 1?
QUESTION
I'm using FastAPI and I need to represent different STIX 2 objects (from MITRE ATT&CK) with a corresponding/equivalent Pydantic model in order to return them as a response JSON.
Let's consider the AttackPattern object.
...ANSWER
Answered 2021-Jun-11 at 08:46A possible and promising approach is to generate the Pydantic model starting from the corresponding JSON Schema of the STIX object.
Luckily enough the JSON schemas for all the STIX 2 objects have been defined by the OASIS Open organization on the GitHub repository CTI-STIX2-JSON-Schemas.
In particular, the JSON Schema for the Attack-Pattern is available here.
QUESTION
I am working on a CSV
data Sheet and want to parse and filter the data out it, While working on a code I found a similar code someone has asked on SO POST there and the author having almost the same H/W data as I see that related to HPE H/W where I have some data and columns are different.
ANSWER
Answered 2021-Jun-07 at 08:59I hope I got this correctly.
QUESTION
I've trying to work out why someone would write the following section of code in a Arduino loop. To me, it doesnt make sense, why have a return in a if statement? Does it just return to the start of the loop and not carry on with the rest of the loop. Here's the snippet of interest:
...ANSWER
Answered 2021-Jun-08 at 19:34After return ;
or just return;
(for void functions) the program exits from the loop and also from function. The function returns (for non-void functions). This statement applies when executing function already is not requeris.
QUESTION
I am going to write my own FORTH "engine" in GNU assembler (GAS) for Linux x86-64 (specifically for AMD Ryzen 9 3900X that is siting on my table).
(If it will be success, I may use similar idea for make firmware for retro 6502 and similar home-brewed computer)
I want to add some interesting debugging features, as saving comments with the compiled code in for of "NOP words" with attached strings, which would do nothing in runtime, but when disassembling/printing out already defined words it would print those comment too, so it would not loose all the headers ( a b -- c) and comments like ( here goes this particular little trick ) and I would be able try to define new words with documentation, and later print all definitions in some nice way and make new library from those, which I consider good. (And have switch to just ignore comments for "production release")
I had read too much of optimalization here and I am not able to understand all of that in few weeks, so I will put out microoptimalisation until it will suffer performance problems and then I will start with profiling.
But I want to start with at least decent architectural decisions.
What I understood yet:
- it would be nice, if the programs was run mainly from CPU cache, not from memory
- the cache is filled somehow "automagically", but having related data/code compact and as near as possible may help a lot
- I identified some areas, that would be good candidates for caching and some, that are not so good - I sorted it in order of importance:
- assembler code - the engine and basic words like "+" - used all the time (fixed size, .text section)
- both stacks - also used all the time (dynamic, I will probably use rsp for data stack and implement return stack independly - not sure yet, which will be "native" and which "emulated")
- forth bytecode - the defined and compiled words - used at runtime, when the speed matters (still growing size)
- variables, constants, strings, other memory allocations (used in runtime)
- names of words ("DUP", "DROP" - used only when defining new words in compilation phase)
- comments (used one daily or so)
As there is lot of "heaps" that grows up (well, there is not "free" used, so it may be also stack, or stack growing up) (and two stacks that grows down) I am unsure how to implement it, so the CPU cache will cover it somehow decently.
My idea is to use one "big heap" (and increse it with brk() when needed), and then allocate big chunks of alligned memory on it, implementing "smaller heaps" in each chunk and extend them to another big chunk when the old one is filled up.
I hope, that the cache would automagically get the most used blocks first keep it most of the time and the less used blocks would be mostly ignored by the cache (respective it would occupy only small parts and get read and kicked out all the time), but maybe I did not it correctly.
But maybe is there some better strategy for that?
...ANSWER
Answered 2021-Jun-04 at 23:53Your first stops for further reading should probably be:
- What Every Programmer Should Know About Memory? re: cache
- https://agner.org/optimize/ re: everything else about writing efficient asm.
- https://uops.info/ for a better version of Agner Fog's instruction tables.
- See also other links in https://stackoverflow.com/tags/x86/info
so I will put out microoptimalisation until it will suffer performance problems and then I will start with profiling.
Yes, probably good to start trying stuff so you have something to profile with HW performance counters, so you can correlate what you're reading about performance stuff with what actually happens. And so you get some ideas of possible details you hadn't thought of yet before you go too far into optimizing your overall design idea. You can learn a lot about asm micro-optimization by starting with something very small scale, like a single loop somewhere without any complicated branching.
Since modern CPUs use split L1i and L1d caches and first-level TLBs, it's not a good idea to place code and data next to each other. (Especially not read-write data; self-modifying code is handled by flushing the whole pipeline on any store too near any code that's in-flight anywhere in the pipeline.)
Related: Why do Compilers put data inside .text(code) section of the PE and ELF files and how does the CPU distinguish between data and code? - they don't, only obfuscated x86 programs do that. (ARM code does sometimes mix code/data because PC-relative loads have limited range on ARM.)
Yes, making sure all your data allocations are nearby should be good for TLB locality. Hardware normally uses a pseudo-LRU allocation/eviction algorithm which generally does a good job at keeping hot data in cache, and it's generally not worth trying to manually clflushopt
anything to help it. Software prefetch is also rarely useful, especially in linear traversal of arrays. It can sometimes be worth it if you know where you'll want to access quite a few instructions later, but the CPU couldn't predict that easily.
AMD's L3 cache may use adaptive replacement like Intel does, to try to keep more lines that get reused, not letting them get evicted as easily by lines that tend not to get reused. But Zen2's 512kiB L2 is relatively big by Forth standards; you probably won't have a significant amount of L2 cache misses. (And out-of-order exec can do a lot to hide L1 miss / L2 hit. And even hide some of the latency of an L3 hit.) Contemporary Intel CPUs typically use 256k L2 caches; if you're cache-blocking for generic modern x86, 128kiB is a good choice of block size to assume you can write and then loop over again while getting L2 hits.
The L1i and L1d caches (32k each), and even uop cache (up to 4096 uops, about 1 or 2 per instruction), on a modern x86 like Zen2 (https://en.wikichip.org/wiki/amd/microarchitectures/zen_2#Architecture) or Skylake, are pretty large compared to a Forth implementation; probably everything will hit in L1 cache most of the time, and certainly L2. Yes, code locality is generally good, but with more L2 cache than the whole memory of a typical 6502, you really don't have much to worry about :P
Of more concern for an interpreter is branch prediction, but fortunately Zen2 (and Intel since Haswell) have TAGE predictors that do well at learning patterns of indirect branches even with one "grand central dispatch" branch: Branch Prediction and the Performance of Interpreters - Don’t Trust Folklore
QUESTION
I have a dataframe where i have three columns:
- Modules
- FW_Version
- Óv_Name
Where Column module
has three distinct values and each values have its FW_Version
and ÒV_name`
I am looking forward to create a new column for these three distinct values and print the FW_Version
below that but but should be aligned against ÒV_name` as shown in expected output.
ANSWER
Answered 2021-Jun-04 at 09:41QUESTION
I have the following XML structure:
...ANSWER
Answered 2021-Jun-01 at 10:55Given a well-formed input such as:
XML
QUESTION
This is my first attempt at parsing nested JSON with Ruby. I need to go through the JSON to pull out specific values for "_id", "name", and "type" for instance. I then need to create a reference table so that I can refer to each "_id" and associated information. I also need to combine information from multiple JSON responses. I've been able to get basic information and have tried a few things I've found online. I just need a little assistance with a starting point. If anyone has any ideas of where to start with this I'd really appreciate it.
Devices JSON response hash. Each device starts with _id.
...ANSWER
Answered 2021-Jun-01 at 06:44You can start with a very rough navigator function like this:
QUESTION
I have an opensource project (https://github.com/WhiteFossa/yiff-l), where I use STM32F103 MCU.
In firmware I have a lot of sprintf's with float parameters, for example:
...ANSWER
Answered 2021-May-31 at 13:42Only thing I can think of while seeing this code is that the value of power is huge:
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install firmware
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page