- 博客(0)
- 资源 (13)
- 收藏
- 关注
PLX PCI卡 linux驱动
PCI8系列 PCI9系列 PCI9054 linux驱动程序
PLX SDK Samples
================================================================
ABOUT
This document provides a brief description of the samples included
in the PLX SDK. Please refer to the source code in each sample &
the PLX SDK User's Manual for additional details.
The PLX samples are intended to demonstrate use of the PLX API. The
samples are not intended for debug or real world applications, although
they can be extended to complex applications. They should be treated
as a reference for writing custom software that utilizes the PLX API.
Not all samples work with all PLX devices. The PLX API supports numerous
PLX chip families in PCI/PCIe, including 6000-series PCI-to-PCI bridges,
9000-series PCI-to-Local bus bridges, & 8000-series PCI/PCIe bridges &
switches. Some samples are provided only for specific chip families.
SAMPLES
- ApiTest
Simple application that calls various PLX APIs for a selected device
& verifies return codes & parameters. The API calls made depend upon
the type of device selected.
- DSlave
Demonstrates how to read/write from a PLX 9000 PCI BAR space using the
PLX API/driver to perform the data transer. This operation is often
referred to as "Direct Slave".
- DSlave_BypassApi
Similar to the 'DSlave' sample, except this sample uses the PLX API only
to map a PCI BAR space directly to the application's virtual space. The
application can then directly access the space via simple memory dereferencing,
bypassing the PLX API/driver & resulting in greater performance, especially
for small transfers. The application is responsible for initializing the
BAR space, such as setup of translation/remap registers.
- LocalToPciInt [9000-series & 8311]
Demonstrates how to wait for a generic Local-to-PCI interrupt using the
PLX Notification API.
- NT_DmaTest [8000-series switches with DMA & NT support]
Demonstrates using the DMA engine in a PLX 8000 switch to transfer data through
a PLX
2018-01-26
检查堆内存 踩内存,内存重复释放 内存泄露的小程序
功能说明:
检查堆内存的问题,定位到文件,行数
1. 踩内存
2. 内存重复释放
3. 内存泄露
使用方法用 dbg_malloc, dbg_free 替换原程序中的malloc, free.
适当的时候调用dbg_memory_check 以检查内存泄露。
原理:
在申请的内存前后添加 隔离带,并做记录。在free, dbg_memory_check中检查踩内存。在free中检查重复释放。
假设要申请的为 size ,则实际申请的为 size + gap_size (前后隔离带的大小)
GAP_BEGIN | size | GAP_END
PS:
此文件可酌情修改,以适应不同的设备,平台等。
多线程情况下,请对dbg_malloc_ dbg_free_ dbg_memory_check 加锁
2015-04-28
brew shell层模拟,Applet机制模拟
有助于理解brew 运行机制,shell层原理。主要实现了如下方面:
1 模拟brew ui_task
2 applet机制模拟,实现app启动,终止,挂起,恢复
3 applet交互模拟,实现app间同步消息,异步消息
4 实现回调
Vc 6.0上编译运行。
2012-04-03
空空如也
TA创建的收藏夹 TA关注的收藏夹
TA关注的人