Graphical Debugger of GPIO Pins

Total Page:16

File Type:pdf, Size:1020Kb

Graphical Debugger of GPIO Pins Masaryk University Faculty of Informatics Graphical Debugger of GPIO Pins Bachelor’s Thesis Miloslav Žežulka Brno, Spring 2018 This is where a copy of the official signed thesis assignment and a copy ofthe Statement of an Author is located in the printed version of the document. Declaration Hereby I declare that this paper is my original authorial work, which I have worked out on my own. All sources, references, and literature used or excerpted during elaboration of this work are properly cited and listed in complete reference to the due source. Miloslav Žežulka Advisor: Mgr. Marek Grác, Ph.D. i Acknowledgements I would like to thank my advisor Mgr. Marek Grác, Ph.D. for his valuable feedback and comments regarding the thesis. I would also like to thank my technical advisor Ing. Pavel Macík who guided me throughout the whole work. iii Abstract The main aim of this thesis is to implement a graphical debugger for single-board computers (SBC) using a library called Bulldog. The first section of this work describes hardware interfaces typically present on SBCs with the emphasis on Raspberry Pi. The main part of the thesis is dedicated to the debugger itself, including a graphical demonstra- tion of its functionality. The result is a graphical debugger capable of communicating with devices from the Raspberry Pi family. During the implementation of the debugger, we also discover that the library itself required some major modifications. The application is based on the client-server model. Given the underlying library picked for the debugger, the application is written in Java and is publicly released via GitHub as an open source project. iv Keywords single-board computer, Bulldog, GPIO, I2C, SPI, Raspberry Pi, BCM2835, Java, JNI v Contents 1 Introduction 1 2 State of the art 3 2.1 RPi.GPIO ...........................3 2.2 BCM2835 ...........................3 2.3 GPIO utility from WiringPi .................3 2.4 i2cdetect, i2cget, i2cset ....................4 3 Bulldog Library 5 3.1 JNI ...............................6 4 Functions of GPIO Pins 9 4.1 Digital I/O ..........................9 4.1.1 Analog vs. digital signal . .9 4.1.2 Accessing GPIO pins . 10 4.1.3 Interrupts . 16 4.2 I2C ............................... 16 4.2.1 Protocol definition . 17 4.2.2 I2C data transmission - semantics . 17 4.3 SPI .............................. 19 4.3.1 SPI data transmission . 21 4.4 Other interfaces ........................ 23 4.4.1 PWM . 23 4.4.2 UART . 23 4.4.3 PCM . 24 5 Raspberry Pi 25 5.1 Raspberry Pi as a single board computer ........... 25 5.2 Uses .............................. 25 5.3 Raspbian ........................... 25 5.4 Accessing peripherals ..................... 26 6 Debugger 29 6.1 Use cases of the debugger ................... 30 6.2 Protocol ............................ 31 6.2.1 Details of the protocol implementation . 31 vii 6.2.2 Agent . 32 6.2.3 Client . 33 6.3 Libraries and frameworks used ................ 33 6.4 Networking .......................... 34 6.4.1 Java NIO . 34 6.5 Usage ............................. 36 6.5.1 Initial state of the debugger . 36 6.5.2 Connecting to a device . 38 6.5.3 Disconnecting from a device . 40 6.5.4 Digital I/O request . 40 6.5.5 Interrupts . 42 6.5.6 I2C request . 43 6.5.7 SPI request . 44 6.5.8 Agent . 45 6.5.9 Testing mode . 46 7 Conclusion 47 7.1 Possible improvements .................... 47 7.1.1 Bulldog . 47 7.1.2 Debugger . 48 7.1.3 Testing . 49 A JNI 55 B Sequence diagram of the debugger 59 C Archive 61 viii List of Figures 2.1 Output of gpio readall 4 3.1 JNI Architecture 7 4.1 Signal sampling 10 4.2 Sysfs tree 11 4.3 GPIO pin sysfs structure 12 4.4 I2C timing diagram 17 4.5 I2C protocol diagram 18 4.6 Regular SPI connection 20 4.7 Daisy-chained SPI bus 21 4.8 Schema of SPI data transmission 22 5.1 raspi-config tool 26 5.2 Binary data in procfs 27 6.1 Use case diagram 30 6.2 Blocking and nonblocking I/O 35 6.3 Debugger initial state 36 6.4 The client connected to Raspberry Pi 38 6.5 netstat command 39 6.6 Digital I/O usage 40 6.7 Interrupts in debugger 42 6.8 Prefilled I2C request form 43 6.9 I2C request form 44 6.10 SPI request form 45 6.11 Agent logger output 46 ix 1 Introduction Single-board computer (SBC) is a fully functional computer embedded on a single board. In comparison with a personal computer, SBC is a computer with all the necessary components (microprocessor, mem- ory, I/O) already present on the board. Furthermore, SBCs usually do not rely on expansion slots for peripheral functions or expansion [33]. By integrating all the components on one board, a smaller overall system can be obtained compared to a conventional PC. This also brings us to one of the most distinguishing characteristics of such com- puters. SBC is usually a very specialized piece of hardware designed and optimized for its one and only purpose. In the past few years, however, SBCs designed for general purpose are becoming increasingly popular1. In the context of this thesis, we will exclusively focus on this SBC type. General purpose SBCs are used as educational tools, development systems, demonstrations and in many other ways. When developing software or hardware for such devices, it is beneficial to have a debug- ging tool which is capable of reading or writing various information from the board, in the most convenient way possible. We will refer to such tool as a graphical debugger. This graphical debugger should be user-friendly2 since it is possible that users might come into contact with an SBC device for their first time. More specifically, the graphical debugger presented in this thesis represents a tool which is capable of providing the user with com- plex information about various hardware components and interfaces present on SBC. It is possible to read and write values on GPIO pins and listen for interrupts on them. Other interfaces available for de- bugging should be at least I2C and SPI3. In general, the debugger retrieves information using general purpose input/output interface, GPIO. This information is then graphically presented to the user. 1. An exhaustive list of such devices can be found in [9] 2. By user-friendly we especially mean the ability to use the debugger without long preparation beforehand. In the ideal implementation, the debugger should be able to run straight out of the box. 3. Both of these interfaces are described in more detail in the chapter "Functions of GPIO Pins". 1 1. Introduction The goal of my thesis was to implement such debugger using the Bulldog library [7]. This library was not fully functional. One of my other goals was also to look into Bulldog and improve it. The Bulldog library specializes in SBCs which use ARM processors (ARM SBC, ASBC). At the time of writing this thesis, Bulldog can communicate with Raspberry Pi, CubieBoard, and BeagleBoneBlack. Debugger implementation mainly focuses on Raspberry Pi with the potential for extending it for the other two SBCs supported by Bulldog. The debugger consists of two modules: client with graphical user interface and agent. The client is run on the machine from which the device is controlled and monitored over the network. The agent is deployed on the target device. The client can connect to multiple devices at once, whereas the agent is designed for communicating with one client only. The implementation language is Java because this is the primary language used in Bulldog. The resulting outcome of this project is a pair of JAR archives together with a manual describing how to deploy and use the application. This manual is one of the parts of this thesis. 2 2 State of the art Despite Raspberry Pi being powerful enough to run graphical appli- cations, most of the tools used for debugging are only available via a command-line interface. One of the reasons is compatibility with older Raspberry Pi releases which do not have powerful enough hard- ware to run graphics-based software. List of the most commonly used tools follows. 2.1 RPi.GPIO Python library for controlling digital I/O features of pins. What is more, RPi.GPIO [32] can also be used for writing scripts which test other functions available on pins1. However, this library only provides limited functionality when compared to others on this list. 2.2 BCM2835 Named after the chip Raspberry Pi has got embedded in its processor, this library written in C directly accesses chip registers. This makes BCM2835 [8] very powerful2. The BCM2835 library is recommended for more advanced users as it assumes deeper understanding of the interfaces. 2.3 GPIO utility from WiringPi WiringPi [18] is a pin-based GPIO access library written in C for the BCM2835 chip used in Raspberry Pi3. Apart from the library itself, WiringPi also provides a separate program which in textual form displays information about all avail- 1. Pin capabilities are determined by general purpose input output (GPIO) which itself is discussed in the chapter "Functions of GPIO Pins". 2. Other tools access GPIO functionality indirectly via sysfs which is in detail discussed in the section "Sysfs" of the chapter "Functions of GPIO Pins". 3. Since the initial release of this library in May 2013, it has been extended to also work on newer chips and supports alternative pin functions. 3 2. State of the art able pins. This is very useful when searching for various types of pin addresses (as shown in the illustration below).
Recommended publications
  • Multiplatformní Knihovna Pro Interakci S Grafickým Uživatelským Prostředím
    Masarykova univerzita Fakulta}w¡¢£¤¥¦§¨ informatiky !"#$%&'()+,-./012345<yA| Multiplatformní knihovna pro interakci s grafickým uživatelským prostředím Bakalářská práce Jaromír Kala Brno, 2014 Prohlášení Prohlašuji, že tato bakalářská práce je mým původním autorským dílem, které jsem vypracoval samostatně. Všechny zdroje, prameny a literaturu, které jsem při vypracování používal nebo z nich čerpal, v práci řádně cituji s uvedením úplného odkazu na příslušný zdroj. Jaromír Kala Vedoucí práce: RNDr. Pavel Troubil ii Poděkování Rád bych poděkoval RNDr. Pavlu Troubilovi za cenné rady, věcné připomínky a ochotu při konzultacích a vypracování bakalářské práce. iii Shrnutí Cílem bakalářské práce bylo vytvořit multiplatformní knihovnu pro manipulaci s grafickým uživatelským rozhraním. Vzniklá knihovna WDDMan podporuje detekci připojených monitorů a jejich rozlišení, zjištění otevřených oken a manipulaci s nimi (zavření, změny velikostí a přesuny) a detekci virtuálních ploch. Knihovna WDDMan funguje na operačních systémech skupiny Windows, Linux a Mac OS. Kni- hovna s podobnou funkcionalitou doposud nebyla k dispozici a bude použita v middleware CoUniverse pro manipulaci s objekty videokon- ferenčních nástrojů. Prostředí CoUniverse se využije pro vzdálené tlu- močení přednášek pro Středisko pro pomoc studentům se specifickými nároky Masarykovy univerzity. Knihovna WDDMan bude zveřejněna pod otevřenou licencí k volnému užití. Součástí knihovny je i anglická dokumentace a ukázkový a testovací příklad. iv Klíčová slova CoUniverse, Windows API, XLib, JNA, AppleScript, GUI v Obsah 1 Úvod ...............................2 2 Popis použitých technologií .................4 2.1 Java Native Access .....................4 2.1.1 Popis knihovny Java Native Access . .4 2.1.2 Použití JNA v knihovně WDDMan . .7 2.2 Windows API ........................8 2.3 X Window System a Xlib .................9 2.4 AppleScript ........................
    [Show full text]
  • Unravel Data Systems Version 4.5
    UNRAVEL DATA SYSTEMS VERSION 4.5 Component name Component version name License names jQuery 1.8.2 MIT License Apache Tomcat 5.5.23 Apache License 2.0 Tachyon Project POM 0.8.2 Apache License 2.0 Apache Directory LDAP API Model 1.0.0-M20 Apache License 2.0 apache/incubator-heron 0.16.5.1 Apache License 2.0 Maven Plugin API 3.0.4 Apache License 2.0 ApacheDS Authentication Interceptor 2.0.0-M15 Apache License 2.0 Apache Directory LDAP API Extras ACI 1.0.0-M20 Apache License 2.0 Apache HttpComponents Core 4.3.3 Apache License 2.0 Spark Project Tags 2.0.0-preview Apache License 2.0 Curator Testing 3.3.0 Apache License 2.0 Apache HttpComponents Core 4.4.5 Apache License 2.0 Apache Commons Daemon 1.0.15 Apache License 2.0 classworlds 2.4 Apache License 2.0 abego TreeLayout Core 1.0.1 BSD 3-clause "New" or "Revised" License jackson-core 2.8.6 Apache License 2.0 Lucene Join 6.6.1 Apache License 2.0 Apache Commons CLI 1.3-cloudera-pre-r1439998 Apache License 2.0 hive-apache 0.5 Apache License 2.0 scala-parser-combinators 1.0.4 BSD 3-clause "New" or "Revised" License com.springsource.javax.xml.bind 2.1.7 Common Development and Distribution License 1.0 SnakeYAML 1.15 Apache License 2.0 JUnit 4.12 Common Public License 1.0 ApacheDS Protocol Kerberos 2.0.0-M12 Apache License 2.0 Apache Groovy 2.4.6 Apache License 2.0 JGraphT - Core 1.2.0 (GNU Lesser General Public License v2.1 or later AND Eclipse Public License 1.0) chill-java 0.5.0 Apache License 2.0 Apache Commons Logging 1.2 Apache License 2.0 OpenCensus 0.12.3 Apache License 2.0 ApacheDS Protocol
    [Show full text]
  • T U M a Digital Wallet Implementation for Anonymous Cash
    Technische Universität München Department of Informatics Bachelor’s Thesis in Information Systems A Digital Wallet Implementation for Anonymous Cash Oliver R. Broome Technische Universität München Department of Informatics Bachelor’s Thesis in Information Systems A Digital Wallet Implementation for Anonymous Cash Implementierung eines digitalen Wallets for anonyme Währungen Author Oliver R. Broome Supervisor Prof. Dr.-Ing. Georg Carle Advisor Sree Harsha Totakura, M. Sc. Date October 15, 2015 Informatik VIII Chair for Network Architectures and Services I conrm that this thesis is my own work and I have documented all sources and material used. Garching b. München, October 15, 2015 Signature Abstract GNU Taler is a novel approach to digital payments with which payments are performed with cryptographically generated representations of actual currencies. The main goal of GNU Taler is to allow taxable anonymous payments to non-anonymous merchants. This thesis documents the implementation of the Android version of the GNU Taler wallet, which allows users to create new Taler-based funds and perform payments with them. Zusammenfassung GNU Taler ist ein neuartiger Ansatz für digitales Bezahlen, bei dem Zahlungen mit kryptographischen Repräsentationen von echten Währungen getätigt werden. Das Hauptziel von GNU Taler ist es, versteuerbare, anonyme Zahlungen an nicht-anonyme Händler zu ermöglichen. Diese Arbeit dokumentiert die Implementation der Android-Version des Taler-Portemonnaies, der es Benutzern erlaubt, neues Taler-Guthaben zu erzeugen und mit ihnen Zahlungen zu tätigen. I Contents 1 Introduction 1 1.1 GNU Taler . .2 1.2 Goals of the thesis . .2 1.3 Outline . .3 2 Implementation prerequisites 5 2.1 Native libraries . .5 2.1.1 Libgcrypt .
    [Show full text]
  • Developers Guide
    jjPPrroodduuccttiivviittyy LLLLCC Protection User Guide Developers Guide Licensing Toolkit Protect your investments Protect your with Protection! http://www.jproductivity.com v 5 . 2 ! tm Revision 397 - 1/7/20 Notice of Copyright Published by jProductivity, LLC Copyright ©2003-2019 All rights reserved. Registered Trademarks and Proprietary Names Product names mentioned in this document may be trademarks or registered trademarks of jProductivity, LLC or other hardware, software, or service providers and are used herein for identification purposes only. Applicability This document applies to Protection! v5.2 software. 2 Protection! Developers Guide v5.2 Copyright © 2003-2019 jProductivity L.L.C. http://www. jproductivity.com Contents Contents ....................................................................................................................... 3 1. Protection! Licensing Toolkit Concepts ........................................................................... 6 1.1 Key Concepts ................................................................................................. 6 1.1.1 License File .............................................................................................. 6 1.1.2 Protection! Control Center ......................................................................... 6 1.1.3 Secret Storage ......................................................................................... 6 1.2 Protection! Process .........................................................................................
    [Show full text]
  • Third Party Version
    Third Party Name Third Party Version Manufacturer License Type Comments Merge Product Merge Product Versions License details Software source autofac 3.5.2 Autofac Contributors MIT Merge Cardio 10.2 SOUP repository https://www.nuget.org/packages/Autofac/3.5 .2 Gibraltar Loupe Agent 2.5.2.815 eSymmetrix Gibraltor EULA Gibraltar Merge Cardio 10.2 SOUP repository https://my.gibraltarsoftware.com/Support/Gi Loupe Agent braltar_2_5_2_815_Download will be used within the Cardio Application to view events and metrics so you can resolve support issues quickly and easily. Modernizr 2.8.3 Modernizr MIT Merge Cadio 6.0 http://modernizr.com/license/ http://modernizr.com/download/ drools 2.1 Red Hat Apache License 2.0 it is a very old Merge PACS 7.0 http://www.apache.org/licenses/LICENSE- http://mvnrepository.com/artifact/drools/dro version of 2.0 ols-spring/2.1 drools. Current version is 6.2 and license type is changed too drools 6.3 Red Hat Apache License 2.0 Merge PACS 7.1 http://www.apache.org/licenses/LICENSE- https://github.com/droolsjbpm/drools/releases/ta 2.0 g/6.3.0.Final HornetQ 2.2.13 v2.2..13 JBOSS Apache License 2.0 part of JBOSS Merge PACS 7.0 http://www.apache.org/licenses/LICENSE- http://mvnrepository.com/artifact/org.hornet 2.0 q/hornetq-core/2.2.13.Final jcalendar 1.0 toedter.com LGPL v2.1 MergePacs Merge PACS 7.0 GNU LESSER GENERAL PUBLIC http://toedter.com/jcalendar/ server uses LICENSE Version 2. v1, and viewer uses v1.3.
    [Show full text]
  • Ce0825a - Object Oriented Programming II 8: Memory, Java Native Access, Animation
    CE0825a - Object Oriented Programming II 8: Memory, Java Native Access, Animation CE0825a - Object Oriented Programming II 8: Memory, Java Native Access, Animation James A Sutherland Abertay University Monday, 29th February 2016 CE0825a - Object Oriented Programming II 8: Memory, Java Native Access, Animation Memory Basics Generally, it’s just a single bunch of bytes, numbered from 0 upwards. (DEC Alpha is different!) Operating systems group them into pages, usually 4k. CE0825a - Object Oriented Programming II 8: Memory, Java Native Access, Animation Memory Basics Generally, it’s just a single bunch of bytes, numbered from 0 upwards. (DEC Alpha is different!) Operating systems group them into pages, usually 4k. CE0825a - Object Oriented Programming II 8: Memory, Java Native Access, Animation Memory Basics Generally, it’s just a single bunch of bytes, numbered from 0 upwards. (DEC Alpha is different!) Operating systems group them into pages, usually 4k. CE0825a - Object Oriented Programming II 8: Memory, Java Native Access, Animation Stacks and Heaps Usually, there is a stack – short term storage, arguments. Often where buffer overflows target: see Return Oriented Programming later on. Also a heap, for longer term allocations. Good news: Java takes care of all this for us! CE0825a - Object Oriented Programming II 8: Memory, Java Native Access, Animation Stacks and Heaps Usually, there is a stack – short term storage, arguments. Often where buffer overflows target: see Return Oriented Programming later on. Also a heap, for longer term allocations. Good news: Java takes care of all this for us! CE0825a - Object Oriented Programming II 8: Memory, Java Native Access, Animation Stacks and Heaps Usually, there is a stack – short term storage, arguments.
    [Show full text]
  • MD COADS 2011 2 01.Pdf
    UNIVERSIDADE TECNOLÓGICA FEDERAL DO PARANÁ – UTFPR CURSO SUPERIOR DE TECNOLOGIA EM ANÁLISE E DESENVOLVIMENTO DE SISTEMAS ANDRÉ RICARDO GNHOATO USO DA BIBLIOTECA DPLOT JR COM JAVA E UM COMPARATIVO ENTRE DUAS INTERFACES DE ACESSO: JAVA NATIVE INTERFACE E JAVA NATIVE ACCESS MEDIANEIRA 2011 ANDRE RICARDO GNHOATO USO DA BIBLIOTECA DPLOT JR COM JAVA E UM COMPARATIVO ENTRE DUAS INTERFACES DE ACESSO: JAVA NATIVE INTERFACE E JAVA NATIVE ACCESS Pré-Projeto apresentado à disciplina de Trabalho de Diplomação, do Curso Superior de Tecnologia em Análise e Desenvolvimento de Sistemas – COADS – da Universidade Tecnológica Federal do Paraná – UTFPR, como requisito parcial para obtenção do título de Tecnólogo. Orientador: Prof. Paulo Lopes de Menezes, MSc. MEDIANEIRA 2011 Ministério da Educação Universidade Tecnológica Federal do Paraná Diretoria de Graduação e Educação Profissional Curso Superior de Tecnologia em Análise e Desenvolvimento de Sistemas TERMO DE APROVAÇÃO USO DA BIBLIOTECA DPLOT JR COM JAVA E UM COMPARATIVO ENTRE DUAS INTERFACES DE ACESSO: JAVA NATIVE INTERFACE E JAVA NATIVE ACCESS Por André Ricardo Gnhoato Este Trabalho de Diplomação (TD) foi apresentado às 08:20 h do dia 29 de Novembro de 2011 como requisito parcial para a obtenção do título de Tecnólogo no Curso Superior de Tecnologia em Análise e Desenvolvimento de Sistemas, da Universidade Tecnológica Federal do Paraná, Campus Medianeira. O candidato foi arguido pela Banca Examinadora composta pelos professores abaixo assinados. Após deliberação, a Banca Examinadora considerou o trabalho aprovado. Prof. MSc. Paulo Lopes de Menezes Prof. Nelson Miguel Betzek UTFPR – Campus Medianeira UTFPR – Campus Medianeira (Orientador) (Convidado) Prof. M.Eng Juliano R Lamb Prof.
    [Show full text]
  • Real-Time Resource Monitoring for Poly/ML Processes
    IT 13 015 Examensarbete 15 hp Mars 2013 Real-Time Resource Monitoring for Poly/ML Processes Magnus Stenqvist Institutionen för informationsteknologi Department of Information Technology Abstract Real-Time Resource Monitoring for Poly/ML Processes Magnus Stenqvist Teknisk- naturvetenskaplig fakultet UTH-enheten Poly/ML, a run time system of the Standard ML language, has with its latest version 5.5 included a statistics feature which provides information about the running system and Besöksadress: ML programs running in that system. This feature provides information about the Ångströmlaboratoriet Lägerhyddsvägen 1 program threads running in the system, memory usages, garbage collection Hus 4, Plan 0 information and user defined data. The problem is that the statistics information is only accessible through the use of the language C. No way exist today that reads and Postadress: displays this data automatically. It would be very convenient for developers, to have Box 536 751 21 Uppsala an easy access to this statistic data, to better evaluate their ML programs running in the Poly/ML system. This report presents a Java application that collects the statistics Telefon: data of Poly/ML and displays it in a graphical environment easy to observe by the user. 018 – 471 30 03 This application will help developers develop programs with Poly/ML, by letting them Telefax: observe how their programs affect the Poly/ML run time system. 018 – 471 30 00 Hemsida: http://www.teknat.uu.se/student Handledare: Tjark Weber Ämnesgranskare: Justin Pearson Examinator: Olle Gällmo IT 13 015 Tryckt av: Reprocentralen ITC Contents 1 Introduction 2 1.1 Background . 2 1.2 Monitor programs .
    [Show full text]
  • Towards a Dynamic Object Model Within Unix Processes
    Published at Onward! 2015. Towards a Dynamic Object Model within Unix Processes Stephen Kell Computer Laboratory, University of Cambridge Cambridge, United Kingdom fi[email protected] Abstract Historically, the earliest Lisp and Smalltalk virtual ma- Programmers face much complexity from the co-existence chines (VMs) were conceived to eventually supplant Unix- of “native” (Unix-like) and virtual machine (VM) “man- like operating systems. For good or ill, this hasn’t happened: aged” run-time environments. Rather than having VMs re- their descendents today (including Java VMs) nearly al- place Unix processes, we investigate whether it makes sense ways occur within a Unix-like process. Although VMs’ in- for the latter to “become VMs”, by evolving Unix’s user- ternal uniformity can simplify many tasks, interoperating level services to subsume those of VMs. We survey the (little- with the wider world (including other VMs) remains an in- understood) VM-like features in modern Unix, noting com- evitable necessity—yet is a second-class concern to VM mon shortcomings: a lack of semantic metadata (“type in- implementers. The apparent abstraction gap between VMs formation”) and the inability to bind from objects “back” and the Unix “common denominator” leaves a wealth of to their metadata. We describe the design and implementa- programming tasks addressable only by manual or ad-hoc tion of a system, liballocs, which adds these capabilities in means: sharing code via brittle foreign function interfacing, a highly compatible way, and explore its consequences. sharing data (whether in memory or persistently) by manual translation between formats, and making do with a hodge- Categories and Subject Descriptors D.3.4 [Programming podge of per-silo tools for debugging, profiling and the like.
    [Show full text]
  • Karol Wrótniak @Droidsonroids @GDG Wrocław
    Karol Wrótniak @DroidsOnRoids @GDG Wrocław [email protected] koral-- karol-wrotniak JNI @karol.wrotniak Overview • Java Native Interface • Native: • Platform-specific shared library (.dll, .so, .dylib) • Non-hybrid mobile app, React Native • C, C++ • Call native functions from Java and vice versa • Other JVM languages supported • JNI ≠ JNA Foo.java: static { System.loadLibrary("foo"); } public native int getTextLength(String text); Foo.java: static { System.loadLibrary("foo"); } public native int getTextLength(String text); Foo.java: static { System.loadLibrary("foo"); } public native int getTextLength(String text); foo.c: #include <jni.h> JNIEXPORT jint JNICALL Java_pl_droidsonroids_ndkdemo_Foo_getTextLength( JNIEnv *env, jobject thiz, jstring text ) { return (*env)->GetStringUTFLength(env, text); } Foo.java: static { System.loadLibrary("foo"); } public native int getTextLength(String text); foo.c: #include <jni.h> JNIEXPORT jint JNICALL Java_pl_droidsonroids_ndkdemo_Foo_getTextLength( JNIEnv *env, jobject thiz, jstring text ) { return (*env)->GetStringUTFLength(env, text); } Foo.java: static { System.loadLibrary("foo"); } public native int getTextLength(String text); foo.c: #include <jni.h> JNIEXPORT jint JNICALL Java_pl_droidsonroids_ndkdemo_Foo_getTextLength( JNIEnv *env, jobject thiz, jstring text ) { return (*env)->GetStringUTFLength(env, text); } Foo.java: static { System.loadLibrary("foo"); } public native int getTextLength(String text); foo.c: #include <jni.h> JNIEXPORT jint JNICALL Java_pl_droidsonroids_ndkdemo_Foo_getTextLength(
    [Show full text]
  • Open Source Software Packages
    Hitachi Ops Center V. 10.3.0 Open Source Software Packages Contact Information: Hitachi Ops Center Project Manager Hitachi Vantara LLC 2535 Augustine Drive Santa Clara, California 95054 Name of Product/Product Version License Component aesh 2.4 Apache License, Version 2.0 aesh Extensions 1.8 Apache License, Version 2.0 aesh Readline 2.0 Apache License, Version 2.0 aesh Terminal API 2.0 Apache License, Version 2.0 "Java Concurrency in Practice" 1.0-redhat- Creative Commons Attribution 2.5 Generic book annotations 4 @angular-builders/custom- 8.0.0-RC.0 The MIT License webpack @angular-devkit/build-angular 0.800.0-rc.2 The MIT License @angular-devkit/build-angular 0.803.25 The MIT License @angular-devkit/core 7.3.8 The MIT License @angular-devkit/schematics 7.3.8 The MIT License @angular/animations 7.2.15 The MIT License @angular/animations 8.2.14 The MIT License Name of Product/Product Version License Component @angular/cdk 7.3.7 The MIT License @angular/cli 8.0.0 The MIT License @angular/cli 8.3.25 The MIT License @angular/common 7.2.15 The MIT License @angular/common 8.2.14 The MIT License @angular/compiler 7.2.15 The MIT License @angular/compiler 8.2.14 The MIT License @angular/compiler-cli 8.2.14 The MIT License @angular/core 7.2.15 The MIT License @angular/forms 7.2.13 The MIT License @angular/forms 7.2.15 The MIT License @angular/forms 8.2.14 The MIT License @angular/forms 8.2.7 The MIT License @angular/language-service 8.2.14 The MIT License @angular/platform-browser 7.2.15 The MIT License Name of Product/Product Version License
    [Show full text]
  • Bridging the Gap Between Haskell and Java
    Bridging the Gap between Haskell and Java Julian Fleischer June 27, 2013 Abstract This thesis investigates the possibility of translating interfaces between Haskell and Java libraries. Furthermore a library and a tool are developed for invoking the virtual machine from within Haskell processes and for the automatic trans- lation of Java APIs into Haskell. In dieser Arbeit wird die M¨oglichkeit einer Ubersetzung¨ von Schnittstellen zwis- chen Haskell und Java Bibliotheken untersucht. Außerdem werden eine Bib- liothek und ein Werkzeug entwickelt um die virtuelle Maschine aus Haskell Prozessen heraus zu nutzen und um automatische Ubersetzungen¨ von Java APIs nach Haskell durchzuf¨uhren.vorgesetellt Selbstst¨andigkeitserkl¨arung Hiermit best¨atigeich, dass ich die vorliegende Ausarbeitung mit dem Titel: \Bridging the Gap between Haskell and Java" selbstst¨andigund ohne unerlaubte Hilfe angefer- tigt habe. Ich versichere, dass ich ausschließlich die angegebenen Quellen in Anspruch genommen habe. Zitate sind als solche gekennzeichnet, durch Anf¨uhrungszeichen und Fußnoten. ||||||||||| Julian Fleischer Contents 1 Introduction and Motivation5 1.1 Scope of this Thesis............................5 1.2 Organization of this Document......................5 2 Similarities and Differences between Haskell & Java7 2.1 A Brief Overview of the Haskell Programming Language........7 2.2 A Brief Overview of the Java Programming Language.........7 2.3 Syntax and Semantics...........................8 2.3.1 (Restricted) Polymorphism....................8 2.3.2 Higher-kinded Polymorphism...................9 2.3.3 Order, State, and Side Effects................... 10 2.3.4 Excecution Model......................... 10 2.4 The Awkward Squad............................ 12 2.4.1 Exceptions............................. 12 2.4.2 The Java Virtual Machine..................... 13 2.4.3 Haskell Implementations.....................
    [Show full text]