1. 程式人生 > >嵌入式linux usb wifi驅動移植

嵌入式linux usb wifi驅動移植

wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
wpa_driver_wext_set_drop_unencrypted
wpa_driver_wext_set_psk
wlan0: Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP fail=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portControl=Auto
EAPOL: Supplicant port status: Unauthorized
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
wlan0: Event 5 received on interface wlan0
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
wlan0: Event 5 received on interface wlan0
Wireless event: cmd=0x8b04 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
wlan0: Event 5 received on interface wlan0
Wireless event: cmd=0x8b1a len=15
link to Ralink AP
issue_deauth to ec:6c:9f:04:05:6c
OnAuthClient
network.SupportedRates[0]=82
network.SupportedRates[1]=84
network.SupportedRates[2]=8B
network.SupportedRates[3]=96
network.SupportedRates[4]=12
network.SupportedRates[5]=24
network.SupportedRates[6]=48
network.SupportedRates[7]=6C
network.SupportedRates[8]=0C
network.SupportedRates[9]=18
network.SupportedRates[10]=30
network.SupportedRates[11]=60
bssrate_len = 12
OnAssocRsp
report_join_res(2)
rtw_joinbss_update_network
+rtw_update_ht_cap()
rtw_joinbss_update_stainfo
HW_VAR_BASIC_RATE: BrateCfg(0x15d)
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IWMM(0): 0, a42b
FLA_IFNAME: Interface 'wlan0' added
wlan0: Event 5 received on WMM(1): 0, a44f
WMM(2): 0, 5e4322
WMM(3): 0, 2f3222
[HW_VAR_ACM_CTRL] Write 0x0
HTOnAssocRsp
interface wlan0
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: ec:6c:9f:04:05:6c
wlan0: Event 0 received on interface wlan0
wlan0: State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
wlan0: Associated to a new BSS: BSSID=ec:6c:9f:04:05:6c
Add randomness: count=11 entropy=10
wlan0: No keys have been configured - skip key clearing
wlan0: Associated with ec:6c:9f:04:05:6c
wlan0: WPA: Association event - clear replay counter
wlan0: WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
wlan0: Setting authentication timeout: 10 sec 0 usec
wlan0: Cancelling scan request
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
wlan0: Event 5 received on interface wlupdate raid entry, mask=0xfffff, arg=0x80
an0
rtl8192c_set_FwJoinBssReport_cmd mstatus(1)
SetFwRsvdPagePkt
Set RSVD page location to Fw.
=>mlmeext_joinbss_event_callback
wlan0: RX EAPOL from ec:6c:9f:04:05:6c
RX EAPOL - hexdump(len=99): 01 03 00 5f 02 00 8a 00 10 00 00 0OnAction_back
OnAction_back, action=0
issue_action_BA, category=3, action=1, status=0
0 00 00 00 00 01 47 55 75 73 1d bf 9d 29 4e ea 6d fd d8 c2 8c 19 f5 e4 0d f3 23 fc 9c 4e e0 bb 53 3f 82 c9 18 82 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
wlan0: Setting authentication timeout: 10 sec 0 usec
wlan0: IEEE 802.1X RX: version=1 type=3 length=95
wlan0:   EAPOL-Key type=2
wlan0:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
wlan0:   key_length=16 key_data_length=0
  replay_counter - hexdump(len=
: 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): 47 55 75 73 1d bf 9d 29 4e ea 6d fd d8 c2 8c 19 f5 e4 0d f3 23 fc 9c 4e e0 bb 53 3f 82 c9 18 82
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=: 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=: 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 47 55 75 73 1d bf 9d 29 4e ea 6d fd d8 c2 8c 19 f5 e4 0d f3 23 fc 9c 4e e0 bb 53 3f 82 c9 18 82 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
wlan0: State: ASSOCIATED -> 4WAY_HANDSHAKE
wlan0: WPA: RX message 1 of 4-Way Handshake from ec:6c:9f:04:05:6c (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
Get randomness: len=32 entropy=11
WPA: Renewed SNonce - hexdump(len=32): 1e 32 39 56 ff e3 d0 4d 07 b8 70 d4 03 45 f7 23 88 d2 5e a6 bf b9 24 bd 0f d7 19 74 92 d6 38 bd
WPA: PTK derivation - A1=08:10:76:34:80:f5 A2=ec:6c:9f:04:05:6c
WPA: Nonce1 - hexdump(len=32): 1e 32 39 56 ff e3 d0 4d 07 b8 70 d4 03 45 f7 23 88 d2 5e a6 bf b9 24 bd 0f d7 19 74 92 d6 38 bd
WPA: Nonce2 - hexdump(len=32): 47 55 75 73 1d bf 9d 29 4e ea 6d fd d8 c2 8c 19 f5 e4 0d f3 23 fc 9c 4e e0 bb 53 3f 82 c9 18 82
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=4
: [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Replay Counter - hexdump(len=: 00 00 00 00 00 00 00 01
wlan0: WPA: Sending EAPOL-Key 2/4
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): 64 77 cb e5 5a 43 f8 c8 31 da 5d 83 d6 b8 59 9e
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 1e 32 39 56 ff e3 d0 4d 07 b8 70 d4 03 45 f7 23 88 d2 5e a6 bf b9 24 bd 0f d7 19 74 92 d6 38 bd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 64 77 cb e5 5a 43 f8 c8 31 da 5d 83 d6 b8 59 9e 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
wlan0: RX EAPOL from ec:6c:9f:04:05:6c
RX EAPOL - hexdump(len=155): 01 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 47 55 75 73 1d bf 9d 29 4e ea 6d fd d8 c2 8c 19 f5 e4 0d f3 23 fc 9c 4e e0 bb 53 3f 82 c9 18 82 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 58 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 70 a8 3c 63 b5 8e a1 56 90 3f 19 3b a9 9e 96 b7 00 38 eb f6 36 b0 1c 3e a8 f5 f0 34 fe d8 38 80 cf 25 0c 74 b7 60 65 41 fb 75 70 d8 65 c9 4b d4 dc e4 b5 b0 55 cc 2f de 59 da d8 7c 43 aa a5 bc 44 02 6a db 9f 38 2f cd 48 95
wlan0: IEEE 802.1X RX: version=1 type=3 length=151
wlan0:   EAPOL-Key type=2
wlan0:   key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
wlan0:   key_length=16 key_data_length=56
  replay_counter - hexdump(len=
: 00 00 00 00 00 00 00 02
  key_nonce - hexdump(len=32): 47 55 75 73 1d bf 9d 29 4e ea 6d fd d8 c2 8c 19 f5 e4 0d f3 23 fc 9c 4e e0 bb 53 3f 82 c9 18 82
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=: 58 03 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=: 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 70 a8 3c 63 b5 8e a1 56 90 3f 19 3b a9 9e 96 b7
WPA
~~~~stastakey:unicastkey

~~~~stastakey:groupkey
==> rtw_set_key algorithm(4),keyid(2),key_mask(4)
: RX EAPOL-Key - hexdump(len=155): 01 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 47 55 75 73 1d bf 9d 29 4e ea 6d fd d8 c2 8c 19 f5 e4 0d f3 23 fc 9c 4e e0 bb 53 3f 82 c9 18 82 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 58 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 70 a8 3c 63 b5 8e a1 56 90 3f 19 3b a9 9e 96 b7 00 38 eb f6 36 b0 1c 3e a8 f5 f0 34 fe d8 38 80 cf 25 0c 74 b7 60 65 41 fb 75 70 d8 65 c9 4b d4 dc e4 b5 b0 55 cc 2f de 59 da d8 7c 43 aa a5 bc 44 02 6a db 9f 38 2f cd 48 95
RSN: encrypted key data - hexdump(len=56): eb f6 36 b0 1c 3e a8 f5 f0 34 fe d8 38 80 cf 25 0c 74 b7 60 65 41 fb 75 70 d8 65 c9 4b d4 dc e4 b5 b0 55 cc 2f de 59 da d8 7c 43 aa a5 bc 44 02 6a db 9f 38 2f cd 48 95
WPA: decrypted EAPOL-Key key data - hexdump(len=4: [REMOVED]
wlan0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
wlan0: WPA: RX message 3 of 4-Way Handshake from ec:6c:9f:04:05:6c (ver=2)
WPA: IE KeyData - hexdump(len=4: 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 16 00 0f ac 01 02 00 f2 e1 ec 75 73 c2 9c 43 3a 34 a7 32 88 fc 8b 96 dd 00
WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED]
wlan0: WPA: Sending EAPOL-Key 4/4
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): 40 36 1e a5 c5 00 e9 d9 82 45 08 b3 85 9a 20 61
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 36 1e a5 c5 00 e9 d9 82 45 08 b3 85 9a 20 61 00 00
wlan0: WPA: Installing PTK to the driver
wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
EAPOL: External notification - portValid=1
wlan0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED]
WPA: Group Key - hexdump(len=16): [REMOVED]
wlan0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16)
WPA: RSC - hexdump(len=6): 58 03 00 00 00 00
wpa_driver_wext_set_key: alg=3 key_idx=2 set_tx=0 seq_len=6 key_len=16
wlan0: WPA: Key negotiation completed with ec:6c:9f:04:05:6c [PTK=CCMP GTK=CCMP]
wlan0: Cancelling authentication timeout
wlan0: State: GROUP_HANDSHAKE -> COMPLETED
wlan0: CTRL-EVENT-CONNECTED - Connection to ec:6c:9f:04:05:6c completed (auth) [id=0 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
netlink: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: Supplicant port status: Authorized
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed successfully
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
wlan0: Event 5 received on interface wlan0
EAPOL: startWhen --> 0
EAPOL: disable timer tick
rtl8192c_dm_RF_Saving(): RF_Save

[[email protected] /opt]#

接下來我們ping下路由器,零點幾毫秒,有這麼快的響應麼?錯了,忘記關掉eth0,將eth0網絡卡關閉,它的網段也是192.168.1.x或改為其他網段。
[[email protected] /opt]# ping 192.168.1.1
PING 192.168.1.1 (192.168.1.1): 56 data bytes
64 bytes from 192.168.1.1: seq=0 ttl=64 time=8.048 ms
64 bytes from 192.168.1.1: seq=1 ttl=64 time=0.740 ms
64 bytes from 192.168.1.1: seq=2 ttl=64 time=0.561 ms
64 bytes from 192.168.1.1: seq=3 ttl=64 time=0.746 ms
^C
--- 192.168.1.1 ping statistics ---
4 packets transmitted, 4 packets received, 0% packet loss
round-trip min/avg/max = 0.561/2.523/8.048 ms
[[email protected] /opt]# 
[[email protected] /opt]#
關掉eth0如果不放心直接把網線拔掉。在ping閘道器,usb wifi達到幾十毫秒
[[email protected] /opt]# ifconfig
lo        Link encap:Local Loopback  
          inet addr:127.0.0.1  Mask:255.0.0.0
          UP LOOPBACK RUNNING  MTU:16436  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0 
          RX bytes:0 (0.0 B)  TX bytes:0 (0.0 B)

wlan0     Link encap:Ethernet  HWaddr 08:10:76:34:80:F5  
          inet addr:192.168.1.22  Bcast:192.168.1.255  Mask:255.255.255.0
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:50 errors:0 dropped:50 overruns:0 frame:0
          TX packets:2 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000 
          RX bytes:6416 (6.2 KiB)  TX bytes:288 (288.0 B)

[[email protected] /opt]# ping 192.168.1.1
PING 192.168.1.1 (192.168.1.1): 56 data bytes
64 bytes from 192.168.1.1: seq=0 ttl=64 time=20.931 ms
64 bytes from 192.168.1.1: seq=1 ttl=64 time=6.564 ms
64 bytes from 192.168.1.1: seq=2 ttl=64 time=37.729 ms
64 bytes from 192.168.1.1: seq=3 ttl=64 time=6.867 ms
64 bytes from 192.168.1.1: seq=4 ttl=64 time=19.028 ms
64 bytes from 192.168.1.1: seq=5 ttl=64 time=34.159 ms
64 bytes from 192.168.1.1: seq=6 ttl=64 time=8.358 ms
^C
--- 192.168.1.1 ping statistics ---
7 packets transmitted, 7 packets received, 0% packet loss
round-trip min/avg/max = 6.564/19.090/37.729 ms
[[email protected] /opt]# 接著再ping外網,啥不通?閘道器忘了
[[email protected] /opt]# ping www.baidu.com
PING www.baidu.com (119.75.218.77): 56 data bytes
ping: sendto: Network is unreachable
[[email protected] /opt]# ping www.baidu.com
PING www.baidu.com (119.75.217.56): 56 data bytes
ping: sendto: Network is unreachable
[[email protected] /opt]# ping www.sina.com 
PING www.sina.com (221.236.31.140): 56 data bytes
ping: sendto: Network is unreachable
[[email protected] /opt]#

[[email protected] /opt]# route
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
192.168.1.0     *               255.255.255.0   U     0      0        0 wlan0
[[email protected] /opt]#
[[email protected] /opt]# route add default gw 192.168.1.1
[[email protected] /opt]# ping www.baidu.com
PING www.baidu.com (119.75.218.77): 56 data bytes
64 bytes from 119.75.218.77: seq=0 ttl=56 time=54.385 ms
64 bytes from 119.75.218.77: seq=1 ttl=56 time=56.016 ms
64 bytes from 119.75.218.77: seq=2 ttl=56 time=47.137 ms
64 bytes from 119.75.218.77: seq=3 ttl=56 time=45.277 ms
--- www.baidu.com ping statistics ---
4 packets transmitted, 4 packets received, 0% packet loss
round-trip min/avg/max = 45.277/50.703/56.016 ms
[[email protected] /opt]#
大功告成,通過usb wifi可以正常訪問外網
題外話:因為ping的是域名地址www.baidu.com需要進行DNS轉化因此在etc目錄下需要有個resov.conf的檔案,檔案內容如下:
nameserver 192.168.1.1
nameserver 8.8.8.8

相關推薦

嵌入式linux usb wifi驅動移植

wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate wpa_driver_wext_set_

嵌入式linux usb wifi移植[s3c6410平臺 轉載]

http://blog.chinaunix.net/uid-8048969-id-3251135.html 重新編譯關於WIFI方面的modules,然後編譯wifi模組的驅動。把模組設定成開機載入模式。

第十七章:STA模式USB WIFI驅動移植

1、下載原始碼 首先將原始碼複製到ubuntu中實驗目錄,並解壓開,這裡我們用到的是sta模式,所以解壓MT7601U_LinuxAP_3.0.0.1_20130802.tar.bz2這個檔案。 我們這裡解壓之後放在了以下目錄中.             2、修改

android 平臺USB wifi驅動移植及使用

來自: http://blog.csdn.net/haomcu/article/details/7267090 一.   Android平臺Wifi的基本程式碼路徑 1.       Wpa_supplicant原始碼部分 external/wpa_sup

嵌入式Linux USB驅動開發之教你一步步編寫USB驅動程式

編寫與一個USB裝置驅動程式的方法和其他匯流排驅動方式類似,驅動程式把驅動程式物件註冊到USB子系統中,稍後再使用製造商和裝置標識來判斷是否安裝了硬體。當然,這些製造商和裝置標識需要我們編寫進USB 驅動程式中。 USB 驅動程式依然遵循裝置模型 —— 匯流排、裝置、驅動

嵌入式Linux開發——(十五)移植YAFFS檔案系統

一、移植YAFFS檔案系統 1)YAFFS檔案系統的介紹     ①YAFFS(yet another flash file system)是一種類似於JFFS / JFFS2,專門為NAND Flash設計的嵌入式檔案系統,適用於大     &nbs

嵌入式Linux開發——(十四)移植Linux核心

基於Linux2.6.22.6 1、相關常識     ①VERSION = 2   PATCHLEVEL=6        主版本號,穩定版本用偶數來表示,每隔2~~3年出現一個穩定版 &nbs

Linux USB裝置驅動程式設計 和 USB下載線驅動設計

Linux USB裝置驅動程式設計 和 USB下載線驅動設計   USB裝置驅動模型 USB裝置包括配置(configuration)、介面(interface)和端點(endpoint),一個USB裝置驅動程式對應一個USB介面,而非整個USB裝置。 在Lin

Linux usb 裝置驅動 (1)

在初始化了一些資源之後,可以看到第一個關鍵的函式呼叫——interface_to_usbdev。他通過一個usb_interface來得到該介面所在裝置的裝置描述結構。本來,要得到一個usb_device只要用interface_to_usbdev就夠了,但因為要增加對該usb_device的引用計數,我們

8 Android平臺開發-WIFI 驅動移植 -- 詳細

一、WIFI的基本架構(程式碼路徑)     1、WIFI Settings應用程式:        packages/apps/Settings/src/com/android/setting

#嵌入式Linux最小系統移植# yaffs2根檔案系統移植出錯記錄

busybox官網地址: 本次移植採用的busybox版本: busybox-1.26.0.tar.bz2 交叉編譯工具鏈版本: $ arm-linux-gcc -v gcc version 4.4.3 (ctng-1.6.1) 1

WIFI驅動移植--udhcpc獲取IP

在使用wpa工具連線WIFI的時候,一般採用DHCP方式自動獲取裝置ip。在執行完udhcpc命令後,發現獲取到了IP,但是ifconfig一看,還是沒有IP資訊。在獲取IP後需要配置指令碼設定ip。本文使用udhcpc命令配合配置指令碼,實現自動獲取、設定ip的功能。一、建

WIFI驅動移植---編譯MT7601驅動

1.修改Makefile    1)新增平臺型別       2)新增編譯工具等ifeq ($(PLATFORM),3518E) LINUX_SRC = /home/float/share/Hi3518E_SDK_V1.0.4.0/package/osdrv/opensour

嵌入式Linux——塊裝置驅動

        宣告:本文章是看韋東山老師的教學視訊後並閱讀了一些部落格後所寫的塊裝置的驅動程式,其中包括一些對程式的分析,如果文中的分析與您的文章相同敬請提出,我會做相應的修改或刪除。同時如果我的文章對你有所幫助那是我的幸運。        說起塊裝置驅動,我們就會想我們

android wifi驅動移植及其部分問題回答

Update(19/05/2011): Verify validity against Gingerbread. Update (11/08/2010): Updated patch to fix the loading of awext driver at run tim

Linuxwifi 驅動開發(三)—— SDIO介面WiFi驅動淺析

      SDIO-Wifi模組是基於SDIO介面的符合wifi無線網路標準的嵌入式模組,內建無線網路協議IEEE802.11協議棧以及TCP/IP協議棧,能夠實現使用者主平臺數據通過SDIO口到無線網路之間的轉換。SDIO具有傳輸資料快,相容SD、MMC介面等特點。  

嵌入式Linux學習-----u-boot移植

自從大二我就開始接觸微控制器,開始學習51微控制器程式設計及電路圖繪製,經過一段時間的學習,發現嵌入式很有意思。後來在師兄的推薦下,我到圖書館借了韋東山老師寫的《嵌入式Linux應用開發完全手冊》,開始學習嵌入式linux,在虛擬機器安裝Linux,熟悉Linux環境,各種

Linuxwifi 驅動開發(一)—— WiFi基礎知識解析

 一、WiFi相關基礎概念 1、什麼是wifi        我們看一下百度百科是如何定義的:       Wi-Fi是一種可以將個人電腦、手持裝置(如pad、手機)等終端以無線方式互相連線的技術,事實上它是一個高頻無線電訊號。[1]  無線保真是一個無線網路通訊技術的品牌

嵌入式Linux最簡單驅動模組編譯與剖析

# 最簡單的核心模組: #include<linux/module.h> #include<linux/kernel.h> static int my_driver_init(void) { printk("hello\n"); return

linux編譯wifi驅動RTL8188EUS模組 AP模式

1、掛載已經編譯好的wifi驅動,這是通用模組 insmod /modules/wlan.ko 2、掛載wlan0模組 ifconfig wlan0 up 3、設定wlan0的IP ifconfig wlan0 192.168.3.1 4、hostapd工具的