<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Embedded-Systems on Jesus Oseguera</title><link>https://r0tbyt3.dev/tags/embedded-systems/</link><description>Recent content in Embedded-Systems on Jesus Oseguera</description><generator>Hugo</generator><language>en-us</language><atom:link href="https://r0tbyt3.dev/tags/embedded-systems/index.xml" rel="self" type="application/rss+xml"/><item><title>Accessing Memory-Mapped Registers with Pointers</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/accessing-memory-mapped-registers-with-pointers/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/accessing-memory-mapped-registers-with-pointers/</guid><description>Accessing Memory-Mapped Registers with Pointers Accessing Memory-Mapped Registers with Pointers - technique for directly reading and writing hardware registers by casting their addresses to typed pointer types in C.
Related Links: Bitwise Operators and Bit Manipulation Techniques Compiler Optimization Behavior and volatile Fixes Complex const and volatile Combinations Control Flow for Firmware Data Types, Variables, and Storage Class Specifiers Defensive C Patterns for Vulnerability Prevention ELF File Format, Symbols, Sections, and Segments Functions and Modular Firmware Design Pointers and Casting in Embedded C Register Definitions with C Structures Relocation, Linking, Literal Pools, and Veneers Structures, Bitfields, Unions, and Bit Extraction Toolchain Fundamentals</description></item><item><title>Arm M-profile</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/arm-m-profile/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/arm-m-profile/</guid><description>Arm M-profile Arm M-profile - the family of Arm processor cores designed for embedded and microcontroller applications, including the Cortex-M series with its NVIC, MPU, and TrustZone-M security extensions.
Boot Flow on Cortex-M Exceptions Interruptions MPU Usage Patterns NVIC TrustZone-M Related Links: Bus Fabrics and On-Chip Interconnects CPU Core Concepts Heterogeneous SoCs and Co-processors Memory Architecture Power and Clock Domain Architecture RISC-V Single Core vs Multi-Core Architectures</description></item><item><title>Bitwise Operators and Bit Manipulation Techniques</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/bitwise-operators-and-bit-manipulation-techniques/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/bitwise-operators-and-bit-manipulation-techniques/</guid><description>Bitwise Operators and Bit Manipulation Techniques Bitwise Operators and Bit Manipulation Techniques - operators and patterns for reading, setting, clearing, and toggling individual bits in registers and data fields.
Related Links: Accessing Memory-Mapped Registers with Pointers Compiler Optimization Behavior and volatile Fixes Complex const and volatile Combinations Control Flow for Firmware Data Types, Variables, and Storage Class Specifiers Defensive C Patterns for Vulnerability Prevention ELF File Format, Symbols, Sections, and Segments Functions and Modular Firmware Design Pointers and Casting in Embedded C Register Definitions with C Structures Relocation, Linking, Literal Pools, and Veneers Structures, Bitfields, Unions, and Bit Extraction Toolchain Fundamentals</description></item><item><title>Board Bring-Up and Hardware Validation</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/hardware/board-bring-up-and-hardware-validation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/hardware/board-bring-up-and-hardware-validation/</guid><description>Board Bring-Up and Hardware Validation Board Bring-Up and Hardware Validation - process of verifying a newly assembled PCB by systematically testing power rails, clocks, communication interfaces, and peripherals.
Related Links: Cables, Connectors, and Physical Interfaces Clocking and Reset Circuits Debug and Programming Hardware Digital and Analog Peripherals Memory Hardware Microcontrollers and Selection Criteria Power Regulation and Conversion Power Sources and Power Budgeting Sensors, Actuators, and Driver Components Signal Integrity, Protection, and Level Shifting</description></item><item><title>Boot Flow on Cortex-M</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/arm-m-profile/boot-flow-on-cortex-m/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/arm-m-profile/boot-flow-on-cortex-m/</guid><description>Boot Flow on Cortex-M Boot Flow on Cortex-M - the sequence of steps from power-on through reset vector fetch, stack pointer initialization, and startup code execution that brings a Cortex-M device to its main application.
Related Links: Exceptions Interruptions MPU Usage Patterns NVIC TrustZone-M</description></item><item><title>Buffer Overflow</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/exploits/buffer-overflow/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/exploits/buffer-overflow/</guid><description>Buffer Overflow Buffer Overflow - vulnerability caused by writing beyond the bounds of a fixed-size buffer, potentially overwriting control data or enabling arbitrary code execution.
Related Links: Firmware Exploitation Network Attacks Physical Attacks Side-Channel Attacks</description></item><item><title>Bus Fabrics and On-Chip Interconnects</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/bus-fabrics-and-on-chip-interconnects/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/bus-fabrics-and-on-chip-interconnects/</guid><description>Bus Fabrics and On-Chip Interconnects Bus Fabrics and On-Chip Interconnects - the internal communication infrastructure of a SoC that connects the CPU, memory, and peripherals, including AHB, APB, AXI, and crossbar fabrics.
Related Links: Arm M-profile CPU Core Concepts Heterogeneous SoCs and Co-processors Memory Architecture Power and Clock Domain Architecture RISC-V Single Core vs Multi-Core Architectures</description></item><item><title>C Language for Embedded Systems</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/</guid><description>C Language for Embedded Systems C Language for Embedded Systems - the programming language commonly used for developing software for embedded systems due to its efficiency and low-level control. (Note: This is different from application-level C programming, which may involve higher-level abstractions and libraries.)
Accessing Memory-Mapped Registers with Pointers Bitwise Operators and Bit Manipulation Techniques Compiler Optimization Behavior and volatile Fixes Complex const and volatile Combinations Control Flow for Firmware Data Types, Variables, and Storage Class Specifiers Defensive C Patterns for Vulnerability Prevention ELF File Format, Symbols, Sections, and Segments Functions and Modular Firmware Design Pointers and Casting in Embedded C Register Definitions with C Structures Relocation, Linking, Literal Pools, and Veneers Structures, Bitfields, Unions, and Bit Extraction Toolchain Fundamentals Related Links: Embedded Systems Architectures Embedded Systems Communication Protocols Embedded Systems Execution Models Embedded Systems Exploits Embedded Systems Hardware Embedded Systems Runtime View STM32 Microcontrollers</description></item><item><title>Cables, Connectors, and Physical Interfaces</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/hardware/cables-connectors-and-physical-interfaces/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/hardware/cables-connectors-and-physical-interfaces/</guid><description>Cables, Connectors, and Physical Interfaces Cables, Connectors, and Physical Interfaces - physical interconnects used to connect embedded boards to peripherals, power supplies, and debug tools.
Related Links: Board Bring-Up and Hardware Validation Clocking and Reset Circuits Debug and Programming Hardware Digital and Analog Peripherals Memory Hardware Microcontrollers and Selection Criteria Power Regulation and Conversion Power Sources and Power Budgeting Sensors, Actuators, and Driver Components Signal Integrity, Protection, and Level Shifting</description></item><item><title>CAN Bus</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/communication-protocols/can-bus/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/communication-protocols/can-bus/</guid><description>CAN Bus CAN Bus - multi-master serial bus protocol used in automotive and industrial embedded systems for reliable, prioritized message exchange.
Related Links: I2C Monodon Firmware SPI UART</description></item><item><title>Clocking and Reset Circuits</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/hardware/clocking-and-reset-circuits/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/hardware/clocking-and-reset-circuits/</guid><description>Clocking and Reset Circuits Clocking and Reset Circuits - oscillators, PLLs, and reset logic that establish and maintain the timing and initialization state of a microcontroller.
Related Links: Board Bring-Up and Hardware Validation Cables, Connectors, and Physical Interfaces Debug and Programming Hardware Digital and Analog Peripherals Memory Hardware Microcontrollers and Selection Criteria Power Regulation and Conversion Power Sources and Power Budgeting Sensors, Actuators, and Driver Components Signal Integrity, Protection, and Level Shifting</description></item><item><title>Compiler Optimization Behavior and volatile Fixes</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/compiler-optimization-behavior-and-volatile-fixes/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/compiler-optimization-behavior-and-volatile-fixes/</guid><description>Compiler Optimization Behavior and volatile Fixes Compiler Optimization Behavior and volatile Fixes - how compilers reorder or eliminate memory accesses and how the volatile qualifier prevents such optimizations on hardware-mapped variables.
Related Links: Accessing Memory-Mapped Registers with Pointers Bitwise Operators and Bit Manipulation Techniques Complex const and volatile Combinations Control Flow for Firmware Data Types, Variables, and Storage Class Specifiers Defensive C Patterns for Vulnerability Prevention ELF File Format, Symbols, Sections, and Segments Functions and Modular Firmware Design Pointers and Casting in Embedded C Register Definitions with C Structures Relocation, Linking, Literal Pools, and Veneers Structures, Bitfields, Unions, and Bit Extraction Toolchain Fundamentals</description></item><item><title>Complex const and volatile Combinations</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/complex-const-and-volatile-combinations/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/complex-const-and-volatile-combinations/</guid><description>Complex const and volatile Combinations Complex const and volatile Combinations - combined use of const and volatile qualifiers to model read-only hardware registers and shared data in embedded C.
Related Links: Accessing Memory-Mapped Registers with Pointers Bitwise Operators and Bit Manipulation Techniques Compiler Optimization Behavior and volatile Fixes Control Flow for Firmware Data Types, Variables, and Storage Class Specifiers Defensive C Patterns for Vulnerability Prevention ELF File Format, Symbols, Sections, and Segments Functions and Modular Firmware Design Pointers and Casting in Embedded C Register Definitions with C Structures Relocation, Linking, Literal Pools, and Veneers Structures, Bitfields, Unions, and Bit Extraction Toolchain Fundamentals</description></item><item><title>Control Flow for Firmware</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/control-flow-for-firmware/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/control-flow-for-firmware/</guid><description>Control Flow for Firmware Control Flow for Firmware - use of conditionals, loops, and switch statements in firmware, including considerations for deterministic execution and avoiding undefined behavior.
Related Links: Accessing Memory-Mapped Registers with Pointers Bitwise Operators and Bit Manipulation Techniques Compiler Optimization Behavior and volatile Fixes Complex const and volatile Combinations Data Types, Variables, and Storage Class Specifiers Defensive C Patterns for Vulnerability Prevention ELF File Format, Symbols, Sections, and Segments Functions and Modular Firmware Design Pointers and Casting in Embedded C Register Definitions with C Structures Relocation, Linking, Literal Pools, and Veneers Structures, Bitfields, Unions, and Bit Extraction Toolchain Fundamentals</description></item><item><title>Cooperative Scheduling</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/execution-models/cooperative-scheduling/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/execution-models/cooperative-scheduling/</guid><description>Cooperative Scheduling Cooperative Scheduling - execution model where tasks voluntarily yield the processor, requiring explicit hand-off points to ensure fairness and responsiveness.
Related Links: Event-Driven and State-Machine Models Failure Recovery Models Hybrid Polling and Interrupt Models Interrupt-Driven Execution ISR-to-Task Communication Patterns Power-Aware Execution Strategies Preemptive RTOS Scheduling Real-Time Constraints, Latency, and Jitter Shared-State Synchronization and Concurrency Safety Superloop Task Priorities and Deadline Handling</description></item><item><title>CPU Core Concepts</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/cpu-core-concepts/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/cpu-core-concepts/</guid><description>CPU Core Concepts CPU Core Concepts - fundamental principles of processor design relevant to embedded systems, including instruction set architectures, pipeline stages, and privilege levels.
ISA Privilege Levels Related Links: Arm M-profile Bus Fabrics and On-Chip Interconnects Heterogeneous SoCs and Co-processors Memory Architecture Power and Clock Domain Architecture RISC-V Single Core vs Multi-Core Architectures</description></item><item><title>Data Types, Variables, and Storage Class Specifiers</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/data-types-variables-and-storage-class-specifiers/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/data-types-variables-and-storage-class-specifiers/</guid><description>Data Types, Variables, and Storage Class Specifiers Data Types, Variables, and Storage Class Specifiers - fixed-width integer types, alignment, storage classes (auto, static, extern, register), and their impact on memory layout.
Related Links: Accessing Memory-Mapped Registers with Pointers Bitwise Operators and Bit Manipulation Techniques Compiler Optimization Behavior and volatile Fixes Complex const and volatile Combinations Control Flow for Firmware Defensive C Patterns for Vulnerability Prevention ELF File Format, Symbols, Sections, and Segments Functions and Modular Firmware Design Pointers and Casting in Embedded C Register Definitions with C Structures Relocation, Linking, Literal Pools, and Veneers Structures, Bitfields, Unions, and Bit Extraction Toolchain Fundamentals</description></item><item><title>Debug and Programming Hardware</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/hardware/debug-and-programming-hardware/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/hardware/debug-and-programming-hardware/</guid><description>Debug and Programming Hardware Debug and Programming Hardware - tools and circuits used to flash firmware and debug running code, including JTAG, SWD, and debug adapters.
Related Links: Board Bring-Up and Hardware Validation Cables, Connectors, and Physical Interfaces Clocking and Reset Circuits Digital and Analog Peripherals Memory Hardware Microcontrollers and Selection Criteria Power Regulation and Conversion Power Sources and Power Budgeting Sensors, Actuators, and Driver Components Signal Integrity, Protection, and Level Shifting</description></item><item><title>Defensive C Patterns for Vulnerability Prevention</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/defensive-c-patterns-for-vulnerability-prevention/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/defensive-c-patterns-for-vulnerability-prevention/</guid><description>Defensive C Patterns for Vulnerability Prevention Defensive C Patterns for Vulnerability Prevention - coding practices that reduce common firmware vulnerabilities such as buffer overflows, integer wrapping, and uninitialized memory use.
Related Links: Accessing Memory-Mapped Registers with Pointers Bitwise Operators and Bit Manipulation Techniques Compiler Optimization Behavior and volatile Fixes Complex const and volatile Combinations Control Flow for Firmware Data Types, Variables, and Storage Class Specifiers ELF File Format, Symbols, Sections, and Segments Functions and Modular Firmware Design Pointers and Casting in Embedded C Register Definitions with C Structures Relocation, Linking, Literal Pools, and Veneers Structures, Bitfields, Unions, and Bit Extraction Toolchain Fundamentals</description></item><item><title>Digital and Analog Peripherals</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/hardware/digital-and-analog-peripherals/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/hardware/digital-and-analog-peripherals/</guid><description>Digital and Analog Peripherals Digital and Analog Peripherals - microcontroller-integrated or external digital and analog devices such as GPIOs, ADCs, DACs, and timers.
Related Links: Board Bring-Up and Hardware Validation Cables, Connectors, and Physical Interfaces Clocking and Reset Circuits Debug and Programming Hardware Memory Hardware Microcontrollers and Selection Criteria Power Regulation and Conversion Power Sources and Power Budgeting Sensors, Actuators, and Driver Components Signal Integrity, Protection, and Level Shifting</description></item><item><title>ELF File Format, Symbols, Sections, and Segments</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/elf-file-format-symbols-sections-and-segments/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/elf-file-format-symbols-sections-and-segments/</guid><description>ELF File Format, Symbols, Sections, and Segments ELF File Format, Symbols, Sections, and Segments - structure of ELF binaries produced by the toolchain, including .text, .data, .bss sections and symbol table layout.
Related Links: Accessing Memory-Mapped Registers with Pointers Bitwise Operators and Bit Manipulation Techniques Compiler Optimization Behavior and volatile Fixes Complex const and volatile Combinations Control Flow for Firmware Data Types, Variables, and Storage Class Specifiers Defensive C Patterns for Vulnerability Prevention Functions and Modular Firmware Design Pointers and Casting in Embedded C Register Definitions with C Structures Relocation, Linking, Literal Pools, and Veneers Structures, Bitfields, Unions, and Bit Extraction Toolchain Fundamentals</description></item><item><title>Embedded Systems</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/</guid><description>Embedded Systems Map Embedded Systems - design, development, and maintenance of specialized computing systems that are integrated into larger devices or systems to perform specific functions.
Architectures C Language Communication Protocols Execution Models Exploits Hardware Runtime View STM32 Microcontrollers Related Links: Backend Engineering Cybersecurity DevOps and Platform Engineering Home</description></item><item><title>Embedded Systems Architectures</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/</guid><description>Embedded Systems Architectures Embedded Systems Architectures - the different approaches to designing and structuring embedded systems, including single-core, multi-core, and heterogeneous architectures.
Arm M-profile Bus Fabrics and On-Chip Interconnects CPU Core Concepts Heterogeneous SoCs and Co-processors Memory Architecture Power and Clock Domain Architecture RISC-V Single-Core vs Multi-Core Architectures Related Links: C Language for Embedded Systems Embedded Systems Communication Protocols Embedded Systems Execution Models Embedded Systems Exploits Embedded Systems Hardware Embedded Systems Runtime View STM32 Microcontrollers</description></item><item><title>Embedded Systems Communication Protocols</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/communication-protocols/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/communication-protocols/</guid><description>Embedded Systems Communication Protocols Embedded Systems Communication Protocols - the methods and standards used for communication between embedded systems and other devices or systems.
CAN Bus I2C Monodon Firmware SPI UART Related Links: C Language for Embedded Systems Embedded Systems Architectures Embedded Systems Execution Models Embedded Systems Exploits Embedded Systems Hardware Embedded Systems Runtime View STM32 Microcontrollers</description></item><item><title>Embedded Systems Execution Models</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/execution-models/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/execution-models/</guid><description>Embedded Systems Execution Models Embedded Systems Execution Models - the different approaches to managing and executing code in embedded systems, including polling, interrupt-driven, and real-time operating system (RTOS) based models.
Cooperative Scheduling Event-Driven and State-Machine Models Failure Recovery Models Hybrid Polling and Interrupt Models Interrupt-Driven Execution ISR-to-Task Communication Patterns Power-Aware Execution Strategies Preemptive RTOS Scheduling Real-Time Constraints, Latency, and Jitter Shared-State Synchronization and Concurrency Safety Superloop Task Priorities and Deadline Handling Related Links: C Language for Embedded Systems Embedded Systems Architectures Embedded Systems Communication Protocols Embedded Systems Exploits Embedded Systems Hardware Embedded Systems Runtime View STM32 Microcontrollers</description></item><item><title>Embedded Systems Exploits</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/exploits/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/exploits/</guid><description>Embedded Systems Exploits Embedded Systems Exploits - the methods and techniques used to identify and exploit vulnerabilities in embedded systems.
Buffer Overflow Firmware Exploitation Network Attacks Physical Attacks Side-Channel Attacks Related Links: C Language for Embedded Systems Embedded Systems Architectures Embedded Systems Communication Protocols Embedded Systems Execution Models Embedded Systems Hardware Embedded Systems Runtime View STM32 Microcontrollers</description></item><item><title>Embedded Systems Hardware</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/hardware/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/hardware/</guid><description>Embedded Systems Hardware Embedded Systems Hardware - the physical components and architecture of embedded systems, including microcontrollers, memory, and peripheral devices.
Board Bring-Up and Hardware Validation Cables, Connectors, and Physical Interfaces Clocking and Reset Circuits Debug and Programming Hardware Digital and Analog Peripherals Memory Hardware Microcontrollers and Selection Criteria Power Regulation and Conversion Power Sources and Power Budgeting Sensors, Actuators, and Driver Components Signal Integrity, Protection, and Level Shifting Related Links: C Language for Embedded Systems Embedded Systems Architectures Embedded Systems Communication Protocols Embedded Systems Execution Models Embedded Systems Exploits Embedded Systems Runtime View STM32 Microcontrollers</description></item><item><title>Event-Driven and State-Machine Models</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/execution-models/event-driven-and-state-machine-models/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/execution-models/event-driven-and-state-machine-models/</guid><description>Event-Driven and State-Machine Models Event-Driven and State-Machine Models - firmware architecture that transitions between well-defined states in response to hardware events or software signals.
Related Links: Cooperative Scheduling Failure Recovery Models Hybrid Polling and Interrupt Models Interrupt-Driven Execution ISR-to-Task Communication Patterns Power-Aware Execution Strategies Preemptive RTOS Scheduling Real-Time Constraints, Latency, and Jitter Shared-State Synchronization and Concurrency Safety Superloop Task Priorities and Deadline Handling</description></item><item><title>Exceptions</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/arm-m-profile/exceptions/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/arm-m-profile/exceptions/</guid><description>Exceptions Exceptions - synchronous and asynchronous events on Cortex-M that transfer control to exception handlers, including faults, SVC calls, and system-level exceptions.
Related Links: Boot Flow on Cortex-M Interruptions MPU Usage Patterns NVIC TrustZone-M</description></item><item><title>Failure Recovery Models</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/execution-models/failure-recovery-models/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/execution-models/failure-recovery-models/</guid><description>Failure Recovery Models Failure Recovery Models - strategies for detecting and recovering from runtime errors, watchdog timeouts, and unexpected system states in embedded firmware.
Related Links: Cooperative Scheduling Event-Driven and State-Machine Models Hybrid Polling and Interrupt Models Interrupt-Driven Execution ISR-to-Task Communication Patterns Power-Aware Execution Strategies Preemptive RTOS Scheduling Real-Time Constraints, Latency, and Jitter Shared-State Synchronization and Concurrency Safety Superloop Task Priorities and Deadline Handling</description></item><item><title>Firmware Exploitation</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/exploits/firmware-exploitation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/exploits/firmware-exploitation/</guid><description>Firmware Exploitation Firmware Exploitation - techniques for identifying and exploiting vulnerabilities in embedded firmware, including reverse engineering and binary patching.
Related Links: Buffer Overflow Network Attacks Physical Attacks Side-Channel Attacks</description></item><item><title>Functions and Modular Firmware Design</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/functions-and-modular-firmware-design/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/functions-and-modular-firmware-design/</guid><description>Functions and Modular Firmware Design Functions and Modular Firmware Design - function declarations, calling conventions, stack usage, and techniques for organizing firmware into reusable modules.
Related Links: Accessing Memory-Mapped Registers with Pointers Bitwise Operators and Bit Manipulation Techniques Compiler Optimization Behavior and volatile Fixes Complex const and volatile Combinations Control Flow for Firmware Data Types, Variables, and Storage Class Specifiers Defensive C Patterns for Vulnerability Prevention ELF File Format, Symbols, Sections, and Segments Pointers and Casting in Embedded C Register Definitions with C Structures Relocation, Linking, Literal Pools, and Veneers Structures, Bitfields, Unions, and Bit Extraction Toolchain Fundamentals</description></item><item><title>Harvard</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/memory-architecture/harvard/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/memory-architecture/harvard/</guid><description>Harvard Harvard - a processor memory architecture that uses separate buses for instruction and data memory, enabling simultaneous fetches and improving throughput in embedded applications.
Related Links: Von Neumann</description></item><item><title>Heterogeneous SoCs and Co-processors</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/heterogeneous-socs-and-co-processors/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/heterogeneous-socs-and-co-processors/</guid><description>Heterogeneous SoCs and Co-processors Heterogeneous SoCs and Co-processors - system-on-chip designs that integrate multiple processor types (such as Cortex-M and Cortex-A), DSPs, or hardware accelerators to balance performance and power efficiency.
Related Links: Arm M-profile Bus Fabrics and On-Chip Interconnects CPU Core Concepts Memory Architecture Power and Clock Domain Architecture RISC-V Single Core vs Multi-Core Architectures</description></item><item><title>Hybrid Polling and Interrupt Models</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/execution-models/hybrid-polling-and-interrupt-models/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/execution-models/hybrid-polling-and-interrupt-models/</guid><description>Hybrid Polling and Interrupt Models Hybrid Polling and Interrupt Models - combined approach that uses interrupts to flag events and polling loops to process them, balancing latency and complexity.
Related Links: Cooperative Scheduling Event-Driven and State-Machine Models Failure Recovery Models Interrupt-Driven Execution ISR-to-Task Communication Patterns Power-Aware Execution Strategies Preemptive RTOS Scheduling Real-Time Constraints, Latency, and Jitter Shared-State Synchronization and Concurrency Safety Superloop Task Priorities and Deadline Handling</description></item><item><title>I2C</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/communication-protocols/i2c/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/communication-protocols/i2c/</guid><description>I2C I2C - two-wire serial bus protocol for short-distance communication between a master and multiple peripheral devices sharing clock and data lines.
Related Links: CAN Bus Monodon Firmware SPI UART</description></item><item><title>Interrupt-Driven Execution</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/execution-models/interrupt-driven-execution/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/execution-models/interrupt-driven-execution/</guid><description>Interrupt-Driven Execution Interrupt-Driven Execution - firmware architecture where hardware interrupt service routines respond to peripheral events asynchronously with the main execution flow.
Related Links: Cooperative Scheduling Event-Driven and State-Machine Models Failure Recovery Models Hybrid Polling and Interrupt Models ISR-to-Task Communication Patterns Power-Aware Execution Strategies Preemptive RTOS Scheduling Real-Time Constraints, Latency, and Jitter Shared-State Synchronization and Concurrency Safety Superloop Task Priorities and Deadline Handling</description></item><item><title>Interruptions</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/arm-m-profile/interruptions/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/arm-m-profile/interruptions/</guid><description>Interruptions Interruptions - hardware interrupt signals on Cortex-M that trigger IRQ handlers via the NVIC, including priority management, nesting, and tail-chaining behavior.
Related Links: Boot Flow on Cortex-M Exceptions MPU Usage Patterns NVIC TrustZone-M</description></item><item><title>ISA</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/cpu-core-concepts/isa/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/cpu-core-concepts/isa/</guid><description>ISA ISA - the Instruction Set Architecture defining the set of operations a processor can execute, including encoding formats, addressing modes, and the programmer-visible register model.
Related Links: Privilege Levels</description></item><item><title>ISR-to-Task Communication Patterns</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/execution-models/isr-to-task-communication-patterns/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/execution-models/isr-to-task-communication-patterns/</guid><description>ISR-to-Task Communication Patterns ISR-to-Task Communication Patterns - mechanisms for safely passing data and signals from interrupt service routines to application-level tasks.
Related Links: Cooperative Scheduling Event-Driven and State-Machine Models Failure Recovery Models Hybrid Polling and Interrupt Models Interrupt-Driven Execution Power-Aware Execution Strategies Preemptive RTOS Scheduling Real-Time Constraints, Latency, and Jitter Shared-State Synchronization and Concurrency Safety Superloop Task Priorities and Deadline Handling</description></item><item><title>Memory Architecture</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/memory-architecture/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/memory-architecture/</guid><description>Memory Architecture Memory Architecture - the organization of instruction and data memory in embedded processors, including the distinctions between Harvard and Von Neumann architectures and their trade-offs.
Harvard Von Neumann Related Links: Arm M-profile Bus Fabrics and On-Chip Interconnects CPU Core Concepts Heterogeneous SoCs and Co-processors Power and Clock Domain Architecture RISC-V Single Core vs Multi-Core Architectures</description></item><item><title>Memory Hardware</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/hardware/memory-hardware/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/hardware/memory-hardware/</guid><description>Memory Hardware Memory Hardware - physical memory devices used in embedded systems including Flash, SRAM, EEPROM, and external memory interfaces.
Related Links: Board Bring-Up and Hardware Validation Cables, Connectors, and Physical Interfaces Clocking and Reset Circuits Debug and Programming Hardware Digital and Analog Peripherals Microcontrollers and Selection Criteria Power Regulation and Conversion Power Sources and Power Budgeting Sensors, Actuators, and Driver Components Signal Integrity, Protection, and Level Shifting</description></item><item><title>Microcontrollers and Selection Criteria</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/hardware/microcontrollers-and-selection-criteria/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/hardware/microcontrollers-and-selection-criteria/</guid><description>Microcontrollers and Selection Criteria Microcontrollers and Selection Criteria - factors and trade-offs involved in selecting a microcontroller for an embedded application, including performance, power, and peripherals.
Related Links: Board Bring-Up and Hardware Validation Cables, Connectors, and Physical Interfaces Clocking and Reset Circuits Debug and Programming Hardware Digital and Analog Peripherals Memory Hardware Power Regulation and Conversion Power Sources and Power Budgeting Sensors, Actuators, and Driver Components Signal Integrity, Protection, and Level Shifting</description></item><item><title>Monodon Firmware</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/communication-protocols/monodon-firmware/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/communication-protocols/monodon-firmware/</guid><description>Monodon Firmware Monodon Firmware - firmware implementation and protocol details for the Monodon communication stack.
Related Links: CAN Bus I2C SPI UART</description></item><item><title>MPU Usage Patterns</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/arm-m-profile/mpu-usage-patterns/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/arm-m-profile/mpu-usage-patterns/</guid><description>MPU Usage Patterns MPU Usage Patterns - common configurations of the Cortex-M Memory Protection Unit to enforce privilege separation, protect stack regions, and prevent unauthorized memory access.
Related Links: Boot Flow on Cortex-M Exceptions Interruptions NVIC TrustZone-M</description></item><item><title>Network Attacks</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/exploits/network-attacks/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/exploits/network-attacks/</guid><description>Network Attacks Network Attacks - exploitation techniques targeting network-connected embedded systems through protocol vulnerabilities, unauthenticated services, or traffic interception.
Related Links: Buffer Overflow Firmware Exploitation Physical Attacks Side-Channel Attacks</description></item><item><title>NVIC</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/arm-m-profile/nvic/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/arm-m-profile/nvic/</guid><description>NVIC NVIC - the Nested Vectored Interrupt Controller on Cortex-M that manages interrupt priority, enabling, pending state, and vectored dispatch to handler functions.
Related Links: Boot Flow on Cortex-M Exceptions Interruptions MPU Usage Patterns TrustZone-M</description></item><item><title>Physical Attacks</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/exploits/physical-attacks/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/exploits/physical-attacks/</guid><description>Physical Attacks Physical Attacks - hardware-level attack techniques including fault injection, probe-based extraction, and physical tampering with embedded devices.
Related Links: Buffer Overflow Firmware Exploitation Network Attacks Side-Channel Attacks</description></item><item><title>Platform Interrupt Architecture</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/risc-v/platform-interrupt-architecture/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/risc-v/platform-interrupt-architecture/</guid><description>Platform Interrupt Architecture Platform Interrupt Architecture - the RISC-V PLIC and CLINT interrupt controllers that route external and timer interrupts to harts with configurable priority and threshold settings.
Related Links: PMP and Isolation Privilege Model and Trap Handling</description></item><item><title>PMP and Isolation</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/risc-v/pmp-and-isolation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/risc-v/pmp-and-isolation/</guid><description>PMP and Isolation PMP and Isolation - the RISC-V Physical Memory Protection unit used to restrict memory access by privilege level, enabling isolation between firmware components and sandboxing of untrusted code.
Related Links: Platform Interrupt Architecture Privilege Model and Trap Handling</description></item><item><title>Pointers and Casting in Embedded C</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/pointers-and-casting-in-embedded-c/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/pointers-and-casting-in-embedded-c/</guid><description>Pointers and Casting in Embedded C Pointers and Casting in Embedded C - pointer arithmetic, void pointers, and type casting used to access hardware registers and manipulate raw memory.
Related Links: Accessing Memory-Mapped Registers with Pointers Bitwise Operators and Bit Manipulation Techniques Compiler Optimization Behavior and volatile Fixes Complex const and volatile Combinations Control Flow for Firmware Data Types, Variables, and Storage Class Specifiers Defensive C Patterns for Vulnerability Prevention ELF File Format, Symbols, Sections, and Segments Functions and Modular Firmware Design Register Definitions with C Structures Relocation, Linking, Literal Pools, and Veneers Structures, Bitfields, Unions, and Bit Extraction Toolchain Fundamentals</description></item><item><title>Power and Clock Domain Architecture</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/power-and-clock-domain-architecture/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/power-and-clock-domain-architecture/</guid><description>Power and Clock Domain Architecture Power and Clock Domain Architecture - the organization of clock trees and power domains within a SoC, including clock gating, domain isolation, and power management controller design.
Related Links: Arm M-profile Bus Fabrics and On-Chip Interconnects CPU Core Concepts Heterogeneous SoCs and Co-processors Memory Architecture RISC-V Single Core vs Multi-Core Architectures</description></item><item><title>Power Regulation and Conversion</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/hardware/power-regulation-and-conversion/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/hardware/power-regulation-and-conversion/</guid><description>Power Regulation and Conversion Power Regulation and Conversion - circuits that convert and regulate supply voltages for embedded hardware, including LDOs, buck converters, and boost converters.
Related Links: Board Bring-Up and Hardware Validation Cables, Connectors, and Physical Interfaces Clocking and Reset Circuits Debug and Programming Hardware Digital and Analog Peripherals Memory Hardware Microcontrollers and Selection Criteria Power Sources and Power Budgeting Sensors, Actuators, and Driver Components Signal Integrity, Protection, and Level Shifting</description></item><item><title>Power Sources and Power Budgeting</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/hardware/power-sources-and-power-budgeting/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/hardware/power-sources-and-power-budgeting/</guid><description>Power Sources and Power Budgeting Power Sources and Power Budgeting - battery types, energy harvesting sources, and methods for estimating and managing total system power consumption.
Related Links: Board Bring-Up and Hardware Validation Cables, Connectors, and Physical Interfaces Clocking and Reset Circuits Debug and Programming Hardware Digital and Analog Peripherals Memory Hardware Microcontrollers and Selection Criteria Power Regulation and Conversion Sensors, Actuators, and Driver Components Signal Integrity, Protection, and Level Shifting</description></item><item><title>Power-Aware Execution Strategies</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/execution-models/power-aware-execution-strategies/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/execution-models/power-aware-execution-strategies/</guid><description>Power-Aware Execution Strategies Power-Aware Execution Strategies - techniques for reducing energy consumption through sleep modes, clock gating, and workload scheduling.
Related Links: Cooperative Scheduling Event-Driven and State-Machine Models Failure Recovery Models Hybrid Polling and Interrupt Models Interrupt-Driven Execution ISR-to-Task Communication Patterns Preemptive RTOS Scheduling Real-Time Constraints, Latency, and Jitter Shared-State Synchronization and Concurrency Safety Superloop Task Priorities and Deadline Handling</description></item><item><title>Preemptive RTOS Scheduling</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/execution-models/preemptive-rtos-scheduling/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/execution-models/preemptive-rtos-scheduling/</guid><description>Preemptive RTOS Scheduling Preemptive RTOS Scheduling - real-time operating system model where the scheduler can interrupt a running task to give the CPU to a higher-priority task.
Related Links: Cooperative Scheduling Event-Driven and State-Machine Models Failure Recovery Models Hybrid Polling and Interrupt Models Interrupt-Driven Execution ISR-to-Task Communication Patterns Power-Aware Execution Strategies Real-Time Constraints, Latency, and Jitter Shared-State Synchronization and Concurrency Safety Superloop Task Priorities and Deadline Handling</description></item><item><title>Privilege Levels</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/cpu-core-concepts/privilege-levels/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/cpu-core-concepts/privilege-levels/</guid><description>Privilege Levels Privilege Levels - the hardware-enforced execution modes (such as privileged and unprivileged) that control access to protected instructions, registers, and memory regions.
Related Links: ISA</description></item><item><title>Privilege Model and Trap Handling</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/risc-v/privilege-model-and-trap-handling/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/risc-v/privilege-model-and-trap-handling/</guid><description>Privilege Model and Trap Handling Privilege Model and Trap Handling - the RISC-V privilege levels (Machine, Supervisor, User) and the trap mechanism used to handle exceptions, interrupts, and environment calls across privilege boundaries.
Related Links: Platform Interrupt Architecture PMP and Isolation</description></item><item><title>Real-Time Constraints, Latency, and Jitter</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/execution-models/real-time-constraints-latency-and-jitter/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/execution-models/real-time-constraints-latency-and-jitter/</guid><description>Real-Time Constraints, Latency, and Jitter Real-Time Constraints, Latency, and Jitter - timing requirements for embedded systems including deadlines, worst-case execution times, and sources of scheduling variance.
Related Links: Cooperative Scheduling Event-Driven and State-Machine Models Failure Recovery Models Hybrid Polling and Interrupt Models Interrupt-Driven Execution ISR-to-Task Communication Patterns Power-Aware Execution Strategies Preemptive RTOS Scheduling Shared-State Synchronization and Concurrency Safety Superloop Task Priorities and Deadline Handling</description></item><item><title>Register Definitions with C Structures</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/register-definitions-with-c-structures/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/register-definitions-with-c-structures/</guid><description>Register Definitions with C Structures Register Definitions with C Structures - use of structs and bitfields to model memory-mapped peripheral register blocks with named field access.
Related Links: Accessing Memory-Mapped Registers with Pointers Bitwise Operators and Bit Manipulation Techniques Compiler Optimization Behavior and volatile Fixes Complex const and volatile Combinations Control Flow for Firmware Data Types, Variables, and Storage Class Specifiers Defensive C Patterns for Vulnerability Prevention ELF File Format, Symbols, Sections, and Segments Functions and Modular Firmware Design Pointers and Casting in Embedded C Relocation, Linking, Literal Pools, and Veneers Structures, Bitfields, Unions, and Bit Extraction Toolchain Fundamentals</description></item><item><title>Relocation, Linking, Literal Pools, and Veneers</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/relocation-linking-literal-pools-and-veneers/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/relocation-linking-literal-pools-and-veneers/</guid><description>Relocation, Linking, Literal Pools, and Veneers Relocation, Linking, Literal Pools, and Veneers - how the linker resolves symbol references, manages literal pools, and inserts veneers for out-of-range branches.
Related Links: Accessing Memory-Mapped Registers with Pointers Bitwise Operators and Bit Manipulation Techniques Compiler Optimization Behavior and volatile Fixes Complex const and volatile Combinations Control Flow for Firmware Data Types, Variables, and Storage Class Specifiers Defensive C Patterns for Vulnerability Prevention ELF File Format, Symbols, Sections, and Segments Functions and Modular Firmware Design Pointers and Casting in Embedded C Register Definitions with C Structures Structures, Bitfields, Unions, and Bit Extraction Toolchain Fundamentals</description></item><item><title>RISC-V</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/risc-v/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/risc-v/</guid><description>RISC-V RISC-V - an open-standard instruction set architecture based on RISC principles, increasingly used in embedded systems for its modularity, extensibility, and royalty-free licensing.
Platform Interrupt Architecture PMP and Isolation Privilege Model and Trap Handling Related Links: Arm M-profile Bus Fabrics and On-Chip Interconnects CPU Core Concepts Heterogeneous SoCs and Co-processors Memory Architecture Power and Clock Domain Architecture Single Core vs Multi-Core Architectures</description></item><item><title>Runtime Memory Management</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/runtime-view/runtime-memory-management/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/runtime-view/runtime-memory-management/</guid><description>Runtime Memory Management Runtime Memory Management - strategies for allocating, using, and freeing memory during firmware execution, including static allocation and heap management.
Related Links: Task Scheduling and Context Switching</description></item><item><title>Runtime View of Embedded Systems</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/runtime-view/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/runtime-view/</guid><description>Runtime View of Embedded Systems Runtime View of Embedded Systems - the perspective of how an embedded system behaves during execution, including the management of resources, task scheduling, and interaction with the hardware.
Runtime Memory Management Task Scheduling and Context Switching Related Links: C Language for Embedded Systems Embedded Systems Architectures Embedded Systems Communication Protocols Embedded Systems Execution Models Embedded Systems Exploits Embedded Systems Hardware STM32 Microcontrollers</description></item><item><title>Sensors, Actuators, and Driver Components</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/hardware/sensors-actuators-and-driver-components/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/hardware/sensors-actuators-and-driver-components/</guid><description>Sensors, Actuators, and Driver Components Sensors, Actuators, and Driver Components - input transducers, output actuators, and the driver circuits that interface them to a microcontroller.
Related Links: Board Bring-Up and Hardware Validation Cables, Connectors, and Physical Interfaces Clocking and Reset Circuits Debug and Programming Hardware Digital and Analog Peripherals Memory Hardware Microcontrollers and Selection Criteria Power Regulation and Conversion Power Sources and Power Budgeting Signal Integrity, Protection, and Level Shifting</description></item><item><title>Shared-State Synchronization and Concurrency Safety</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/execution-models/shared-state-synchronization-and-concurrency-safety/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/execution-models/shared-state-synchronization-and-concurrency-safety/</guid><description>Shared-State Synchronization and Concurrency Safety Shared-State Synchronization and Concurrency Safety - techniques for safely sharing data between tasks or ISRs, including atomic operations, mutexes, and critical sections.
Related Links: Cooperative Scheduling Event-Driven and State-Machine Models Failure Recovery Models Hybrid Polling and Interrupt Models Interrupt-Driven Execution ISR-to-Task Communication Patterns Power-Aware Execution Strategies Preemptive RTOS Scheduling Real-Time Constraints, Latency, and Jitter Superloop Task Priorities and Deadline Handling</description></item><item><title>Side-Channel Attacks</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/exploits/side-channel-attacks/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/exploits/side-channel-attacks/</guid><description>Side-Channel Attacks Side-Channel Attacks - exploitation of information leaked through power consumption, electromagnetic emissions, timing variations, or other physical side channels.
Related Links: Buffer Overflow Firmware Exploitation Network Attacks Physical Attacks</description></item><item><title>Signal Integrity, Protection, and Level Shifting</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/hardware/signal-integrity-protection-and-level-shifting/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/hardware/signal-integrity-protection-and-level-shifting/</guid><description>Signal Integrity, Protection, and Level Shifting Signal Integrity, Protection, and Level Shifting - techniques for maintaining clean signal transmission and protecting circuits from voltage mismatches, ESD, and noise.
Related Links: Board Bring-Up and Hardware Validation Cables, Connectors, and Physical Interfaces Clocking and Reset Circuits Debug and Programming Hardware Digital and Analog Peripherals Memory Hardware Microcontrollers and Selection Criteria Power Regulation and Conversion Power Sources and Power Budgeting Sensors, Actuators, and Driver Components</description></item><item><title>Single Core vs Multi-Core Architectures</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/single-core-vs-multi-core-architectures/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/single-core-vs-multi-core-architectures/</guid><description>Single Core vs Multi-Core Architectures Single Core vs Multi-Core Architectures - comparison of single-processor and multi-processor embedded designs, including trade-offs in complexity, power, real-time behavior, and inter-core communication.
Related Links: Arm M-profile Bus Fabrics and On-Chip Interconnects CPU Core Concepts Heterogeneous SoCs and Co-processors Memory Architecture Power and Clock Domain Architecture RISC-V</description></item><item><title>SPI</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/communication-protocols/spi/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/communication-protocols/spi/</guid><description>SPI SPI - high-speed, full-duplex serial protocol for communicating with peripherals using dedicated clock, MOSI, MISO, and chip-select lines.
Related Links: CAN Bus I2C Monodon Firmware UART</description></item><item><title>STM32 Blue Pill</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/stm32-microcontrollers/stm32-blue-pill/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/stm32-microcontrollers/stm32-blue-pill/</guid><description>STM32 Blue Pill STM32 Blue Pill - low-cost STM32F103-based development board commonly used for prototyping and learning embedded development with the STM32 family.
Related Links: STM32L5 Series</description></item><item><title>STM32 Microcontrollers</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/stm32-microcontrollers/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/stm32-microcontrollers/</guid><description>STM32 Microcontrollers STM32 Microcontrollers - a family of 32-bit ARM Cortex-M microcontrollers designed by STMicroelectronics with a vendor-specific microcontroller architecture used in a wide range of embedded systems applications.
STM32 Blue Pill STM32L5 Series Related Links: C Language for Embedded Systems Embedded Systems Architectures Embedded Systems Communication Protocols Embedded Systems Execution Models Embedded Systems Exploits Embedded Systems Hardware Embedded Systems Runtime View</description></item><item><title>STM32L5 Series</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/stm32-microcontrollers/stm32l5-series/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/stm32-microcontrollers/stm32l5-series/</guid><description>STM32L5 Series STM32L5 Series - STMicroelectronics ultra-low-power microcontroller series featuring Arm Cortex-M33 with TrustZone and advanced security features.
Related Links: STM32 Blue Pill</description></item><item><title>Structures, Bitfields, Unions, and Bit Extraction</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/structures-bitfields-unions-and-bit-extraction/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/structures-bitfields-unions-and-bit-extraction/</guid><description>Structures, Bitfields, Unions, and Bit Extraction Structures, Bitfields, Unions, and Bit Extraction - aggregate data types used to model packed hardware data, protocol frames, and register overlays.
Related Links: Accessing Memory-Mapped Registers with Pointers Bitwise Operators and Bit Manipulation Techniques Compiler Optimization Behavior and volatile Fixes Complex const and volatile Combinations Control Flow for Firmware Data Types, Variables, and Storage Class Specifiers Defensive C Patterns for Vulnerability Prevention ELF File Format, Symbols, Sections, and Segments Functions and Modular Firmware Design Pointers and Casting in Embedded C Register Definitions with C Structures Relocation, Linking, Literal Pools, and Veneers Toolchain Fundamentals</description></item><item><title>Superloop</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/execution-models/superloop/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/execution-models/superloop/</guid><description>Superloop Superloop - the simplest embedded execution model consisting of an infinite loop that polls peripherals and handles all system tasks sequentially.
Related Links: Cooperative Scheduling Event-Driven and State-Machine Models Failure Recovery Models Hybrid Polling and Interrupt Models Interrupt-Driven Execution ISR-to-Task Communication Patterns Power-Aware Execution Strategies Preemptive RTOS Scheduling Real-Time Constraints, Latency, and Jitter Shared-State Synchronization and Concurrency Safety Task Priorities and Deadline Handling</description></item><item><title>Task Priorities and Deadline Handling</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/execution-models/task-priorities-and-deadline-handling/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/execution-models/task-priorities-and-deadline-handling/</guid><description>Task Priorities and Deadline Handling Task Priorities and Deadline Handling - assignment of execution priorities to tasks in an RTOS and strategies for meeting hard and soft timing deadlines.
Related Links: Cooperative Scheduling Event-Driven and State-Machine Models Failure Recovery Models Hybrid Polling and Interrupt Models Interrupt-Driven Execution ISR-to-Task Communication Patterns Power-Aware Execution Strategies Preemptive RTOS Scheduling Real-Time Constraints, Latency, and Jitter Shared-State Synchronization and Concurrency Safety Superloop</description></item><item><title>Task Scheduling and Context Switching</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/runtime-view/task-scheduling-and-context-switching/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/runtime-view/task-scheduling-and-context-switching/</guid><description>Task Scheduling and Context Switching Task Scheduling and Context Switching - mechanisms by which an RTOS saves and restores task state to achieve multitasking on a single processor.
Related Links: Runtime Memory Management</description></item><item><title>Toolchain Fundamentals</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/toolchain-fundamentals/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/c-language/toolchain-fundamentals/</guid><description>Toolchain Fundamentals Toolchain Fundamentals - components of the embedded C toolchain including the compiler, assembler, linker, and object file utilities.
Related Links: Accessing Memory-Mapped Registers with Pointers Bitwise Operators and Bit Manipulation Techniques Compiler Optimization Behavior and volatile Fixes Complex const and volatile Combinations Control Flow for Firmware Data Types, Variables, and Storage Class Specifiers Defensive C Patterns for Vulnerability Prevention ELF File Format, Symbols, Sections, and Segments Functions and Modular Firmware Design Pointers and Casting in Embedded C Register Definitions with C Structures Relocation, Linking, Literal Pools, and Veneers Structures, Bitfields, Unions, and Bit Extraction</description></item><item><title>TrustZone-M</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/arm-m-profile/trustzone-m/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/arm-m-profile/trustzone-m/</guid><description>TrustZone-M TrustZone-M - the Cortex-M security extension that partitions the system into Secure and Non-Secure worlds, enabling hardware-enforced isolation between trusted firmware and untrusted application code.
Related Links: Boot Flow on Cortex-M Exceptions Interruptions MPU Usage Patterns NVIC</description></item><item><title>UART</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/communication-protocols/uart/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/communication-protocols/uart/</guid><description>UART UART - asynchronous serial communication protocol for point-to-point data exchange between microcontrollers and peripherals.
Related Links: CAN Bus I2C Monodon Firmware SPI</description></item><item><title>Von Neumann</title><link>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/memory-architecture/von-neumann/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://r0tbyt3.dev/wiki/content/embedded-systems/architectures/memory-architecture/von-neumann/</guid><description>Von Neumann Von Neumann - a processor memory architecture where instructions and data share a single address space and bus, simplifying design at the cost of simultaneous instruction and data access.
Related Links: Harvard</description></item></channel></rss>