view rvinterf/etmsync/symlink.c @ 497:74610c4f10f7

target-utils: added 10 ms delay at the end of abb_power_off() The deosmification of the ABB access code (replacement of osmo_delay_ms() bogus delays with correctly-timed ones, which are significantly shorter) had one annoying side effect: when executing the poweroff command from any of the programs, one last '=' prompt character was being sent (and received by the x86 host) as the Calypso board powers off. With delays being shorter now, the abb_power_off() function was returning and the standalone program's main loop was printing its prompt before the Iota chip fully executed the switch-off sequence! I thought about inserting an endless tight loop at the end of the abb_power_off() function, but the implemented solution of a 10 ms delay is a little nicer IMO because if the DEVOFF operation doesn't happen for some reason in a manual hacking scenario, there won't be an artificial blocker in the form of a tight loop keeping us from further poking around.
author Mychaela Falconia <falcon@freecalypso.org>
date Sat, 25 May 2019 20:44:05 +0000
parents e7502631a0f9
children
line wrap: on
line source

/*
 * Commands for experimenting with FFS symlinks
 */

#include <sys/types.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <strings.h>
#include "etm.h"
#include "ffs.h"
#include "tmffs2.h"
#include "limits.h"
#include "ffslimits.h"
#include "localtypes.h"
#include "localstruct.h"
#include "exitcodes.h"

extern u_char rvi_msg[];
extern int rvi_msg_len;

do_symlink(target, realobj)
	char *target, *realobj;
{
	u_char cmdpkt[MAX_PKT_TO_TARGET], *dp;
	int rc, targlen, reallen;

	reallen = strlen(realobj);
	if (reallen >= TMFFS_STRING_SIZE) {
		printf("error: pathname arg exceeds string length limit\n");
		return(ERROR_USAGE);
	}
	targlen = strlen(target);
	if (3 + (reallen+2) + (targlen+2) + 1 > MAX_PKT_TO_TARGET) {
		printf("error: symlink request fails to fit into packet\n");
		return(ERROR_USAGE);
	}
	dp = cmdpkt + 1;
	*dp++ = ETM_FFS2;
	*dp++ = TMFFS_SYMLINK;
	*dp++ = reallen + 1;
	strcpy(dp, realobj);
	dp += reallen + 1;
	*dp++ = targlen + 1;
	strcpy(dp, target);
	dp += targlen + 1;
	rc = etm_pkt_exch(cmdpkt, dp - cmdpkt - 1);
	if (rc)
		return(rc);
	if (rvi_msg_len != 5) {
		printf("error: TMFFS_SYMLINK response has wrong length\n");
		return(ERROR_TARGET);
	}
	if (rvi_msg[3]) {
		report_ffs_err("symlink", rvi_msg[3]);
		return(ERROR_TARGET);
	}
	return(0);
}

cmd_symlink(argc, argv)
	char **argv;
{
	return do_symlink(argv[1], argv[2]);
}

do_readlink(pathname, databuf, rdret)
	char *pathname;
	u_char *databuf;
	int *rdret;
{
	u_char cmdpkt[MAX_PKT_TO_TARGET], *dp;
	int rc, slen, sz;

	slen = strlen(pathname);
	if (slen >= TMFFS_STRING_SIZE) {
		printf("error: pathname arg exceeds string length limit\n");
		return(ERROR_USAGE);
	}
	dp = cmdpkt + 1;
	*dp++ = ETM_FFS2;
	*dp++ = TMFFS_READLINK;
	*dp++ = slen + 1;
	strcpy(dp, pathname);
	dp += slen + 1;
	*dp++ = 0;	/* dummy 2nd buffer */
	rc = etm_pkt_exch(cmdpkt, dp - cmdpkt - 1);
	if (rc)
		return(rc);
	if (rvi_msg[3]) {
		report_ffs_err("readlink", rvi_msg[3]);
		return(ERROR_TARGET);
	}
	if (rvi_msg_len < 6) {
		*rdret = 0;
		return(0);
	}
	sz = rvi_msg[4];
	if (rvi_msg_len != sz + 6) {
		printf("error: readlink response has wrong length\n");
		return(ERROR_TARGET);
	}
	bcopy(rvi_msg + 5, databuf, sz);
	*rdret = sz;
	return(0);
}

cmd_readlink(argc, argv)
	char **argv;
{
	u_char databuf[256];
	int rc, sz, off, l;

	rc = do_readlink(argv[1], databuf, &sz);
	if (rc)
		return(rc);
	printf("%d bytes read\n", sz);
	for (off = 0; off < sz; off += 16) {
		l = sz - off;
		if (l > 16)
			l = 16;
		hexdump_line(off, databuf + off, l);
	}
	return(0);
}

do_readlink_sancheck(pathname, databuf)
	char *pathname;
	u_char *databuf;
{
	int rc, sz;

	rc = do_readlink(pathname, databuf, &sz);
	if (rc)
		return(rc);
	if (sz < 2 || databuf[sz-1]) {
		printf("error: readlink on %s returned garbage\n", pathname);
		return(ERROR_TARGET);
	}
	return(0);
}