FreeCalypso > hg > freecalypso-tools
view rvinterf/old/before-rvinterf/etmsend.c @ 497:74610c4f10f7
target-utils: added 10 ms delay at the end of abb_power_off()
The deosmification of the ABB access code (replacement of osmo_delay_ms()
bogus delays with correctly-timed ones, which are significantly shorter)
had one annoying side effect: when executing the poweroff command from
any of the programs, one last '=' prompt character was being sent (and
received by the x86 host) as the Calypso board powers off. With delays
being shorter now, the abb_power_off() function was returning and the
standalone program's main loop was printing its prompt before the Iota chip
fully executed the switch-off sequence!
I thought about inserting an endless tight loop at the end of the
abb_power_off() function, but the implemented solution of a 10 ms delay
is a little nicer IMO because if the DEVOFF operation doesn't happen for
some reason in a manual hacking scenario, there won't be an artificial
blocker in the form of a tight loop keeping us from further poking around.
author | Mychaela Falconia <falcon@freecalypso.org> |
---|---|
date | Sat, 25 May 2019 20:44:05 +0000 |
parents | e7502631a0f9 |
children |
line wrap: on
line source
/* * This program is a hack that sends a hand-crafted ETM packet * to the UNIX-local dgram socket established by rvtdump with -s option. */ #include <sys/types.h> #include <sys/socket.h> #include <sys/un.h> #include <stdio.h> #include <string.h> #include <strings.h> #include <stdlib.h> #include <unistd.h> #include "pktmux.h" #include "txpkt.h" char sockpath[] = "/tmp/rvt_send_socket"; u_char packet[MAX_PKT_TO_TARGET]; int payload_len; main(argc, argv) char **argv; { int i, c, s; struct sockaddr_un local; unsigned int namelen; if (argc < 2) { fprintf(stderr, "usage: %s hexbytes...\n", argv[0]); exit(1); } payload_len = argc - 1; if (payload_len > MAX_PKT_TO_TARGET-2) { fprintf(stderr, "%s: too many bytes (packet length limit exceeded)\n", argv[0]); exit(1); } packet[0] = RVT_TM_HEADER; for (i = 1; i <= payload_len; i++) packet[i] = strtoul(argv[i], 0, 16); c = 0; for (i = 1; i <= payload_len; i++) c ^= packet[i]; packet[payload_len+1] = c; s = socket(AF_UNIX, SOCK_DGRAM, 0); if (s < 0) { perror("socket(AF_UNIX, SOCK_DGRAM, 0)"); exit(1); } local.sun_family = AF_UNIX; strncpy(local.sun_path, sockpath, sizeof(local.sun_path)); local.sun_path[sizeof(local.sun_path) - 1] = '\0'; /* we use the same magic that X11 uses in Xtranssock.c for * calculating the proper length of the sockaddr */ #if defined(BSD44SOCKETS) || defined(__UNIXWARE__) local.sun_len = strlen(local.sun_path); #endif #if defined(BSD44SOCKETS) || defined(SUN_LEN) namelen = SUN_LEN(&local); #else namelen = strlen(local.sun_path) + offsetof(struct sockaddr_un, sun_path); #endif i = sendto(s, packet, payload_len+2, 0, (struct sockaddr *) &local, namelen); if (i < 0) { perror("sendto"); exit(1); } exit(0); }