view rvinterf/old/before-rvinterf/etmsend.c @ 497:74610c4f10f7

target-utils: added 10 ms delay at the end of abb_power_off() The deosmification of the ABB access code (replacement of osmo_delay_ms() bogus delays with correctly-timed ones, which are significantly shorter) had one annoying side effect: when executing the poweroff command from any of the programs, one last '=' prompt character was being sent (and received by the x86 host) as the Calypso board powers off. With delays being shorter now, the abb_power_off() function was returning and the standalone program's main loop was printing its prompt before the Iota chip fully executed the switch-off sequence! I thought about inserting an endless tight loop at the end of the abb_power_off() function, but the implemented solution of a 10 ms delay is a little nicer IMO because if the DEVOFF operation doesn't happen for some reason in a manual hacking scenario, there won't be an artificial blocker in the form of a tight loop keeping us from further poking around.
author Mychaela Falconia <falcon@freecalypso.org>
date Sat, 25 May 2019 20:44:05 +0000
parents e7502631a0f9
children
line wrap: on
line source

/*
 * This program is a hack that sends a hand-crafted ETM packet
 * to the UNIX-local dgram socket established by rvtdump with -s option.
 */

#include <sys/types.h>
#include <sys/socket.h>
#include <sys/un.h>
#include <stdio.h>
#include <string.h>
#include <strings.h>
#include <stdlib.h>
#include <unistd.h>
#include "pktmux.h"
#include "txpkt.h"

char sockpath[] = "/tmp/rvt_send_socket";

u_char packet[MAX_PKT_TO_TARGET];
int payload_len;

main(argc, argv)
	char **argv;
{
	int i, c, s;
	struct sockaddr_un local;
	unsigned int namelen;

	if (argc < 2) {
		fprintf(stderr, "usage: %s hexbytes...\n", argv[0]);
		exit(1);
	}
	payload_len = argc - 1;
	if (payload_len > MAX_PKT_TO_TARGET-2) {
		fprintf(stderr,
			"%s: too many bytes (packet length limit exceeded)\n",
			argv[0]);
		exit(1);
	}

	packet[0] = RVT_TM_HEADER;
	for (i = 1; i <= payload_len; i++)
		packet[i] = strtoul(argv[i], 0, 16);
	c = 0;
	for (i = 1; i <= payload_len; i++)
		c ^= packet[i];
	packet[payload_len+1] = c;

	s = socket(AF_UNIX, SOCK_DGRAM, 0);
	if (s < 0) {
		perror("socket(AF_UNIX, SOCK_DGRAM, 0)");
		exit(1);
	}

	local.sun_family = AF_UNIX;
	strncpy(local.sun_path, sockpath, sizeof(local.sun_path));
	local.sun_path[sizeof(local.sun_path) - 1] = '\0';

	/* we use the same magic that X11 uses in Xtranssock.c for
	 * calculating the proper length of the sockaddr */
#if defined(BSD44SOCKETS) || defined(__UNIXWARE__)
	local.sun_len = strlen(local.sun_path);
#endif
#if defined(BSD44SOCKETS) || defined(SUN_LEN)
	namelen = SUN_LEN(&local);
#else
	namelen = strlen(local.sun_path) +
		  offsetof(struct sockaddr_un, sun_path);
#endif

	i = sendto(s, packet, payload_len+2, 0,
			(struct sockaddr *) &local, namelen);
	if (i < 0) {
		perror("sendto");
		exit(1);
	}

	exit(0);
}