- /* but the flag register wants them here, with 1 meaning "disable channel" */
- flag_reg |= ~(changrp_mask << 2) & 0x3c;
-
- data = flag_reg << 24;
- if(send_longcommand(sdi->serial->fd, CMD_SET_FLAGS, data) != SIGROK_OK)
- return SIGROK_ERR;
-
- /* start acquisition on the device */
- if(send_shortcommand(sdi->serial->fd, CMD_RUN) != SIGROK_OK)
- return SIGROK_ERR;
-
- source_add(sdi->serial->fd, G_IO_IN, -1, receive_data, session_device_id);
-
- /* send header packet to the session bus */
- packet = g_malloc(sizeof(struct datafeed_packet));
- header = g_malloc(sizeof(struct datafeed_header));
- if(!packet || !header)
- return SIGROK_ERR;
- packet->type = DF_HEADER;
- packet->length = sizeof(struct datafeed_header);
- packet->payload = (unsigned char *) header;
+
+ /*
+ * Limit readcount to prevent reading past the end of the hardware
+ * buffer.
+ */
+ readcount = MIN(ctx->max_samples / num_channels, ctx->limit_samples) / 4;
+
+ memset(trigger_config, 0, 16);
+ trigger_config[ctx->num_stages - 1] |= 0x08;
+ if (ctx->trigger_mask[0]) {
+ delaycount = readcount * (1 - ctx->capture_ratio / 100.0);
+ ctx->trigger_at = (readcount - delaycount) * 4 - ctx->num_stages;
+
+ if (send_longcommand(ctx->serial->fd, CMD_SET_TRIGGER_MASK_0,
+ reverse32(ctx->trigger_mask[0])) != SR_OK)
+ return SR_ERR;
+ if (send_longcommand(ctx->serial->fd, CMD_SET_TRIGGER_VALUE_0,
+ reverse32(ctx->trigger_value[0])) != SR_OK)
+ return SR_ERR;
+ if (send_longcommand(ctx->serial->fd, CMD_SET_TRIGGER_CONFIG_0,
+ trigger_config[0]) != SR_OK)
+ return SR_ERR;
+
+ if (send_longcommand(ctx->serial->fd, CMD_SET_TRIGGER_MASK_1,
+ reverse32(ctx->trigger_mask[1])) != SR_OK)
+ return SR_ERR;
+ if (send_longcommand(ctx->serial->fd, CMD_SET_TRIGGER_VALUE_1,
+ reverse32(ctx->trigger_value[1])) != SR_OK)
+ return SR_ERR;
+ if (send_longcommand(ctx->serial->fd, CMD_SET_TRIGGER_CONFIG_1,
+ trigger_config[1]) != SR_OK)
+ return SR_ERR;
+
+ if (send_longcommand(ctx->serial->fd, CMD_SET_TRIGGER_MASK_2,
+ reverse32(ctx->trigger_mask[2])) != SR_OK)
+ return SR_ERR;
+ if (send_longcommand(ctx->serial->fd, CMD_SET_TRIGGER_VALUE_2,
+ reverse32(ctx->trigger_value[2])) != SR_OK)
+ return SR_ERR;
+ if (send_longcommand(ctx->serial->fd, CMD_SET_TRIGGER_CONFIG_2,
+ trigger_config[2]) != SR_OK)
+ return SR_ERR;
+
+ if (send_longcommand(ctx->serial->fd, CMD_SET_TRIGGER_MASK_3,
+ reverse32(ctx->trigger_mask[3])) != SR_OK)
+ return SR_ERR;
+ if (send_longcommand(ctx->serial->fd, CMD_SET_TRIGGER_VALUE_3,
+ reverse32(ctx->trigger_value[3])) != SR_OK)
+ return SR_ERR;
+ if (send_longcommand(ctx->serial->fd, CMD_SET_TRIGGER_CONFIG_3,
+ trigger_config[3]) != SR_OK)
+ return SR_ERR;
+ } else {
+ if (send_longcommand(ctx->serial->fd, CMD_SET_TRIGGER_MASK_0,
+ ctx->trigger_mask[0]) != SR_OK)
+ return SR_ERR;
+ if (send_longcommand(ctx->serial->fd, CMD_SET_TRIGGER_VALUE_0,
+ ctx->trigger_value[0]) != SR_OK)
+ return SR_ERR;
+ if (send_longcommand(ctx->serial->fd, CMD_SET_TRIGGER_CONFIG_0,
+ 0x00000008) != SR_OK)
+ return SR_ERR;
+ delaycount = readcount;
+ }
+
+ sr_info("ols: setting samplerate to %" PRIu64 " Hz (divider %u, "
+ "demux %s)", ctx->cur_samplerate, ctx->cur_samplerate_divider,
+ ctx->flag_reg & FLAG_DEMUX ? "on" : "off");
+ if (send_longcommand(ctx->serial->fd, CMD_SET_DIVIDER,
+ reverse32(ctx->cur_samplerate_divider)) != SR_OK)
+ return SR_ERR;
+
+ /* Send sample limit and pre/post-trigger capture ratio. */
+ data = ((readcount - 1) & 0xffff) << 16;
+ data |= (delaycount - 1) & 0xffff;
+ if (send_longcommand(ctx->serial->fd, CMD_CAPTURE_SIZE, reverse16(data)) != SR_OK)
+ return SR_ERR;
+
+ /* The flag register wants them here, and 1 means "disable channel". */
+ ctx->flag_reg |= ~(changrp_mask << 2) & 0x3c;
+ ctx->flag_reg |= FLAG_FILTER;
+ ctx->rle_count = 0;
+ data = (ctx->flag_reg << 24) | ((ctx->flag_reg << 8) & 0xff0000);
+ if (send_longcommand(ctx->serial->fd, CMD_SET_FLAGS, data) != SR_OK)
+ return SR_ERR;
+
+ /* Start acquisition on the device. */
+ if (send_shortcommand(ctx->serial->fd, CMD_RUN) != SR_OK)
+ return SR_ERR;
+
+ sr_source_add(ctx->serial->fd, G_IO_IN, -1, receive_data,
+ cb_data);
+
+ if (!(packet = g_try_malloc(sizeof(struct sr_datafeed_packet)))) {
+ sr_err("ols: %s: packet malloc failed", __func__);
+ return SR_ERR_MALLOC;
+ }
+
+ if (!(header = g_try_malloc(sizeof(struct sr_datafeed_header)))) {
+ sr_err("ols: %s: header malloc failed", __func__);
+ g_free(packet);
+ return SR_ERR_MALLOC;
+ }
+
+ /* Send header packet to the session bus. */
+ packet->type = SR_DF_HEADER;
+ packet->payload = (unsigned char *)header;