ChangeFSI broken
Malcolm Hussain-Gambles (1596) 811 posts |
ChangeFSI is broken with the latest ROM 02-Jun-14 on the pandaboard. The previous ROM 29-May-14 is OK, looks like this is to do with the recent BASIC changes :-( |
Steve Pampling (1551) 8172 posts |
I get the same error message relating to a chunk of inline assembler in the RunImage of !Blackhole.
Snap, I’m thinking the same thing. |
Malcolm Hussain-Gambles (1596) 811 posts |
Where did you get Blackhole from, I’ve found v2 but it’s not 32bit compat because of the module :-( |
Sprow (202) 1158 posts |
Looks like I didn’t think through the optimisation of “a number greater than 9 is implicitly greater than 5”. In the spirit of optimisation my fix for that is to delete another instruction! Try again with tomorrow’s ROM. |
Steve Pampling (1551) 8172 posts |
No, Blackhole 2, just a few modifications for the beagle (which doesn’t have ADFS and complains about that, but the core function works after a small hack) and the Hole module needs a small alteration to work with RO5. The hole350 module just needs a tidy replacement for the MOVS PC,LR and a 32 bit header. When I did it I went for a crude MOVS —> MOV. While that works, it probably isn’t the neatest answer so I think I will run it through again . It keeps me amused when there’s nothing decent on the TV1 and I want to forget about work. 1 Which is most of the time |
Mike Morris (1852) 89 posts |
Having a good recycle bin is one of the things I miss most about RO4 and RO6 (and, I feel, is one of the biggest omissions of RO5). For many years I used Blackhole under RO4 – would you be able share your modified version? If so, would it run on a Raspberry Pi? (I’d be very happy to test it out :-). Part of the copyright bit of Blackhole2 states: “If you wish to use pieces of my code in your own pd programs then please feel free to do so, provided these programs are not intented (sic) for sale.” So perhaps there wouldn’t be too much of a problem there, providing the original author was credited? |
Fred Graute (114) 645 posts |
What version of BlackHole is that? My copy has a Hole500 module and works on the Iyonix.
Alas, just above the bit that you quoted the conditions on distribution state: “b) That the application is supplied unchanged.” |
Steve Pampling (1551) 8172 posts |
Blackhole 2 version 4.18 Never seen a later version. It doesn’t have a Hole500. What’s your source? |
Mike Morris (1852) 89 posts |
Yes, there is quite some ambivalence in the legal bits but I prefer to go with the spirit of the thing :-) Seriously, it’s such a good application maybe it’s worth finding out what the score is direct from the author, Mark Greenwood, if he’s still contactable. That is of course if Steve P is OK about it all? |
Malcolm Hussain-Gambles (1596) 811 posts |
There’s a lot of nice little apps like this (memphis being one), is BSD the preferred licence? |
Fred Graute (114) 645 posts |
It was on one of the last Foundation RISC User CDs. Annoyingly it’s also marked 4.18, the Hole500 module is dated 18 Apr 2004
The spirit is that you must distribute the application unchanged. The fact that you are allowed to use bits of the software in your own projects is completely separate from that. Contacting authors to try and keep software alive is always a good idea as we’ve lost way too much good stuff already. It may even yield an unexpected result, I recently contacted Alisdair McDiarmid about Transient’s licence and ended up with the copyright being transferred to me. |
Mike Morris (1852) 89 posts |
Did you miss my smiley? Perhaps it was a joke that software authors would find in poor taste – in which case I apologise – but, nevertheless, it was a joke. Anyway, I’ve emailed Mark Greenwood at the address given at the end of BlackHole’s Legal & Copyright bit. If the email address is still used by him and if he responds I’ll let you know what the outcome is. |
Malcolm Hussain-Gambles (1596) 811 posts |
Fixed, thanks. |
Steve Pampling (1551) 8172 posts |
Tried emailing last year. No response. If you think about it a combination of the Hole filer delete interception and Freds “Transient” would be a better bet. Ideally the filer delete being intercepted would produce a captured file with path in the recycle bin so that a restore to original location is easier. Which of course means neither Blackhole, nor I think Transient, fit the bill exactly. |
Steve Pampling (1551) 8172 posts |
Confirmed. Nice quick fix. |
Andrew Conroy (370) 740 posts |
The best Recycle bin I’ve found has been !Recycler from Fabis (and now APDL?). It allows restore to original location, allows for multiple deletions of the same object, traps overwrites as well as deletes and has a whitelist of locations not to trap from. If it could be made RO5 compatible, it would be ideal, in my view. Alternatively, if the OS could provide the relevant hooks to allow easy trapping of deletes and overwrites I guess a new one could be made. |
Steve Pampling (1551) 8172 posts |
The Hole module in Blackhole already does both deletes and overwrites. |
Fred Graute (114) 645 posts |
No, I didn’t miss the smiley but your earlier quote along with going with the spirit rather than what the licence actually said, seemed to suggest that you thought taking liberties was all right. Apologies if I read too much into it.
That’s actually one of the additions to Transient that Alisdair was thinking of, but he never finished it. Trapping Filer deletes is easy, the hard part is finding out which top level objects are about to be deleted. Sitting on FileV or upcall 3,6 (which is what BlackHole does) gives you a bottom up view of deletions. Just enable ‘Trap Filer Deletes’ in BlackHole then delete an application to see what that results in. What you really want is to move an application or directory in its entirety to the bin, keeping its structure intact. I guess the easiest way would be to exrend FilerAction, as per ROL branch, it probably could be done without that I think but with some difficulty.
How did it handle applications/directories? Were they kept intact or did you end up with a bunch of individual files? |
Steve Pampling (1551) 8172 posts |
Yeah, hence my comment about needing to capture the path info. |
Rick Murray (539) 13850 posts |
Certainly – otherwise how can you tell the difference between “user is deleting these files within !App” and “user is deleting !App”?
I wonder if this isn’t something that a “bin” could handle at its UI end? While the files might appear as a disparate list of files, if the containing directory itself should become one of the deleted objects, the bin software could consolidate everything within into one item, to permit you to undelete each file individually, or the whole lot in one click. A good test, perhaps, is to create a directory “test”, copy in half a dozen files (001, 002 … 006). Delete the directory. |
Andrew Conroy (370) 740 posts |
It just creates a pile of files, not files in a directory structure, sadly. Last time I tried Blackhole (a long time ago, mind), I didn’t find the ‘trap overwrites’ feature, so moved on. Does it have a ‘whitelist’ too, so you can tell it not to trap from certain locations (eg. !Scrap)? |
Fred Graute (114) 645 posts |
Yes, if you keep track of the full paths then you can restore the original app/dir and if you implement Rick’s suggestion of adding some cleverness to the UI you wouldn’t have to hand-pick all the constituent files. However if objects could be dragged to the bin too you’d end up with individual files if you used Filer delete but with an intact app/dir when dragging to the bin – unless you’d split drags up in separate files too (which seems silly to me). The same goes for OS_File 6 vs OS_FSControl 27. Personally I’d prefer the bin to deal with top level objects as much as possible, it makes for a tidier bin and possibly a simpler UI. Nevertheless I’ll have a think about Rick’s suggestions.
How would it handle restoring a file that’s nested inside a deleted app/dir? Recreate the higher level directories or say the file can’t be restored. |
Fred Graute (114) 645 posts |
Thanks, so it’s basically the same as BlackHole in this regard.
Yes, you can tell it to not trap certain paths. |
Andrew Conroy (370) 740 posts |
Sounds like BlackHole is pretty much what’s wanted, apart from the keeping directory structures intact then. The only problem seems to be that there’s no way of getting hold of a fully RPi compatible version now, if I follow the thread correctly? |
Chris Hall (132) 3558 posts |
One possible solution is to distribute the application unchanged along with another application that makes the necessary changes to the binary in the first application. |