tools: Force sparse verification on TUI

Additionally, because the tool relies 100% on sd card, it will become a Nyx only. Remove the config also, as it will be moved to nyx configuration.
This commit is contained in:
CTCaer
2020-04-06 05:36:09 +03:00
parent dc9c7fd95c
commit 52c506af9a
4 changed files with 23 additions and 103 deletions

View File

@@ -78,7 +78,7 @@ static int _dump_emmc_verify(sdmmc_storage_t *storage, u32 lba_curr, char *outFi
// Check every time or every 4.
// Every 4 protects from fake sd, sector corruption and frequent I/O corruption.
// Full provides all that, plus protection from extremely rare I/O corruption.
if ((h_cfg.verification >= 2) || !(sparseShouldVerify % 4))
if (!(sparseShouldVerify % 4))
{
if (!sdmmc_storage_read(storage, lba_curr, num, bufEm))
{
@@ -307,15 +307,12 @@ static int _dump_emmc_part(char *sd_path, sdmmc_storage_t *storage, emmc_part_t
memset(&fp, 0, sizeof(fp));
currPartIdx++;
if (h_cfg.verification)
// Verify part.
if (_dump_emmc_verify(storage, lbaStartPart, outFilename, part))
{
// Verify part.
if (_dump_emmc_verify(storage, lbaStartPart, outFilename, part))
{
EPRINTF("\nPress any key and try again...\n");
EPRINTF("\nPress any key and try again...\n");
return 0;
}
return 0;
}
_update_filename(outFilename, sdPathLen, numSplitParts, currPartIdx);
@@ -441,18 +438,15 @@ static int _dump_emmc_part(char *sd_path, sdmmc_storage_t *storage, emmc_part_t
// Backup operation ended successfully.
f_close(&fp);
if (h_cfg.verification)
// Verify last part or single file backup.
if (_dump_emmc_verify(storage, lbaStartPart, outFilename, part))
{
// Verify last part or single file backup.
if (_dump_emmc_verify(storage, lbaStartPart, outFilename, part))
{
EPRINTF("\nPress any key and try again...\n");
EPRINTF("\nPress any key and try again...\n");
return 0;
}
else
tui_pbar(0, gfx_con.y, 100, 0xFF96FF00, 0xFF155500);
return 0;
}
else
tui_pbar(0, gfx_con.y, 100, 0xFF96FF00, 0xFF155500);
gfx_con.fntsz = 16;
// Remove partial backup index file if no fatal errors occurred.
@@ -580,10 +574,8 @@ static void _dump_emmc_selected(emmcPartType_t dumpType)
timer = get_tmr_s() - timer;
gfx_printf("Time taken: %dm %ds.\n", timer / 60, timer % 60);
sdmmc_storage_end(&storage);
if (res && h_cfg.verification)
if (res)
gfx_printf("\n%kFinished and verified!%k\nPress any key...\n", 0xFF96FF00, 0xFFCCCCCC);
else if (res)
gfx_printf("\nFinished! Press any key...\n");
out:
sd_unmount();
@@ -713,15 +705,12 @@ static int _restore_emmc_part(char *sd_path, sdmmc_storage_t *storage, emmc_part
memset(&fp, 0, sizeof(fp));
currPartIdx++;
if (h_cfg.verification)
// Verify part.
if (_dump_emmc_verify(storage, lbaStartPart, outFilename, part))
{
// Verify part.
if (_dump_emmc_verify(storage, lbaStartPart, outFilename, part))
{
EPRINTF("\nPress any key and try again...\n");
EPRINTF("\nPress any key and try again...\n");
return 0;
}
return 0;
}
_update_filename(outFilename, sdPathLen, numSplitParts, currPartIdx);
@@ -791,18 +780,15 @@ static int _restore_emmc_part(char *sd_path, sdmmc_storage_t *storage, emmc_part
// Restore operation ended successfully.
f_close(&fp);
if (h_cfg.verification)
// Verify restored data.
if (_dump_emmc_verify(storage, lbaStartPart, outFilename, part))
{
// Verify restored data.
if (_dump_emmc_verify(storage, lbaStartPart, outFilename, part))
{
EPRINTF("\nPress any key and try again...\n");
EPRINTF("\nPress any key and try again...\n");
return 0;
}
else
tui_pbar(0, gfx_con.y, 100, 0xFF96FF00, 0xFF155500);
return 0;
}
else
tui_pbar(0, gfx_con.y, 100, 0xFF96FF00, 0xFF155500);
gfx_con.fntsz = 16;
gfx_puts("\n\n");
@@ -925,10 +911,8 @@ static void _restore_emmc_selected(emmcPartType_t restoreType)
timer = get_tmr_s() - timer;
gfx_printf("Time taken: %dm %ds.\n", timer / 60, timer % 60);
sdmmc_storage_end(&storage);
if (res && h_cfg.verification)
if (res)
gfx_printf("\n%kFinished and verified!%k\nPress any key...\n", 0xFF96FF00, 0xFFCCCCCC);
else if (res)
gfx_printf("\nFinished! Press any key...\n");
out:
sd_unmount();