focaltech_flash.c 50 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093
  1. /*
  2. *
  3. * FocalTech fts TouchScreen driver.
  4. *
  5. * Copyright (c) 2012-2019, Focaltech Ltd. All rights reserved.
  6. *
  7. * This software is licensed under the terms of the GNU General Public
  8. * License version 2, as published by the Free Software Foundation, and
  9. * may be copied, distributed, and modified under those terms.
  10. *
  11. * This program is distributed in the hope that it will be useful,
  12. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  13. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  14. * GNU General Public License for more details.
  15. *
  16. */
  17. /*****************************************************************************
  18. *
  19. * File Name: focaltech_flash.c
  20. *
  21. * Author: Focaltech Driver Team
  22. *
  23. * Created: 2016-08-08
  24. *
  25. * Abstract:
  26. *
  27. * Reference:
  28. *
  29. *****************************************************************************/
  30. /*****************************************************************************
  31. * 1.Included header files
  32. *****************************************************************************/
  33. #include "focaltech_core.h"
  34. #include "focaltech_flash.h"
  35. /*****************************************************************************
  36. * Private constant and macro definitions using #define
  37. *****************************************************************************/
  38. #define FTS_FW_REQUEST_SUPPORT 1
  39. /* Example: focaltech_ts_fw_tianma.bin */
  40. #define FTS_FW_NAME_PREX_WITH_REQUEST "focaltech_ts_fw_"
  41. /*****************************************************************************
  42. * Global variable or extern global variabls/functions
  43. *****************************************************************************/
  44. u8 fw_file[1] = {
  45. 0,
  46. };
  47. struct upgrade_module module_list[] = {
  48. {FTS_MODULE_ID, FTS_MODULE_NAME, fw_file, sizeof(fw_file)},
  49. {FTS_MODULE2_ID, FTS_MODULE2_NAME, fw_file, sizeof(fw_file)},
  50. };
  51. struct upgrade_func upgrade_func_ft8720 = {
  52. .ctype = {0x1C},
  53. .fwveroff = 0x210E,
  54. .fwcfgoff = 0x1000,
  55. .appoff = 0x2000,
  56. .licoff = 0x0000,
  57. .appoff_handle_in_ic = true,
  58. .pramboot_supported = false,
  59. .new_return_value_from_ic = true,
  60. .hid_supported = false,
  61. };
  62. struct upgrade_func *upgrade_func_list[] = {
  63. &upgrade_func_ft5452,
  64. &upgrade_func_ft5652,
  65. &upgrade_func_ft8720,
  66. };
  67. struct fts_upgrade *fwupgrade;
  68. /*****************************************************************************
  69. * Static function prototypes
  70. *****************************************************************************/
  71. static bool fts_fwupg_check_state(
  72. struct fts_upgrade *upg, enum FW_STATUS rstate);
  73. /************************************************************************
  74. * Name: fts_fwupg_get_boot_state
  75. * Brief: read boot id(rom/pram/bootloader), confirm boot environment
  76. * Input:
  77. * Output:
  78. * Return: return 0 if success, otherwise return error code
  79. ***********************************************************************/
  80. static int fts_fwupg_get_boot_state(
  81. struct fts_upgrade *upg,
  82. enum FW_STATUS *fw_sts)
  83. {
  84. int ret = 0;
  85. u8 cmd[4] = { 0 };
  86. u32 cmd_len = 0;
  87. u8 val[2] = { 0 };
  88. struct ft_chip_t *ids = NULL;
  89. FTS_INFO("**********read boot id**********");
  90. if ((!upg) || (!upg->func) || (!upg->ts_data) || (!fw_sts)) {
  91. FTS_ERROR("upg/func/ts_data/fw_sts is null");
  92. return -EINVAL;
  93. }
  94. if (upg->func->hid_supported)
  95. fts_hid2std();
  96. cmd[0] = FTS_CMD_START1;
  97. cmd[1] = FTS_CMD_START2;
  98. if (upg->func->upgspec_version >= UPGRADE_SPEC_V_1_0)
  99. cmd_len = 1;
  100. else
  101. cmd_len = 2;
  102. ret = fts_write(cmd, cmd_len);
  103. if (ret < 0) {
  104. FTS_ERROR("write 55 cmd fail");
  105. return ret;
  106. }
  107. msleep(FTS_CMD_START_DELAY);
  108. cmd[0] = FTS_CMD_READ_ID;
  109. cmd[1] = cmd[2] = cmd[3] = 0x00;
  110. if (fts_data->ic_info.is_incell ||
  111. (upg->func->upgspec_version >= UPGRADE_SPEC_V_1_0))
  112. cmd_len = FTS_CMD_READ_ID_LEN_INCELL;
  113. else
  114. cmd_len = FTS_CMD_READ_ID_LEN;
  115. ret = fts_read(cmd, cmd_len, val, 2);
  116. if (ret < 0) {
  117. FTS_ERROR("write 90 cmd fail");
  118. return ret;
  119. }
  120. FTS_INFO("read boot id:0x%02x%02x", val[0], val[1]);
  121. ids = &upg->ts_data->ic_info.ids;
  122. if ((val[0] == ids->rom_idh) && (val[1] == ids->rom_idl)) {
  123. FTS_INFO("tp run in romboot");
  124. *fw_sts = FTS_RUN_IN_ROM;
  125. } else if ((val[0] == ids->pb_idh) && (val[1] == ids->pb_idl)) {
  126. FTS_INFO("tp run in pramboot");
  127. *fw_sts = FTS_RUN_IN_PRAM;
  128. } else if ((val[0] == ids->bl_idh) && (val[1] == ids->bl_idl)) {
  129. FTS_INFO("tp run in bootloader");
  130. *fw_sts = FTS_RUN_IN_BOOTLOADER;
  131. }
  132. return 0;
  133. }
  134. static int fts_fwupg_reset_to_boot(struct fts_upgrade *upg)
  135. {
  136. int ret = 0;
  137. u8 reg = FTS_REG_UPGRADE;
  138. FTS_INFO("send 0xAA and 0x55 to FW, reset to boot environment");
  139. if (upg && upg->func && upg->func->is_reset_register_BC) {
  140. reg = FTS_REG_UPGRADE2;
  141. }
  142. ret = fts_write_reg(reg, FTS_UPGRADE_AA);
  143. if (ret < 0) {
  144. FTS_ERROR("write FC=0xAA fail");
  145. return ret;
  146. }
  147. msleep(FTS_DELAY_UPGRADE_AA);
  148. ret = fts_write_reg(reg, FTS_UPGRADE_55);
  149. if (ret < 0) {
  150. FTS_ERROR("write FC=0x55 fail");
  151. return ret;
  152. }
  153. msleep(FTS_DELAY_UPGRADE_RESET);
  154. return 0;
  155. }
  156. /************************************************************************
  157. * Name: fts_fwupg_reset_to_romboot
  158. * Brief: reset to romboot, to load pramboot
  159. * Input:
  160. * Output:
  161. * Return: return 0 if success, otherwise return error code
  162. ***********************************************************************/
  163. static int fts_fwupg_reset_to_romboot(struct fts_upgrade *upg)
  164. {
  165. int ret = 0;
  166. int i = 0;
  167. u8 cmd = FTS_CMD_RESET;
  168. enum FW_STATUS state = FTS_RUN_IN_ERROR;
  169. ret = fts_write(&cmd, 1);
  170. if (ret < 0) {
  171. FTS_ERROR("pram/rom/bootloader reset cmd write fail");
  172. return ret;
  173. }
  174. mdelay(10);
  175. for (i = 0; i < FTS_UPGRADE_LOOP; i++) {
  176. ret = fts_fwupg_get_boot_state(upg, &state);
  177. if (FTS_RUN_IN_ROM == state)
  178. break;
  179. mdelay(5);
  180. }
  181. if (i >= FTS_UPGRADE_LOOP) {
  182. FTS_ERROR("reset to romboot fail");
  183. return -EIO;
  184. }
  185. return 0;
  186. }
  187. static u16 fts_crc16_calc_host(u8 *pbuf, u32 length)
  188. {
  189. u16 ecc = 0;
  190. u32 i = 0;
  191. u32 j = 0;
  192. for ( i = 0; i < length; i += 2 ) {
  193. ecc ^= ((pbuf[i] << 8) | (pbuf[i + 1]));
  194. for (j = 0; j < 16; j ++) {
  195. if (ecc & 0x01)
  196. ecc = (u16)((ecc >> 1) ^ AL2_FCS_COEF);
  197. else
  198. ecc >>= 1;
  199. }
  200. }
  201. return ecc;
  202. }
  203. static u16 fts_pram_ecc_calc_host(u8 *pbuf, u32 length)
  204. {
  205. return fts_crc16_calc_host(pbuf, length);
  206. }
  207. static int fts_pram_ecc_cal_algo(
  208. struct fts_upgrade *upg,
  209. u32 start_addr,
  210. u32 ecc_length)
  211. {
  212. int ret = 0;
  213. int i = 0;
  214. int ecc = 0;
  215. u8 val[2] = { 0 };
  216. u8 tmp = 0;
  217. u8 cmd[FTS_ROMBOOT_CMD_ECC_NEW_LEN] = { 0 };
  218. FTS_INFO("read out pramboot checksum");
  219. if ((!upg) || (!upg->func)) {
  220. FTS_ERROR("upg/func is null");
  221. return -EINVAL;
  222. }
  223. cmd[0] = FTS_ROMBOOT_CMD_ECC;
  224. cmd[1] = BYTE_OFF_16(start_addr);
  225. cmd[2] = BYTE_OFF_8(start_addr);
  226. cmd[3] = BYTE_OFF_0(start_addr);
  227. cmd[4] = BYTE_OFF_16(ecc_length);
  228. cmd[5] = BYTE_OFF_8(ecc_length);
  229. cmd[6] = BYTE_OFF_0(ecc_length);
  230. ret = fts_write(cmd, FTS_ROMBOOT_CMD_ECC_NEW_LEN);
  231. if (ret < 0) {
  232. FTS_ERROR("write pramboot ecc cal cmd fail");
  233. return ret;
  234. }
  235. cmd[0] = FTS_ROMBOOT_CMD_ECC_FINISH;
  236. for (i = 0; i < FTS_ECC_FINISH_TIMEOUT; i++) {
  237. msleep(1);
  238. ret = fts_read(cmd, 1, val, 1);
  239. if (ret < 0) {
  240. FTS_ERROR("ecc_finish read cmd fail");
  241. return ret;
  242. }
  243. if (upg->func->new_return_value_from_ic ||
  244. (upg->func->upgspec_version >= UPGRADE_SPEC_V_1_0)) {
  245. tmp = FTS_ROMBOOT_CMD_ECC_FINISH_OK_A5;
  246. } else {
  247. tmp = FTS_ROMBOOT_CMD_ECC_FINISH_OK_00;
  248. }
  249. if (tmp == val[0])
  250. break;
  251. }
  252. if (i >= FTS_ECC_FINISH_TIMEOUT) {
  253. FTS_ERROR("wait ecc finish fail");
  254. return -EIO;
  255. }
  256. cmd[0] = FTS_ROMBOOT_CMD_ECC_READ;
  257. ret = fts_read(cmd, 1, val, 2);
  258. if (ret < 0) {
  259. FTS_ERROR("read pramboot ecc fail");
  260. return ret;
  261. }
  262. ecc = ((u16)(val[0] << 8) + val[1]) & 0x0000FFFF;
  263. return ecc;
  264. }
  265. static int fts_pram_ecc_cal_xor(void)
  266. {
  267. int ret = 0;
  268. u8 reg_val = 0;
  269. FTS_INFO("read out pramboot checksum");
  270. ret = fts_read_reg(FTS_ROMBOOT_CMD_ECC, &reg_val);
  271. if (ret < 0) {
  272. FTS_ERROR("read pramboot ecc fail");
  273. return ret;
  274. }
  275. return (int)reg_val;
  276. }
  277. static int fts_pram_ecc_cal(struct fts_upgrade *upg, u32 saddr, u32 len)
  278. {
  279. if ((!upg) || (!upg->func)) {
  280. FTS_ERROR("upg/func is null");
  281. return -EINVAL;
  282. }
  283. if ((upg->func->pram_ecc_check_mode == ECC_CHECK_MODE_CRC16) ||
  284. (upg->func->upgspec_version >= UPGRADE_SPEC_V_1_0))
  285. return fts_pram_ecc_cal_algo(upg, saddr, len);
  286. return fts_pram_ecc_cal_xor();
  287. }
  288. static int fts_pram_write_buf(struct fts_upgrade *upg, u8 *buf, u32 len)
  289. {
  290. int ret = 0;
  291. u32 i = 0;
  292. u32 j = 0;
  293. u32 offset = 0;
  294. u32 remainder = 0;
  295. u32 packet_number;
  296. u32 packet_len = 0;
  297. u8 packet_buf[FTS_FLASH_PACKET_LENGTH + FTS_CMD_WRITE_LEN] = { 0 };
  298. u8 ecc_tmp = 0;
  299. int ecc_in_host = 0;
  300. u32 cmdlen = 0;
  301. FTS_INFO("write pramboot to pram");
  302. if ((!upg) || (!upg->func) || !buf) {
  303. FTS_ERROR("upg/func/buf is null");
  304. return -EINVAL;
  305. }
  306. FTS_INFO("pramboot len=%d", len);
  307. if ((len < PRAMBOOT_MIN_SIZE) || (len > PRAMBOOT_MAX_SIZE)) {
  308. FTS_ERROR("pramboot length(%d) fail", len);
  309. return -EINVAL;
  310. }
  311. packet_number = len / FTS_FLASH_PACKET_LENGTH;
  312. remainder = len % FTS_FLASH_PACKET_LENGTH;
  313. if (remainder > 0)
  314. packet_number++;
  315. packet_len = FTS_FLASH_PACKET_LENGTH;
  316. for (i = 0; i < packet_number; i++) {
  317. offset = i * FTS_FLASH_PACKET_LENGTH;
  318. /* last packet */
  319. if ((i == (packet_number - 1)) && remainder)
  320. packet_len = remainder;
  321. if (upg->ts_data->bus_type == BUS_TYPE_SPI_V2) {
  322. packet_buf[0] = FTS_ROMBOOT_CMD_SET_PRAM_ADDR;
  323. packet_buf[1] = BYTE_OFF_16(offset);
  324. packet_buf[2] = BYTE_OFF_8(offset);
  325. packet_buf[3] = BYTE_OFF_0(offset);
  326. ret = fts_write(packet_buf, FTS_ROMBOOT_CMD_SET_PRAM_ADDR_LEN);
  327. if (ret < 0) {
  328. FTS_ERROR("pramboot set write address(%d) fail", i);
  329. return ret;
  330. }
  331. packet_buf[0] = FTS_ROMBOOT_CMD_WRITE;
  332. cmdlen = 1;
  333. } else {
  334. packet_buf[0] = FTS_ROMBOOT_CMD_WRITE;
  335. packet_buf[1] = BYTE_OFF_16(offset);
  336. packet_buf[2] = BYTE_OFF_8(offset);
  337. packet_buf[3] = BYTE_OFF_0(offset);
  338. packet_buf[4] = BYTE_OFF_8(packet_len);
  339. packet_buf[5] = BYTE_OFF_0(packet_len);
  340. cmdlen = 6;
  341. }
  342. for (j = 0; j < packet_len; j++) {
  343. packet_buf[cmdlen + j] = buf[offset + j];
  344. if (upg->func->pram_ecc_check_mode == ECC_CHECK_MODE_XOR)
  345. ecc_tmp ^= packet_buf[cmdlen + j];
  346. }
  347. ret = fts_write(packet_buf, packet_len + cmdlen);
  348. if (ret < 0) {
  349. FTS_ERROR("pramboot write data(%d) fail", i);
  350. return ret;
  351. }
  352. }
  353. if ((upg->func->pram_ecc_check_mode == ECC_CHECK_MODE_CRC16) ||
  354. (upg->func->upgspec_version >= UPGRADE_SPEC_V_1_0))
  355. ecc_in_host = (int)fts_pram_ecc_calc_host(buf, len);
  356. else
  357. ecc_in_host = (int)ecc_tmp;
  358. return ecc_in_host;
  359. }
  360. static int fts_pram_start(void)
  361. {
  362. u8 cmd = FTS_ROMBOOT_CMD_START_APP;
  363. int ret = 0;
  364. FTS_INFO("remap to start pramboot");
  365. ret = fts_write(&cmd, 1);
  366. if (ret < 0) {
  367. FTS_ERROR("write start pram cmd fail");
  368. return ret;
  369. }
  370. msleep(FTS_DELAY_PRAMBOOT_START);
  371. return 0;
  372. }
  373. static int fts_pram_write_remap(struct fts_upgrade *upg)
  374. {
  375. int ret = 0;
  376. int ecc_in_host = 0;
  377. int ecc_in_tp = 0;
  378. u8 *pb_buf = NULL;
  379. u32 pb_len = 0;
  380. FTS_INFO("write pram and remap");
  381. if (!upg || !upg->func || !upg->func->pramboot) {
  382. FTS_ERROR("upg/func/pramboot is null");
  383. return -EINVAL;
  384. }
  385. if (upg->func->pb_length < FTS_MIN_LEN) {
  386. FTS_ERROR("pramboot length(%d) fail", upg->func->pb_length);
  387. return -EINVAL;
  388. }
  389. pb_buf = upg->func->pramboot;
  390. pb_len = upg->func->pb_length;
  391. /* write pramboot to pram */
  392. ecc_in_host = fts_pram_write_buf(upg, pb_buf, pb_len);
  393. if (ecc_in_host < 0) {
  394. FTS_ERROR( "write pramboot fail");
  395. return ecc_in_host;
  396. }
  397. /* read out checksum */
  398. ecc_in_tp = fts_pram_ecc_cal(upg, 0, pb_len);
  399. if (ecc_in_tp < 0) {
  400. FTS_ERROR( "read pramboot ecc fail");
  401. return ecc_in_tp;
  402. }
  403. FTS_INFO("pram ecc in tp:%x, host:%x", ecc_in_tp, ecc_in_host);
  404. /* pramboot checksum != fw checksum, upgrade fail */
  405. if (ecc_in_host != ecc_in_tp) {
  406. FTS_ERROR("pramboot ecc check fail");
  407. return -EIO;
  408. }
  409. /*start pram*/
  410. ret = fts_pram_start();
  411. if (ret < 0) {
  412. FTS_ERROR("pram start fail");
  413. return ret;
  414. }
  415. return 0;
  416. }
  417. static int fts_pram_init(void)
  418. {
  419. int ret = 0;
  420. u8 reg_val = 0;
  421. u8 wbuf[3] = { 0 };
  422. FTS_INFO("pramboot initialization");
  423. /* read flash ID */
  424. wbuf[0] = FTS_CMD_FLASH_TYPE;
  425. ret = fts_read(wbuf, 1, &reg_val, 1);
  426. if (ret < 0) {
  427. FTS_ERROR("read flash type fail");
  428. return ret;
  429. }
  430. /* set flash clk */
  431. wbuf[0] = FTS_CMD_FLASH_TYPE;
  432. wbuf[1] = reg_val;
  433. wbuf[2] = 0x00;
  434. ret = fts_write(wbuf, 3);
  435. if (ret < 0) {
  436. FTS_ERROR("write flash type fail");
  437. return ret;
  438. }
  439. return 0;
  440. }
  441. static int fts_pram_write_init(struct fts_upgrade *upg)
  442. {
  443. int ret = 0;
  444. bool state = 0;
  445. enum FW_STATUS status = FTS_RUN_IN_ERROR;
  446. FTS_INFO("**********pram write and init**********");
  447. if ((NULL == upg) || (NULL == upg->func)) {
  448. FTS_ERROR("upgrade/func is null");
  449. return -EINVAL;
  450. }
  451. if (!upg->func->pramboot_supported) {
  452. FTS_ERROR("ic not support pram");
  453. return -EINVAL;
  454. }
  455. FTS_DEBUG("check whether tp is in romboot or not ");
  456. /* need reset to romboot when non-romboot state */
  457. ret = fts_fwupg_get_boot_state(upg, &status);
  458. if (status != FTS_RUN_IN_ROM) {
  459. if (FTS_RUN_IN_PRAM == status) {
  460. FTS_INFO("tp is in pramboot, need send reset cmd before upgrade");
  461. ret = fts_pram_init();
  462. if (ret < 0) {
  463. FTS_ERROR("pramboot(before) init fail");
  464. return ret;
  465. }
  466. }
  467. FTS_INFO("tp isn't in romboot, need send reset to romboot");
  468. ret = fts_fwupg_reset_to_romboot(upg);
  469. if (ret < 0) {
  470. FTS_ERROR("reset to romboot fail");
  471. return ret;
  472. }
  473. }
  474. /* check the length of the pramboot */
  475. ret = fts_pram_write_remap(upg);
  476. if (ret < 0) {
  477. FTS_ERROR("pram write fail, ret=%d", ret);
  478. return ret;
  479. }
  480. FTS_DEBUG("after write pramboot, confirm run in pramboot");
  481. state = fts_fwupg_check_state(upg, FTS_RUN_IN_PRAM);
  482. if (!state) {
  483. FTS_ERROR("not in pramboot");
  484. return -EIO;
  485. }
  486. ret = fts_pram_init();
  487. if (ret < 0) {
  488. FTS_ERROR("pramboot init fail");
  489. return ret;
  490. }
  491. return 0;
  492. }
  493. static bool fts_fwupg_check_fw_valid(void)
  494. {
  495. int ret = 0;
  496. ret = fts_wait_tp_to_valid();
  497. if (ret < 0) {
  498. FTS_INFO("tp fw invaild");
  499. return false;
  500. }
  501. FTS_INFO("tp fw vaild");
  502. return true;
  503. }
  504. /************************************************************************
  505. * Name: fts_fwupg_check_state
  506. * Brief: confirm tp run in which mode: romboot/pramboot/bootloader
  507. * Input:
  508. * Output:
  509. * Return: return true if state is match, otherwise return false
  510. ***********************************************************************/
  511. static bool fts_fwupg_check_state(
  512. struct fts_upgrade *upg, enum FW_STATUS rstate)
  513. {
  514. int ret = 0;
  515. int i = 0;
  516. enum FW_STATUS cstate = FTS_RUN_IN_ERROR;
  517. for (i = 0; i < FTS_UPGRADE_LOOP; i++) {
  518. ret = fts_fwupg_get_boot_state(upg, &cstate);
  519. /* FTS_DEBUG("fw state=%d, retries=%d", cstate, i); */
  520. if (cstate == rstate)
  521. return true;
  522. msleep(FTS_DELAY_READ_ID);
  523. }
  524. return false;
  525. }
  526. /************************************************************************
  527. * Name: fts_fwupg_reset_in_boot
  528. * Brief: RST CMD(07), reset to romboot(bootloader) in boot environment
  529. * Input:
  530. * Output:
  531. * Return: return 0 if success, otherwise return error code
  532. ***********************************************************************/
  533. int fts_fwupg_reset_in_boot(void)
  534. {
  535. int ret = 0;
  536. u8 cmd = FTS_CMD_RESET;
  537. FTS_INFO("reset in boot environment");
  538. ret = fts_write(&cmd, 1);
  539. if (ret < 0) {
  540. FTS_ERROR("pram/rom/bootloader reset cmd write fail");
  541. return ret;
  542. }
  543. msleep(FTS_DELAY_UPGRADE_RESET);
  544. return 0;
  545. }
  546. static int fts_fwupg_enter_into_boot_old(struct fts_upgrade *upg)
  547. {
  548. int ret = 0;
  549. bool fwvalid = false;
  550. bool state = false;
  551. FTS_INFO("***********enter into pramboot/bootloader***********");
  552. if ((!upg) || (NULL == upg->func)) {
  553. FTS_ERROR("upgrade/func is null");
  554. return -EINVAL;
  555. }
  556. fwvalid = fts_fwupg_check_fw_valid();
  557. if (fwvalid) {
  558. ret = fts_fwupg_reset_to_boot(upg);
  559. if (ret < 0) {
  560. FTS_ERROR("enter into romboot/bootloader fail");
  561. return ret;
  562. }
  563. } else if (upg->func->read_boot_id_need_reset) {
  564. ret = fts_fwupg_reset_in_boot();
  565. if (ret < 0) {
  566. FTS_ERROR("reset before read boot id when fw invalid fail");
  567. return ret;
  568. }
  569. }
  570. if (upg->func->pramboot_supported) {
  571. FTS_INFO("pram supported, write pramboot and init");
  572. /* pramboot */
  573. ret = fts_pram_write_init(upg);
  574. if (ret < 0) {
  575. FTS_ERROR("pram write_init fail");
  576. return ret;
  577. }
  578. } else {
  579. FTS_DEBUG("pram not supported, confirm in bootloader");
  580. /* bootloader */
  581. state = fts_fwupg_check_state(upg, FTS_RUN_IN_BOOTLOADER);
  582. if (!state) {
  583. FTS_ERROR("fw not in bootloader, fail");
  584. return -EIO;
  585. }
  586. }
  587. return 0;
  588. }
  589. static int fts_hardware_reset_to_boot(void)
  590. {
  591. u8 cmd[2] = {0};
  592. int i = 0;
  593. u8 chip_id[2] = { 0 };
  594. u8 id_cmd[4] = { 0 };
  595. int ret = 0;
  596. fts_reset_proc(0);
  597. FTS_INFO("reset finish!!");
  598. usleep_range(10000, 11000);
  599. for (i = 0; i < 20; i++) {
  600. FTS_INFO("start send 55 AA");
  601. cmd[0] = 0x55;
  602. cmd[1] = 0xAA;
  603. ret = fts_write(cmd, 2);
  604. if (ret < 0)
  605. FTS_ERROR("send 55 AA cmd fail");
  606. usleep_range(8000, 9000);
  607. FTS_INFO("start send 90 00 00 00");
  608. id_cmd[0] = 0x90;
  609. id_cmd[1] = id_cmd[2] = id_cmd[3] = 0x00;
  610. ret = fts_read(id_cmd, 1, chip_id, 2);
  611. if (ret < 0)
  612. FTS_ERROR("send 90 cmd fail");
  613. FTS_INFO("read boot id = %x--%x", chip_id[0], chip_id[1]);
  614. if (chip_id[1] == 0xB2)
  615. break;
  616. usleep_range(1000, 2000);
  617. if (i == 10) {
  618. fts_reset_proc(0);
  619. FTS_INFO("reset again finish!!");
  620. usleep_range(10000, 11000);
  621. }
  622. }
  623. if (i >= 20) {
  624. FTS_INFO("enter into romboot fail");
  625. return -EIO;
  626. }
  627. return 0;
  628. }
  629. static int fts_fwupg_enter_into_boot_new(struct fts_upgrade *upg)
  630. {
  631. int ret = 0;
  632. bool state = false;
  633. FTS_INFO("***********enter into pramboot/bootloader***********");
  634. if ((!upg) || (upg->func == NULL)) {
  635. FTS_ERROR("upgrade/func is null");
  636. return -EINVAL;
  637. }
  638. ret = fts_hardware_reset_to_boot();
  639. if (!ret) {
  640. FTS_INFO("tp run in bootloader success");
  641. return ret;
  642. }
  643. if (upg->func->pramboot_supported) {
  644. FTS_INFO("pram supported, write pramboot and init");
  645. /* pramboot */
  646. if (upg->func->write_pramboot_private)
  647. ret = upg->func->write_pramboot_private();
  648. else
  649. ret = fts_pram_write_init(upg);
  650. if (ret < 0) {
  651. FTS_ERROR("pram write_init fail");
  652. return ret;
  653. }
  654. } else {
  655. FTS_DEBUG("pram not supported, confirm in bootloader");
  656. /* bootloader */
  657. state = fts_fwupg_check_state(upg, FTS_RUN_IN_BOOTLOADER);
  658. if (!state) {
  659. FTS_ERROR("fw not in bootloader, fail");
  660. return -EIO;
  661. }
  662. }
  663. return 0;
  664. }
  665. int fts_fwupg_enter_into_boot(void)
  666. {
  667. struct fts_upgrade *upg = fwupgrade;
  668. if (upg->func->upgspec_version >= UPGRADE_SPEC_V_1_0)
  669. return fts_fwupg_enter_into_boot_new(upg);
  670. return fts_fwupg_enter_into_boot_old(upg);
  671. }
  672. /************************************************************************
  673. * Name: fts_fwupg_check_flash_status
  674. * Brief: read status from tp
  675. * Input: flash_status: correct value from tp
  676. * retries: read retry times
  677. * retries_delay: retry delay
  678. * Output:
  679. * Return: return true if flash status check pass, otherwise return false
  680. ***********************************************************************/
  681. static bool fts_fwupg_check_flash_status(
  682. u16 flash_status,
  683. int retries,
  684. int retries_delay)
  685. {
  686. int ret = 0;
  687. int i = 0;
  688. u8 cmd = 0;
  689. u8 val[FTS_CMD_FLASH_STATUS_LEN] = { 0 };
  690. u16 read_status = 0;
  691. for (i = 0; i < retries; i++) {
  692. cmd = FTS_CMD_FLASH_STATUS;
  693. ret = fts_read(&cmd , 1, val, FTS_CMD_FLASH_STATUS_LEN);
  694. read_status = (((u16)val[0]) << 8) + val[1];
  695. if (flash_status == read_status) {
  696. /* FTS_DEBUG("[UPGRADE]flash status ok"); */
  697. return true;
  698. }
  699. /* FTS_DEBUG("flash status fail,ok:%04x read:%04x, retries:%d", flash_status, read_status, i); */
  700. msleep(retries_delay);
  701. }
  702. return false;
  703. }
  704. /************************************************************************
  705. * Name: fts_fwupg_erase
  706. * Brief: erase flash area
  707. * Input: delay - delay after erase
  708. * Output:
  709. * Return: return 0 if success, otherwise return error code
  710. ***********************************************************************/
  711. int fts_fwupg_erase(u32 delay)
  712. {
  713. int ret = 0;
  714. u8 cmd = 0;
  715. bool flag = false;
  716. FTS_INFO("**********erase now**********");
  717. /*send to erase flash*/
  718. cmd = FTS_CMD_ERASE_APP;
  719. ret = fts_write(&cmd, 1);
  720. if (ret < 0) {
  721. FTS_ERROR("erase cmd fail");
  722. return ret;
  723. }
  724. msleep(delay);
  725. /* read status 0xF0AA: success */
  726. flag = fts_fwupg_check_flash_status(FTS_CMD_FLASH_STATUS_ERASE_OK,
  727. FTS_RETRIES_REASE,
  728. FTS_RETRIES_DELAY_REASE);
  729. if (!flag) {
  730. FTS_ERROR("ecc flash status check fail");
  731. return -EIO;
  732. }
  733. return 0;
  734. }
  735. /************************************************************************
  736. * Name: fts_fwupg_ecc_cal
  737. * Brief: calculate and get ecc from tp
  738. * Input: saddr - start address need calculate ecc
  739. * len - length need calculate ecc
  740. * Output:
  741. * Return: return data ecc of tp if success, otherwise return error code
  742. ***********************************************************************/
  743. int fts_fwupg_ecc_cal(u32 saddr, u32 len)
  744. {
  745. int ret = 0;
  746. u32 i = 0;
  747. u32 cmdlen = FTS_CMD_ECC_CAL_LEN;
  748. u8 wbuf[FTS_CMD_ECC_CAL_LEN] = { 0 };
  749. u8 val[FTS_CMD_FLASH_STATUS_LEN] = { 0 };
  750. int ecc = 0;
  751. int ecc_len = 0;
  752. u32 packet_num = 0;
  753. u32 packet_len = 0;
  754. u32 remainder = 0;
  755. u32 addr = 0;
  756. u32 offset = 0;
  757. bool bflag = false;
  758. struct fts_upgrade *upg = fwupgrade;
  759. FTS_INFO( "**********read out checksum**********");
  760. if ((NULL == upg) || (NULL == upg->func)) {
  761. FTS_ERROR("upgrade/func is null");
  762. return -EINVAL;
  763. }
  764. /* check sum init */
  765. wbuf[0] = FTS_CMD_ECC_INIT;
  766. ret = fts_write(wbuf, 1);
  767. if (ret < 0) {
  768. FTS_ERROR("ecc init cmd write fail");
  769. return ret;
  770. }
  771. if (upg->func->upgspec_version >= UPGRADE_SPEC_V_1_0) {
  772. packet_num = 1;
  773. remainder = 0;
  774. packet_len = len;
  775. } else {
  776. packet_num = len / FTS_MAX_LEN_ECC_CALC;
  777. remainder = len % FTS_MAX_LEN_ECC_CALC;
  778. if (remainder)
  779. packet_num++;
  780. packet_len = FTS_MAX_LEN_ECC_CALC;
  781. }
  782. FTS_INFO("ecc calc num:%d, remainder:%d", packet_num, remainder);
  783. /* send commond to start checksum */
  784. wbuf[0] = FTS_CMD_ECC_CAL;
  785. for (i = 0; i < packet_num; i++) {
  786. offset = FTS_MAX_LEN_ECC_CALC * i;
  787. addr = saddr + offset;
  788. wbuf[1] = BYTE_OFF_16(addr);
  789. wbuf[2] = BYTE_OFF_8(addr);
  790. wbuf[3] = BYTE_OFF_0(addr);
  791. if (upg->func->upgspec_version >= UPGRADE_SPEC_V_1_0) {
  792. wbuf[4] = BYTE_OFF_16(packet_len);
  793. wbuf[5] = BYTE_OFF_8(packet_len);
  794. wbuf[6] = BYTE_OFF_0(packet_len);
  795. cmdlen = FTS_CMD_ECC_CAL_LEN;
  796. } else {
  797. if ((i == (packet_num - 1)) && remainder)
  798. packet_len = remainder;
  799. wbuf[4] = BYTE_OFF_8(packet_len);
  800. wbuf[5] = BYTE_OFF_0(packet_len);
  801. cmdlen = FTS_CMD_ECC_CAL_LEN - 1;
  802. }
  803. FTS_DEBUG("ecc calc startaddr:0x%04x, len:%d", addr, packet_len);
  804. ret = fts_write(wbuf, cmdlen);
  805. if (ret < 0) {
  806. FTS_ERROR("ecc calc cmd write fail");
  807. return ret;
  808. }
  809. msleep(packet_len / 256);
  810. /* read status if check sum is finished */
  811. bflag = fts_fwupg_check_flash_status(FTS_CMD_FLASH_STATUS_ECC_OK,
  812. FTS_RETRIES_ECC_CAL,
  813. FTS_RETRIES_DELAY_ECC_CAL);
  814. if (!bflag) {
  815. FTS_ERROR("ecc flash status read fail");
  816. return -EIO;
  817. }
  818. }
  819. ecc_len = 1;
  820. if ((upg->func->fw_ecc_check_mode == ECC_CHECK_MODE_CRC16) ||
  821. (upg->func->upgspec_version >= UPGRADE_SPEC_V_1_0))
  822. ecc_len = 2;
  823. /* read out check sum */
  824. wbuf[0] = FTS_CMD_ECC_READ;
  825. ret = fts_read(wbuf, 1, val, ecc_len);
  826. if (ret < 0) {
  827. FTS_ERROR( "ecc read cmd write fail");
  828. return ret;
  829. }
  830. if ((upg->func->fw_ecc_check_mode == ECC_CHECK_MODE_CRC16) ||
  831. (upg->func->upgspec_version >= UPGRADE_SPEC_V_1_0))
  832. ecc = (int)((u16)(val[0] << 8) + val[1]);
  833. else
  834. ecc = (int)val[0];
  835. return ecc;
  836. }
  837. /************************************************************************
  838. * Name: fts_flash_write_buf
  839. * Brief: write buf data to flash address
  840. * Input: saddr - start address data write to flash
  841. * buf - data buffer
  842. * len - data length
  843. * delay - delay after write
  844. * Output:
  845. * Return: return data ecc of host if success, otherwise return error code
  846. ***********************************************************************/
  847. int fts_flash_write_buf(
  848. u32 saddr,
  849. u8 *buf,
  850. u32 len,
  851. u32 delay)
  852. {
  853. int ret = 0;
  854. u32 i = 0;
  855. u32 j = 0;
  856. u32 packet_number = 0;
  857. u32 packet_len = 0;
  858. u32 addr = 0;
  859. u32 offset = 0;
  860. u32 remainder = 0;
  861. u32 cmdlen = 0;
  862. u8 packet_buf[FTS_FLASH_PACKET_LENGTH + FTS_CMD_WRITE_LEN] = { 0 };
  863. u8 ecc_tmp = 0;
  864. int ecc_in_host = 0;
  865. u8 cmd = 0;
  866. u8 val[FTS_CMD_FLASH_STATUS_LEN] = { 0 };
  867. u16 read_status = 0;
  868. u16 wr_ok = 0;
  869. struct fts_upgrade *upg = fwupgrade;
  870. FTS_INFO( "**********write data to flash**********");
  871. if ((!upg) || (!upg->func || !buf || !len)) {
  872. FTS_ERROR("upgrade/func/buf/len is invalid");
  873. return -EINVAL;
  874. }
  875. FTS_INFO("data buf start addr=0x%x, len=0x%x", saddr, len);
  876. packet_number = len / FTS_FLASH_PACKET_LENGTH;
  877. remainder = len % FTS_FLASH_PACKET_LENGTH;
  878. if (remainder > 0)
  879. packet_number++;
  880. packet_len = FTS_FLASH_PACKET_LENGTH;
  881. FTS_INFO("write data, num:%d remainder:%d", packet_number, remainder);
  882. for (i = 0; i < packet_number; i++) {
  883. offset = i * FTS_FLASH_PACKET_LENGTH;
  884. addr = saddr + offset;
  885. /* last packet */
  886. if ((i == (packet_number - 1)) && remainder)
  887. packet_len = remainder;
  888. if (upg->ts_data->bus_type == BUS_TYPE_SPI_V2) {
  889. packet_buf[0] = FTS_CMD_SET_WFLASH_ADDR;
  890. packet_buf[1] = BYTE_OFF_16(addr);
  891. packet_buf[2] = BYTE_OFF_8(addr);
  892. packet_buf[3] = BYTE_OFF_0(addr);
  893. ret = fts_write(packet_buf, FTS_LEN_SET_ADDR);
  894. if (ret < 0) {
  895. FTS_ERROR("set flash address fail");
  896. return ret;
  897. }
  898. packet_buf[0] = FTS_CMD_WRITE;
  899. cmdlen = 1;
  900. } else {
  901. packet_buf[0] = FTS_CMD_WRITE;
  902. packet_buf[1] = BYTE_OFF_16(addr);
  903. packet_buf[2] = BYTE_OFF_8(addr);
  904. packet_buf[3] = BYTE_OFF_0(addr);
  905. packet_buf[4] = BYTE_OFF_8(packet_len);
  906. packet_buf[5] = BYTE_OFF_0(packet_len);
  907. cmdlen = 6;
  908. }
  909. for (j = 0; j < packet_len; j++) {
  910. packet_buf[cmdlen + j] = buf[offset + j];
  911. ecc_tmp ^= packet_buf[cmdlen + j];
  912. }
  913. ret = fts_write(packet_buf, packet_len + cmdlen);
  914. if (ret < 0) {
  915. FTS_ERROR("app write fail");
  916. return ret;
  917. }
  918. mdelay(delay);
  919. /* read status */
  920. wr_ok = FTS_CMD_FLASH_STATUS_WRITE_OK + addr / packet_len;
  921. for (j = 0; j < FTS_RETRIES_WRITE; j++) {
  922. cmd = FTS_CMD_FLASH_STATUS;
  923. ret = fts_read(&cmd , 1, val, FTS_CMD_FLASH_STATUS_LEN);
  924. read_status = (((u16)val[0]) << 8) + val[1];
  925. /* FTS_INFO("%x %x", wr_ok, read_status); */
  926. if (read_status == wr_ok)
  927. break;
  928. mdelay(FTS_RETRIES_DELAY_WRITE);
  929. }
  930. }
  931. ecc_in_host = (int)ecc_tmp;
  932. if ((upg->func->fw_ecc_check_mode == ECC_CHECK_MODE_CRC16) ||
  933. (upg->func->upgspec_version >= UPGRADE_SPEC_V_1_0))
  934. ecc_in_host = (int)fts_crc16_calc_host(buf, len);
  935. return ecc_in_host;
  936. }
  937. /************************************************************************
  938. * Name: fts_flash_read_buf
  939. * Brief: read data from flash
  940. * Input: saddr - start address data write to flash
  941. * buf - buffer to store data read from flash
  942. * len - read length
  943. * Output:
  944. * Return: return 0 if success, otherwise return error code
  945. *
  946. * Warning: can't call this function directly, need call in boot environment
  947. ***********************************************************************/
  948. static int fts_flash_read_buf(u32 saddr, u8 *buf, u32 len)
  949. {
  950. int ret = 0;
  951. u32 i = 0;
  952. u32 packet_number = 0;
  953. u32 packet_len = 0;
  954. u32 addr = 0;
  955. u32 offset = 0;
  956. u32 remainder = 0;
  957. u8 wbuf[FTS_CMD_READ_LEN_SPI] = { 0 };
  958. struct fts_upgrade *upg = fwupgrade;
  959. if (!upg || !buf || !len) {
  960. FTS_ERROR("upgrade/buf is NULL or len is 0");
  961. return -EINVAL;
  962. }
  963. packet_number = len / FTS_FLASH_PACKET_LENGTH;
  964. remainder = len % FTS_FLASH_PACKET_LENGTH;
  965. if (remainder > 0) {
  966. packet_number++;
  967. }
  968. packet_len = FTS_FLASH_PACKET_LENGTH;
  969. FTS_INFO("read packet_number:%d, remainder:%d", packet_number, remainder);
  970. for (i = 0; i < packet_number; i++) {
  971. offset = i * FTS_FLASH_PACKET_LENGTH;
  972. addr = saddr + offset;
  973. /* last packet */
  974. if ((i == (packet_number - 1)) && remainder)
  975. packet_len = remainder;
  976. if (upg->ts_data->bus_type == BUS_TYPE_I2C) {
  977. wbuf[0] = FTS_CMD_READ;
  978. wbuf[1] = BYTE_OFF_16(addr);
  979. wbuf[2] = BYTE_OFF_8(addr);
  980. wbuf[3] = BYTE_OFF_0(addr);
  981. ret = fts_write(wbuf, FTS_CMD_READ_LEN);
  982. if (ret < 0) {
  983. FTS_ERROR("pram/bootloader write 03 command fail");
  984. return ret;
  985. }
  986. msleep(FTS_CMD_READ_DELAY); /* must wait, otherwise read wrong data */
  987. ret = fts_read(NULL, 0, buf + offset, packet_len);
  988. if (ret < 0) {
  989. FTS_ERROR("pram/bootloader read 03 command fail");
  990. return ret;
  991. }
  992. } else if (upg->ts_data->bus_type == BUS_TYPE_SPI_V2) {
  993. wbuf[0] = FTS_CMD_SET_RFLASH_ADDR;
  994. wbuf[1] = BYTE_OFF_16(addr);
  995. wbuf[2] = BYTE_OFF_8(addr);
  996. wbuf[3] = BYTE_OFF_0(addr);
  997. ret = fts_write(wbuf, FTS_LEN_SET_ADDR);
  998. if (ret < 0) {
  999. FTS_ERROR("set flash address fail");
  1000. return ret;
  1001. }
  1002. msleep(FTS_CMD_READ_DELAY);
  1003. wbuf[0] = FTS_CMD_READ;
  1004. ret = fts_read(wbuf, 1, buf + offset, packet_len);
  1005. if (ret < 0) {
  1006. FTS_ERROR("pram/bootloader read 03(SPI_V2) command fail");
  1007. return ret;
  1008. }
  1009. } else if (upg->ts_data->bus_type == BUS_TYPE_SPI) {
  1010. wbuf[0] = FTS_CMD_READ;
  1011. wbuf[1] = BYTE_OFF_16(addr);
  1012. wbuf[2] = BYTE_OFF_8(addr);
  1013. wbuf[3] = BYTE_OFF_0(addr);
  1014. wbuf[4] = BYTE_OFF_8(packet_len);
  1015. wbuf[5] = BYTE_OFF_0(packet_len);
  1016. ret = fts_read(wbuf, FTS_CMD_READ_LEN_SPI,
  1017. buf + offset, packet_len);
  1018. if (ret < 0) {
  1019. FTS_ERROR("pram/bootloader read 03(SPI) command fail");
  1020. return ret;
  1021. }
  1022. }
  1023. }
  1024. return 0;
  1025. }
  1026. /************************************************************************
  1027. * Name: fts_flash_read
  1028. * Brief:
  1029. * Input: addr - address of flash
  1030. * len - length of read
  1031. * Output: buf - data read from flash
  1032. * Return: return 0 if success, otherwise return error code
  1033. ***********************************************************************/
  1034. static int fts_flash_read(u32 addr, u8 *buf, u32 len)
  1035. {
  1036. int ret = 0;
  1037. FTS_INFO("***********read flash***********");
  1038. if ((NULL == buf) || (0 == len)) {
  1039. FTS_ERROR("buf is NULL or len is 0");
  1040. return -EINVAL;
  1041. }
  1042. ret = fts_fwupg_enter_into_boot();
  1043. if (ret < 0) {
  1044. FTS_ERROR("enter into pramboot/bootloader fail");
  1045. goto read_flash_err;
  1046. }
  1047. ret = fts_flash_read_buf(addr, buf, len);
  1048. if (ret < 0) {
  1049. FTS_ERROR("read flash fail");
  1050. goto read_flash_err;
  1051. }
  1052. read_flash_err:
  1053. /* reset to normal boot */
  1054. ret = fts_fwupg_reset_in_boot();
  1055. if (ret < 0)
  1056. FTS_ERROR("reset to normal boot fail");
  1057. return ret;
  1058. }
  1059. int fts_enter_test_environment(bool test_state)
  1060. {
  1061. return 0;
  1062. }
  1063. #if FTS_AUTO_LIC_UPGRADE_EN
  1064. static int fts_lic_get_vid_in_tp(u16 *vid)
  1065. {
  1066. int ret = 0;
  1067. u8 val[2] = { 0 };
  1068. if (NULL == vid) {
  1069. FTS_ERROR("vid is NULL");
  1070. return -EINVAL;
  1071. }
  1072. ret = fts_read_reg(FTS_REG_VENDOR_ID, &val[0]);
  1073. if (fts_data->ic_info.is_incell)
  1074. ret = fts_read_reg(FTS_REG_MODULE_ID, &val[1]);
  1075. if (ret < 0) {
  1076. FTS_ERROR("read vid from tp fail");
  1077. return ret;
  1078. }
  1079. *vid = *(u16 *)val;
  1080. return 0;
  1081. }
  1082. static int fts_lic_get_vid_in_host(struct fts_upgrade *upg, u16 *vid)
  1083. {
  1084. u8 val[2] = { 0 };
  1085. u8 *licbuf = NULL;
  1086. u32 conf_saddr = 0;
  1087. if (!upg || !upg->func || !upg->lic || !vid) {
  1088. FTS_ERROR("upgrade/func/get_hlic_ver/lic/vid is null");
  1089. return -EINVAL;
  1090. }
  1091. if (upg->lic_length < FTS_MAX_LEN_SECTOR) {
  1092. FTS_ERROR("lic length(%x) fail", upg->lic_length);
  1093. return -EINVAL;
  1094. }
  1095. licbuf = upg->lic;
  1096. conf_saddr = upg->func->fwcfgoff;
  1097. val[0] = licbuf[conf_saddr + FTS_CONIFG_VENDORID_OFF];
  1098. if (fts_data->ic_info.is_incell)
  1099. val[1] = licbuf[conf_saddr + FTS_CONIFG_MODULEID_OFF];
  1100. *vid = *(u16 *)val;
  1101. return 0;
  1102. }
  1103. static int fts_lic_get_ver_in_tp(u8 *ver)
  1104. {
  1105. int ret = 0;
  1106. if (NULL == ver) {
  1107. FTS_ERROR("ver is NULL");
  1108. return -EINVAL;
  1109. }
  1110. ret = fts_read_reg(FTS_REG_LIC_VER, ver);
  1111. if (ret < 0) {
  1112. FTS_ERROR("read lcd initcode ver from tp fail");
  1113. return ret;
  1114. }
  1115. return 0;
  1116. }
  1117. static int fts_lic_get_ver_in_host(struct fts_upgrade *upg, u8 *ver)
  1118. {
  1119. int ret = 0;
  1120. if (!upg || !upg->func || !upg->func->get_hlic_ver || !upg->lic) {
  1121. FTS_ERROR("upgrade/func/get_hlic_ver/lic is null");
  1122. return -EINVAL;
  1123. }
  1124. ret = upg->func->get_hlic_ver(upg->lic);
  1125. if (ret < 0) {
  1126. FTS_ERROR("get host lcd initial code version fail");
  1127. return ret;
  1128. }
  1129. *ver = (u8)ret;
  1130. return ret;
  1131. }
  1132. static bool fts_lic_need_upgrade(struct fts_upgrade *upg)
  1133. {
  1134. int ret = 0;
  1135. u8 initcode_ver_in_tp = 0;
  1136. u8 initcode_ver_in_host = 0;
  1137. u16 vid_in_tp = 0;
  1138. u16 vid_in_host = 0;
  1139. bool fwvalid = false;
  1140. fwvalid = fts_fwupg_check_fw_valid();
  1141. if ( !fwvalid) {
  1142. FTS_INFO("fw is invalid, no upgrade lcd init code");
  1143. return false;
  1144. }
  1145. ret = fts_lic_get_vid_in_host(upg, &vid_in_host);
  1146. if (ret < 0) {
  1147. FTS_ERROR("vendor id in host invalid");
  1148. return false;
  1149. }
  1150. ret = fts_lic_get_vid_in_tp(&vid_in_tp);
  1151. if (ret < 0) {
  1152. FTS_ERROR("vendor id in tp invalid");
  1153. return false;
  1154. }
  1155. FTS_DEBUG("vid in tp:0x%04x, host:0x%04x", vid_in_tp, vid_in_host);
  1156. if (vid_in_tp != vid_in_host) {
  1157. FTS_INFO("vendor id in tp&host are different, no upgrade lic");
  1158. return false;
  1159. }
  1160. ret = fts_lic_get_ver_in_host(upg, &initcode_ver_in_host);
  1161. if (ret < 0) {
  1162. FTS_ERROR("init code in host invalid");
  1163. return false;
  1164. }
  1165. ret = fts_lic_get_ver_in_tp(&initcode_ver_in_tp);
  1166. if (ret < 0) {
  1167. FTS_ERROR("read reg0xE4 fail");
  1168. return false;
  1169. }
  1170. FTS_DEBUG("lcd initial code version in tp:%x, host:%x",
  1171. initcode_ver_in_tp, initcode_ver_in_host);
  1172. if (0xA5 == initcode_ver_in_tp) {
  1173. FTS_INFO("lcd init code ver is 0xA5, don't upgade init code");
  1174. return false;
  1175. } else if (0xFF == initcode_ver_in_tp) {
  1176. FTS_DEBUG("lcd init code in tp is invalid, need upgrade init code");
  1177. return true;
  1178. } else if (initcode_ver_in_tp < initcode_ver_in_host)
  1179. return true;
  1180. else
  1181. return false;
  1182. }
  1183. static int fts_lic_upgrade(struct fts_upgrade *upg)
  1184. {
  1185. int ret = 0;
  1186. bool hlic_upgrade = false;
  1187. int upgrade_count = 0;
  1188. u8 ver = 0;
  1189. FTS_INFO("lcd initial code auto upgrade function");
  1190. if ((!upg) || (!upg->func) || (!upg->func->lic_upgrade)) {
  1191. FTS_ERROR("lcd upgrade function is null");
  1192. return -EINVAL;
  1193. }
  1194. hlic_upgrade = fts_lic_need_upgrade(upg);
  1195. FTS_INFO("lcd init code upgrade flag:%d", hlic_upgrade);
  1196. if (hlic_upgrade) {
  1197. FTS_INFO("lcd initial code need upgrade, upgrade begin...");
  1198. do {
  1199. FTS_INFO("lcd initial code upgrade times:%d", upgrade_count);
  1200. upgrade_count++;
  1201. ret = upg->func->lic_upgrade(upg->lic, upg->lic_length);
  1202. if (ret < 0) {
  1203. fts_fwupg_reset_in_boot();
  1204. } else {
  1205. fts_lic_get_ver_in_tp(&ver);
  1206. FTS_INFO("success upgrade to lcd initcode ver:%02x", ver);
  1207. break;
  1208. }
  1209. } while (upgrade_count < 2);
  1210. } else {
  1211. FTS_INFO("lcd initial code don't need upgrade");
  1212. }
  1213. return ret;
  1214. }
  1215. #endif /* FTS_AUTO_LIC_UPGRADE_EN */
  1216. static int fts_param_get_ver_in_tp(u8 *ver)
  1217. {
  1218. int ret = 0;
  1219. if (NULL == ver) {
  1220. FTS_ERROR("ver is NULL");
  1221. return -EINVAL;
  1222. }
  1223. ret = fts_read_reg(FTS_REG_IDE_PARA_VER_ID, ver);
  1224. if (ret < 0) {
  1225. FTS_ERROR("read fw param ver from tp fail");
  1226. return ret;
  1227. }
  1228. if ((0x00 == *ver) || (0xFF == *ver)) {
  1229. FTS_INFO("param version in tp invalid");
  1230. return -EIO;
  1231. }
  1232. return 0;
  1233. }
  1234. static int fts_param_get_ver_in_host(struct fts_upgrade *upg, u8 *ver)
  1235. {
  1236. if ((!upg) || (!upg->func) || (!upg->fw) || (!ver)) {
  1237. FTS_ERROR("fts_data/upgrade/func/fw/ver is NULL");
  1238. return -EINVAL;
  1239. }
  1240. if (upg->fw_length < upg->func->paramcfgveroff) {
  1241. FTS_ERROR("fw len(%x) < paramcfg ver offset(%x)",
  1242. upg->fw_length, upg->func->paramcfgveroff);
  1243. return -EINVAL;
  1244. }
  1245. FTS_INFO("fw paramcfg version offset:%x", upg->func->paramcfgveroff);
  1246. *ver = upg->fw[upg->func->paramcfgveroff];
  1247. if ((0x00 == *ver) || (0xFF == *ver)) {
  1248. FTS_INFO("param version in host invalid");
  1249. return -EIO;
  1250. }
  1251. return 0;
  1252. }
  1253. /*
  1254. * return: < 0 : error
  1255. * == 0: no ide
  1256. * == 1: ide
  1257. */
  1258. static int fts_param_ide_in_host(struct fts_upgrade *upg)
  1259. {
  1260. u32 off = 0;
  1261. if ((!upg) || (!upg->func) || (!upg->fw)) {
  1262. FTS_ERROR("fts_data/upgrade/func/fw is NULL");
  1263. return -EINVAL;
  1264. }
  1265. if (upg->fw_length < upg->func->paramcfgoff + FTS_FW_IDE_SIG_LEN) {
  1266. FTS_INFO("fw len(%x) < paramcfg offset(%x), no IDE",
  1267. upg->fw_length, upg->func->paramcfgoff + FTS_FW_IDE_SIG_LEN);
  1268. return 0;
  1269. }
  1270. off = upg->func->paramcfgoff;
  1271. if (0 == memcmp(&upg->fw[off], FTS_FW_IDE_SIG, FTS_FW_IDE_SIG_LEN)) {
  1272. FTS_INFO("fw in host is IDE version");
  1273. return 1;
  1274. }
  1275. FTS_INFO("fw in host isn't IDE version");
  1276. return 0;
  1277. }
  1278. /*
  1279. * return: < 0 : error
  1280. * 0 : no ide
  1281. * 1 : ide
  1282. */
  1283. static int fts_param_ide_in_tp(u8 *val)
  1284. {
  1285. int ret = 0;
  1286. ret = fts_read_reg(FTS_REG_IDE_PARA_STATUS, val);
  1287. if (ret < 0) {
  1288. FTS_ERROR("read IDE PARAM STATUS in tp fail");
  1289. return ret;
  1290. }
  1291. if ((*val != 0xFF) && ((*val & 0x80) == 0x80)) {
  1292. FTS_INFO("fw in tp is IDE version");
  1293. return 1;
  1294. }
  1295. FTS_INFO("fw in tp isn't IDE version");
  1296. return 0;
  1297. }
  1298. /************************************************************************
  1299. * fts_param_need_upgrade - check fw paramcfg need upgrade or not
  1300. *
  1301. * Return: < 0 : error if paramcfg need upgrade
  1302. * 0 : no need upgrade
  1303. * 1 : need upgrade app + param
  1304. * 2 : need upgrade param
  1305. ***********************************************************************/
  1306. static int fts_param_need_upgrade(struct fts_upgrade *upg)
  1307. {
  1308. int ret = 0;
  1309. u8 val = 0;
  1310. int ide_in_host = 0;
  1311. int ide_in_tp = 0;
  1312. u8 ver_in_host = 0;
  1313. u8 ver_in_tp = 0;
  1314. bool fwvalid = false;
  1315. fwvalid = fts_fwupg_check_fw_valid();
  1316. if ( !fwvalid) {
  1317. FTS_INFO("fw is invalid, upgrade app+param");
  1318. return 1;
  1319. }
  1320. ide_in_host = fts_param_ide_in_host(upg);
  1321. if (ide_in_host < 0) {
  1322. FTS_INFO("fts_param_ide_in_host fail");
  1323. return ide_in_host;
  1324. }
  1325. ide_in_tp = fts_param_ide_in_tp(&val);
  1326. if (ide_in_tp < 0) {
  1327. FTS_INFO("fts_param_ide_in_tp fail");
  1328. return ide_in_tp;
  1329. }
  1330. if ((0 == ide_in_host) && (0 == ide_in_tp)) {
  1331. FTS_INFO("fw in host&tp are both no ide");
  1332. return 0;
  1333. } else if (ide_in_host != ide_in_tp) {
  1334. FTS_INFO("fw in host&tp not equal, need upgrade app+param");
  1335. return 1;
  1336. } else if ((1 == ide_in_host) && (1 == ide_in_tp)) {
  1337. FTS_INFO("fw in host&tp are both ide");
  1338. if ((val & 0x7F) != 0x00) {
  1339. FTS_INFO("param invalid, need upgrade param");
  1340. return 2;
  1341. }
  1342. ret = fts_param_get_ver_in_host(upg, &ver_in_host);
  1343. if (ret < 0) {
  1344. FTS_ERROR("param version in host invalid");
  1345. return ret;
  1346. }
  1347. ret = fts_param_get_ver_in_tp(&ver_in_tp);
  1348. if (ret < 0) {
  1349. FTS_ERROR("get IDE param ver in tp fail");
  1350. return ret;
  1351. }
  1352. FTS_INFO("fw paramcfg version in tp:%x, host:%x",
  1353. ver_in_tp, ver_in_host);
  1354. if (ver_in_tp != ver_in_host) {
  1355. return 2;
  1356. }
  1357. }
  1358. return 0;
  1359. }
  1360. static int fts_fwupg_get_ver_in_tp(u8 *ver)
  1361. {
  1362. int ret = 0;
  1363. if (NULL == ver) {
  1364. FTS_ERROR("ver is NULL");
  1365. return -EINVAL;
  1366. }
  1367. ret = fts_read_reg(FTS_REG_FW_VER, ver);
  1368. if (ret < 0) {
  1369. FTS_ERROR("read fw ver from tp fail");
  1370. return ret;
  1371. }
  1372. return 0;
  1373. }
  1374. static int fts_fwupg_get_ver_in_host(struct fts_upgrade *upg, u8 *ver)
  1375. {
  1376. if ((!upg) || (!upg->func) || (!upg->fw) || (!ver)) {
  1377. FTS_ERROR("fts_data/upgrade/func/fw/ver is NULL");
  1378. return -EINVAL;
  1379. }
  1380. if (upg->fw_length < upg->func->fwveroff) {
  1381. FTS_ERROR("fw len(0x%0x) < fw ver offset(0x%x)",
  1382. upg->fw_length, upg->func->fwveroff);
  1383. return -EINVAL;
  1384. }
  1385. FTS_INFO("fw version offset:0x%x", upg->func->fwveroff);
  1386. *ver = upg->fw[upg->func->fwveroff];
  1387. return 0;
  1388. }
  1389. static bool fts_fwupg_need_upgrade(struct fts_upgrade *upg)
  1390. {
  1391. int ret = 0;
  1392. bool fwvalid = false;
  1393. u8 fw_ver_in_host = 0;
  1394. u8 fw_ver_in_tp = 0;
  1395. fwvalid = fts_fwupg_check_fw_valid();
  1396. if (fwvalid) {
  1397. ret = fts_fwupg_get_ver_in_host(upg, &fw_ver_in_host);
  1398. if (ret < 0) {
  1399. FTS_ERROR("get fw ver in host fail");
  1400. return false;
  1401. }
  1402. ret = fts_fwupg_get_ver_in_tp(&fw_ver_in_tp);
  1403. if (ret < 0) {
  1404. FTS_ERROR("get fw ver in tp fail");
  1405. return false;
  1406. }
  1407. FTS_INFO("fw version in tp:%x, host:%x", fw_ver_in_tp, fw_ver_in_host);
  1408. if (fw_ver_in_tp != fw_ver_in_host) {
  1409. return true;
  1410. }
  1411. } else {
  1412. FTS_INFO("fw invalid, need upgrade fw");
  1413. return true;
  1414. }
  1415. return false;
  1416. }
  1417. /************************************************************************
  1418. * Name: fts_fw_upgrade
  1419. * Brief: fw upgrade main entry, run in following steps
  1420. * 1. check fw version(A6), not equal, will upgrade app(+param)
  1421. * 2. if fw version equal, will check ide, will upgrade app(+param)
  1422. * in the follow situation
  1423. * a. host&tp IDE's type are not equal, will upgrade app+param
  1424. * b. host&tp are both IDE's type, and param's version are not
  1425. * equal, will upgrade param
  1426. * Input:
  1427. * Output:
  1428. * Return: return 0 if success, otherwise return error code
  1429. ***********************************************************************/
  1430. int fts_fwupg_upgrade(struct fts_upgrade *upg)
  1431. {
  1432. int ret = 0;
  1433. bool upgrade_flag = false;
  1434. int upgrade_count = 0;
  1435. u8 ver = 0;
  1436. FTS_INFO("fw auto upgrade function");
  1437. if ((NULL == upg) || (NULL == upg->func)) {
  1438. FTS_ERROR("upg/upg->func is null");
  1439. return -EINVAL;
  1440. }
  1441. upgrade_flag = fts_fwupg_need_upgrade(upg);
  1442. FTS_INFO("fw upgrade flag:%d", upgrade_flag);
  1443. do {
  1444. upgrade_count++;
  1445. if (upgrade_flag) {
  1446. FTS_INFO("upgrade fw app(times:%d)", upgrade_count);
  1447. if (upg->func->upgrade) {
  1448. ret = upg->func->upgrade(upg->fw, upg->fw_length);
  1449. if (ret < 0) {
  1450. fts_fwupg_reset_in_boot();
  1451. } else {
  1452. fts_fwupg_get_ver_in_tp(&ver);
  1453. FTS_INFO("success upgrade to fw version %02x", ver);
  1454. break;
  1455. }
  1456. } else {
  1457. FTS_ERROR("upgrade func/upgrade is null, return immediately");
  1458. ret = -ENODATA;
  1459. break;
  1460. }
  1461. } else {
  1462. if (upg->func->param_upgrade) {
  1463. ret = fts_param_need_upgrade(upg);
  1464. if (ret <= 0) {
  1465. FTS_INFO("param don't need upgrade");
  1466. break;
  1467. } else if (1 == ret) {
  1468. FTS_INFO("force upgrade fw app(times:%d)", upgrade_count);
  1469. if (upg->func->upgrade) {
  1470. ret = upg->func->upgrade(upg->fw, upg->fw_length);
  1471. if (ret < 0) {
  1472. fts_fwupg_reset_in_boot();
  1473. } else {
  1474. break;
  1475. }
  1476. }
  1477. } else if (2 == ret) {
  1478. FTS_INFO("upgrade param area(times:%d)", upgrade_count);
  1479. ret = upg->func->param_upgrade(upg->fw, upg->fw_length);
  1480. if (ret < 0) {
  1481. fts_fwupg_reset_in_boot();
  1482. } else {
  1483. fts_param_get_ver_in_tp(&ver);
  1484. FTS_INFO("success upgrade to fw param version %02x", ver);
  1485. break;
  1486. }
  1487. } else
  1488. break;
  1489. } else {
  1490. break;
  1491. }
  1492. }
  1493. } while (upgrade_count < 2);
  1494. return ret;
  1495. }
  1496. /************************************************************************
  1497. * fts_fwupg_auto_upgrade - upgrade main entry
  1498. ***********************************************************************/
  1499. static void fts_fwupg_auto_upgrade(struct fts_upgrade *upg)
  1500. {
  1501. int ret = 0;
  1502. FTS_INFO("********************FTS enter upgrade********************");
  1503. if (!upg || !upg->ts_data) {
  1504. FTS_ERROR("upg/ts_data is null");
  1505. return ;
  1506. }
  1507. ret = fts_fwupg_upgrade(upg);
  1508. if (ret < 0)
  1509. FTS_ERROR("**********tp fw(app/param) upgrade failed**********");
  1510. else
  1511. FTS_INFO("**********tp fw(app/param) no upgrade/upgrade success**********");
  1512. #if FTS_AUTO_LIC_UPGRADE_EN
  1513. ret = fts_lic_upgrade(upg);
  1514. if (ret < 0)
  1515. FTS_ERROR("**********lcd init code upgrade failed**********");
  1516. else
  1517. FTS_INFO("**********lcd init code no upgrade/upgrade success**********");
  1518. #endif
  1519. FTS_INFO("********************FTS exit upgrade********************");
  1520. }
  1521. static int fts_fwupg_get_vendorid(struct fts_upgrade *upg, int *vid)
  1522. {
  1523. int ret = 0;
  1524. bool fwvalid = false;
  1525. u8 vendor_id = 0;
  1526. u8 module_id = 0;
  1527. u32 fwcfg_addr = 0;
  1528. u8 cmd = 0;
  1529. u8 cfgbuf[FTS_HEADER_LEN] = { 0 };
  1530. FTS_INFO("read vendor id from tp");
  1531. if ((!upg) || (!upg->func) || (!upg->ts_data) || (!vid)) {
  1532. FTS_ERROR("upgrade/func/ts_data/vid is null");
  1533. return -EINVAL;
  1534. }
  1535. fwvalid = fts_fwupg_check_fw_valid();
  1536. if (fwvalid) {
  1537. ret = fts_read_reg(FTS_REG_VENDOR_ID, &vendor_id);
  1538. if (upg->ts_data->ic_info.is_incell)
  1539. ret = fts_read_reg(FTS_REG_MODULE_ID, &module_id);
  1540. } else {
  1541. if (upg->func->upgspec_version >= UPGRADE_SPEC_V_1_0) {
  1542. cmd = FTS_CMD_READ_FW_CONF;
  1543. ret = fts_read(&cmd, 1, cfgbuf, FTS_HEADER_LEN);
  1544. } else {
  1545. fwcfg_addr = upg->func->fwcfgoff;
  1546. ret = fts_flash_read(fwcfg_addr, cfgbuf, FTS_HEADER_LEN);
  1547. }
  1548. if ((cfgbuf[FTS_CONIFG_VENDORID_OFF] +
  1549. cfgbuf[FTS_CONIFG_VENDORID_OFF + 1]) == 0xFF)
  1550. vendor_id = cfgbuf[FTS_CONIFG_VENDORID_OFF];
  1551. if (upg->ts_data->ic_info.is_incell) {
  1552. if ((cfgbuf[FTS_CONIFG_MODULEID_OFF] +
  1553. cfgbuf[FTS_CONIFG_MODULEID_OFF + 1]) == 0xFF)
  1554. module_id = cfgbuf[FTS_CONIFG_MODULEID_OFF];
  1555. }
  1556. }
  1557. if (ret < 0) {
  1558. FTS_ERROR("fail to get vendor id from tp");
  1559. return ret;
  1560. }
  1561. *vid = (int)((module_id << 8) + vendor_id);
  1562. return 0;
  1563. }
  1564. static int fts_fwupg_get_module_info(struct fts_upgrade *upg)
  1565. {
  1566. int ret = 0;
  1567. int i = 0;
  1568. struct upgrade_module *info = &module_list[0];
  1569. if (!upg || !upg->ts_data) {
  1570. FTS_ERROR("upg/ts_data is null");
  1571. return -EINVAL;
  1572. }
  1573. if (FTS_GET_MODULE_NUM > 1) {
  1574. /* support multi modules, must read correct module id(vendor id) */
  1575. ret = fts_fwupg_get_vendorid(upg, &upg->module_id);
  1576. if (ret < 0) {
  1577. FTS_ERROR("get vendor id failed");
  1578. return ret;
  1579. }
  1580. FTS_INFO("module id:%04x", upg->module_id);
  1581. for (i = 0; i < FTS_GET_MODULE_NUM; i++) {
  1582. info = &module_list[i];
  1583. if (upg->module_id == info->id) {
  1584. FTS_INFO("module id match, get module info pass");
  1585. break;
  1586. }
  1587. }
  1588. if (i >= FTS_GET_MODULE_NUM) {
  1589. info = &module_list[0];
  1590. FTS_ERROR("no module id match, default to use first module");
  1591. }
  1592. }
  1593. upg->module_info = info;
  1594. return 0;
  1595. }
  1596. static int fts_get_fw_file_via_request_firmware(struct fts_upgrade *upg)
  1597. {
  1598. int ret = 0;
  1599. const struct firmware *fw = NULL;
  1600. u8 *tmpbuf = NULL;
  1601. char fwname[FILE_NAME_LENGTH] = { 0 };
  1602. if (!upg || !upg->ts_data || !upg->ts_data->dev) {
  1603. FTS_ERROR("upg/ts_data/dev is null");
  1604. return -EINVAL;
  1605. }
  1606. if (upg->ts_data->pdata->type == _FT3658U)
  1607. snprintf(fwname, FILE_NAME_LENGTH, "%s%s_ft3658.bin",
  1608. FTS_FW_NAME_PREX_WITH_REQUEST,
  1609. upg->module_info->vendor_name);
  1610. else
  1611. snprintf(fwname, FILE_NAME_LENGTH, "%s%s.bin",
  1612. FTS_FW_NAME_PREX_WITH_REQUEST,
  1613. upg->module_info->vendor_name);
  1614. ret = request_firmware(&fw, fwname, upg->ts_data->dev);
  1615. if (ret == 0) {
  1616. FTS_INFO("firmware(%s) request successfully", fwname);
  1617. tmpbuf = vmalloc(fw->size);
  1618. if (NULL == tmpbuf) {
  1619. FTS_ERROR("fw buffer vmalloc fail");
  1620. ret = -ENOMEM;
  1621. } else {
  1622. memcpy(tmpbuf, fw->data, fw->size);
  1623. upg->fw = tmpbuf;
  1624. upg->fw_length = fw->size;
  1625. upg->fw_from_request = 1;
  1626. }
  1627. } else {
  1628. FTS_INFO("firmware(%s) request fail,ret=%d", fwname, ret);
  1629. }
  1630. if (fw != NULL) {
  1631. release_firmware(fw);
  1632. fw = NULL;
  1633. }
  1634. return ret;
  1635. }
  1636. static int fts_get_fw_file_via_i(struct fts_upgrade *upg)
  1637. {
  1638. upg->fw = upg->module_info->fw_file;
  1639. upg->fw_length = upg->module_info->fw_len;
  1640. upg->fw_from_request = 0;
  1641. return 0;
  1642. }
  1643. /*****************************************************************************
  1644. * Name: fts_fwupg_get_fw_file
  1645. * Brief: get fw image/file,
  1646. * If support muitl modules, please set FTS_GET_MODULE_NUM, and FTS_-
  1647. * MODULE_ID/FTS_MODULE_NAME;
  1648. * If get fw via .i file, please set FTS_FW_REQUEST_SUPPORT=0, and F-
  1649. * TS_MODULE_ID; will use module id to distingwish different modules;
  1650. * If get fw via reques_firmware(), please set FTS_FW_REQUEST_SUPPORT
  1651. * =1, and FTS_MODULE_NAME; fw file name will be composed of "focalt-
  1652. * ech_ts_fw_" & FTS_VENDOR_NAME;
  1653. *
  1654. * If have flash, module_id=vendor_id, If non-flash,module_id need
  1655. * transfer from LCD driver(gpio or lcm_id or ...);
  1656. * Input:
  1657. * Output:
  1658. * Return: return 0 if success, otherwise return error code
  1659. *****************************************************************************/
  1660. static int fts_fwupg_get_fw_file(struct fts_upgrade *upg)
  1661. {
  1662. int ret = 0;
  1663. bool get_fw_i_flag = false;
  1664. FTS_DEBUG("get upgrade fw file");
  1665. if (!upg || !upg->ts_data) {
  1666. FTS_ERROR("upg/ts_data is null");
  1667. return -EINVAL;
  1668. }
  1669. ret = fts_fwupg_get_module_info(upg);
  1670. if ((ret < 0) || (!upg->module_info)) {
  1671. FTS_ERROR("get module info fail");
  1672. return ret;
  1673. }
  1674. if (FTS_FW_REQUEST_SUPPORT) {
  1675. ret = fts_get_fw_file_via_request_firmware(upg);
  1676. if (ret != 0) {
  1677. get_fw_i_flag = true;
  1678. }
  1679. } else {
  1680. get_fw_i_flag = true;
  1681. }
  1682. if (get_fw_i_flag) {
  1683. ret = fts_get_fw_file_via_i(upg);
  1684. }
  1685. upg->lic = upg->fw;
  1686. upg->lic_length = upg->fw_length;
  1687. FTS_INFO("upgrade fw file len:%d", upg->fw_length);
  1688. if ((upg->fw_length < FTS_MIN_LEN)
  1689. || (upg->fw_length > FTS_MAX_LEN_FILE)) {
  1690. FTS_ERROR("fw file len(%d) fail", upg->fw_length);
  1691. return -ENODATA;
  1692. }
  1693. return ret;
  1694. }
  1695. static void fts_fwupg_init_ic_detail(struct fts_upgrade *upg)
  1696. {
  1697. if (upg && upg->func && upg->func->init) {
  1698. upg->func->init(upg->fw, upg->fw_length);
  1699. }
  1700. }
  1701. /*****************************************************************************
  1702. * Name: fts_fwupg_work
  1703. * Brief: 1. get fw image/file
  1704. * 2. ic init if have
  1705. * 3. call upgrade main function(fts_fwupg_auto_upgrade)
  1706. * Input:
  1707. * Output:
  1708. * Return:
  1709. *****************************************************************************/
  1710. static void fts_fwupg_work(struct work_struct *work)
  1711. {
  1712. int ret = 0;
  1713. struct fts_upgrade *upg = fwupgrade;
  1714. #if !FTS_AUTO_UPGRADE_EN
  1715. FTS_INFO("FTS_AUTO_UPGRADE_EN is disabled, not upgrade when power on");
  1716. return ;
  1717. #endif
  1718. FTS_INFO("fw upgrade work function");
  1719. if (!upg || !upg->ts_data) {
  1720. FTS_ERROR("upg/ts_data is null");
  1721. return ;
  1722. }
  1723. upg->ts_data->fw_loading = 1;
  1724. fts_irq_disable();
  1725. #if FTS_ESDCHECK_EN
  1726. fts_esdcheck_switch(DISABLE);
  1727. #endif
  1728. /* get fw */
  1729. ret = fts_fwupg_get_fw_file(upg);
  1730. if (ret < 0) {
  1731. FTS_ERROR("get file fail, can't upgrade");
  1732. } else {
  1733. /* ic init if have */
  1734. fts_fwupg_init_ic_detail(upg);
  1735. /* run auto upgrade */
  1736. fts_fwupg_auto_upgrade(upg);
  1737. }
  1738. #if FTS_ESDCHECK_EN
  1739. fts_esdcheck_switch(ENABLE);
  1740. #endif
  1741. fts_irq_enable();
  1742. upg->ts_data->fw_loading = 0;
  1743. }
  1744. int fts_fwupg_init(struct fts_ts_data *ts_data)
  1745. {
  1746. int i = 0;
  1747. int j = 0;
  1748. int ic_stype = 0;
  1749. struct upgrade_func *func = upgrade_func_list[0];
  1750. int func_count = sizeof(upgrade_func_list) / sizeof(upgrade_func_list[0]);
  1751. FTS_INFO("fw upgrade init function");
  1752. if (!ts_data || !ts_data->ts_workqueue) {
  1753. FTS_ERROR("ts_data/workqueue is NULL, can't run upgrade function");
  1754. return -EINVAL;
  1755. }
  1756. if (0 == func_count) {
  1757. FTS_ERROR("no upgrade function in tp driver");
  1758. return -ENODATA;
  1759. }
  1760. fwupgrade = (struct fts_upgrade *)kzalloc(sizeof(*fwupgrade), GFP_KERNEL);
  1761. if (NULL == fwupgrade) {
  1762. FTS_ERROR("malloc memory for upgrade fail");
  1763. return -ENOMEM;
  1764. }
  1765. ic_stype = ts_data->ic_info.ids.type;
  1766. if (1 == func_count) {
  1767. fwupgrade->func = func;
  1768. } else {
  1769. for (i = 0; i < func_count; i++) {
  1770. func = upgrade_func_list[i];
  1771. for (j = 0; j < FTX_MAX_COMPATIBLE_TYPE; j++) {
  1772. if (0 == func->ctype[j])
  1773. break;
  1774. else if (func->ctype[j] == ic_stype) {
  1775. FTS_INFO("match upgrade function,type:%x", (int)func->ctype[j]);
  1776. fwupgrade->func = func;
  1777. }
  1778. }
  1779. }
  1780. }
  1781. if (NULL == fwupgrade->func) {
  1782. FTS_ERROR("no upgrade function match, can't upgrade");
  1783. kfree(fwupgrade);
  1784. fwupgrade = NULL;
  1785. return -ENODATA;
  1786. }
  1787. fwupgrade->ts_data = ts_data;
  1788. INIT_WORK(&ts_data->fwupg_work, fts_fwupg_work);
  1789. queue_work(ts_data->ts_workqueue, &ts_data->fwupg_work);
  1790. return 0;
  1791. }
  1792. int fts_fwupg_exit(struct fts_ts_data *ts_data)
  1793. {
  1794. FTS_FUNC_ENTER();
  1795. if (fwupgrade) {
  1796. if (fwupgrade->fw_from_request) {
  1797. vfree(fwupgrade->fw);
  1798. fwupgrade->fw = NULL;
  1799. }
  1800. kfree(fwupgrade);
  1801. fwupgrade = NULL;
  1802. }
  1803. FTS_FUNC_EXIT();
  1804. return 0;
  1805. }