Statistics
| Branch: | Tag: | Revision:

amiro-blt / Target / Modules / DiWheelDrive_1-2 / Boot / hooks.c @ master

History | View | Annotate | Download (22.186 KB)

1
/************************************************************************************//**
2
* \file         Demo\ARMCM3_STM32_Olimex_STM32P103_GCC\Boot\hooks.c
3
* \brief        Bootloader callback source file.
4
* \ingroup      Boot_ARMCM3_STM32_Olimex_STM32P103_GCC
5
* \internal
6
*----------------------------------------------------------------------------------------
7
*                          C O P Y R I G H T
8
*----------------------------------------------------------------------------------------
9
*   Copyright (c) 2012  by Feaser    http://www.feaser.com    All rights reserved
10
*
11
*----------------------------------------------------------------------------------------
12
*                            L I C E N S E
13
*----------------------------------------------------------------------------------------
14
* This file is part of OpenBLT. OpenBLT is free software: you can redistribute it and/or
15
* modify it under the terms of the GNU General Public License as published by the Free
16
* Software Foundation, either version 3 of the License, or (at your option) any later
17
* version.
18
*
19
* OpenBLT is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY;
20
* without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
21
* PURPOSE. See the GNU General Public License for more details.
22
*
23
* You should have received a copy of the GNU General Public License along with OpenBLT.
24
* If not, see <http://www.gnu.org/licenses/>.
25
*
26
* A special exception to the GPL is included to allow you to distribute a combined work 
27
* that includes OpenBLT without being obliged to provide the source code for any 
28
* proprietary components. The exception text is included at the bottom of the license
29
* file <license.html>.
30
* 
31
* \endinternal
32
****************************************************************************************/
33

    
34
/****************************************************************************************
35
* Include files
36
****************************************************************************************/
37
#include "boot.h"                                /* bootloader generic header          */
38
#if (BOOT_FILE_LOGGING_ENABLE > 0)
39
#include "stm32f10x.h"                           /* STM32 registers                    */
40
#include "stm32f10x_conf.h"                      /* STM32 peripheral drivers           */
41
#endif
42

    
43
/****************************************************************************************
44
*   B A C K D O O R   E N T R Y   H O O K   F U N C T I O N S
45
****************************************************************************************/
46

    
47
#if (BOOT_BACKDOOR_HOOKS_ENABLE > 0)
48

    
49
static blt_int32u backdoorOpenTime;
50
#define BACKDOOR_ENTRY_TIMEOUT_MS 500
51
static blt_bool timeRanOut = BLT_FALSE;
52
enum BOOT_STATE {BOOT_FLASH_CHECK,
53
                 BOOT_FLASH_WAIT,
54
                 BOOT_OS_SYNC,
55
                 BOOT_OS_START
56
                } boot_state;
57

    
58
#define SYS_PD_N_PIN      GPIO_Pin_8
59
#define SYS_PD_N_GPIO     GPIOC
60
#define SYS_SYNC_N_PIN    GPIO_Pin_1
61
#define SYS_SYNC_N_GPIO   GPIOC
62

    
63
/************************************************************************************//**
64
** \brief     Initializes the backdoor entry option.
65
** \return    none.
66
**
67
****************************************************************************************/
68
void BackDoorInitHook(void)
69
{
70
  backdoorOpenTime = TimerGet();
71
  boot_state = BOOT_FLASH_CHECK;
72
} /*** end of BackDoorInitHook ***/
73

    
74

    
75
/************************************************************************************//**
76
** \brief     Checks if it has to stay in backdoor.
77
** \return    BLT_TRUE if the backdoor entry is requested, BLT_FALSE otherwise.
78
**
79
****************************************************************************************/
80
blt_bool BackDoorEntryCheck(void)
81
{
82
  /* evaluate the fsm state */
83
  switch (boot_state) {
84
    case BOOT_FLASH_CHECK:
85
    {
86
      /* wait for a timeout */
87
      if (timeRanOut == BLT_FALSE) {
88
        if (TimerGet() > backdoorOpenTime+BACKDOOR_ENTRY_TIMEOUT_MS) {
89
          timeRanOut = BLT_TRUE;
90
          boot_state = BOOT_FLASH_WAIT;
91
          GPIO_SetBits(SYS_SYNC_N_GPIO, SYS_SYNC_N_PIN);
92
        }
93
      }
94
      return BLT_TRUE;
95
      break;
96
    }
97
    case BOOT_FLASH_WAIT:
98
    {
99
      /* wait for the SYS_SYNC_N signal to go up */
100
      if (GPIO_ReadInputDataBit(SYS_SYNC_N_GPIO, SYS_SYNC_N_PIN) == Bit_RESET) {
101
        return BLT_TRUE;
102
      } else {
103
        boot_state = BOOT_OS_SYNC;
104
        return BLT_FALSE;
105
      }
106
      break;
107
    }
108
    default:
109
      return BLT_FALSE;
110
      break;
111
  }
112
  return BLT_FALSE;
113
} /*** end of BackDoorEntryCheck ***/
114

    
115
/************************************************************************************//**
116
** \brief     Checks if a backdoor entry is requested.
117
** \return    BLT_TRUE if the backdoor entry is requested, BLT_FALSE otherwise.
118
**
119
****************************************************************************************/
120
blt_bool BackDoorEntryHook(void)
121
{
122
  /* default implementation always activates the bootloader after a reset */
123
  return BLT_TRUE;
124
} /*** end of BackDoorEntryHook ***/
125
#endif /* BOOT_BACKDOOR_HOOKS_ENABLE > 0 */
126

    
127

    
128
/************************************************************************************//**
129
** \brief     Notice that there is still an open connection over COM 
130
** \return    -
131
**
132
****************************************************************************************/
133
void BackDoorComIsConnected(void)
134
{
135
  backdoorOpenTime = TimerGet();
136
}
137

    
138

    
139
/****************************************************************************************
140
*   C P U   D R I V E R   H O O K   F U N C T I O N S
141
****************************************************************************************/
142

    
143
#if (BOOT_CPU_USER_PROGRAM_START_HOOK > 0)
144
/************************************************************************************//**
145
** \brief     Callback that gets called when the bootloader is about to exit and
146
**            hand over control to the user program. This is the last moment that
147
**            some final checking can be performed and if necessary prevent the
148
**            bootloader from activiting the user program.
149
** \return    BLT_TRUE if it is okay to start the user program, BLT_FALSE to keep
150
**            keep the bootloader active.
151
**
152
****************************************************************************************/
153
blt_bool CpuUserProgramStartHook(void)
154
{
155
  /* evaluate the fsm state */
156
  switch (boot_state) {
157
    case BOOT_OS_SYNC:
158
    {
159
      /* wait for the SYS_SYNC_N signal to go down */
160
      if (GPIO_ReadInputDataBit(SYS_SYNC_N_GPIO, SYS_SYNC_N_PIN) == Bit_RESET) {
161
        boot_state = BOOT_OS_START;
162
      }
163
      return BLT_FALSE;
164
      break;
165
    }
166
    case BOOT_OS_START:
167
    {
168
      /* pull down SYS_SYNC_N to indicate that the module is busy
169
       * note: This is optional at this point. The OS however MUST pull down SYS_SYNC_N until it is ready */
170
      GPIO_ResetBits(SYS_SYNC_N_GPIO, SYS_SYNC_N_PIN);
171
      return BLT_TRUE;
172
    }
173
    default:
174
      return BLT_FALSE;
175
      break;
176
  }
177
  return BLT_FALSE;
178
} /*** end of CpuUserProgramStartHook ***/
179
#endif /* BOOT_CPU_USER_PROGRAM_START_HOOK > 0 */
180

    
181

    
182
/****************************************************************************************
183
*   N O N - V O L A T I L E   M E M O R Y   D R I V E R   H O O K   F U N C T I O N S
184
****************************************************************************************/
185

    
186
#if (BOOT_NVM_HOOKS_ENABLE > 0)
187
/************************************************************************************//**
188
** \brief     Callback that gets called at the start of the internal NVM driver
189
**            initialization routine. 
190
** \return    none.
191
**
192
****************************************************************************************/
193
void NvmInitHook(void)
194
{
195
} /*** end of NvmInitHook ***/
196

    
197

    
198
/************************************************************************************//**
199
** \brief     Callback that gets called at the start of the NVM driver write 
200
**            routine. It allows additional memory to be operated on. If the address
201
**            is not within the range of the additional memory, then 
202
**            BLT_NVM_NOT_IN_RANGE must be returned to indicate that the data hasn't
203
**            been written yet.
204
** \param     addr Start address.
205
** \param     len  Length in bytes.
206
** \param     data Pointer to the data buffer.
207
** \return    BLT_NVM_OKAY if successful, BLT_NVM_NOT_IN_RANGE if the address is
208
**            not within the supported memory range, or BLT_NVM_ERROR is the write
209
**            operation failed.
210
**
211
****************************************************************************************/
212
blt_int8u NvmWriteHook(blt_addr addr, blt_int32u len, blt_int8u *data)
213
{
214
  return BLT_NVM_NOT_IN_RANGE;
215
} /*** end of NvmWriteHook ***/
216

    
217

    
218
/************************************************************************************//**
219
** \brief     Callback that gets called at the start of the NVM driver erase 
220
**            routine. It allows additional memory to be operated on. If the address
221
**            is not within the range of the additional memory, then
222
**            BLT_NVM_NOT_IN_RANGE must be returned to indicate that the memory
223
**            hasn't been erased yet.
224
** \param     addr Start address.
225
** \param     len  Length in bytes.
226
** \return    BLT_NVM_OKAY if successful, BLT_NVM_NOT_IN_RANGE if the address is
227
**            not within the supported memory range, or BLT_NVM_ERROR is the erase
228
**            operation failed.
229
**
230
****************************************************************************************/
231
blt_int8u NvmEraseHook(blt_addr addr, blt_int32u len)
232
{
233
  return BLT_NVM_NOT_IN_RANGE;
234
} /*** end of NvmEraseHook ***/
235

    
236

    
237
/************************************************************************************//**
238
** \brief     Callback that gets called at the end of the NVM programming session.
239
** \return    BLT_TRUE is successful, BLT_FALSE otherwise.
240
**
241
****************************************************************************************/
242
blt_bool NvmDoneHook(void)
243
{
244
  return BLT_TRUE;
245
} /*** end of NvmDoneHook ***/
246
#endif /* BOOT_NVM_HOOKS_ENABLE > 0 */
247

    
248

    
249
#if (BOOT_NVM_CHECKSUM_HOOKS_ENABLE > 0)
250
/************************************************************************************//**
251
** \brief     Verifies the checksum, which indicates that a valid user program is
252
**            present and can be started.
253
** \return    BLT_TRUE if successful, BLT_FALSE otherwise.
254
**
255
****************************************************************************************/
256
blt_bool NvmVerifyChecksumHook(void)
257
{
258
  return BLT_TRUE;
259
} /*** end of NvmVerifyChecksum ***/
260

    
261

    
262
/************************************************************************************//**
263
** \brief     Writes a checksum of the user program to non-volatile memory. This is
264
**            performed once the entire user program has been programmed. Through
265
**            the checksum, the bootloader can check if a valid user programming is
266
**            present and can be started.
267
** \return    BLT_TRUE if successful, BLT_FALSE otherwise. 
268
**
269
****************************************************************************************/
270
blt_bool NvmWriteChecksumHook(void)
271
{
272
  return BLT_TRUE;
273
}
274
#endif /* BOOT_NVM_CHECKSUM_HOOKS_ENABLE > 0 */
275

    
276

    
277
/****************************************************************************************
278
*   W A T C H D O G   D R I V E R   H O O K   F U N C T I O N S
279
****************************************************************************************/
280

    
281
#if (BOOT_COP_HOOKS_ENABLE > 0)
282
/************************************************************************************//**
283
** \brief     Callback that gets called at the end of the internal COP driver
284
**            initialization routine. It can be used to configure and enable the
285
**            watchdog.
286
** \return    none.
287
**
288
****************************************************************************************/
289
void CopInitHook(void)
290
{
291
} /*** end of CopInitHook ***/
292

    
293

    
294
/************************************************************************************//**
295
** \brief     Callback that gets called at the end of the internal COP driver
296
**            service routine. This gets called upon initialization and during
297
**            potential long lasting loops and routine. It can be used to service
298
**            the watchdog to prevent a watchdog reset.
299
** \return    none.
300
**
301
****************************************************************************************/
302
void CopServiceHook(void)
303
{
304
} /*** end of CopServiceHook ***/
305
#endif /* BOOT_COP_HOOKS_ENABLE > 0 */
306

    
307

    
308
/****************************************************************************************
309
*   F I L E   S Y S T E M   I N T E R F A C E   H O O K   F U N C T I O N S
310
****************************************************************************************/
311

    
312
#if (BOOT_FILE_SYS_ENABLE > 0)
313

    
314
/****************************************************************************************
315
* Constant data declarations
316
****************************************************************************************/
317
/** \brief Firmware filename. */
318
static const blt_char firmwareFilename[] = "/demoprog_olimex_stm32p103.srec";
319

    
320

    
321
/****************************************************************************************
322
* Local data declarations
323
****************************************************************************************/
324
#if (BOOT_FILE_LOGGING_ENABLE > 0)
325
/** \brief Data structure for grouping log-file related information. */
326
static struct 
327
{
328
  FIL      handle;                  /**< FatFS handle to the log-file.                 */
329
  blt_bool canUse;                  /**< Flag to indicate if the log-file can be used. */
330
} logfile;
331
#endif
332

    
333

    
334
/************************************************************************************//**
335
** \brief     Callback that gets called to check whether a firmware update from 
336
**            local file storage should be started. This could for example be when
337
**            a switch is pressed, when a certain file is found on the local file 
338
**            storage, etc.
339
** \return    BLT_TRUE if a firmware update is requested, BLT_FALSE otherwise.
340
**
341
****************************************************************************************/
342
blt_bool FileIsFirmwareUpdateRequestedHook(void)
343
{
344
  FILINFO fileInfoObject = { 0 }; /* needs to be zeroed according to f_stat docs */;
345

    
346
  /* Current example implementation looks for a predetermined firmware file on the 
347
   * SD-card. If the SD-card is accessible and the firmware file was found the firmware
348
   * update is started. When successfully completed, the firmware file is deleted.
349
   * During the firmware update, progress information is written to a file called
350
   * bootlog.txt and additionally outputted on UART @57600 bps for debugging purposes.
351
   */
352
  /* check if firmware file is present and SD-card is accessible */
353
  if (f_stat(firmwareFilename, &fileInfoObject) == FR_OK) 
354
  {
355
    /* check if the filesize is valid and that it is not a directory */
356
    if ( (fileInfoObject.fsize > 0) && (!(fileInfoObject.fattrib & AM_DIR)) )
357
    {
358
      /* all conditions are met to start a firmware update from local file storage */
359
      return BLT_TRUE;
360
    }
361
  }
362
  /* still here so no firmware update request is pending */  
363
  return BLT_FALSE;
364
} /*** end of FileIsFirmwareUpdateRequestedHook ***/
365

    
366

    
367
/************************************************************************************//**
368
** \brief     Callback to obtain the filename of the firmware file that should be
369
**            used during the firmware update from the local file storage. This 
370
**            hook function is called at the beginning of the firmware update from
371
**            local storage sequence. 
372
** \return    valid firmware filename with full path or BLT_NULL.
373
**
374
****************************************************************************************/
375
const blt_char *FileGetFirmwareFilenameHook(void)
376
{
377
  return firmwareFilename;
378
} /*** end of FileGetFirmwareFilenameHook ***/
379

    
380

    
381
#if (BOOT_FILE_STARTED_HOOK_ENABLE > 0)
382
/************************************************************************************//**
383
** \brief     Callback that gets called to inform the application that a firmware
384
**            update from local storage just started. 
385
** \return    none.
386
**
387
****************************************************************************************/
388
void FileFirmwareUpdateStartedHook(void)
389
{
390
  #if (BOOT_FILE_LOGGING_ENABLE > 0)
391
  /* create/overwrite the logfile */
392
  logfile.canUse = BLT_FALSE;
393
  if (f_open(&logfile.handle, "/bootlog.txt", FA_CREATE_ALWAYS | FA_WRITE) == FR_OK)
394
  {
395
    logfile.canUse = BLT_TRUE;
396
  }
397
  #endif
398
} /*** end of FileFirmwareUpdateStartedHook ***/
399
#endif /* BOOT_FILE_STARTED_HOOK_ENABLE > 0 */
400

    
401

    
402
#if (BOOT_FILE_COMPLETED_HOOK_ENABLE > 0)
403
/************************************************************************************//**
404
** \brief     Callback that gets called to inform the application that a firmware
405
**            update was successfully completed.
406
** \return    none.
407
**
408
****************************************************************************************/
409
void FileFirmwareUpdateCompletedHook(void)
410
{
411
  #if (BOOT_FILE_LOGGING_ENABLE > 0)
412
  /* close the log file */
413
  if (logfile.canUse == BLT_TRUE)
414
  {
415
    f_close(&logfile.handle);
416
  }
417
  /* wait for all logging related transmission to complete */
418
  while(USART_GetFlagStatus(USART2, USART_FLAG_TC) == RESET);
419
  #endif
420
  /* now delete the firmware file from the disk since the update was successful */
421
  f_unlink(firmwareFilename);
422
} /*** end of FileFirmwareUpdateCompletedHook ***/
423
#endif /* BOOT_FILE_COMPLETED_HOOK_ENABLE > 0 */
424

    
425

    
426
#if (BOOT_FILE_ERROR_HOOK_ENABLE > 0)
427
/************************************************************************************//**
428
** \brief     Callback that gets called in case an error occurred during a firmware
429
**            update. Refer to <file.h> for a list of available error codes.
430
** \return    none.
431
**
432
****************************************************************************************/
433
void FileFirmwareUpdateErrorHook(blt_int8u error_code)
434
{
435
  #if (BOOT_FILE_LOGGING_ENABLE > 0)
436
  /* error detected which stops the firmware update, so close the log file */
437
  if (logfile.canUse == BLT_TRUE)
438
  {
439
    f_close(&logfile.handle);
440
  }
441
  #endif
442
} /*** end of FileFirmwareUpdateErrorHook ***/
443
#endif /* BOOT_FILE_ERROR_HOOK_ENABLE > 0 */
444

    
445

    
446
#if (BOOT_FILE_LOGGING_ENABLE > 0)
447
/************************************************************************************//**
448
** \brief     Callback that gets called each time new log information becomes 
449
**            available during a firmware update.
450
** \param     info_string Pointer to a character array with the log entry info.
451
** \return    none.
452
**
453
****************************************************************************************/
454
void FileFirmwareUpdateLogHook(blt_char *info_string)
455
{
456
  /* write the string to the log file */
457
  if (logfile.canUse == BLT_TRUE)
458
  {
459
    if (f_puts(info_string, &logfile.handle) < 0)
460
    {
461
      logfile.canUse = BLT_FALSE;
462
      f_close(&logfile.handle);
463
    }
464
  }
465
  /* echo all characters in the string on UART */
466
  while(*info_string != '\0')
467
  {
468
    /* write character to transmit holding register */
469
    USART_SendData(USART2, *info_string);
470
    /* wait for tx holding register to be empty */
471
    while(USART_GetFlagStatus(USART2, USART_FLAG_TXE) == RESET);
472
    /* point to the next character in the string */
473
    info_string++;
474
  }
475
} /*** end of FileFirmwareUpdateLogHook ***/
476
#endif /* BOOT_FILE_LOGGING_ENABLE > 0 */
477

    
478

    
479
#endif /* BOOT_FILE_SYS_ENABLE > 0 */
480

    
481

    
482
/****************************************************************************************
483
*   S E E D / K E Y   S E C U R I T Y   H O O K   F U N C T I O N S
484
****************************************************************************************/
485

    
486
#if (BOOT_XCP_SEED_KEY_ENABLE > 0)
487
/************************************************************************************//**
488
** \brief     Provides a seed to the XCP master that will be used for the key 
489
**            generation when the master attempts to unlock the specified resource. 
490
**            Called by the GET_SEED command.
491
** \param     resource  Resource that the seed if requested for (XCP_RES_XXX).
492
** \param     seed      Pointer to byte buffer wher the seed will be stored.
493
** \return    Length of the seed in bytes.
494
**
495
****************************************************************************************/
496
blt_int8u XcpGetSeedHook(blt_int8u resource, blt_int8u *seed)
497
{
498
  /* request seed for unlocking ProGraMming resource */
499
  if ((resource & XCP_RES_PGM) != 0)
500
  {
501
    seed[0] = 0x55;
502
  }
503

    
504
  /* return seed length */
505
  return 1;
506
} /*** end of XcpGetSeedHook ***/
507

    
508

    
509
/************************************************************************************//**
510
** \brief     Called by the UNLOCK command and checks if the key to unlock the 
511
**            specified resource was correct. If so, then the resource protection 
512
**            will be removed.
513
** \param     resource  resource to unlock (XCP_RES_XXX).
514
** \param     key       pointer to the byte buffer holding the key.
515
** \param     len       length of the key in bytes.
516
** \return    1 if the key was correct, 0 otherwise.
517
**
518
****************************************************************************************/
519
blt_int8u XcpVerifyKeyHook(blt_int8u resource, blt_int8u *key, blt_int8u len)
520
{
521
  /* suppress compiler warning for unused parameter */
522
  len = len;
523

    
524
  /* the example key algorithm in "FeaserKey.dll" works as follows:
525
   *  - PGM will be unlocked if key = seed - 1
526
   */
527

    
528
  /* check key for unlocking ProGraMming resource */
529
  if ((resource == XCP_RES_PGM) && (key[0] == (0x55-1)))
530
  {
531
    /* correct key received for unlocking PGM resource */
532
    return 1;
533
  }
534

    
535
  /* still here so key incorrect */
536
  return 0;
537
} /*** end of XcpVerifyKeyHook ***/
538
#endif /* BOOT_XCP_SEED_KEY_ENABLE > 0 */
539

    
540

    
541
/*********************************** end of hooks.c ************************************/