2022-08-15 04:20:27 -05:00
|
|
|
/**
|
|
|
|
* @file ota_common.cpp
|
|
|
|
* @author BES AI team
|
|
|
|
* @version 0.1
|
|
|
|
* @date 2020-04-17
|
|
|
|
*
|
|
|
|
* @copyright Copyright (c) 2015-2020 BES Technic.
|
|
|
|
* All rights reserved. All unpublished rights reserved.
|
|
|
|
*
|
|
|
|
* No part of this work may be used or reproduced in any form or by any
|
|
|
|
* means, or stored in a database or retrieval system, without prior written
|
|
|
|
* permission of BES.
|
|
|
|
*
|
|
|
|
* Use of this work is governed by a license granted by BES.
|
|
|
|
* This work contains confidential and proprietary information of
|
|
|
|
* BES. which is protected by copyright, trade secret,
|
|
|
|
* trademark and other intellectual property rights.
|
|
|
|
*/
|
|
|
|
|
|
|
|
/*****************************header include********************************/
|
2023-02-01 14:52:54 -06:00
|
|
|
#include "ota_common.h"
|
|
|
|
#include "app.h"
|
|
|
|
#include "app_bt.h"
|
|
|
|
#include "app_utils.h"
|
|
|
|
#include "apps.h"
|
|
|
|
#include "bt_drv_reg_op.h"
|
2022-08-15 04:20:27 -05:00
|
|
|
#include "cmsis.h"
|
2023-02-01 14:52:54 -06:00
|
|
|
#include "crc32.h"
|
2022-08-15 04:20:27 -05:00
|
|
|
#include "hal_timer.h"
|
|
|
|
#include "norflash_api.h"
|
2023-02-01 14:52:54 -06:00
|
|
|
#include "norflash_drv.h"
|
2022-08-15 04:20:27 -05:00
|
|
|
#include "nvrecord_ota.h"
|
|
|
|
#include "ota_dbg.h"
|
2023-02-01 14:52:54 -06:00
|
|
|
#include "string.h"
|
2022-08-15 04:20:27 -05:00
|
|
|
|
|
|
|
#ifdef IBRT
|
2023-02-01 14:52:54 -06:00
|
|
|
#include "app_ibrt_if.h"
|
2022-08-15 04:20:27 -05:00
|
|
|
#include "app_ibrt_ota_cmd.h"
|
|
|
|
#include "app_ibrt_ui.h"
|
2023-02-01 14:52:54 -06:00
|
|
|
#include "app_tws_ctrl_thread.h"
|
|
|
|
#include "app_tws_ibrt.h"
|
|
|
|
#include "app_tws_if.h"
|
2022-08-15 04:20:27 -05:00
|
|
|
#endif
|
|
|
|
|
|
|
|
/*********************external function declearation************************/
|
|
|
|
|
|
|
|
/************************private macro defination***************************/
|
|
|
|
#define OTA_BOOT_INFO_FLASH_OFFSET 0x1000
|
|
|
|
#define OTA_BREAKPOINT_STORE_GRANULARITY (256 * 1024) // must be 4KB aligned
|
|
|
|
#define LEN_OF_IMAGE_TAIL_TO_FIND_SANITY_CRC 512
|
|
|
|
#define INVALID_VERSION_STR "BESTECHNIC"
|
|
|
|
|
|
|
|
#define NORFLASH_API_MODE_ASYNC true
|
|
|
|
#define OTA_DEFAULT_NORFLASH_API_MODE NORFLASH_API_MODE_ASYNC
|
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
#define CASES(prefix, item) \
|
|
|
|
case prefix##item: \
|
|
|
|
str = #item; \
|
|
|
|
break;
|
2022-08-15 04:20:27 -05:00
|
|
|
|
|
|
|
/************************private type defination****************************/
|
|
|
|
|
|
|
|
/**********************private function declearation************************/
|
|
|
|
|
|
|
|
/************************private variable defination************************/
|
2023-02-01 14:52:54 -06:00
|
|
|
__attribute__((unused)) static const char *imageSanityKeyWord =
|
|
|
|
"CRC32_OF_IMAGE=0x";
|
|
|
|
__attribute__((unused)) static const char *oldImageSanityKeyWord =
|
|
|
|
"CRC32_OF_IMAGE=";
|
2022-08-15 04:20:27 -05:00
|
|
|
|
|
|
|
#ifdef IBRT
|
|
|
|
static void _ota_tws_thread(const void *arg);
|
|
|
|
osThreadDef(_ota_tws_thread, osPriorityNormal, 1, 1024, "ota_tws");
|
|
|
|
|
|
|
|
static osEvent evt;
|
|
|
|
|
|
|
|
/// tws relay OTA command/data TX thread ID
|
|
|
|
osThreadId txThreadId = NULL;
|
|
|
|
|
|
|
|
/// tws relay OTA command/data RX thread ID
|
|
|
|
osThreadId rxThreadId;
|
|
|
|
|
|
|
|
osMutexDef(twsTxQueueMutex);
|
|
|
|
osMutexDef(twsRxQueueMutex);
|
|
|
|
|
|
|
|
/// tws relay data TX queue mutex
|
|
|
|
osMutexId txQueueMutexID = NULL;
|
|
|
|
|
|
|
|
/// tws relay data RX queue mutex
|
|
|
|
osMutexId rxQueueMutexID = NULL;
|
|
|
|
|
|
|
|
uint8_t relayBuf[TWS_RELAY_DATA_MAX_SIZE];
|
|
|
|
#endif
|
|
|
|
|
|
|
|
OTA_COMMON_ENV_T otaEnv;
|
|
|
|
|
|
|
|
/****************************function defination****************************/
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief Convert OTA command to string
|
|
|
|
*
|
|
|
|
* @param cmd @see OTA_COMMAND_E
|
|
|
|
* @return char* string of OTA_COMMAND
|
|
|
|
*/
|
2023-02-01 14:52:54 -06:00
|
|
|
static char *_cmd2str(OTA_COMMAND_E cmd) {
|
|
|
|
const char *str = NULL;
|
|
|
|
|
|
|
|
switch (cmd) {
|
|
|
|
CASES(OTA_COMMAND_, BEGIN);
|
|
|
|
CASES(OTA_COMMAND_, APPLY);
|
|
|
|
CASES(OTA_COMMAND_, DATA);
|
|
|
|
CASES(OTA_COMMAND_, ABORT);
|
2022-08-15 04:20:27 -05:00
|
|
|
#ifdef IBRT
|
2023-02-01 14:52:54 -06:00
|
|
|
CASES(OTA_COMMAND_, RSP);
|
2022-08-15 04:20:27 -05:00
|
|
|
#endif
|
2023-02-01 14:52:54 -06:00
|
|
|
// CASES(OTA_COMMAND_, );
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
default:
|
|
|
|
str = "INVALID";
|
|
|
|
break;
|
|
|
|
}
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
return (char *)str;
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief Convert OTA user to string
|
|
|
|
*
|
|
|
|
* @param user @see OTA_USER_E
|
|
|
|
* @return char* OTA_USER string
|
|
|
|
*/
|
2023-02-01 14:52:54 -06:00
|
|
|
static char *_user2str(OTA_USER_E user) {
|
|
|
|
const char *str = NULL;
|
|
|
|
|
|
|
|
switch (user) {
|
|
|
|
CASES(OTA_USER_, BES);
|
|
|
|
CASES(OTA_USER_, COLORFUL);
|
|
|
|
CASES(OTA_USER_, RED);
|
|
|
|
CASES(OTA_USER_, ORANGE);
|
|
|
|
CASES(OTA_USER_, GREEN);
|
|
|
|
// CASES(OTA_USER_, );
|
|
|
|
|
|
|
|
default:
|
|
|
|
str = "INVALID";
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
return (char *)str;
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief Convert OTA path into string
|
|
|
|
*
|
|
|
|
* @param path @see OTA_PATH_E
|
|
|
|
* @return char* OTA_PATH string
|
|
|
|
*/
|
2023-02-01 14:52:54 -06:00
|
|
|
static char *_path2str(OTA_PATH_E path) {
|
|
|
|
const char *str = NULL;
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
switch (path) {
|
|
|
|
CASES(OTA_PATH_, BT);
|
|
|
|
CASES(OTA_PATH_, BLE);
|
|
|
|
// CASES(OTA_PATH_, );
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
default:
|
|
|
|
str = "INVALID";
|
|
|
|
break;
|
|
|
|
}
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
return (char *)str;
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief Convert OTA stage into string
|
|
|
|
*
|
|
|
|
* @param stage @see OTA_STAGE_E
|
|
|
|
* @return char* OTA_STAGE string
|
|
|
|
*/
|
2023-02-01 14:52:54 -06:00
|
|
|
static char *_stage2str(OTA_STAGE_E stage) {
|
|
|
|
const char *str = NULL;
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
switch (stage) {
|
|
|
|
CASES(OTA_STAGE_, IDLE);
|
|
|
|
CASES(OTA_STAGE_, ONGOING);
|
|
|
|
CASES(OTA_STAGE_, DONE);
|
|
|
|
// CASES(OTA_STAGE_, );
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
default:
|
|
|
|
str = "INVALID";
|
|
|
|
break;
|
|
|
|
}
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
return (char *)str;
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
static char *_sts2str(OTA_STATUS_E sts) {
|
|
|
|
const char *str = NULL;
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
switch (sts) {
|
|
|
|
CASES(OTA_STATUS_, OK);
|
|
|
|
CASES(OTA_STATUS_, ERROR);
|
|
|
|
CASES(OTA_STATUS_, ERROR_RELAY_TIMEOUT);
|
|
|
|
CASES(OTA_STATUS_, ERROR_CHECKSUM);
|
|
|
|
CASES(OTA_STATUS_, ERROR_NOT_ALLOWED);
|
|
|
|
// CASES(OTA_STATUS_, );
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
default:
|
|
|
|
str = "INVALID";
|
|
|
|
break;
|
|
|
|
}
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
return (char *)str;
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief Find key word in upgrade data.
|
|
|
|
*
|
|
|
|
* This function is used to find out the key word at the end of upgrade data,
|
|
|
|
* these key words are generated by python script by calculate the crc of whole
|
|
|
|
* upgrade image and write the result at the end of the image in string format.
|
|
|
|
* This is used to do sanity check.
|
|
|
|
*
|
|
|
|
* @param tgtArray source array to search the key word
|
|
|
|
* @param tgtArrayLen source array length
|
|
|
|
* @param keyArray key word array
|
|
|
|
* @param keyArrayLen key word length
|
|
|
|
* @return int32_t index of the key word in dstArry
|
|
|
|
*/
|
|
|
|
__attribute__((unused)) static int32_t _find_key_word(uint8_t *tgtArray,
|
2023-02-01 14:52:54 -06:00
|
|
|
uint32_t tgtArrayLen,
|
|
|
|
uint8_t *keyArray,
|
|
|
|
uint32_t keyArrayLen) {
|
|
|
|
if ((keyArrayLen > 0) && (tgtArrayLen >= keyArrayLen)) {
|
|
|
|
uint32_t index = 0, targetIndex = 0;
|
|
|
|
for (targetIndex = 0; targetIndex < tgtArrayLen; targetIndex++) {
|
|
|
|
for (index = 0; index < keyArrayLen; index++) {
|
|
|
|
if (tgtArray[targetIndex + index] != keyArray[index]) {
|
|
|
|
break;
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
2023-02-01 14:52:54 -06:00
|
|
|
}
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
if (index == keyArrayLen) {
|
|
|
|
return targetIndex;
|
|
|
|
}
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
2023-02-01 14:52:54 -06:00
|
|
|
|
|
|
|
return -1;
|
|
|
|
} else {
|
|
|
|
return -1;
|
|
|
|
}
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief Convert ASCII code into hex format.
|
|
|
|
*
|
|
|
|
* @param asciiCode ASCII code to convert
|
|
|
|
* @return uint8_t convert result
|
|
|
|
*/
|
2023-02-01 14:52:54 -06:00
|
|
|
__attribute__((unused)) static uint8_t _ascii2hex(uint8_t asciiCode) {
|
|
|
|
if ((asciiCode >= '0') && (asciiCode <= '9')) {
|
|
|
|
return asciiCode - '0';
|
|
|
|
} else if ((asciiCode >= 'a') && (asciiCode <= 'f')) {
|
|
|
|
return asciiCode - 'a' + 10;
|
|
|
|
} else if ((asciiCode >= 'A') && (asciiCode <= 'F')) {
|
|
|
|
return asciiCode - 'A' + 10;
|
|
|
|
} else {
|
|
|
|
return 0xff;
|
|
|
|
}
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief Update the stage of OTA progress.
|
|
|
|
*
|
|
|
|
* @param stage OTA stage to update,
|
|
|
|
* @see OTA_STAGE_E to get more details.
|
|
|
|
*/
|
2023-02-01 14:52:54 -06:00
|
|
|
static void _set_ota_stage(OTA_STAGE_E stage) {
|
|
|
|
LOG_D("stage update:%s->%s", _stage2str(otaEnv.currentStage),
|
|
|
|
_stage2str(stage));
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
otaEnv.currentStage = stage;
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
static void _update_ota_user(OTA_USER_E user) {
|
|
|
|
ASSERT((OTA_USER_NUM == otaEnv.currentUser) || (OTA_USER_NUM == user),
|
|
|
|
"try to set a ota user while the current user is not null");
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
LOG_I("ota user update:%s->%s", _user2str(otaEnv.currentUser),
|
|
|
|
_user2str(user));
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
otaEnv.currentUser = user;
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief Enter OTA state handler.
|
|
|
|
*
|
|
|
|
* This function is used to require the relative system resources to gurantee
|
|
|
|
* the performance for both OTA progress and other functionalities
|
|
|
|
*
|
|
|
|
* @param path Current OTA path,
|
|
|
|
* @see OTA_PATH_E to get more details.
|
|
|
|
*/
|
2023-02-01 14:52:54 -06:00
|
|
|
static void _enter_ota_state(OTA_PATH_E path) {
|
|
|
|
LOG_I("%s", __func__);
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
if (otaEnv.isInOtaState) {
|
|
|
|
LOG_W("ALREADY in OTA state");
|
|
|
|
} else {
|
|
|
|
/// 1. guarantee performance->switch to the highest freq
|
|
|
|
app_sysfreq_req(APP_SYSFREQ_USER_OTA, APP_SYSFREQ_104M);
|
2022-08-15 04:20:27 -05:00
|
|
|
|
|
|
|
#ifdef IBRT
|
2023-02-01 14:52:54 -06:00
|
|
|
/// 2. guarantee performance->decrease the communication interval of TWS
|
|
|
|
/// connection
|
|
|
|
ibrt_ctrl_t *p_ibrt_ctrl = app_tws_ibrt_get_bt_ctrl_ctx();
|
|
|
|
btdrv_reg_op_set_tws_link_duration(IBRT_TWS_LINK_LARGE_DURATION);
|
|
|
|
btdrv_reg_op_set_private_tws_poll_interval(
|
|
|
|
p_ibrt_ctrl->config.default_private_poll_interval,
|
|
|
|
p_ibrt_ctrl->config.default_private_poll_interval_in_sco);
|
|
|
|
|
|
|
|
/// 3. guarantee performance->exit bt sniff mode
|
|
|
|
app_ibrt_ui_judge_link_policy(OTA_START_TRIGGER, BTIF_BLP_DISABLE_ALL);
|
|
|
|
|
|
|
|
if (app_tws_ibrt_tws_link_connected() &&
|
|
|
|
(p_ibrt_ctrl->nv_role == IBRT_MASTER) &&
|
|
|
|
p_ibrt_ctrl->p_tws_remote_dev) {
|
|
|
|
btif_me_stop_sniff(p_ibrt_ctrl->p_tws_remote_dev);
|
|
|
|
}
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
app_ibrt_if_tws_sniff_block(15);
|
2022-08-15 04:20:27 -05:00
|
|
|
#else
|
2023-02-01 14:52:54 -06:00
|
|
|
/// 3. guarantee performance->exit bt sniff mode
|
|
|
|
app_bt_active_mode_set(ACTIVE_MODE_KEEPER_OTA,
|
|
|
|
UPDATE_ACTIVE_MODE_FOR_ALL_LINKS);
|
2022-08-15 04:20:27 -05:00
|
|
|
#endif
|
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
/// update the OTA path
|
|
|
|
LOG_I("OTA path update:%s->%s", _path2str(otaEnv.currentPath),
|
|
|
|
_path2str(path));
|
|
|
|
otaEnv.currentPath = path;
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
/// 4. guarantee performance->decrease the BLE connection interval
|
2022-08-15 04:20:27 -05:00
|
|
|
#ifdef BLE_ENABLE
|
2023-02-01 14:52:54 -06:00
|
|
|
if (OTA_PATH_BLE == otaEnv.currentPath) {
|
|
|
|
app_ble_update_conn_param_mode(BLE_CONN_PARAM_MODE_OTA, true);
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
2023-02-01 14:52:54 -06:00
|
|
|
#endif
|
|
|
|
}
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief Exit the OTA state handler.
|
|
|
|
*
|
|
|
|
* This function is used to release the system resources which are required
|
|
|
|
* when enter the OTA state
|
|
|
|
*
|
|
|
|
*/
|
2023-02-01 14:52:54 -06:00
|
|
|
__attribute__((unused)) static void _exit_ota_state(void) {
|
|
|
|
LOG_I("%s", __func__);
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
if (otaEnv.isInOtaState) {
|
2022-08-15 04:20:27 -05:00
|
|
|
#ifdef IBRT
|
2023-02-01 14:52:54 -06:00
|
|
|
app_ibrt_ui_judge_link_policy(OTA_STOP_TRIGGER, BTIF_BLP_SNIFF_MODE);
|
2022-08-15 04:20:27 -05:00
|
|
|
#else
|
2023-02-01 14:52:54 -06:00
|
|
|
app_bt_active_mode_clear(ACTIVE_MODE_KEEPER_OTA,
|
|
|
|
UPDATE_ACTIVE_MODE_FOR_ALL_LINKS);
|
2022-08-15 04:20:27 -05:00
|
|
|
#endif
|
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
/// release the short TWS communication interval
|
2022-08-15 04:20:27 -05:00
|
|
|
#ifdef IBRT
|
2023-02-01 14:52:54 -06:00
|
|
|
ibrt_ctrl_t *p_ibrt_ctrl = app_tws_ibrt_get_bt_ctrl_ctx();
|
|
|
|
btdrv_reg_op_set_tws_link_duration(IBRT_TWS_LINK_DEFAULT_DURATION);
|
|
|
|
btdrv_reg_op_set_private_tws_poll_interval(
|
|
|
|
p_ibrt_ctrl->config.long_private_poll_interval,
|
|
|
|
p_ibrt_ctrl->config.default_private_poll_interval_in_sco);
|
2022-08-15 04:20:27 -05:00
|
|
|
#endif
|
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
/// release the short BLE connection interval
|
2022-08-15 04:20:27 -05:00
|
|
|
#ifdef BLE_ENABLE
|
2023-02-01 14:52:54 -06:00
|
|
|
app_ble_update_conn_param_mode(BLE_CONN_PARAM_MODE_OTA, false);
|
|
|
|
app_ble_update_conn_param_mode(BLE_CONN_PARAM_MODE_OTA_SLOWER, false);
|
2022-08-15 04:20:27 -05:00
|
|
|
#endif
|
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
/// update the OTA path to invalid
|
|
|
|
otaEnv.currentPath = OTA_PATH_INVALID;
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
/// release the system frequency
|
|
|
|
app_sysfreq_req(APP_SYSFREQ_USER_OTA, APP_SYSFREQ_32K);
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
otaEnv.isInOtaState = false;
|
|
|
|
} else {
|
|
|
|
LOG_W("NOT in OTA STATE");
|
|
|
|
}
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef IBRT
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief Do the sanity check for the upgrade file.
|
|
|
|
*
|
|
|
|
* Currently, this function uses the CRC that was inserted by the build process.
|
|
|
|
* This CRC check does not verify the last x bytes of the image. x varies
|
|
|
|
* depending on order of the key/value pair order but is < 512 bytes.
|
|
|
|
*
|
|
|
|
* @return true Sanity check success.
|
|
|
|
* @return false Sanity check failed.
|
|
|
|
*/
|
2023-02-01 14:52:54 -06:00
|
|
|
static bool _image_sanity_check(void) {
|
|
|
|
// find the location of the CRC key word string
|
|
|
|
uint8_t *ptrOfTheLast4KImage =
|
|
|
|
(uint8_t *)(OTA_FLASH_LOGIC_ADDR + NEW_IMAGE_FLASH_OFFSET +
|
|
|
|
otaEnv.totalImageSize - LEN_OF_IMAGE_TAIL_TO_FIND_SANITY_CRC);
|
|
|
|
|
|
|
|
uint32_t sanityCrc32;
|
|
|
|
uint32_t crc32ImageOffset;
|
|
|
|
int32_t sanity_crc_location =
|
|
|
|
_find_key_word(ptrOfTheLast4KImage, LEN_OF_IMAGE_TAIL_TO_FIND_SANITY_CRC,
|
|
|
|
(uint8_t *)imageSanityKeyWord, strlen(imageSanityKeyWord));
|
|
|
|
if (-1 == sanity_crc_location) {
|
|
|
|
sanity_crc_location = _find_key_word(
|
|
|
|
ptrOfTheLast4KImage, LEN_OF_IMAGE_TAIL_TO_FIND_SANITY_CRC,
|
|
|
|
(uint8_t *)oldImageSanityKeyWord, strlen(oldImageSanityKeyWord));
|
|
|
|
if (-1 == sanity_crc_location) {
|
|
|
|
// if no sanity crc, fail the check
|
|
|
|
return false;
|
|
|
|
} else {
|
|
|
|
crc32ImageOffset = sanity_crc_location + otaEnv.totalImageSize -
|
|
|
|
LEN_OF_IMAGE_TAIL_TO_FIND_SANITY_CRC +
|
|
|
|
strlen(oldImageSanityKeyWord);
|
|
|
|
sanityCrc32 = *(uint32_t *)(OTA_FLASH_LOGIC_ADDR +
|
|
|
|
NEW_IMAGE_FLASH_OFFSET + crc32ImageOffset);
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
2023-02-01 14:52:54 -06:00
|
|
|
} else {
|
|
|
|
crc32ImageOffset = sanity_crc_location + otaEnv.totalImageSize -
|
|
|
|
LEN_OF_IMAGE_TAIL_TO_FIND_SANITY_CRC +
|
|
|
|
strlen(imageSanityKeyWord);
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
sanityCrc32 = 0;
|
|
|
|
uint8_t *crcString = (uint8_t *)(OTA_FLASH_LOGIC_ADDR +
|
|
|
|
NEW_IMAGE_FLASH_OFFSET + crc32ImageOffset);
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
for (uint8_t index = 0; index < 8; index++) {
|
|
|
|
sanityCrc32 |= (_ascii2hex(crcString[index]) << (28 - 4 * index));
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
2023-02-01 14:52:54 -06:00
|
|
|
}
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
LOG_D("Bytes to generate crc32 is %d", crc32ImageOffset);
|
|
|
|
LOG_D("sanity_crc_location is %d", sanity_crc_location);
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
LOG_D("sanityCrc32 is 0x%x", sanityCrc32);
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
// generate the CRC from image data
|
|
|
|
uint32_t calculatedCrc32 = 0;
|
|
|
|
calculatedCrc32 =
|
|
|
|
crc32(calculatedCrc32,
|
|
|
|
(uint8_t *)(OTA_FLASH_LOGIC_ADDR + NEW_IMAGE_FLASH_OFFSET),
|
|
|
|
crc32ImageOffset);
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
LOG_D("calculatedCrc32 is 0x%x", calculatedCrc32);
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
if (sanityCrc32 == calculatedCrc32) {
|
|
|
|
return true;
|
|
|
|
}
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
return false;
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
static enum NORFLASH_API_MODULE_ID_T
|
2023-02-01 14:52:54 -06:00
|
|
|
_get_flash_module_from_ota_device(OTA_DEVICE_E device) {
|
|
|
|
enum NORFLASH_API_MODULE_ID_T mod = NORFLASH_API_MODULE_ID_COUNT;
|
|
|
|
|
|
|
|
switch (device) {
|
|
|
|
case OTA_DEVICE_APP:
|
|
|
|
mod = NORFLASH_API_MODULE_ID_OTA;
|
|
|
|
break;
|
|
|
|
case OTA_DEVICE_HOTWORD:
|
|
|
|
mod = NORFLASH_API_MODULE_ID_HOTWORD_MODEL;
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
|
|
|
ASSERT(0, "invalid OTA device received in %s", __func__);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
return mod;
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
static void _flush_data_to_flash(uint8_t *ptrSource, uint32_t lengthToBurn,
|
2022-08-15 04:20:27 -05:00
|
|
|
uint32_t offsetInFlashToProgram,
|
2023-02-01 14:52:54 -06:00
|
|
|
bool synWrite) {
|
|
|
|
|
|
|
|
LOG_D("flush %d bytes to flash offset 0x%x", lengthToBurn,
|
|
|
|
offsetInFlashToProgram);
|
|
|
|
enum NORFLASH_API_MODULE_ID_T mod =
|
|
|
|
_get_flash_module_from_ota_device(otaEnv.deviceId);
|
|
|
|
|
|
|
|
uint32_t preBytes = (FLASH_SECTOR_SIZE_IN_BYTES -
|
|
|
|
(offsetInFlashToProgram % FLASH_SECTOR_SIZE_IN_BYTES)) %
|
|
|
|
FLASH_SECTOR_SIZE_IN_BYTES;
|
|
|
|
|
|
|
|
if (lengthToBurn < preBytes) {
|
|
|
|
preBytes = lengthToBurn;
|
|
|
|
}
|
|
|
|
|
|
|
|
uint32_t middleBytes = 0;
|
|
|
|
if (lengthToBurn > preBytes) {
|
|
|
|
middleBytes = ((lengthToBurn - preBytes) / FLASH_SECTOR_SIZE_IN_BYTES *
|
|
|
|
FLASH_SECTOR_SIZE_IN_BYTES);
|
|
|
|
}
|
|
|
|
|
|
|
|
uint32_t postBytes = 0;
|
|
|
|
if (lengthToBurn > (preBytes + middleBytes)) {
|
|
|
|
postBytes =
|
|
|
|
(offsetInFlashToProgram + lengthToBurn) % FLASH_SECTOR_SIZE_IN_BYTES;
|
|
|
|
}
|
|
|
|
|
|
|
|
LOG_D("Prebytes is %d middlebytes is %d postbytes is %d", preBytes,
|
|
|
|
middleBytes, postBytes);
|
|
|
|
|
|
|
|
if (preBytes > 0) {
|
|
|
|
app_flash_page_program(mod, offsetInFlashToProgram, ptrSource, preBytes,
|
|
|
|
synWrite);
|
|
|
|
|
|
|
|
ptrSource += preBytes;
|
|
|
|
offsetInFlashToProgram += preBytes;
|
|
|
|
}
|
|
|
|
|
|
|
|
uint32_t sectorIndexInFlash =
|
|
|
|
offsetInFlashToProgram / FLASH_SECTOR_SIZE_IN_BYTES;
|
|
|
|
|
|
|
|
if (middleBytes > 0) {
|
|
|
|
uint32_t sectorCntToProgram = middleBytes / FLASH_SECTOR_SIZE_IN_BYTES;
|
|
|
|
for (uint32_t sector = 0; sector < sectorCntToProgram; sector++) {
|
|
|
|
app_flash_page_erase(mod,
|
|
|
|
sectorIndexInFlash * FLASH_SECTOR_SIZE_IN_BYTES);
|
|
|
|
app_flash_page_program(mod,
|
|
|
|
sectorIndexInFlash * FLASH_SECTOR_SIZE_IN_BYTES,
|
|
|
|
ptrSource + sector * FLASH_SECTOR_SIZE_IN_BYTES,
|
|
|
|
FLASH_SECTOR_SIZE_IN_BYTES, synWrite);
|
|
|
|
|
|
|
|
sectorIndexInFlash++;
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
ptrSource += middleBytes;
|
|
|
|
}
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
if (postBytes > 0) {
|
|
|
|
app_flash_page_erase(mod, sectorIndexInFlash * FLASH_SECTOR_SIZE_IN_BYTES);
|
|
|
|
app_flash_page_program(mod, sectorIndexInFlash * FLASH_SECTOR_SIZE_IN_BYTES,
|
|
|
|
ptrSource, postBytes, synWrite);
|
|
|
|
}
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
app_flush_pending_flash_op(mod, NORFLASH_API_ALL);
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* NOTE that this function is stil needed since the OTA bootloader uses the CRC
|
|
|
|
* that is passed into it to re-verify the image and that CRC is for the entire
|
|
|
|
* image.
|
|
|
|
*/
|
2023-02-01 14:52:54 -06:00
|
|
|
static bool _compute_whole_image_crc(void) {
|
|
|
|
uint32_t processedDataSize = 0;
|
|
|
|
uint32_t crc32Value = 0;
|
|
|
|
uint32_t bytes_to_use = 0;
|
|
|
|
uint32_t lock;
|
|
|
|
|
|
|
|
while (processedDataSize < otaEnv.totalImageSize) {
|
|
|
|
if (otaEnv.totalImageSize - processedDataSize >
|
|
|
|
OTA_DATA_CACHE_BUFFER_SIZE) {
|
|
|
|
bytes_to_use = OTA_DATA_CACHE_BUFFER_SIZE;
|
|
|
|
} else {
|
|
|
|
bytes_to_use = otaEnv.totalImageSize - processedDataSize;
|
|
|
|
}
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
lock = int_lock_global();
|
|
|
|
norflash_sync_read(
|
|
|
|
NORFLASH_API_MODULE_ID_OTA,
|
|
|
|
(OTA_FLASH_LOGIC_ADDR + NEW_IMAGE_FLASH_OFFSET + processedDataSize),
|
|
|
|
otaEnv.dataCacheBuffer, OTA_DATA_CACHE_BUFFER_SIZE);
|
|
|
|
// memcpy(otaEnv.dataCacheBuffer, (uint8_t *)(OTA_FLASH_LOGIC_ADDR +
|
|
|
|
// NEW_IMAGE_FLASH_OFFSET + processedDataSize),
|
|
|
|
// OTA_DATA_CACHE_BUFFER_SIZE);
|
|
|
|
int_unlock_global(lock);
|
|
|
|
|
|
|
|
if (0 == processedDataSize) {
|
|
|
|
if (*(uint32_t *)otaEnv.dataCacheBuffer != NORMAL_BOOT) {
|
|
|
|
LOG_D("first 32bit value is not NORMAL_BOOT");
|
|
|
|
return false;
|
|
|
|
} else {
|
|
|
|
*(uint32_t *)otaEnv.dataCacheBuffer = 0xFFFFFFFF;
|
|
|
|
}
|
|
|
|
}
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
LOG_D("bytes to verify =%d.", bytes_to_use);
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
crc32Value =
|
|
|
|
crc32(crc32Value, (uint8_t *)otaEnv.dataCacheBuffer, bytes_to_use);
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
processedDataSize += bytes_to_use;
|
|
|
|
}
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
LOG_D("Computed CRC32 is 0x%x.", crc32Value);
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
/* This crc value will be passed to the ota app in GSoundOtaApply(). */
|
|
|
|
otaEnv.crc32OfImage = crc32Value;
|
|
|
|
return true;
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
static void _update_boot_info(OTA_BOOT_INFO_T *otaBootInfo) {
|
|
|
|
ASSERT(OTA_DEVICE_APP == otaEnv.deviceId,
|
|
|
|
"illegal OTA device try to update boot info");
|
|
|
|
hal_norflash_disable_protection(HAL_NORFLASH_ID_0);
|
|
|
|
enum NORFLASH_API_MODULE_ID_T mod =
|
|
|
|
_get_flash_module_from_ota_device(otaEnv.deviceId);
|
|
|
|
app_flash_page_erase(mod, OTA_BOOT_INFO_FLASH_OFFSET);
|
|
|
|
app_flash_page_program(mod, OTA_BOOT_INFO_FLASH_OFFSET,
|
|
|
|
(uint8_t *)otaBootInfo, sizeof(OTA_BOOT_INFO_T), true);
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
static void _update_magic_number(uint32_t newMagicNumber) {
|
|
|
|
ASSERT(OTA_DEVICE_APP == otaEnv.deviceId,
|
|
|
|
"illegal device %d to update magic number", otaEnv.deviceId);
|
|
|
|
memcpy(otaEnv.dataCacheBuffer,
|
|
|
|
(uint8_t *)(OTA_FLASH_LOGIC_ADDR + otaEnv.newImageFlashOffset),
|
|
|
|
FLASH_SECTOR_SIZE_IN_BYTES);
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
*(uint32_t *)otaEnv.dataCacheBuffer = newMagicNumber;
|
|
|
|
enum NORFLASH_API_MODULE_ID_T mod =
|
|
|
|
_get_flash_module_from_ota_device(otaEnv.deviceId);
|
|
|
|
app_flash_page_erase(mod, otaEnv.newImageFlashOffset);
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
app_flash_page_program(mod, otaEnv.newImageFlashOffset,
|
|
|
|
otaEnv.dataCacheBuffer, FLASH_SECTOR_SIZE_IN_BYTES,
|
|
|
|
true);
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
app_flush_pending_flash_op(mod, NORFLASH_API_ALL);
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
static void _update_peer_result(OTA_STATUS_E ret) {
|
|
|
|
LOG_D("update peer result:%s->%s", _sts2str(otaEnv.peerResult),
|
|
|
|
_sts2str(ret));
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
otaEnv.peerResult = ret;
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
OTA_STATUS_E ota_common_get_peer_result(void) { return otaEnv.peerResult; }
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
static bool _relay_data_needed(void) {
|
|
|
|
bool ret = true;
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
if (!app_tws_ibrt_tws_link_connected()) {
|
|
|
|
ret = false;
|
|
|
|
}
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
if (OTA_STAGE_IDLE == otaEnv.currentStage) {
|
|
|
|
ret = false;
|
|
|
|
}
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
/// check the customized relay_data_needed permission
|
|
|
|
if (ret && otaEnv.customRelayNeededHandler) {
|
|
|
|
ret = otaEnv.customRelayNeededHandler();
|
|
|
|
}
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
return ret;
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
static void _ota_relay_data(OTA_COMMAND_E cmdType, const uint8_t *dataPtr,
|
|
|
|
uint16_t length) {
|
|
|
|
uint8_t frameNum = 0;
|
|
|
|
uint16_t frameLen = 0;
|
|
|
|
OTA_TWS_DATA_T tCmd = {
|
|
|
|
cmdType,
|
|
|
|
};
|
|
|
|
|
|
|
|
ASSERT(length <= ARRAY_SIZE(tCmd.data), "ILLEGAL relay packet length");
|
|
|
|
|
|
|
|
/// split packet into servel frame to fulfill the max TWS data
|
|
|
|
/// transmission length requirement
|
|
|
|
if (length % OTA_TWS_PAYLOAD_MAX_LEN) {
|
|
|
|
frameNum = length / OTA_TWS_PAYLOAD_MAX_LEN + 1;
|
|
|
|
} else {
|
|
|
|
frameNum = length / OTA_TWS_PAYLOAD_MAX_LEN;
|
|
|
|
}
|
|
|
|
|
|
|
|
LOG_D("packet len:%d, splited frame num:%d", length, frameNum);
|
|
|
|
|
|
|
|
/// push all data into queue
|
|
|
|
for (uint8_t i = 0; i < frameNum; i++) {
|
|
|
|
if ((i + 1) == frameNum) {
|
|
|
|
tCmd.magicCode = OTA_RELAY_PACKET_MAGIC_CODE_COMPLETE;
|
|
|
|
tCmd.length = length % OTA_TWS_PAYLOAD_MAX_LEN;
|
|
|
|
} else {
|
|
|
|
tCmd.magicCode = OTA_RELAY_PACKET_MAGIC_CODE_INCOMPLETE;
|
|
|
|
tCmd.length = OTA_TWS_PAYLOAD_MAX_LEN;
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
frameLen = OTA_TWS_HEAD_SIZE + tCmd.length;
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
memcpy(tCmd.data, dataPtr + i * OTA_TWS_PAYLOAD_MAX_LEN, tCmd.length);
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
osMutexWait(txQueueMutexID, osWaitForever);
|
|
|
|
ASSERT(CQ_OK == EnCQueue(&otaEnv.txQueue, (CQItemType *)&frameLen,
|
|
|
|
sizeof(frameLen)),
|
|
|
|
"%s failed to push data to queue", __func__);
|
|
|
|
ASSERT(CQ_OK == EnCQueue(&otaEnv.txQueue, (CQItemType *)&tCmd, frameLen),
|
|
|
|
"%s failed to push data to queue", __func__);
|
|
|
|
osMutexRelease(txQueueMutexID);
|
|
|
|
}
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
/// inform tx thread to handle the data to be transmitted
|
|
|
|
osSignalSet(txThreadId, OTA_TWS_TX_SIGNAL);
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief Check the validity of received data frame.
|
|
|
|
*
|
|
|
|
* @param dataPtr Pointer of received data
|
|
|
|
* @param length length of received data
|
|
|
|
* @return true Received data frame is valid
|
|
|
|
* @return false Received data frame is invalid
|
|
|
|
*/
|
2023-02-01 14:52:54 -06:00
|
|
|
static bool _tws_frame_validity_check(uint8_t *dataPtr, uint32_t length) {
|
|
|
|
bool isValid = true;
|
|
|
|
|
|
|
|
OTA_TWS_DATA_T *otaTwsData = (OTA_TWS_DATA_T *)dataPtr;
|
|
|
|
|
|
|
|
ASSERT(TWS_RELAY_DATA_MAX_SIZE >= length,
|
|
|
|
"received overloaded data packet!!!");
|
|
|
|
if (OTA_RELAY_PACKET_MAGIC_CODE_INCOMPLETE == otaEnv.currentMagicCode &&
|
|
|
|
otaTwsData->cmdType != otaEnv.currentCmdType) {
|
|
|
|
ASSERT(0, "bad frame is received!!!");
|
|
|
|
}
|
|
|
|
|
|
|
|
if (length != otaTwsData->length + OTA_TWS_HEAD_SIZE) {
|
|
|
|
LOG_W("INVALID packet, dataLen:%d, expected dataLen:%d", length,
|
|
|
|
otaTwsData->length + OTA_TWS_HEAD_SIZE);
|
|
|
|
isValid = false;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (OTA_RELAY_PACKET_MAGIC_CODE_COMPLETE != otaTwsData->magicCode &&
|
|
|
|
OTA_RELAY_PACKET_MAGIC_CODE_INCOMPLETE != otaTwsData->magicCode) {
|
|
|
|
LOG_W("INVALID magic code:0x%08x", otaTwsData->magicCode);
|
|
|
|
isValid = false;
|
|
|
|
}
|
|
|
|
|
|
|
|
return isValid;
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief Response the master for the OTA_COMMAND received.
|
|
|
|
*
|
|
|
|
* This function will response the master after a whole packet receiving is
|
|
|
|
* done.
|
|
|
|
*
|
|
|
|
* @param status Status of receiving TWS relay data
|
|
|
|
*/
|
2023-02-01 14:52:54 -06:00
|
|
|
static void _tws_rsp(OTA_STATUS_E status) {
|
|
|
|
LOG_D("[%s] status:%s", __func__, _sts2str(status));
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
OTA_STATUS_E rsp = status;
|
|
|
|
_ota_relay_data(OTA_COMMAND_RSP, (const uint8_t *)&rsp, sizeof(rsp));
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
OTA_COMMON_ENV_T *ota_common_get_env(void) { return &otaEnv; }
|
2022-08-15 04:20:27 -05:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief Reset the OTA environment.
|
|
|
|
*
|
|
|
|
*/
|
2023-02-01 14:52:54 -06:00
|
|
|
static void _reset_env(void) {
|
|
|
|
LOG_D("[%s]", __func__);
|
|
|
|
memset(&otaEnv, 0, sizeof(otaEnv));
|
2022-08-15 04:20:27 -05:00
|
|
|
|
|
|
|
#ifdef __APP_USER_DATA_NV_FLASH_OFFSET__
|
2023-02-01 14:52:54 -06:00
|
|
|
otaEnv.userDataNvFlashOffset = __APP_USER_DATA_NV_FLASH_OFFSET__;
|
2022-08-15 04:20:27 -05:00
|
|
|
#else
|
2023-02-01 14:52:54 -06:00
|
|
|
otaEnv.userDataNvFlashOffset =
|
|
|
|
hal_norflash_get_flash_total_size(HAL_NORFLASH_ID_0) - 2 * 4096;
|
2022-08-15 04:20:27 -05:00
|
|
|
#endif
|
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
otaEnv.flashOffsetOfUserDataPool = otaEnv.userDataNvFlashOffset;
|
|
|
|
_update_ota_user(OTA_USER_NUM);
|
2022-08-15 04:20:27 -05:00
|
|
|
|
|
|
|
#ifdef OTA_NVRAM
|
2023-02-01 14:52:54 -06:00
|
|
|
// gOtaCtx.cfg.clearUserData = false;
|
|
|
|
// gOtaCtx.flashOffsetOfFactoryDataPool =
|
|
|
|
// otaEnv.otaCommon->userDataNvFlashOffset + FLASH_SECTOR_SIZE_IN_BYTES;
|
2022-08-15 04:20:27 -05:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef IBRT
|
2023-02-01 14:52:54 -06:00
|
|
|
/// init tws TX queue
|
|
|
|
osMutexWait(txQueueMutexID, osWaitForever);
|
|
|
|
InitCQueue(&(otaEnv.txQueue), ARRAY_SIZE(otaEnv.txBuf),
|
|
|
|
(CQItemType *)otaEnv.txBuf);
|
|
|
|
osMutexRelease(txQueueMutexID);
|
|
|
|
|
|
|
|
/// init tws RX queue
|
|
|
|
osMutexWait(rxQueueMutexID, osWaitForever);
|
|
|
|
InitCQueue(&(otaEnv.rxQueue), ARRAY_SIZE(otaEnv.rxBuf),
|
|
|
|
(CQItemType *)otaEnv.rxBuf);
|
|
|
|
osMutexRelease(rxQueueMutexID);
|
2022-08-15 04:20:27 -05:00
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
void ota_common_init_handler(void) {
|
|
|
|
LOG_D("[%s]", __func__);
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
/// init OTA related nvrecord pointer
|
|
|
|
nv_record_ota_init();
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
/// init common used flash module
|
|
|
|
ota_common_init_flash(
|
|
|
|
(uint8_t)NORFLASH_API_MODULE_ID_OTA, 0,
|
|
|
|
(OTA_FLASH_LOGIC_ADDR + (
|
2022-08-15 04:20:27 -05:00
|
|
|
#ifdef __APP_USER_DATA_NV_FLASH_OFFSET__
|
2023-02-01 14:52:54 -06:00
|
|
|
__APP_USER_DATA_NV_FLASH_OFFSET__
|
2022-08-15 04:20:27 -05:00
|
|
|
#else
|
2023-02-01 14:52:54 -06:00
|
|
|
(hal_norflash_get_flash_total_size(
|
|
|
|
HAL_NORFLASH_ID_0) -
|
|
|
|
2 * 4096)
|
2022-08-15 04:20:27 -05:00
|
|
|
#endif
|
2023-02-01 14:52:54 -06:00
|
|
|
& 0xffffff)),
|
|
|
|
0);
|
2022-08-15 04:20:27 -05:00
|
|
|
|
|
|
|
#ifdef IBRT
|
2023-02-01 14:52:54 -06:00
|
|
|
if (txThreadId == NULL) {
|
|
|
|
txThreadId = osThreadCreate(osThread(_ota_tws_thread), NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
/// init tws TX queue mutex
|
|
|
|
if (txQueueMutexID == NULL) {
|
|
|
|
txQueueMutexID = osMutexCreate((osMutex(twsTxQueueMutex)));
|
|
|
|
}
|
|
|
|
|
|
|
|
/// init tws RX queue mutex
|
|
|
|
if (rxQueueMutexID == NULL) {
|
|
|
|
rxQueueMutexID = osMutexCreate((osMutex(twsRxQueueMutex)));
|
|
|
|
}
|
2022-08-15 04:20:27 -05:00
|
|
|
#endif
|
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
_reset_env();
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
void ota_common_enable_sanity_check(bool enable) {
|
|
|
|
LOG_I("sanity check enable state update:%d->%d", otaEnv.sanityCheckEnable,
|
|
|
|
enable);
|
|
|
|
otaEnv.sanityCheckEnable = enable;
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
void ota_common_init_flash(uint8_t module, uint32_t baseAddr, uint32_t len,
|
|
|
|
uint32_t imageHandler) {
|
|
|
|
enum NORFLASH_API_RET_T ret;
|
|
|
|
uint32_t block_size = 0;
|
|
|
|
uint32_t sector_size = 0;
|
|
|
|
uint32_t page_size = 0;
|
|
|
|
|
|
|
|
hal_norflash_get_size(HAL_NORFLASH_ID_0, NULL, &block_size, §or_size,
|
|
|
|
&page_size);
|
|
|
|
|
|
|
|
LOG_I("%s module:%d, startAddr:0x%x, len:0x%x", __func__, module, baseAddr,
|
|
|
|
len);
|
|
|
|
ret = norflash_api_register((NORFLASH_API_MODULE_ID_T)module,
|
|
|
|
HAL_NORFLASH_ID_0, baseAddr, len, block_size,
|
|
|
|
sector_size, page_size, OTA_NORFLASH_BUFFER_LEN,
|
|
|
|
(NORFLASH_API_OPERA_CB)imageHandler);
|
|
|
|
|
|
|
|
ASSERT(ret == NORFLASH_API_OK,
|
|
|
|
"ota_init_flash: norflash_api register failed,ret = %d.", ret);
|
2022-08-15 04:20:27 -05:00
|
|
|
|
|
|
|
#ifdef FLASH_SUSPEND
|
2023-02-01 14:52:54 -06:00
|
|
|
norflash_suspend_check_irq(AUDMA_IRQn);
|
|
|
|
norflash_suspend_check_irq(ISDATA_IRQn);
|
|
|
|
norflash_suspend_check_irq(ISDATA1_IRQn);
|
2022-08-15 04:20:27 -05:00
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
bool ota_common_is_in_progress(void) {
|
|
|
|
bool ret = false;
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
if (OTA_STAGE_IDLE != otaEnv.currentStage) {
|
|
|
|
ret = true;
|
|
|
|
}
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
return ret;
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
void ota_common_registor_command_handler(OTA_COMMAND_E cmdType,
|
2023-02-01 14:52:54 -06:00
|
|
|
void *cmdHandler) {
|
|
|
|
if (otaEnv.cmdHandler[cmdType]) {
|
|
|
|
LOG_W("handler for OTA command %d is not NULL", cmdType);
|
|
|
|
}
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
otaEnv.cmdHandler[cmdType] = (OTA_CMD_HANDLER_T)cmdHandler;
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
OTA_STATUS_E ota_common_command_received_handler(OTA_COMMAND_E cmdType,
|
|
|
|
void *cmdInfo,
|
2023-02-01 14:52:54 -06:00
|
|
|
uint16_t cmdLen) {
|
|
|
|
LOG_D("cmd received:%s", _cmd2str(cmdType));
|
|
|
|
otaEnv.status = OTA_STATUS_OK;
|
|
|
|
OTA_STATUS_E temp = OTA_STATUS_OK;
|
|
|
|
|
|
|
|
/// init OTA progress when received begin command
|
|
|
|
if (OTA_COMMAND_BEGIN == cmdType) {
|
|
|
|
ASSERT(OTA_STAGE_IDLE == otaEnv.currentStage,
|
|
|
|
"Received begin command while not in IDLE stage");
|
|
|
|
OTA_BEGIN_PARAM_T *c = (OTA_BEGIN_PARAM_T *)cmdInfo;
|
|
|
|
|
|
|
|
/// update the ota user to ota common layer
|
|
|
|
_update_ota_user(c->user);
|
|
|
|
|
|
|
|
/// update the new image size according to the image size param
|
|
|
|
LOG_I("total image size update:%d->%d", otaEnv.totalImageSize,
|
|
|
|
c->imageSize);
|
|
|
|
otaEnv.totalImageSize = c->imageSize;
|
|
|
|
|
|
|
|
/// update the new image offset according to the start offset param
|
|
|
|
ASSERT(0 == (c->startOffset % FLASH_SECTOR_SIZE_IN_BYTES),
|
|
|
|
"Resumed start offset is not 4KB aligned!");
|
|
|
|
LOG_I("programOffset&receivedDataSize is update:%d->%d",
|
|
|
|
otaEnv.newImageProgramOffset, c->startOffset);
|
|
|
|
otaEnv.newImageProgramOffset = c->startOffset;
|
|
|
|
otaEnv.receivedDataSize = c->startOffset;
|
|
|
|
|
|
|
|
/// update the device index
|
|
|
|
LOG_I("deviceId update:%d->%d", otaEnv.deviceId, c->device);
|
|
|
|
otaEnv.deviceId = c->device;
|
|
|
|
|
|
|
|
/// update the version info and version length
|
|
|
|
memcpy(otaEnv.version, c->version, c->versionLen);
|
|
|
|
otaEnv.versionLen = c->versionLen;
|
|
|
|
|
|
|
|
/// update the flash offset of new image
|
|
|
|
LOG_I("newImageFlashOffset update:0x%02x->0x%02x",
|
|
|
|
otaEnv.newImageFlashOffset, c->flashOffset);
|
|
|
|
otaEnv.newImageFlashOffset = c->flashOffset;
|
|
|
|
|
|
|
|
/// set the OTA stage to ongoing
|
|
|
|
_set_ota_stage(OTA_STAGE_ONGOING);
|
|
|
|
|
|
|
|
/// system layer configurations to guarentee the performance
|
|
|
|
/// of all functionalities
|
|
|
|
_enter_ota_state(c->path);
|
|
|
|
}
|
|
|
|
|
|
|
|
/// execute the custom configuration
|
|
|
|
if (OTA_COMMAND_NUM != cmdType) {
|
|
|
|
if (otaEnv.cmdHandler[cmdType]) {
|
|
|
|
temp = otaEnv.cmdHandler[cmdType](cmdInfo, cmdLen);
|
|
|
|
LOG_I("ota command %s handle done, status:%s", _cmd2str(cmdType),
|
|
|
|
_sts2str(temp));
|
|
|
|
|
|
|
|
if (OTA_STATUS_OK != temp) {
|
|
|
|
otaEnv.status = temp;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
LOG_W("ota cmd %s is not handled by customor", _cmd2str(cmdType));
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
2023-02-01 14:52:54 -06:00
|
|
|
} else {
|
|
|
|
LOG_E("INVALID cmd:%d", cmdType);
|
|
|
|
}
|
|
|
|
|
|
|
|
/// update the OTA progress
|
|
|
|
if (OTA_STATUS_OK == otaEnv.status) {
|
|
|
|
if (!nv_record_ota_update_info(otaEnv.currentUser, otaEnv.deviceId,
|
|
|
|
otaEnv.currentStage, otaEnv.totalImageSize,
|
|
|
|
otaEnv.version)) {
|
|
|
|
LOG_W("update info failed");
|
|
|
|
otaEnv.status = OTA_STATUS_ERROR;
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
2023-02-01 14:52:54 -06:00
|
|
|
}
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
/// special process for OTA_ABORT&&OTA_APPLY command
|
|
|
|
if ((OTA_COMMAND_ABORT == cmdType) || (OTA_COMMAND_APPLY == cmdType)) {
|
|
|
|
_reset_env();
|
|
|
|
}
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
LOG_I("%s cmd process result:%s", __func__, _sts2str(otaEnv.status));
|
|
|
|
return otaEnv.status;
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef OTA_NVRAM
|
2023-02-01 14:52:54 -06:00
|
|
|
static void ota_update_nv_data(void) {
|
|
|
|
if (otaEnv.configuration.isToClearUserData) {
|
|
|
|
enum NORFLASH_API_MODULE_ID_T mod =
|
|
|
|
_get_flash_module_from_ota_device(otaEnv.deviceId);
|
|
|
|
app_flash_page_erase(mod, sectorIndexInFlash * FLASH_SECTOR_SIZE_IN_BYTES);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (otaEnv.configuration.isToRenameBT || otaEnv.configuration.isToRenameBLE ||
|
|
|
|
otaEnv.configuration.isToUpdateBTAddr ||
|
|
|
|
otaEnv.configuration.isToUpdateBLEAddr) {
|
|
|
|
uint32_t *pOrgFactoryData, *pUpdatedFactoryData;
|
|
|
|
pOrgFactoryData = (uint32_t *)(OTA_FLASH_LOGIC_ADDR +
|
|
|
|
otaEnv.flashOffsetOfFactoryDataPool);
|
|
|
|
memcpy(otaEnv.dataCacheBuffer, (uint8_t *)pOrgFactoryData,
|
|
|
|
FLASH_SECTOR_SIZE_IN_BYTES);
|
|
|
|
pUpdatedFactoryData = (uint32_t *)&(otaEnv.dataCacheBuffer);
|
|
|
|
|
|
|
|
if (NVREC_DEV_VERSION_1 == nv_record_dev_rev) {
|
|
|
|
if (otaEnv.configuration.isToRenameBT) {
|
|
|
|
memset((uint8_t *)(pUpdatedFactoryData + dev_name), 0,
|
|
|
|
sizeof(uint32_t) * (dev_bt_addr - dev_name));
|
|
|
|
|
|
|
|
memcpy((uint8_t *)(pUpdatedFactoryData + dev_name),
|
|
|
|
(uint8_t *)(otaEnv.configuration.newBTName), NAME_LENGTH);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (otaEnv.configuration.isToUpdateBTAddr) {
|
|
|
|
memcpy((uint8_t *)(pUpdatedFactoryData + dev_bt_addr),
|
|
|
|
(uint8_t *)(otaEnv.configuration.newBTAddr), BD_ADDR_LENGTH);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (otaEnv.configuration.isToUpdateBLEAddr) {
|
|
|
|
memcpy((uint8_t *)(pUpdatedFactoryData + dev_ble_addr),
|
|
|
|
(uint8_t *)(otaEnv.configuration.newBLEAddr), BD_ADDR_LENGTH);
|
|
|
|
}
|
|
|
|
|
|
|
|
pUpdatedFactoryData[dev_crc] =
|
|
|
|
crc32(0, (uint8_t *)(&pUpdatedFactoryData[dev_reserv1]),
|
|
|
|
(dev_data_len - dev_reserv1) * sizeof(uint32_t));
|
|
|
|
} else {
|
|
|
|
if (otaEnv.configuration.isToRenameBT) {
|
|
|
|
memset((uint8_t *)(pUpdatedFactoryData + rev2_dev_name), 0,
|
|
|
|
sizeof(uint32_t) * (rev2_dev_bt_addr - rev2_dev_name));
|
|
|
|
|
|
|
|
memcpy((uint8_t *)(pUpdatedFactoryData + rev2_dev_name),
|
|
|
|
(uint8_t *)(otaEnv.configuration.newBTName), NAME_LENGTH);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (otaEnv.configuration.isToRenameBLE) {
|
|
|
|
memset((uint8_t *)(pUpdatedFactoryData + rev2_dev_ble_name), 0,
|
|
|
|
sizeof(uint32_t) * (rev2_dev_section_end - rev2_dev_ble_name));
|
|
|
|
|
|
|
|
memcpy((uint8_t *)(pUpdatedFactoryData + rev2_dev_ble_name),
|
|
|
|
(uint8_t *)(otaEnv.configuration.newBleName),
|
|
|
|
BLE_NAME_LEN_IN_NV);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (otaEnv.configuration.isToUpdateBTAddr) {
|
|
|
|
memcpy((uint8_t *)(pUpdatedFactoryData + rev2_dev_bt_addr),
|
|
|
|
(uint8_t *)(otaEnv.configuration.newBTAddr), BD_ADDR_LENGTH);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (otaEnv.configuration.isToUpdateBLEAddr) {
|
|
|
|
memcpy((uint8_t *)(pUpdatedFactoryData + rev2_dev_ble_addr),
|
|
|
|
(uint8_t *)(otaEnv.configuration.newBLEAddr), BD_ADDR_LENGTH);
|
|
|
|
}
|
|
|
|
|
|
|
|
pUpdatedFactoryData[dev_crc] = crc32(
|
|
|
|
0, (uint8_t *)(&pUpdatedFactoryData[rev2_dev_section_start_reserved]),
|
|
|
|
pUpdatedFactoryData[rev2_dev_data_len]);
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
enum NORFLASH_API_MODULE_ID_T mod =
|
|
|
|
_get_flash_module_from_ota_device(otaEnv.deviceId);
|
|
|
|
app_flash_page_erase(mod, sectorIndexInFlash * FLASH_SECTOR_SIZE_IN_BYTES);
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
app_flash_page_program(mod, otaEnv.flashOffsetOfFactoryDataPool,
|
|
|
|
(uint8_t *)pUpdatedFactoryData,
|
|
|
|
FLASH_SECTOR_SIZE_IN_BYTES);
|
|
|
|
}
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef IBRT
|
2023-02-01 14:52:54 -06:00
|
|
|
void ota_common_registor_relay_needed_handler(void *handler) {
|
|
|
|
if (otaEnv.customRelayNeededHandler) {
|
|
|
|
LOG_W("handler for custom relay needed judge is not NULL");
|
|
|
|
}
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
otaEnv.customRelayNeededHandler = (CUSTOM_RELAY_NEEDED_FUNC_T)handler;
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
void ota_common_registor_peer_cmd_received_handler(void *handler) {
|
|
|
|
if (otaEnv.peerCmdReceivedHandler) {
|
|
|
|
LOG_W("handler for peer cmd received is not NULL");
|
|
|
|
}
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
otaEnv.peerCmdReceivedHandler = (PEER_CMD_RECEIVED_HANDLER_T)handler;
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
OTA_STATUS_E ota_common_relay_data_to_peer(OTA_COMMAND_E cmdType,
|
|
|
|
const uint8_t *data, uint16_t len) {
|
|
|
|
OTA_STATUS_E status = OTA_STATUS_OK;
|
|
|
|
if (_relay_data_needed()) {
|
|
|
|
_ota_relay_data(cmdType, (const uint8_t *)data, len);
|
|
|
|
} else {
|
|
|
|
status = OTA_STATUS_ERROR;
|
|
|
|
}
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
return status;
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
OTA_STATUS_E ota_common_receive_peer_rsp(void) {
|
|
|
|
OTA_STATUS_E status = OTA_STATUS_OK;
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
if (_relay_data_needed()) {
|
|
|
|
/// get current thread ID as tws rx thread
|
|
|
|
rxThreadId = osThreadGetId();
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
/// pending current thread to waitting for slave response
|
|
|
|
evt = osSignalWait(OTA_TWS_RX_SIGNAL, OTA_TWS_RELAY_WAITTIME);
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
if (evt.status == osEventTimeout) {
|
|
|
|
status = OTA_STATUS_ERROR_RELAY_TIMEOUT;
|
|
|
|
LOG_W("[%s]SignalWait TIMEOUT!", __func__);
|
|
|
|
} else if (osEventSignal == evt.status) {
|
|
|
|
status = ota_common_get_peer_result();
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
///.clear the excute result of this time
|
|
|
|
_update_peer_result(OTA_STATUS_OK);
|
|
|
|
} else {
|
|
|
|
status = OTA_STATUS_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
return status;
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
OTA_STATUS_E ota_common_fw_data_write(const uint8_t *data, uint16_t len) {
|
|
|
|
OTA_STATUS_E status = OTA_STATUS_OK;
|
|
|
|
uint16_t leftDataSize = len;
|
|
|
|
uint32_t offsetInReceivedRawData = 0;
|
|
|
|
|
|
|
|
do {
|
|
|
|
uint32_t bytesToCopy;
|
|
|
|
// copy to data buffer
|
|
|
|
if ((otaEnv.dataCacheBufferOffset + leftDataSize) >
|
|
|
|
OTA_DATA_CACHE_BUFFER_SIZE) {
|
|
|
|
bytesToCopy = OTA_DATA_CACHE_BUFFER_SIZE - otaEnv.dataCacheBufferOffset;
|
|
|
|
} else {
|
|
|
|
bytesToCopy = leftDataSize;
|
|
|
|
}
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
leftDataSize -= bytesToCopy;
|
|
|
|
|
|
|
|
memcpy(&otaEnv.dataCacheBuffer[otaEnv.dataCacheBufferOffset],
|
|
|
|
&data[offsetInReceivedRawData], bytesToCopy);
|
|
|
|
offsetInReceivedRawData += bytesToCopy;
|
|
|
|
otaEnv.dataCacheBufferOffset += bytesToCopy;
|
|
|
|
|
|
|
|
ASSERT(otaEnv.dataCacheBufferOffset <= OTA_DATA_CACHE_BUFFER_SIZE,
|
|
|
|
"bad math in %s", __func__);
|
|
|
|
if (OTA_DATA_CACHE_BUFFER_SIZE == otaEnv.dataCacheBufferOffset) {
|
|
|
|
_flush_data_to_flash(
|
|
|
|
otaEnv.dataCacheBuffer, OTA_DATA_CACHE_BUFFER_SIZE,
|
|
|
|
(otaEnv.newImageProgramOffset + otaEnv.newImageFlashOffset), false);
|
|
|
|
otaEnv.newImageProgramOffset += OTA_DATA_CACHE_BUFFER_SIZE;
|
|
|
|
otaEnv.dataCacheBufferOffset = 0;
|
|
|
|
}
|
|
|
|
} while (offsetInReceivedRawData < len);
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
otaEnv.receivedDataSize += len;
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
// check whether all image data has been received
|
|
|
|
if (otaEnv.receivedDataSize == otaEnv.totalImageSize) {
|
|
|
|
LOG_D("The final image programming and crc32 check.");
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
// flush any partial buffer to flash
|
|
|
|
if (otaEnv.dataCacheBufferOffset != 0) {
|
|
|
|
_flush_data_to_flash(
|
|
|
|
otaEnv.dataCacheBuffer, otaEnv.dataCacheBufferOffset,
|
|
|
|
(otaEnv.newImageProgramOffset + otaEnv.newImageFlashOffset), true);
|
|
|
|
}
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
if (OTA_DEVICE_APP == otaEnv.deviceId) {
|
|
|
|
bool check = true;
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
/// check the sanity if required
|
|
|
|
if (otaEnv.sanityCheckEnable) {
|
|
|
|
check = _image_sanity_check();
|
|
|
|
}
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
if (check) {
|
|
|
|
/// update the magic code of the application image
|
|
|
|
_update_magic_number(NORMAL_BOOT);
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
/// check the crc32 of the received image data
|
|
|
|
if (_compute_whole_image_crc()) {
|
|
|
|
LOG_I("Whole image verification pass.");
|
|
|
|
|
|
|
|
/// update the OTA stage to OTA done
|
|
|
|
_set_ota_stage(OTA_STAGE_DONE);
|
|
|
|
} else {
|
|
|
|
LOG_W("image verification failed @%d", __LINE__);
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
/// update the OTA stage to OTA idle
|
|
|
|
_set_ota_stage(OTA_STAGE_IDLE);
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
/// sanity check failed
|
|
|
|
LOG_W("image verification failed @%d", __LINE__);
|
|
|
|
|
|
|
|
/// update the OTA stage to OTA idle
|
|
|
|
_set_ota_stage(OTA_STAGE_IDLE);
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
LOG_I("download finished, device:%d", otaEnv.deviceId);
|
|
|
|
|
|
|
|
/// update the OTA stage to OTA idle
|
|
|
|
_set_ota_stage(OTA_STAGE_DONE);
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
2023-02-01 14:52:54 -06:00
|
|
|
|
|
|
|
/// whole image verification failed somehow
|
|
|
|
if (OTA_STAGE_IDLE == otaEnv.currentStage) {
|
|
|
|
nv_record_ota_update_info(otaEnv.currentUser, otaEnv.deviceId,
|
|
|
|
otaEnv.currentStage, 0, INVALID_VERSION_STR);
|
|
|
|
|
|
|
|
status = OTA_STATUS_ERROR_CHECKSUM;
|
|
|
|
} else //!< whole image verification passed
|
2022-08-15 04:20:27 -05:00
|
|
|
{
|
2023-02-01 14:52:54 -06:00
|
|
|
nv_record_ota_update_info(otaEnv.currentUser, otaEnv.deviceId,
|
|
|
|
otaEnv.currentStage, otaEnv.totalImageSize,
|
|
|
|
otaEnv.version);
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
/// exit the OTA state
|
|
|
|
_exit_ota_state();
|
|
|
|
} else //!< whole image revceive not finished
|
|
|
|
{
|
|
|
|
LOG_D("Received image size:%d", otaEnv.receivedDataSize);
|
|
|
|
|
|
|
|
/// update the break point if it is changed
|
|
|
|
if ((otaEnv.receivedDataSize - otaEnv.breakPoint) >=
|
|
|
|
OTA_BREAKPOINT_STORE_GRANULARITY) {
|
|
|
|
otaEnv.breakPoint =
|
|
|
|
(otaEnv.receivedDataSize / OTA_BREAKPOINT_STORE_GRANULARITY) *
|
|
|
|
OTA_BREAKPOINT_STORE_GRANULARITY;
|
|
|
|
|
|
|
|
LOG_I("update record offset to %d", otaEnv.breakPoint);
|
|
|
|
nv_record_ota_update_breakpoint(otaEnv.currentUser, otaEnv.deviceId,
|
|
|
|
otaEnv.breakPoint);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return status;
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
void ota_common_apply_current_fw(void) {
|
|
|
|
OTA_BOOT_INFO_T otaBootInfo = {COPY_NEW_IMAGE, otaEnv.totalImageSize,
|
|
|
|
otaEnv.crc32OfImage};
|
|
|
|
_update_boot_info(&otaBootInfo);
|
2022-08-15 04:20:27 -05:00
|
|
|
|
|
|
|
#ifdef OTA_NVRAM
|
2023-02-01 14:52:54 -06:00
|
|
|
ota_update_nv_data();
|
2022-08-15 04:20:27 -05:00
|
|
|
#endif
|
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
app_start_postponed_reset();
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
void ota_common_on_relay_data_received(uint8_t *ptrParam, uint32_t paramLen) {
|
|
|
|
ASSERT(ptrParam, "invalid data pointer received in %s", __func__);
|
|
|
|
ASSERT(paramLen <= TWS_RELAY_DATA_MAX_SIZE,
|
|
|
|
"illegal parameter length received in %s", __func__);
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
OTA_TWS_DATA_T *otaTwsData = (OTA_TWS_DATA_T *)ptrParam;
|
|
|
|
LOG_D("[%s] paramLen:%d, cmdType:%d|%s", __func__, paramLen,
|
|
|
|
otaTwsData->cmdType, _cmd2str(otaTwsData->cmdType));
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
OTA_STATUS_E status = OTA_STATUS_OK;
|
|
|
|
OTA_BEGIN_PARAM_T *beginInfo = NULL;
|
|
|
|
uint16_t packetLen = 0;
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
if (_tws_frame_validity_check(ptrParam, paramLen)) {
|
|
|
|
/// update the magic code and command type
|
|
|
|
otaEnv.currentMagicCode = otaTwsData->magicCode;
|
|
|
|
otaEnv.currentCmdType = otaTwsData->cmdType;
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
/// push received data into tws OTA data receive queue
|
|
|
|
osMutexWait(rxQueueMutexID, osWaitForever);
|
|
|
|
ASSERT(CQ_OK == EnCQueue(&otaEnv.rxQueue, (CQItemType *)otaTwsData->data,
|
|
|
|
(paramLen - OTA_TWS_HEAD_SIZE)),
|
|
|
|
"%s failed to push data to queue, avaiable:%d, push:%d", __func__,
|
|
|
|
AvailableOfCQueue(&otaEnv.rxQueue), (paramLen - OTA_TWS_HEAD_SIZE));
|
|
|
|
osMutexRelease(rxQueueMutexID);
|
|
|
|
|
|
|
|
/// whole packet from APP received done
|
|
|
|
if (OTA_RELAY_PACKET_MAGIC_CODE_COMPLETE == otaEnv.currentMagicCode) {
|
|
|
|
osMutexWait(rxQueueMutexID, osWaitForever);
|
|
|
|
packetLen = LengthOfCQueue(&otaEnv.rxQueue);
|
|
|
|
LOG_D("length of rx queue:%d", packetLen);
|
|
|
|
DeCQueue(&otaEnv.rxQueue, otaEnv.tempRxBuf, packetLen);
|
|
|
|
osMutexRelease(rxQueueMutexID);
|
|
|
|
|
|
|
|
switch (otaEnv.currentCmdType) {
|
|
|
|
case OTA_COMMAND_RSP:
|
|
|
|
/// retrieve and update the status of peer
|
|
|
|
status = ((OTA_RESPONSE_PARAM_T *)otaEnv.tempRxBuf)->status;
|
|
|
|
_update_peer_result(status);
|
|
|
|
|
|
|
|
/// inform the receiving thread to proceed
|
|
|
|
osSignalSet(rxThreadId, OTA_TWS_RX_SIGNAL);
|
|
|
|
break;
|
|
|
|
|
|
|
|
/// add other supported command here
|
|
|
|
case OTA_COMMAND_BEGIN:
|
|
|
|
beginInfo = (OTA_BEGIN_PARAM_T *)otaTwsData->data;
|
|
|
|
if (beginInfo->initializer) {
|
|
|
|
beginInfo->initializer();
|
|
|
|
} else {
|
|
|
|
LOG_E("initializer not registored");
|
|
|
|
}
|
|
|
|
case OTA_COMMAND_DATA:
|
|
|
|
case OTA_COMMAND_APPLY:
|
|
|
|
case OTA_COMMAND_ABORT:
|
|
|
|
if (otaEnv.peerCmdReceivedHandler) {
|
|
|
|
status = otaEnv.peerCmdReceivedHandler(
|
|
|
|
otaEnv.currentCmdType, (const uint8_t *)otaEnv.tempRxBuf,
|
|
|
|
packetLen);
|
|
|
|
} else {
|
|
|
|
LOG_W("peerCmdReceivedHandler is not registored");
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
break;
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
default:
|
|
|
|
ASSERT(0, "INVALID cmd received");
|
|
|
|
status = OTA_STATUS_ERROR;
|
|
|
|
break;
|
|
|
|
}
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
/// response to master if needed
|
|
|
|
if (OTA_COMMAND_RSP != otaTwsData->cmdType) {
|
|
|
|
_tws_rsp(status);
|
|
|
|
}
|
|
|
|
|
|
|
|
otaEnv.currentMagicCode = OTA_RELAY_PACKET_MAGIC_CODE_INVALID;
|
|
|
|
otaEnv.currentCmdType = OTA_COMMAND_NUM;
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
2023-02-01 14:52:54 -06:00
|
|
|
} else {
|
|
|
|
LOG_W("Received data frame is invalid");
|
|
|
|
status = OTA_STATUS_ERROR;
|
|
|
|
|
|
|
|
switch (otaTwsData->cmdType) {
|
|
|
|
case OTA_COMMAND_RSP:
|
|
|
|
_update_peer_result(status);
|
|
|
|
osSignalSet(rxThreadId, OTA_TWS_RX_SIGNAL);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case OTA_COMMAND_BEGIN:
|
|
|
|
case OTA_COMMAND_DATA:
|
|
|
|
case OTA_COMMAND_APPLY:
|
|
|
|
case OTA_COMMAND_ABORT:
|
|
|
|
_tws_rsp(status);
|
|
|
|
break;
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
default:
|
|
|
|
ASSERT(0, "INVALID command received");
|
|
|
|
break;
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
2023-02-01 14:52:54 -06:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
POSSIBLY_UNUSED static void _ota_tws_deinit(void) {
|
|
|
|
ResetCQueue(&otaEnv.txQueue);
|
|
|
|
ResetCQueue(&otaEnv.rxQueue);
|
|
|
|
memset(otaEnv.txBuf, 0, ARRAY_SIZE(otaEnv.txBuf));
|
|
|
|
memset(otaEnv.rxBuf, 0, ARRAY_SIZE(otaEnv.rxBuf));
|
|
|
|
memset(otaEnv.tempRxBuf, 0, ARRAY_SIZE(otaEnv.tempRxBuf));
|
|
|
|
|
|
|
|
if (txThreadId) {
|
|
|
|
osThreadTerminate(txThreadId);
|
|
|
|
txThreadId = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (txQueueMutexID != NULL) {
|
|
|
|
osMutexDelete(txQueueMutexID);
|
|
|
|
txQueueMutexID = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (rxQueueMutexID != NULL) {
|
|
|
|
osMutexDelete(rxQueueMutexID);
|
|
|
|
rxQueueMutexID = NULL;
|
|
|
|
}
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
static void _ota_tws_thread(const void *arg) {
|
|
|
|
volatile uint16_t qLen = 0;
|
|
|
|
volatile uint16_t packetLen = 0;
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
while (1) {
|
|
|
|
osMutexWait(txQueueMutexID, osWaitForever);
|
|
|
|
qLen = LengthOfCQueue(&otaEnv.txQueue);
|
|
|
|
osMutexRelease(txQueueMutexID);
|
|
|
|
LOG_D("queued data len:%d", qLen);
|
|
|
|
|
|
|
|
while (qLen) {
|
|
|
|
/// check the validity of queue length
|
|
|
|
/// ASSERT(qLen <= OTA_MAX_MTU, "invalid OTA relay data len");
|
|
|
|
|
|
|
|
osMutexWait(txQueueMutexID, osWaitForever);
|
|
|
|
/// retrive and check the validity of packet length
|
|
|
|
DeCQueue(&otaEnv.txQueue, (CQItemType *)&packetLen, 2);
|
|
|
|
ASSERT(packetLen <= TWS_RELAY_DATA_MAX_SIZE,
|
|
|
|
"invalid OTA relay data len:%d", packetLen);
|
|
|
|
|
|
|
|
/// retrieve the data to transmit
|
|
|
|
DeCQueue(&otaEnv.txQueue, (CQItemType *)relayBuf, packetLen);
|
|
|
|
osMutexRelease(txQueueMutexID);
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
LOG_D("send data len:%d", packetLen);
|
|
|
|
|
|
|
|
/// send data to peer
|
|
|
|
tws_ctrl_send_cmd(IBRT_COMMON_OTA, relayBuf, packetLen);
|
|
|
|
memset(relayBuf, 0, TWS_RELAY_DATA_MAX_SIZE);
|
|
|
|
|
|
|
|
osMutexWait(txQueueMutexID, osWaitForever);
|
|
|
|
qLen = LengthOfCQueue(&otaEnv.txQueue);
|
|
|
|
osMutexRelease(txQueueMutexID);
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
2023-02-01 14:52:54 -06:00
|
|
|
|
|
|
|
osSignalWait(OTA_TWS_TX_SIGNAL, osWaitForever);
|
|
|
|
}
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
static void _sync_info_prepare_handler(uint8_t *buf, uint16_t *length) {
|
|
|
|
*length = OTA_DEVICE_CNT * sizeof(NV_OTA_INFO_T);
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
void *otaInfo = NULL;
|
|
|
|
nv_record_ota_get_ptr(&otaInfo);
|
2022-08-15 04:20:27 -05:00
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
memcpy(buf, otaInfo, *length);
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
static void _sync_info_received_handler(uint8_t *buf, uint16_t length) {
|
|
|
|
// uodate gsound info
|
|
|
|
// TODO:
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
|
|
|
|
2023-02-01 14:52:54 -06:00
|
|
|
void ota_common_tws_sync_init(void) {
|
|
|
|
TWS_SYNC_USER_T userOta = {
|
|
|
|
_sync_info_prepare_handler,
|
|
|
|
_sync_info_received_handler,
|
|
|
|
_sync_info_prepare_handler,
|
|
|
|
NULL,
|
|
|
|
NULL,
|
|
|
|
};
|
|
|
|
|
|
|
|
app_tws_if_register_sync_user(TWS_SYNC_USER_OTA, &userOta);
|
2022-08-15 04:20:27 -05:00
|
|
|
}
|
|
|
|
#endif
|