diff options
author | Mulin Chao <mlchao@nuvoton.com> | 2015-10-19 11:54:42 +0800 |
---|---|---|
committer | chrome-bot <chrome-bot@chromium.org> | 2015-10-19 21:26:52 -0700 |
commit | 228c1687ef4a4d409be672a9decfad44567d5dd0 (patch) | |
tree | 258a91bdc418e9a9ec6a49c65c5da41c8c922019 | |
parent | ab24609287462400c3f23cd86e71b32c5242c57f (diff) | |
download | chrome-ec-228c1687ef4a4d409be672a9decfad44567d5dd0.tar.gz |
nuc: Remove unnecessary NPCX_EC_FLASH_SIZE definition in npcx.
Remove NPCX_EC_FLASH_SIZE definition and replace it with CONFIG_FLASH_SIZE.
Due to inconsistence between NPCX_EC_FLASH_SIZE and CONFIG_FLASH_SIZE,
some flash commands such as flasherase will cause unexpected results.
Modified drivers:
1. config_flash_layout.h: Remove NPCX_EC_FLASH_SIZE definition.
2. flash.c: Replace NPCX_EC_FLASH_SIZE with CONFIG_FLASH_SIZE.
BUG=chrome-os-partner:34346
TEST=make buildall -j; test nuvoton IC specific drivers
BRANCH=none
Change-Id: Idca286eef5bb014d5c4cd689c39635e09f40ee03
Signed-off-by: Mulin Chao <mlchao@nuvoton.com>
Reviewed-on: https://chromium-review.googlesource.com/307004
Reviewed-by: Shawn N <shawnn@chromium.org>
-rw-r--r-- | chip/npcx/config_flash_layout.h | 6 | ||||
-rw-r--r-- | chip/npcx/flash.c | 23 |
2 files changed, 11 insertions, 18 deletions
diff --git a/chip/npcx/config_flash_layout.h b/chip/npcx/config_flash_layout.h index 497be03089..b1fb2f7b2e 100644 --- a/chip/npcx/config_flash_layout.h +++ b/chip/npcx/config_flash_layout.h @@ -20,12 +20,6 @@ #define CONFIG_MAPPED_STORAGE_BASE 0x64000000 #undef CONFIG_FLASH_PSTATE -/* - * On NPCX, the first 256KB of external SPI storage belongs to the EC, - * regardless of the actual size of external SPI. - */ -#define NPCX_EC_FLASH_SIZE 0x40000 - #define CONFIG_EC_PROTECTED_STORAGE_OFF 0 #define CONFIG_EC_PROTECTED_STORAGE_SIZE 0x20000 #define CONFIG_EC_WRITABLE_STORAGE_OFF 0x20000 diff --git a/chip/npcx/flash.c b/chip/npcx/flash.c index 54e1db21b3..5dd866e5f4 100644 --- a/chip/npcx/flash.c +++ b/chip/npcx/flash.c @@ -210,13 +210,12 @@ static int reg_to_protect(uint8_t sr1, uint8_t sr2, unsigned int *start, *len = size * blocks; /* Determine bottom/top of memory to protect */ - *start = tb ? 0 : - (NPCX_EC_FLASH_SIZE - *len) % NPCX_EC_FLASH_SIZE; + *start = tb ? 0 : (CONFIG_FLASH_SIZE - *len); /* Reverse computations if complement set */ if (cmp) { - *start = (*start + *len) % NPCX_EC_FLASH_SIZE; - *len = NPCX_EC_FLASH_SIZE - *len; + *start = *start + *len; + *len = CONFIG_FLASH_SIZE - *len; } /* @@ -261,19 +260,19 @@ static int protect_to_reg(unsigned int start, unsigned int len, return EC_ERROR_INVAL; /* Invalid data */ - if ((start && !len) || start + len > NPCX_EC_FLASH_SIZE) + if ((start && !len) || start + len > CONFIG_FLASH_SIZE) return EC_ERROR_INVAL; /* Set complement bit based on whether length is power of 2 */ if ((len & (len - 1)) != 0) { cmp = 1; - start = (start + len) % NPCX_EC_FLASH_SIZE; - len = NPCX_EC_FLASH_SIZE - len; + start = start + len; + len = CONFIG_FLASH_SIZE - len; } /* Set bottom/top bit based on start address */ - /* Do not set if len == 0 or len == NPCX_EC_FLASH_SIZE */ - if (!start && (len % NPCX_EC_FLASH_SIZE)) + /* Do not set if len == 0 or len == CONFIG_FLASH_SIZE */ + if (!start && (len % CONFIG_FLASH_SIZE)) tb = 1; /* Set sector bit and determine block length based on protect length */ @@ -333,7 +332,7 @@ int flash_set_status_for_prot(int reg1, int reg2) int flash_check_prot_range(unsigned int offset, unsigned int bytes) { /* Invalid value */ - if (offset + bytes > NPCX_EC_FLASH_SIZE) + if (offset + bytes > CONFIG_FLASH_SIZE) return EC_ERROR_INVAL; /* Check if ranges overlap */ if (MAX(addr_prot_start, offset) < MIN(addr_prot_start + @@ -354,7 +353,7 @@ int flash_check_prot_reg(unsigned int offset, unsigned int bytes) sr2 = flash_get_status2(); /* Invalid value */ - if (offset + bytes > NPCX_EC_FLASH_SIZE) + if (offset + bytes > CONFIG_FLASH_SIZE) return EC_ERROR_INVAL; /* Compute current protect range */ @@ -377,7 +376,7 @@ int flash_write_prot_reg(unsigned int offset, unsigned int bytes) uint8_t sr2 = flash_get_status2(); /* Invalid values */ - if (offset + bytes > NPCX_EC_FLASH_SIZE) + if (offset + bytes > CONFIG_FLASH_SIZE) return EC_ERROR_INVAL; /* Compute desired protect range */ |