lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 18 May 2020 12:10:42 +0300 From: Dmitry Osipenko <digetx@...il.com> To: Dmitry Torokhov <dmitry.torokhov@...il.com>, Michał Mirosław <mirq-linux@...e.qmqm.pl>, Johnny Chuang <johnny.chuang@....com.tw> Cc: David Heidelberg <david@...t.cz>, Henrik Rydberg <rydberg@...math.org>, James Chen <james.chen@....com.tw>, Rob Herring <robh+dt@...nel.org>, Scott Liu <scott.liu@....com.tw>, linux-input@...r.kernel.org, linux-kernel@...r.kernel.org Subject: Re: [PATCH v5 07/10] input: elants: support 0x66 reply opcode for reporting touches 18.05.2020 07:05, Dmitry Torokhov пишет: > On Sun, Apr 26, 2020 at 07:47:52PM +0200, Michał Mirosław wrote: >> From: Dmitry Osipenko <digetx@...il.com> >> >> eKTF3624 touchscreen firmware uses two variants of the reply opcodes for >> reporting touch events: one is 0x63 (used by older firmware) and other is >> 0x66 (used by newer firmware). The 0x66 variant is equal to 0x63 of >> eKTH3500, while 0x63 needs small adjustment of the touch pressure value. >> >> Nexus 7 tablet device has eKTF3624 touchscreen and it uses 0x66 opcode for >> reporting touch events, let's support it now. Other devices, eg. ASUS TF300T, >> use 0x63. >> >> Note: CMD_HEADER_REK is used for replying to calibration requests, it has >> the same 0x66 opcode number which eKTF3624 uses for reporting touches. >> The calibration replies are handled separately from the the rest of the >> commands in the driver by entering into ELAN_WAIT_RECALIBRATION state >> and thus this change shouldn't change the old behavior. > > Is it possible to know what format a device will use by querying it at > probe time? I guess only somebody from Elan could answer this question. AFAIK, neither touchscreen firmware sources nor technical documentation aren't publicly available. Downstream kernel driver is the only source of information in our case and it does the same thing as we do in this patch.
Powered by blists - more mailing lists