The gpio table is only used by depthcharge, and depthcharge rarely has a need for the "recovery" gpio. On a few boards it does use the gpio as a signal for confirming physical presence, so on that boards we'll advertise the board as "presence". All these strings probably should have been #defines to help avoid typos (e.g., the "ec_in_rw" in stout seems questionable since everybody else uses "EC in RW"). Cq-Depend: chromium:1580454 BUG=b:129471321 BRANCH=None TEST=Local compile and flash (with corresponding changes to depthcharge) to 2 systems, one with a "presence" gpio and another without. Confirmed that both systems could enter dev mode. Change-Id: Id6d62d9e48d3e6646cbc1277ea53f0ca95dd849e Signed-off-by: Matt Delco <delco@chromium.org> Reviewed-on: https://review.coreboot.org/c/coreboot/+/32718 Tested-by: build bot (Jenkins) <no-reply@coreboot.org> Reviewed-by: Duncan Laurie <dlaurie@chromium.org> Reviewed-by: Julius Werner <jwerner@chromium.org>
94 lines
2.4 KiB
C
94 lines
2.4 KiB
C
/*
|
|
* This file is part of the coreboot project.
|
|
*
|
|
* Copyright (C) 2013 Google Inc.
|
|
* Copyright (C) 2016 Intel Corporation.
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; version 2 of the License.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*/
|
|
|
|
#include <device/device.h>
|
|
#include <device/pci.h>
|
|
#include <gpio.h>
|
|
#include <soc/gpio.h>
|
|
#include <ec/google/chromeec/ec.h>
|
|
#include <vendorcode/google/chromeos/chromeos.h>
|
|
|
|
#include "gpio.h"
|
|
#include "ec.h"
|
|
|
|
#if ENV_RAMSTAGE
|
|
#include <boot/coreboot_tables.h>
|
|
|
|
void fill_lb_gpios(struct lb_gpios *gpios)
|
|
{
|
|
struct lb_gpio chromeos_gpios[] = {
|
|
{-1, ACTIVE_HIGH, get_write_protect_state(), "write protect"},
|
|
{-1, ACTIVE_HIGH, get_lid_switch(), "lid"},
|
|
{-1, ACTIVE_HIGH, 0, "power"},
|
|
{-1, ACTIVE_HIGH, gfx_get_init_done(), "oprom"},
|
|
};
|
|
lb_add_gpios(gpios, chromeos_gpios, ARRAY_SIZE(chromeos_gpios));
|
|
}
|
|
#endif /* ENV_RAMSTAGE */
|
|
|
|
int get_lid_switch(void)
|
|
{
|
|
if (CONFIG(EC_GOOGLE_CHROMEEC))
|
|
/* Read lid switch state from the EC. */
|
|
return !!(google_chromeec_get_switches() & EC_SWITCH_LID_OPEN);
|
|
|
|
/* Lid always open */
|
|
return 1;
|
|
}
|
|
|
|
int get_recovery_mode_switch(void)
|
|
{
|
|
if (CONFIG(EC_GOOGLE_CHROMEEC)) {
|
|
/* Check for dedicated recovery switch first. */
|
|
if (google_chromeec_get_switches() &
|
|
EC_SWITCH_DEDICATED_RECOVERY)
|
|
return 1;
|
|
|
|
/* Otherwise check if the EC has posted the keyboard recovery
|
|
* event. */
|
|
return !!(google_chromeec_get_events_b() &
|
|
EC_HOST_EVENT_MASK(EC_HOST_EVENT_KEYBOARD_RECOVERY));
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
int clear_recovery_mode_switch(void)
|
|
{
|
|
if (CONFIG(EC_GOOGLE_CHROMEEC))
|
|
/* Clear keyboard recovery event. */
|
|
return google_chromeec_clear_events_b(
|
|
EC_HOST_EVENT_MASK(EC_HOST_EVENT_KEYBOARD_RECOVERY));
|
|
|
|
return 0;
|
|
}
|
|
|
|
int get_write_protect_state(void)
|
|
{
|
|
/* No write protect */
|
|
return 0;
|
|
}
|
|
|
|
static const struct cros_gpio cros_gpios[] = {
|
|
CROS_GPIO_REC_AL(CROS_GPIO_VIRTUAL, CROS_GPIO_DEVICE_NAME),
|
|
CROS_GPIO_WP_AH(CROS_GPIO_VIRTUAL, CROS_GPIO_DEVICE_NAME),
|
|
};
|
|
|
|
void mainboard_chromeos_acpi_generate(void)
|
|
{
|
|
chromeos_acpi_gpio_generate(cros_gpios, ARRAY_SIZE(cros_gpios));
|
|
}
|