The DRAM part number can be stored in the CBI data. Therefore, add support for fetching the DRAM part number from CBI. BUG=b:112203105 TEST=Fetched data from CBI on phaser during testing. Change-Id: Ia721c01aab5848ff36e11792adf9c494aa25c01d Signed-off-by: Aaron Durbin <adurbin@chromium.org> Reviewed-on: https://review.coreboot.org/27945 Tested-by: build bot (Jenkins) <no-reply@coreboot.org> Reviewed-by: Justin TerAvest <teravest@chromium.org> Reviewed-by: Furquan Shaikh <furquan@google.com>
1188 lines
29 KiB
C
1188 lines
29 KiB
C
/*
|
|
* This file is part of the coreboot project.
|
|
*
|
|
* Copyright (C) 2012 The Chromium OS Authors. All rights reserved.
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; version 2 of the License
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*/
|
|
|
|
#include <stdint.h>
|
|
#include <string.h>
|
|
#include <cbmem.h>
|
|
#include <console/console.h>
|
|
#include <arch/early_variables.h>
|
|
#include <arch/io.h>
|
|
#include <assert.h>
|
|
#include <bootmode.h>
|
|
#include <bootstate.h>
|
|
#include <delay.h>
|
|
#include <elog.h>
|
|
#include <halt.h>
|
|
#include <reset.h>
|
|
#include <rtc.h>
|
|
#include <stdlib.h>
|
|
#include <security/vboot/vboot_common.h>
|
|
#include <timer.h>
|
|
|
|
#include "chip.h"
|
|
#include "ec.h"
|
|
#include "ec_commands.h"
|
|
|
|
#define INVALID_HCMD 0xFF
|
|
|
|
/*
|
|
* Map UHEPI masks to non UHEPI commands in order to support old EC FW
|
|
* which does not support UHEPI command.
|
|
*/
|
|
static const struct {
|
|
uint8_t set_cmd;
|
|
uint8_t clear_cmd;
|
|
uint8_t get_cmd;
|
|
} event_map[] = {
|
|
[EC_HOST_EVENT_MAIN] = {
|
|
INVALID_HCMD, EC_CMD_HOST_EVENT_CLEAR,
|
|
INVALID_HCMD,
|
|
},
|
|
[EC_HOST_EVENT_B] = {
|
|
INVALID_HCMD, EC_CMD_HOST_EVENT_CLEAR_B,
|
|
EC_CMD_HOST_EVENT_GET_B,
|
|
},
|
|
[EC_HOST_EVENT_SCI_MASK] = {
|
|
EC_CMD_HOST_EVENT_SET_SCI_MASK, INVALID_HCMD,
|
|
EC_CMD_HOST_EVENT_GET_SCI_MASK,
|
|
},
|
|
[EC_HOST_EVENT_SMI_MASK] = {
|
|
EC_CMD_HOST_EVENT_SET_SMI_MASK, INVALID_HCMD,
|
|
EC_CMD_HOST_EVENT_GET_SMI_MASK,
|
|
},
|
|
[EC_HOST_EVENT_ALWAYS_REPORT_MASK] = {
|
|
INVALID_HCMD, INVALID_HCMD, INVALID_HCMD,
|
|
},
|
|
[EC_HOST_EVENT_ACTIVE_WAKE_MASK] = {
|
|
EC_CMD_HOST_EVENT_SET_WAKE_MASK, INVALID_HCMD,
|
|
EC_CMD_HOST_EVENT_GET_WAKE_MASK,
|
|
},
|
|
[EC_HOST_EVENT_LAZY_WAKE_MASK_S0IX] = {
|
|
EC_CMD_HOST_EVENT_SET_WAKE_MASK, INVALID_HCMD,
|
|
EC_CMD_HOST_EVENT_GET_WAKE_MASK,
|
|
},
|
|
[EC_HOST_EVENT_LAZY_WAKE_MASK_S3] = {
|
|
EC_CMD_HOST_EVENT_SET_WAKE_MASK, INVALID_HCMD,
|
|
EC_CMD_HOST_EVENT_GET_WAKE_MASK,
|
|
},
|
|
[EC_HOST_EVENT_LAZY_WAKE_MASK_S5] = {
|
|
EC_CMD_HOST_EVENT_SET_WAKE_MASK, INVALID_HCMD,
|
|
EC_CMD_HOST_EVENT_GET_WAKE_MASK,
|
|
},
|
|
};
|
|
|
|
void log_recovery_mode_switch(void)
|
|
{
|
|
uint64_t *events;
|
|
|
|
if (cbmem_find(CBMEM_ID_EC_HOSTEVENT))
|
|
return;
|
|
|
|
events = cbmem_add(CBMEM_ID_EC_HOSTEVENT, sizeof(*events));
|
|
if (!events)
|
|
return;
|
|
|
|
*events = google_chromeec_get_events_b();
|
|
}
|
|
|
|
static void google_chromeec_elog_add_recovery_event(void *unused)
|
|
{
|
|
uint64_t *events = cbmem_find(CBMEM_ID_EC_HOSTEVENT);
|
|
uint8_t event_byte = EC_EVENT_KEYBOARD_RECOVERY;
|
|
|
|
if (!events)
|
|
return;
|
|
|
|
if (!(*events & EC_HOST_EVENT_MASK(EC_HOST_EVENT_KEYBOARD_RECOVERY)))
|
|
return;
|
|
|
|
if (*events &
|
|
EC_HOST_EVENT_MASK(EC_HOST_EVENT_KEYBOARD_RECOVERY_HW_REINIT))
|
|
event_byte = EC_EVENT_KEYBOARD_RECOVERY_HWREINIT;
|
|
|
|
elog_add_event_byte(ELOG_TYPE_EC_EVENT, event_byte);
|
|
}
|
|
|
|
BOOT_STATE_INIT_ENTRY(BS_WRITE_TABLES, BS_ON_ENTRY,
|
|
google_chromeec_elog_add_recovery_event, NULL);
|
|
|
|
uint8_t google_chromeec_calc_checksum(const uint8_t *data, int size)
|
|
{
|
|
int csum;
|
|
|
|
for (csum = 0; size > 0; data++, size--)
|
|
csum += *data;
|
|
return (uint8_t)(csum & 0xff);
|
|
}
|
|
|
|
int google_chromeec_kbbacklight(int percent)
|
|
{
|
|
struct chromeec_command cec_cmd;
|
|
struct ec_params_pwm_set_keyboard_backlight cmd_backlight;
|
|
struct ec_response_pwm_get_keyboard_backlight rsp_backlight;
|
|
/* if they were dumb, help them out */
|
|
percent = percent % 101;
|
|
cec_cmd.cmd_code = EC_CMD_PWM_SET_KEYBOARD_BACKLIGHT;
|
|
cec_cmd.cmd_version = 0;
|
|
cmd_backlight.percent = percent;
|
|
cec_cmd.cmd_data_in = &cmd_backlight;
|
|
cec_cmd.cmd_data_out = &rsp_backlight;
|
|
cec_cmd.cmd_size_in = sizeof(cmd_backlight);
|
|
cec_cmd.cmd_size_out = sizeof(rsp_backlight);
|
|
cec_cmd.cmd_dev_index = 0;
|
|
google_chromeec_command(&cec_cmd);
|
|
printk(BIOS_DEBUG, "Google Chrome set keyboard backlight: %x status (%x)\n",
|
|
rsp_backlight.percent, cec_cmd.cmd_code);
|
|
return cec_cmd.cmd_code;
|
|
|
|
}
|
|
|
|
void google_chromeec_post(u8 postcode)
|
|
{
|
|
/* backlight is a percent. postcode is a u8.
|
|
* Convert the u8 to %.
|
|
*/
|
|
postcode = (postcode/4) + (postcode/8);
|
|
google_chromeec_kbbacklight(postcode);
|
|
}
|
|
|
|
/*
|
|
* Query the EC for specified mask indicating enabled events.
|
|
* The EC maintains separate event masks for SMI, SCI and WAKE.
|
|
*/
|
|
static int google_chromeec_uhepi_cmd(uint8_t mask, uint8_t action,
|
|
uint64_t *value)
|
|
{
|
|
int ret;
|
|
struct ec_params_host_event req;
|
|
struct ec_response_host_event rsp;
|
|
struct chromeec_command cmd;
|
|
|
|
req.action = action;
|
|
req.mask_type = mask;
|
|
if (action != EC_HOST_EVENT_GET)
|
|
req.value = *value;
|
|
else
|
|
*value = 0;
|
|
cmd.cmd_code = EC_CMD_HOST_EVENT;
|
|
cmd.cmd_version = 0;
|
|
cmd.cmd_data_in = &req;
|
|
cmd.cmd_size_in = sizeof(req);
|
|
cmd.cmd_data_out = &rsp;
|
|
cmd.cmd_size_out = sizeof(rsp);
|
|
cmd.cmd_dev_index = 0;
|
|
|
|
ret = google_chromeec_command(&cmd);
|
|
|
|
if (action != EC_HOST_EVENT_GET)
|
|
return ret;
|
|
if (ret == 0)
|
|
*value = rsp.value;
|
|
return ret;
|
|
}
|
|
|
|
static int google_chromeec_handle_non_uhepi_cmd(uint8_t hcmd, uint8_t action,
|
|
uint64_t *value)
|
|
{
|
|
int ret = -1;
|
|
struct ec_params_host_event_mask req;
|
|
struct ec_response_host_event_mask rsp;
|
|
struct chromeec_command cmd;
|
|
|
|
if (hcmd == INVALID_HCMD)
|
|
return ret;
|
|
|
|
if (action != EC_HOST_EVENT_GET)
|
|
req.mask = (uint32_t)*value;
|
|
else
|
|
*value = 0;
|
|
|
|
cmd.cmd_code = hcmd;
|
|
cmd.cmd_version = 0;
|
|
cmd.cmd_data_in = &req;
|
|
cmd.cmd_size_in = sizeof(req);
|
|
cmd.cmd_data_out = &rsp;
|
|
cmd.cmd_size_out = sizeof(rsp);
|
|
cmd.cmd_dev_index = 0;
|
|
|
|
ret = google_chromeec_command(&cmd);
|
|
|
|
if (action != EC_HOST_EVENT_GET)
|
|
return ret;
|
|
if (ret == 0)
|
|
*value = rsp.mask;
|
|
|
|
return ret;
|
|
}
|
|
|
|
bool google_chromeec_is_uhepi_supported(void)
|
|
{
|
|
#define UHEPI_SUPPORTED 1
|
|
#define UHEPI_NOT_SUPPORTED 2
|
|
|
|
static int uhepi_support CAR_GLOBAL;
|
|
|
|
if (!uhepi_support) {
|
|
uhepi_support = google_chromeec_check_feature
|
|
(EC_FEATURE_UNIFIED_WAKE_MASKS) > 0 ? UHEPI_SUPPORTED :
|
|
UHEPI_NOT_SUPPORTED;
|
|
printk(BIOS_DEBUG, "Chrome EC: UHEPI %s\n",
|
|
uhepi_support == UHEPI_SUPPORTED ?
|
|
"supported" : "not supported");
|
|
}
|
|
return uhepi_support == UHEPI_SUPPORTED;
|
|
}
|
|
|
|
static uint64_t google_chromeec_get_mask(u8 type)
|
|
{
|
|
u64 value = 0;
|
|
|
|
if (google_chromeec_is_uhepi_supported()) {
|
|
google_chromeec_uhepi_cmd(type, EC_HOST_EVENT_GET, &value);
|
|
} else {
|
|
assert(type < ARRAY_SIZE(event_map));
|
|
google_chromeec_handle_non_uhepi_cmd(
|
|
event_map[type].get_cmd,
|
|
EC_HOST_EVENT_GET, &value);
|
|
}
|
|
return value;
|
|
}
|
|
static int google_chromeec_clear_mask(u8 type, u64 mask)
|
|
{
|
|
if (google_chromeec_is_uhepi_supported())
|
|
return google_chromeec_uhepi_cmd(type,
|
|
EC_HOST_EVENT_CLEAR, &mask);
|
|
|
|
assert(type < ARRAY_SIZE(event_map));
|
|
return google_chromeec_handle_non_uhepi_cmd(
|
|
event_map[type].clear_cmd,
|
|
EC_HOST_EVENT_CLEAR, &mask);
|
|
}
|
|
static int __unused google_chromeec_set_mask(u8 type, u64 mask)
|
|
{
|
|
if (google_chromeec_is_uhepi_supported())
|
|
return google_chromeec_uhepi_cmd(type,
|
|
EC_HOST_EVENT_SET, &mask);
|
|
|
|
assert(type < ARRAY_SIZE(event_map));
|
|
return google_chromeec_handle_non_uhepi_cmd(
|
|
event_map[type].set_cmd,
|
|
EC_HOST_EVENT_SET, &mask);
|
|
}
|
|
|
|
static int google_chromeec_set_s3_lazy_wake_mask(uint64_t mask)
|
|
{
|
|
printk(BIOS_DEBUG, "Chrome EC: Set S3 LAZY WAKE mask to 0x%016llx\n",
|
|
mask);
|
|
return google_chromeec_set_mask
|
|
(EC_HOST_EVENT_LAZY_WAKE_MASK_S3, mask);
|
|
}
|
|
|
|
static int google_chromeec_set_s5_lazy_wake_mask(uint64_t mask)
|
|
{
|
|
printk(BIOS_DEBUG, "Chrome EC: Set S5 LAZY WAKE mask to 0x%016llx\n",
|
|
mask);
|
|
return google_chromeec_set_mask
|
|
(EC_HOST_EVENT_LAZY_WAKE_MASK_S5, mask);
|
|
}
|
|
|
|
static int google_chromeec_set_s0ix_lazy_wake_mask(uint64_t mask)
|
|
{
|
|
printk(BIOS_DEBUG, "Chrome EC: Set S0iX LAZY WAKE mask to 0x%016llx\n",
|
|
mask);
|
|
return google_chromeec_set_mask
|
|
(EC_HOST_EVENT_LAZY_WAKE_MASK_S0IX, mask);
|
|
}
|
|
static void google_chromeec_set_lazy_wake_masks(uint64_t s5_mask,
|
|
uint64_t s3_mask, uint64_t s0ix_mask)
|
|
{
|
|
if (google_chromeec_set_s5_lazy_wake_mask(s5_mask))
|
|
printk(BIOS_DEBUG, "Error: Set S5 LAZY WAKE mask failed\n");
|
|
if (google_chromeec_set_s3_lazy_wake_mask(s3_mask))
|
|
printk(BIOS_DEBUG, "Error: Set S3 LAZY WAKE mask failed\n");
|
|
if (google_chromeec_set_s0ix_lazy_wake_mask(s0ix_mask))
|
|
printk(BIOS_DEBUG, "Error: Set S0iX LAZY WAKE mask failed\n");
|
|
}
|
|
|
|
uint64_t google_chromeec_get_events_b(void)
|
|
{
|
|
return google_chromeec_get_mask(EC_HOST_EVENT_B);
|
|
}
|
|
|
|
int google_chromeec_clear_events_b(uint64_t mask)
|
|
{
|
|
printk(BIOS_DEBUG,
|
|
"Chrome EC: clear events_b mask to 0x%016llx\n", mask);
|
|
return google_chromeec_clear_mask(EC_HOST_EVENT_B, mask);
|
|
}
|
|
|
|
int google_chromeec_get_mkbp_event(struct ec_response_get_next_event *event)
|
|
{
|
|
struct chromeec_command cmd;
|
|
|
|
cmd.cmd_code = EC_CMD_GET_NEXT_EVENT;
|
|
cmd.cmd_version = 0;
|
|
cmd.cmd_data_in = NULL;
|
|
cmd.cmd_size_in = 0;
|
|
cmd.cmd_data_out = event;
|
|
cmd.cmd_size_out = sizeof(*event);
|
|
cmd.cmd_dev_index = 0;
|
|
|
|
return google_chromeec_command(&cmd);
|
|
}
|
|
|
|
/* Get the current device event mask */
|
|
uint64_t google_chromeec_get_device_enabled_events(void)
|
|
{
|
|
struct ec_params_device_event req;
|
|
struct ec_response_device_event rsp;
|
|
struct chromeec_command cmd;
|
|
|
|
req.param = EC_DEVICE_EVENT_PARAM_GET_ENABLED_EVENTS;
|
|
cmd.cmd_code = EC_CMD_DEVICE_EVENT;
|
|
cmd.cmd_version = 0;
|
|
cmd.cmd_data_in = &req;
|
|
cmd.cmd_size_in = sizeof(req);
|
|
cmd.cmd_data_out = &rsp;
|
|
cmd.cmd_size_out = sizeof(rsp);
|
|
cmd.cmd_dev_index = 0;
|
|
|
|
if (google_chromeec_command(&cmd) == 0)
|
|
return rsp.event_mask;
|
|
return 0;
|
|
}
|
|
|
|
/* Set the current device event mask */
|
|
int google_chromeec_set_device_enabled_events(uint64_t mask)
|
|
{
|
|
struct ec_params_device_event req;
|
|
struct ec_response_device_event rsp;
|
|
struct chromeec_command cmd;
|
|
|
|
req.event_mask = (uint32_t)mask;
|
|
req.param = EC_DEVICE_EVENT_PARAM_SET_ENABLED_EVENTS;
|
|
cmd.cmd_code = EC_CMD_DEVICE_EVENT;
|
|
cmd.cmd_version = 0;
|
|
cmd.cmd_data_in = &req;
|
|
cmd.cmd_size_in = sizeof(req);
|
|
cmd.cmd_data_out = &rsp;
|
|
cmd.cmd_size_out = sizeof(rsp);
|
|
cmd.cmd_dev_index = 0;
|
|
|
|
return google_chromeec_command(&cmd);
|
|
}
|
|
|
|
/* Read and clear pending device events */
|
|
uint64_t google_chromeec_get_device_current_events(void)
|
|
{
|
|
struct ec_params_device_event req;
|
|
struct ec_response_device_event rsp;
|
|
struct chromeec_command cmd;
|
|
|
|
req.param = EC_DEVICE_EVENT_PARAM_GET_CURRENT_EVENTS;
|
|
cmd.cmd_code = EC_CMD_DEVICE_EVENT;
|
|
cmd.cmd_version = 0;
|
|
cmd.cmd_data_in = &req;
|
|
cmd.cmd_size_in = sizeof(req);
|
|
cmd.cmd_data_out = &rsp;
|
|
cmd.cmd_size_out = sizeof(rsp);
|
|
cmd.cmd_dev_index = 0;
|
|
|
|
if (google_chromeec_command(&cmd) == 0)
|
|
return rsp.event_mask;
|
|
return 0;
|
|
}
|
|
|
|
static void google_chromeec_log_device_events(uint64_t mask)
|
|
{
|
|
uint64_t events;
|
|
int i;
|
|
|
|
if (!IS_ENABLED(CONFIG_ELOG) || !mask)
|
|
return;
|
|
|
|
if (google_chromeec_check_feature(EC_FEATURE_DEVICE_EVENT) != 1)
|
|
return;
|
|
|
|
events = google_chromeec_get_device_current_events() & mask;
|
|
printk(BIOS_INFO, "EC Device Events: 0x%016llx\n", events);
|
|
|
|
for (i = 0; i < sizeof(events) * 8; i++) {
|
|
if (EC_DEVICE_EVENT_MASK(i) & events)
|
|
elog_add_event_byte(ELOG_TYPE_EC_DEVICE_EVENT, i);
|
|
}
|
|
}
|
|
|
|
void google_chromeec_log_events(uint64_t mask)
|
|
{
|
|
u8 event;
|
|
uint64_t wake_mask;
|
|
bool restore_wake_mask = false;
|
|
|
|
if (!IS_ENABLED(CONFIG_ELOG))
|
|
return;
|
|
|
|
/*
|
|
* If the EC supports unified wake masks, then there is no need to set
|
|
* wake mask before reading out the host events.
|
|
*/
|
|
if (google_chromeec_check_feature(EC_FEATURE_UNIFIED_WAKE_MASKS) != 1) {
|
|
wake_mask = google_chromeec_get_wake_mask();
|
|
google_chromeec_set_wake_mask(mask);
|
|
restore_wake_mask = true;
|
|
}
|
|
|
|
while ((event = google_chromeec_get_event()) != 0) {
|
|
if (EC_HOST_EVENT_MASK(event) & mask)
|
|
elog_add_event_byte(ELOG_TYPE_EC_EVENT, event);
|
|
}
|
|
|
|
if (restore_wake_mask)
|
|
google_chromeec_set_wake_mask(wake_mask);
|
|
}
|
|
|
|
void google_chromeec_events_init(const struct google_chromeec_event_info *info,
|
|
bool is_s3_wakeup)
|
|
{
|
|
if (is_s3_wakeup) {
|
|
google_chromeec_log_events(info->log_events |
|
|
info->s3_wake_events);
|
|
|
|
/* Log and clear device events that may wake the system. */
|
|
google_chromeec_log_device_events(info->s3_device_events);
|
|
|
|
/* Disable SMI and wake events. */
|
|
google_chromeec_set_smi_mask(0);
|
|
|
|
/* Clear pending events. */
|
|
while (google_chromeec_get_event() != 0)
|
|
;
|
|
|
|
/* Restore SCI event mask. */
|
|
google_chromeec_set_sci_mask(info->sci_events);
|
|
|
|
} else {
|
|
google_chromeec_set_smi_mask(info->smi_events);
|
|
|
|
google_chromeec_log_events(info->log_events |
|
|
info->s5_wake_events);
|
|
|
|
if (google_chromeec_is_uhepi_supported())
|
|
google_chromeec_set_lazy_wake_masks
|
|
(info->s5_wake_events,
|
|
info->s3_wake_events,
|
|
info->s0ix_wake_events);
|
|
}
|
|
|
|
/* Clear wake event mask. */
|
|
google_chromeec_set_wake_mask(0);
|
|
|
|
}
|
|
|
|
int google_chromeec_check_feature(int feature)
|
|
{
|
|
struct chromeec_command cmd;
|
|
struct ec_response_get_features r;
|
|
|
|
cmd.cmd_code = EC_CMD_GET_FEATURES;
|
|
cmd.cmd_version = 0;
|
|
cmd.cmd_size_in = 0;
|
|
cmd.cmd_data_out = &r;
|
|
cmd.cmd_size_out = sizeof(r);
|
|
cmd.cmd_dev_index = 0;
|
|
|
|
if (google_chromeec_command(&cmd) != 0)
|
|
return -1;
|
|
|
|
if (feature >= 8 * sizeof(r.flags))
|
|
return -1;
|
|
|
|
return r.flags[feature / 32] & EC_FEATURE_MASK_0(feature);
|
|
}
|
|
|
|
int google_chromeec_set_sku_id(u32 skuid)
|
|
{
|
|
struct chromeec_command cmd;
|
|
struct ec_sku_id_info set_skuid = {
|
|
.sku_id = skuid
|
|
};
|
|
|
|
cmd.cmd_code = EC_CMD_SET_SKU_ID;
|
|
cmd.cmd_version = 0;
|
|
cmd.cmd_size_in = sizeof(set_skuid);
|
|
cmd.cmd_data_in = &set_skuid;
|
|
cmd.cmd_data_out = NULL;
|
|
cmd.cmd_size_out = 0;
|
|
cmd.cmd_dev_index = 0;
|
|
|
|
if (google_chromeec_command(&cmd) != 0)
|
|
return -1;
|
|
|
|
return 0;
|
|
}
|
|
|
|
#if IS_ENABLED(CONFIG_EC_GOOGLE_CHROMEEC_RTC)
|
|
int rtc_get(struct rtc_time *time)
|
|
{
|
|
struct chromeec_command cmd;
|
|
struct ec_response_rtc r;
|
|
|
|
cmd.cmd_code = EC_CMD_RTC_GET_VALUE;
|
|
cmd.cmd_version = 0;
|
|
cmd.cmd_size_in = 0;
|
|
cmd.cmd_data_out = &r;
|
|
cmd.cmd_size_out = sizeof(r);
|
|
cmd.cmd_dev_index = 0;
|
|
|
|
if (google_chromeec_command(&cmd) != 0)
|
|
return -1;
|
|
|
|
return rtc_to_tm(r.time, time);
|
|
}
|
|
#endif
|
|
|
|
int google_chromeec_reboot(int dev_idx, enum ec_reboot_cmd type, uint8_t flags)
|
|
{
|
|
struct ec_params_reboot_ec reboot_ec = {
|
|
.cmd = type,
|
|
.flags = flags,
|
|
};
|
|
struct ec_response_get_version cec_resp = { };
|
|
struct chromeec_command cec_cmd = {
|
|
.cmd_code = EC_CMD_REBOOT_EC,
|
|
.cmd_version = 0,
|
|
.cmd_data_in = &reboot_ec,
|
|
.cmd_data_out = &cec_resp,
|
|
.cmd_size_in = sizeof(reboot_ec),
|
|
.cmd_size_out = 0, /* ignore response, if any */
|
|
.cmd_dev_index = dev_idx,
|
|
};
|
|
|
|
return google_chromeec_command(&cec_cmd);
|
|
}
|
|
|
|
static int cbi_get_uint32(uint32_t *id, uint32_t tag)
|
|
{
|
|
struct chromeec_command cmd;
|
|
struct ec_params_get_cbi p;
|
|
uint32_t r = 0;
|
|
int rv;
|
|
|
|
p.tag = tag;
|
|
|
|
cmd.cmd_code = EC_CMD_GET_CROS_BOARD_INFO;
|
|
cmd.cmd_version = 0;
|
|
cmd.cmd_data_in = &p;
|
|
cmd.cmd_data_out = &r;
|
|
cmd.cmd_size_in = sizeof(p);
|
|
cmd.cmd_size_out = sizeof(r);
|
|
cmd.cmd_dev_index = 0;
|
|
|
|
rv = google_chromeec_command(&cmd);
|
|
if (rv < 0)
|
|
return rv;
|
|
*id = r;
|
|
return 0;
|
|
}
|
|
|
|
int google_chromeec_cbi_get_sku_id(uint32_t *id)
|
|
{
|
|
return cbi_get_uint32(id, CBI_TAG_SKU_ID);
|
|
}
|
|
|
|
int google_chromeec_cbi_get_oem_id(uint32_t *id)
|
|
{
|
|
return cbi_get_uint32(id, CBI_TAG_OEM_ID);
|
|
}
|
|
|
|
int google_chromeec_cbi_get_dram_part_num(char *buf, size_t bufsize)
|
|
{
|
|
struct ec_params_get_cbi p = {
|
|
.tag = CBI_TAG_DRAM_PART_NUM,
|
|
};
|
|
struct chromeec_command cmd = {
|
|
.cmd_code = EC_CMD_GET_CROS_BOARD_INFO,
|
|
.cmd_version = 0,
|
|
.cmd_data_in = &p,
|
|
.cmd_data_out = buf,
|
|
.cmd_size_in = sizeof(p),
|
|
.cmd_size_out = bufsize,
|
|
};
|
|
int rv;
|
|
|
|
rv = google_chromeec_command(&cmd);
|
|
if (rv < 0)
|
|
return rv;
|
|
|
|
/* Ensure NUL termination. */
|
|
buf[bufsize - 1] = '\0';
|
|
|
|
return 0;
|
|
}
|
|
|
|
#ifndef __SMM__
|
|
u16 google_chromeec_get_board_version(void)
|
|
{
|
|
struct chromeec_command cmd;
|
|
struct ec_response_board_version board_v;
|
|
|
|
cmd.cmd_code = EC_CMD_GET_BOARD_VERSION;
|
|
cmd.cmd_version = 0;
|
|
cmd.cmd_size_in = 0;
|
|
cmd.cmd_size_out = sizeof(board_v);
|
|
cmd.cmd_data_out = &board_v;
|
|
cmd.cmd_dev_index = 0;
|
|
|
|
if (google_chromeec_command(&cmd) != 0)
|
|
return 0;
|
|
|
|
return board_v.board_version;
|
|
}
|
|
|
|
u32 google_chromeec_get_sku_id(void)
|
|
{
|
|
struct chromeec_command cmd;
|
|
struct ec_sku_id_info sku_v;
|
|
|
|
cmd.cmd_code = EC_CMD_GET_SKU_ID;
|
|
cmd.cmd_version = 0;
|
|
cmd.cmd_size_in = 0;
|
|
cmd.cmd_size_out = sizeof(sku_v);
|
|
cmd.cmd_data_out = &sku_v;
|
|
cmd.cmd_dev_index = 0;
|
|
|
|
if (google_chromeec_command(&cmd) != 0)
|
|
return 0;
|
|
|
|
return sku_v.sku_id;
|
|
}
|
|
|
|
int google_chromeec_vbnv_context(int is_read, uint8_t *data, int len)
|
|
{
|
|
struct chromeec_command cec_cmd;
|
|
struct ec_params_vbnvcontext cmd_vbnvcontext;
|
|
struct ec_response_vbnvcontext rsp_vbnvcontext;
|
|
int retries = 3;
|
|
|
|
if (len != EC_VBNV_BLOCK_SIZE)
|
|
return -1;
|
|
|
|
retry:
|
|
cec_cmd.cmd_code = EC_CMD_VBNV_CONTEXT;
|
|
cec_cmd.cmd_version = EC_VER_VBNV_CONTEXT;
|
|
cec_cmd.cmd_data_in = &cmd_vbnvcontext;
|
|
cec_cmd.cmd_data_out = &rsp_vbnvcontext;
|
|
cec_cmd.cmd_size_in = sizeof(cmd_vbnvcontext);
|
|
cec_cmd.cmd_size_out = is_read ? sizeof(rsp_vbnvcontext) : 0;
|
|
cec_cmd.cmd_dev_index = 0;
|
|
|
|
cmd_vbnvcontext.op = is_read ? EC_VBNV_CONTEXT_OP_READ :
|
|
EC_VBNV_CONTEXT_OP_WRITE;
|
|
|
|
if (!is_read)
|
|
memcpy(&cmd_vbnvcontext.block, data, EC_VBNV_BLOCK_SIZE);
|
|
|
|
if (google_chromeec_command(&cec_cmd)) {
|
|
printk(BIOS_ERR, "ERROR: failed to %s vbnv_ec context: %d\n",
|
|
is_read ? "read" : "write", (int)cec_cmd.cmd_code);
|
|
mdelay(10); /* just in case */
|
|
if (--retries)
|
|
goto retry;
|
|
}
|
|
|
|
if (is_read)
|
|
memcpy(data, &rsp_vbnvcontext.block, EC_VBNV_BLOCK_SIZE);
|
|
|
|
return cec_cmd.cmd_code;
|
|
}
|
|
|
|
#endif /* ! __SMM__ */
|
|
|
|
#ifndef __PRE_RAM__
|
|
|
|
int google_chromeec_i2c_xfer(uint8_t chip, uint8_t addr, int alen,
|
|
uint8_t *buffer, int len, int is_read)
|
|
{
|
|
union {
|
|
struct ec_params_i2c_passthru p;
|
|
uint8_t outbuf[EC_HOST_PARAM_SIZE];
|
|
} params;
|
|
union {
|
|
struct ec_response_i2c_passthru r;
|
|
uint8_t inbuf[EC_HOST_PARAM_SIZE];
|
|
} response;
|
|
struct ec_params_i2c_passthru *p = ¶ms.p;
|
|
struct ec_response_i2c_passthru *r = &response.r;
|
|
struct ec_params_i2c_passthru_msg *msg = p->msg;
|
|
struct chromeec_command cmd;
|
|
uint8_t *pdata;
|
|
int read_len, write_len;
|
|
int size;
|
|
int rv;
|
|
|
|
p->port = 0;
|
|
|
|
if (alen != 1) {
|
|
printk(BIOS_ERR, "Unsupported address length %d\n", alen);
|
|
return -1;
|
|
}
|
|
if (is_read) {
|
|
read_len = len;
|
|
write_len = alen;
|
|
p->num_msgs = 2;
|
|
} else {
|
|
read_len = 0;
|
|
write_len = alen + len;
|
|
p->num_msgs = 1;
|
|
}
|
|
|
|
size = sizeof(*p) + p->num_msgs * sizeof(*msg);
|
|
if (size + write_len > sizeof(params)) {
|
|
printk(BIOS_ERR, "Params too large for buffer\n");
|
|
return -1;
|
|
}
|
|
if (sizeof(*r) + read_len > sizeof(response)) {
|
|
printk(BIOS_ERR, "Read length too big for buffer\n");
|
|
return -1;
|
|
}
|
|
|
|
/* Create a message to write the register address and optional data */
|
|
pdata = (uint8_t *)p + size;
|
|
msg->addr_flags = chip;
|
|
msg->len = write_len;
|
|
pdata[0] = addr;
|
|
if (!is_read)
|
|
memcpy(pdata + 1, buffer, len);
|
|
msg++;
|
|
|
|
if (read_len) {
|
|
msg->addr_flags = chip | EC_I2C_FLAG_READ;
|
|
msg->len = read_len;
|
|
}
|
|
|
|
cmd.cmd_code = EC_CMD_I2C_PASSTHRU;
|
|
cmd.cmd_version = 0;
|
|
cmd.cmd_data_in = p;
|
|
cmd.cmd_size_in = size + write_len;
|
|
cmd.cmd_data_out = r;
|
|
cmd.cmd_size_out = sizeof(*r) + read_len;
|
|
cmd.cmd_dev_index = 0;
|
|
rv = google_chromeec_command(&cmd);
|
|
if (rv != 0)
|
|
return rv;
|
|
|
|
/* Parse response */
|
|
if (r->i2c_status & EC_I2C_STATUS_ERROR) {
|
|
printk(BIOS_ERR, "Transfer failed with status=0x%x\n",
|
|
r->i2c_status);
|
|
return -1;
|
|
}
|
|
|
|
if (cmd.cmd_size_out < sizeof(*r) + read_len) {
|
|
printk(BIOS_ERR, "Truncated read response\n");
|
|
return -1;
|
|
}
|
|
|
|
if (read_len)
|
|
memcpy(buffer, r->data, read_len);
|
|
|
|
return 0;
|
|
}
|
|
|
|
int google_chromeec_set_sci_mask(uint64_t mask)
|
|
{
|
|
printk(BIOS_DEBUG, "Chrome EC: Set SCI mask to 0x%016llx\n", mask);
|
|
return google_chromeec_set_mask(EC_HOST_EVENT_SCI_MASK, mask);
|
|
}
|
|
|
|
int google_chromeec_set_smi_mask(uint64_t mask)
|
|
{
|
|
printk(BIOS_DEBUG, "Chrome EC: Set SMI mask to 0x%016llx\n", mask);
|
|
return google_chromeec_set_mask(EC_HOST_EVENT_SMI_MASK, mask);
|
|
}
|
|
|
|
int google_chromeec_set_wake_mask(uint64_t mask)
|
|
{
|
|
printk(BIOS_DEBUG, "Chrome EC: Set WAKE mask to 0x%016llx\n", mask);
|
|
return google_chromeec_set_mask
|
|
(EC_HOST_EVENT_ACTIVE_WAKE_MASK, mask);
|
|
}
|
|
|
|
uint64_t google_chromeec_get_wake_mask(void)
|
|
{
|
|
return google_chromeec_get_mask(EC_HOST_EVENT_ACTIVE_WAKE_MASK);
|
|
}
|
|
|
|
int google_chromeec_set_usb_charge_mode(u8 port_id, enum usb_charge_mode mode)
|
|
{
|
|
struct chromeec_command cmd;
|
|
struct ec_params_usb_charge_set_mode set_mode = {
|
|
.usb_port_id = port_id,
|
|
.mode = mode,
|
|
};
|
|
|
|
cmd.cmd_code = EC_CMD_USB_CHARGE_SET_MODE;
|
|
cmd.cmd_version = 0;
|
|
cmd.cmd_size_in = sizeof(set_mode);
|
|
cmd.cmd_data_in = &set_mode;
|
|
cmd.cmd_size_out = 0;
|
|
cmd.cmd_data_out = NULL;
|
|
cmd.cmd_dev_index = 0;
|
|
|
|
return google_chromeec_command(&cmd);
|
|
}
|
|
|
|
/* Get charger power info in Watts. Also returns type of charger */
|
|
int google_chromeec_get_usb_pd_power_info(enum usb_chg_type *type,
|
|
u32 *max_watts)
|
|
{
|
|
struct ec_params_usb_pd_power_info req = {
|
|
.port = PD_POWER_CHARGING_PORT,
|
|
};
|
|
struct ec_response_usb_pd_power_info rsp;
|
|
struct chromeec_command cmd = {
|
|
.cmd_code = EC_CMD_USB_PD_POWER_INFO,
|
|
.cmd_version = 0,
|
|
.cmd_data_in = &req,
|
|
.cmd_size_in = sizeof(req),
|
|
.cmd_data_out = &rsp,
|
|
.cmd_size_out = sizeof(rsp),
|
|
.cmd_dev_index = 0,
|
|
};
|
|
struct usb_chg_measures m;
|
|
int rv = google_chromeec_command(&cmd);
|
|
if (rv != 0)
|
|
return rv;
|
|
/* values are given in milliAmps and milliVolts */
|
|
*type = rsp.type;
|
|
m = rsp.meas;
|
|
*max_watts = (m.current_max * m.voltage_max) / 1000000;
|
|
|
|
return 0;
|
|
}
|
|
|
|
int google_chromeec_override_dedicated_charger_limit(u16 current_lim,
|
|
u16 voltage_lim)
|
|
{
|
|
struct ec_params_dedicated_charger_limit p = {
|
|
.current_lim = current_lim,
|
|
.voltage_lim = voltage_lim,
|
|
};
|
|
struct chromeec_command cmd = {
|
|
.cmd_code = EC_CMD_OVERRIDE_DEDICATED_CHARGER_LIMIT,
|
|
.cmd_version = 0,
|
|
.cmd_data_in = &p,
|
|
.cmd_size_in = sizeof(p),
|
|
.cmd_data_out = NULL,
|
|
.cmd_size_out = 0,
|
|
.cmd_dev_index = 0,
|
|
};
|
|
|
|
return google_chromeec_command(&cmd);
|
|
}
|
|
|
|
int google_chromeec_set_usb_pd_role(u8 port, enum usb_pd_control_role role)
|
|
{
|
|
struct ec_params_usb_pd_control req = {
|
|
.port = port,
|
|
.role = role,
|
|
.mux = USB_PD_CTRL_MUX_NO_CHANGE,
|
|
.swap = USB_PD_CTRL_SWAP_NONE,
|
|
};
|
|
struct ec_response_usb_pd_control rsp;
|
|
struct chromeec_command cmd = {
|
|
.cmd_code = EC_CMD_USB_PD_CONTROL,
|
|
.cmd_version = 0,
|
|
.cmd_data_in = &req,
|
|
.cmd_size_in = sizeof(req),
|
|
.cmd_data_out = &rsp,
|
|
.cmd_size_out = sizeof(rsp),
|
|
.cmd_dev_index = 0,
|
|
};
|
|
|
|
return google_chromeec_command(&cmd);
|
|
}
|
|
|
|
#ifndef __SMM__
|
|
|
|
static int google_chromeec_hello(void)
|
|
{
|
|
struct chromeec_command cec_cmd;
|
|
struct ec_params_hello cmd_hello;
|
|
struct ec_response_hello rsp_hello;
|
|
cmd_hello.in_data = 0x10203040;
|
|
cec_cmd.cmd_code = EC_CMD_HELLO;
|
|
cec_cmd.cmd_version = 0;
|
|
cec_cmd.cmd_data_in = &cmd_hello.in_data;
|
|
cec_cmd.cmd_data_out = &rsp_hello.out_data;
|
|
cec_cmd.cmd_size_in = sizeof(cmd_hello.in_data);
|
|
cec_cmd.cmd_size_out = sizeof(rsp_hello.out_data);
|
|
cec_cmd.cmd_dev_index = 0;
|
|
google_chromeec_command(&cec_cmd);
|
|
printk(BIOS_DEBUG, "Google Chrome EC: Hello got back %x status (%x)\n",
|
|
rsp_hello.out_data, cec_cmd.cmd_code);
|
|
return cec_cmd.cmd_code;
|
|
}
|
|
|
|
/*
|
|
* Convert a reset cause ID to human-readable string, providing total coverage
|
|
* of the 'cause' space. The returned string points to static storage and must
|
|
* not be free()ed.
|
|
*/
|
|
static const char *reset_cause_to_str(uint16_t cause)
|
|
{
|
|
/* See also ChromiumOS EC include/chipset.h for details. */
|
|
static const char * const reset_causes[] = {
|
|
"(reset unknown)",
|
|
"reset: board custom",
|
|
"reset: ap hang detected",
|
|
"reset: console command",
|
|
"reset: keyboard sysreset",
|
|
"reset: keyboard warm reboot",
|
|
"reset: debug warm reboot",
|
|
"reset: at AP's request",
|
|
"reset: during EC initialization",
|
|
};
|
|
|
|
static const size_t shutdown_cause_begin = 1 << 15;
|
|
static const char * const shutdown_causes[] = {
|
|
"shutdown: power failure",
|
|
"shutdown: during EC initialization",
|
|
"shutdown: board custom",
|
|
"shutdown: battery voltage startup inhibit",
|
|
"shutdown: power wait asserted",
|
|
"shutdown: critical battery",
|
|
"shutdown: by console command",
|
|
"shutdown: entering G3",
|
|
"shutdown: thermal",
|
|
"shutdown: power button",
|
|
};
|
|
|
|
if (cause < ARRAY_SIZE(reset_causes))
|
|
return reset_causes[cause];
|
|
|
|
if (cause < shutdown_cause_begin)
|
|
return "(reset unknown)";
|
|
|
|
if (cause < shutdown_cause_begin + ARRAY_SIZE(shutdown_causes))
|
|
return shutdown_causes[cause - shutdown_cause_begin];
|
|
|
|
return "(shutdown unknown)";
|
|
}
|
|
|
|
/*
|
|
* Copy the EC's information about resets of the AP and its own uptime for
|
|
* debugging purposes.
|
|
*/
|
|
static void google_chromeec_log_uptimeinfo(void)
|
|
{
|
|
/* See also ChromiumOS EC include/system.h RESET_FLAG for details. */
|
|
static const char * const reset_flag_strings[] = {
|
|
"other",
|
|
"reset-pin",
|
|
"brownout",
|
|
"power-on",
|
|
"watchdog",
|
|
"soft",
|
|
"hibernate",
|
|
"rtc-alarm",
|
|
"wake-pin",
|
|
"low-battery",
|
|
"sysjump",
|
|
"hard",
|
|
"ap-off",
|
|
"preserved",
|
|
"usb-resume",
|
|
"rdd",
|
|
"rbox",
|
|
"security"
|
|
};
|
|
struct ec_response_uptime_info cmd_resp;
|
|
int i, flag, flag_count;
|
|
|
|
struct chromeec_command get_uptime_cmd = {
|
|
.cmd_code = EC_CMD_GET_UPTIME_INFO,
|
|
.cmd_version = 0,
|
|
.cmd_data_in = NULL,
|
|
.cmd_size_in = 0,
|
|
.cmd_data_out = &cmd_resp,
|
|
.cmd_size_out = sizeof(cmd_resp),
|
|
.cmd_dev_index = 0,
|
|
};
|
|
google_chromeec_command(&get_uptime_cmd);
|
|
if (get_uptime_cmd.cmd_code) {
|
|
/*
|
|
* Deliberately say nothing for EC's that don't support this
|
|
* command
|
|
*/
|
|
return;
|
|
}
|
|
|
|
printk(BIOS_DEBUG, "Google Chrome EC uptime: %d.%03d seconds\n",
|
|
cmd_resp.time_since_ec_boot_ms / MSECS_PER_SEC,
|
|
cmd_resp.time_since_ec_boot_ms % MSECS_PER_SEC);
|
|
|
|
printk(BIOS_DEBUG, "Google Chrome AP resets since EC boot: %d\n",
|
|
cmd_resp.ap_resets_since_ec_boot);
|
|
|
|
printk(BIOS_DEBUG, "Google Chrome most recent AP reset causes:\n");
|
|
for (i = 0; i != ARRAY_SIZE(cmd_resp.recent_ap_reset); ++i) {
|
|
if (cmd_resp.recent_ap_reset[i].reset_time_ms == 0)
|
|
continue;
|
|
|
|
printk(BIOS_DEBUG, "\t%d.%03d: %d %s\n",
|
|
cmd_resp.recent_ap_reset[i].reset_time_ms /
|
|
MSECS_PER_SEC,
|
|
cmd_resp.recent_ap_reset[i].reset_time_ms %
|
|
MSECS_PER_SEC,
|
|
cmd_resp.recent_ap_reset[i].reset_cause,
|
|
reset_cause_to_str(
|
|
cmd_resp.recent_ap_reset[i].reset_cause));
|
|
}
|
|
|
|
printk(BIOS_DEBUG, "Google Chrome EC reset flags at last EC boot: ");
|
|
flag_count = 0;
|
|
for (flag = 0; flag != ARRAY_SIZE(reset_flag_strings); ++flag) {
|
|
if ((cmd_resp.ec_reset_flags & (1 << flag)) != 0) {
|
|
if (flag_count)
|
|
printk(BIOS_DEBUG, " | ");
|
|
printk(BIOS_DEBUG, reset_flag_strings[flag]);
|
|
flag_count++;
|
|
}
|
|
}
|
|
printk(BIOS_DEBUG, "\n");
|
|
}
|
|
|
|
static int ec_image_type; /* Cached EC image type (ro or rw). */
|
|
|
|
void google_chromeec_init(void)
|
|
{
|
|
struct chromeec_command cec_cmd;
|
|
struct ec_response_get_version cec_resp = {{0}};
|
|
|
|
google_chromeec_hello();
|
|
|
|
cec_cmd.cmd_code = EC_CMD_GET_VERSION;
|
|
cec_cmd.cmd_version = 0;
|
|
cec_cmd.cmd_data_out = &cec_resp;
|
|
cec_cmd.cmd_size_in = 0;
|
|
cec_cmd.cmd_size_out = sizeof(cec_resp);
|
|
cec_cmd.cmd_dev_index = 0;
|
|
google_chromeec_command(&cec_cmd);
|
|
|
|
if (cec_cmd.cmd_code) {
|
|
printk(BIOS_DEBUG,
|
|
"Google Chrome EC: version command failed!\n");
|
|
} else {
|
|
printk(BIOS_DEBUG, "Google Chrome EC: version:\n");
|
|
printk(BIOS_DEBUG, " ro: %s\n", cec_resp.version_string_ro);
|
|
printk(BIOS_DEBUG, " rw: %s\n", cec_resp.version_string_rw);
|
|
printk(BIOS_DEBUG, " running image: %d\n",
|
|
cec_resp.current_image);
|
|
ec_image_type = cec_resp.current_image;
|
|
}
|
|
|
|
google_chromeec_log_uptimeinfo();
|
|
}
|
|
|
|
int google_ec_running_ro(void)
|
|
{
|
|
return (ec_image_type == EC_IMAGE_RO);
|
|
}
|
|
#endif /* ! __SMM__ */
|
|
|
|
#endif /* ! __PRE_RAM__ */
|
|
|
|
/**
|
|
* Check if EC/TCPM is in an alternate mode or not.
|
|
*
|
|
* @param svid SVID of the alternate mode to check
|
|
* @return 0: Not in the mode. -1: Error. 1: Yes.
|
|
*/
|
|
int google_chromeec_pd_get_amode(uint16_t svid)
|
|
{
|
|
struct ec_response_usb_pd_ports r;
|
|
struct chromeec_command cmd;
|
|
int i;
|
|
|
|
cmd.cmd_code = EC_CMD_USB_PD_PORTS;
|
|
cmd.cmd_version = 0;
|
|
cmd.cmd_data_in = NULL;
|
|
cmd.cmd_size_in = 0;
|
|
cmd.cmd_data_out = &r;
|
|
cmd.cmd_size_out = sizeof(r);
|
|
cmd.cmd_dev_index = 0;
|
|
if (google_chromeec_command(&cmd) < 0)
|
|
return -1;
|
|
|
|
for (i = 0; i < r.num_ports; i++) {
|
|
struct ec_params_usb_pd_get_mode_request p;
|
|
struct ec_params_usb_pd_get_mode_response res;
|
|
int svid_idx = 0;
|
|
|
|
do {
|
|
/* Reset cmd in each iteration in case
|
|
google_chromeec_command changes it. */
|
|
p.port = i;
|
|
p.svid_idx = svid_idx;
|
|
cmd.cmd_code = EC_CMD_USB_PD_GET_AMODE;
|
|
cmd.cmd_version = 0;
|
|
cmd.cmd_data_in = &p;
|
|
cmd.cmd_size_in = sizeof(p);
|
|
cmd.cmd_data_out = &res;
|
|
cmd.cmd_size_out = sizeof(res);
|
|
cmd.cmd_dev_index = 0;
|
|
|
|
if (google_chromeec_command(&cmd) < 0)
|
|
return -1;
|
|
if (res.svid == svid)
|
|
return 1;
|
|
svid_idx++;
|
|
} while (res.svid);
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
#define USB_SID_DISPLAYPORT 0xff01
|
|
|
|
/**
|
|
* Wait for DisplayPort to be ready
|
|
*
|
|
* @param timeout Wait aborts after <timeout> ms.
|
|
* @return 1: Success or 0: Timeout.
|
|
*/
|
|
int google_chromeec_wait_for_displayport(long timeout)
|
|
{
|
|
struct stopwatch sw;
|
|
|
|
printk(BIOS_INFO, "Waiting for DisplayPort\n");
|
|
stopwatch_init_msecs_expire(&sw, timeout);
|
|
while (google_chromeec_pd_get_amode(USB_SID_DISPLAYPORT) != 1) {
|
|
if (stopwatch_expired(&sw)) {
|
|
printk(BIOS_WARNING,
|
|
"DisplayPort not ready after %ldms. Abort.\n",
|
|
timeout);
|
|
return 0;
|
|
}
|
|
mdelay(200);
|
|
}
|
|
printk(BIOS_INFO, "DisplayPort ready after %lu ms\n",
|
|
stopwatch_duration_msecs(&sw));
|
|
|
|
return 1;
|
|
}
|