fada85e655
switch and SPI write protect for fill_lb_gpios() to coreboot table. BUG=chrome-os-partner:43707 BRANCH=none TEST=build and boot on kunimits Signed-off-by: robbie zhang <robbie.zhang@intel.com> Change-Id: I82cd3f74d0ac26e369ee4274b2c65f4f93c1fd3b Signed-off-by: Patrick Georgi <patrick@georgi-clan.de> Original-Commit-Id: 804a8a60951321e1b5b1d7ddacb97ddbe0cd7680 Original-Change-Id: I31ed6c0e48089b84ef9d52753484253a091d5aa5 Original-Reviewed-on: https://chromium-review.googlesource.com/295580 Original-Reviewed-by: Aaron Durbin <adurbin@chromium.org> Original-Commit-Queue: Wenkai Du <wenkai.du@intel.com> Original-Tested-by: Wenkai Du <wenkai.du@intel.com> Reviewed-on: http://review.coreboot.org/11436 Tested-by: build bot (Jenkins) Reviewed-by: Aaron Durbin <adurbin@chromium.org>
93 lines
2.6 KiB
C
93 lines
2.6 KiB
C
/*
|
|
* This file is part of the coreboot project.
|
|
*
|
|
* Copyright (C) 2013 Google Inc.
|
|
* Copyright (C) 2015 Intel Corporation.
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; version 2 of the License.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, write to the Free Software
|
|
* Foundation, Inc.
|
|
*/
|
|
|
|
#include <arch/io.h>
|
|
#include <console/console.h>
|
|
#include <device/device.h>
|
|
#include <device/pci.h>
|
|
#include <ec/google/chromeec/ec.h>
|
|
#include <gpio.h>
|
|
#include <soc/gpio.h>
|
|
#include <string.h>
|
|
#include <vendorcode/google/chromeos/chromeos.h>
|
|
#include "gpio.h"
|
|
#include "ec.h"
|
|
|
|
#if ENV_RAMSTAGE
|
|
#include <boot/coreboot_tables.h>
|
|
|
|
#define GPIO_COUNT 6
|
|
|
|
void fill_lb_gpios(struct lb_gpios *gpios)
|
|
{
|
|
struct lb_gpio *gpio;
|
|
|
|
gpios->size = sizeof(*gpios) + (GPIO_COUNT * sizeof(struct lb_gpio));
|
|
gpios->count = GPIO_COUNT;
|
|
|
|
gpio = gpios->gpios;
|
|
fill_lb_gpio(gpio++, -1, ACTIVE_HIGH, "write protect",
|
|
get_write_protect_state());
|
|
fill_lb_gpio(gpio++, -1, ACTIVE_HIGH, "recovery",
|
|
get_recovery_mode_switch());
|
|
fill_lb_gpio(gpio++, -1, ACTIVE_HIGH, "developer",
|
|
get_developer_mode_switch());
|
|
fill_lb_gpio(gpio++, -1, ACTIVE_HIGH, "lid",
|
|
get_lid_switch());
|
|
fill_lb_gpio(gpio++, -1, ACTIVE_HIGH, "power", 0);
|
|
fill_lb_gpio(gpio++, -1, ACTIVE_HIGH, "oprom", gfx_get_init_done());
|
|
}
|
|
#endif /* ENV_RAMSTAGE */
|
|
|
|
int get_lid_switch(void)
|
|
{
|
|
/* Read lid switch state from the EC. */
|
|
return !!(google_chromeec_get_switches() & EC_SWITCH_LID_OPEN);
|
|
}
|
|
|
|
int get_developer_mode_switch(void)
|
|
{
|
|
/* No physical developer mode switch. */
|
|
return 0;
|
|
}
|
|
|
|
int get_recovery_mode_switch(void)
|
|
{
|
|
/* Check for dedicated recovery switch first. */
|
|
if (google_chromeec_get_switches() & EC_SWITCH_DEDICATED_RECOVERY)
|
|
return 1;
|
|
|
|
/* Otherwise check if the EC has posted the keyboard recovery event. */
|
|
return !!(google_chromeec_get_events_b() &
|
|
EC_HOST_EVENT_MASK(EC_HOST_EVENT_KEYBOARD_RECOVERY));
|
|
}
|
|
|
|
int clear_recovery_mode_switch(void)
|
|
{
|
|
/* Clear keyboard recovery event. */
|
|
return google_chromeec_clear_events_b(
|
|
EC_HOST_EVENT_MASK(EC_HOST_EVENT_KEYBOARD_RECOVERY));
|
|
}
|
|
|
|
int get_write_protect_state(void)
|
|
{
|
|
/* Read PCH_WP GPIO. */
|
|
return gpio_get(GPIO_PCH_WP);
|
|
}
|