| /* |
| * This file is part of the coreboot project. |
| * |
| * Copyright (C) 2012 The Chromium OS Authors. All rights reserved. |
| * |
| * This program is free software; you can redistribute it and/or modify |
| * it under the terms of the GNU General Public License as published by |
| * the Free Software Foundation; version 2 of the License |
| * |
| * This program is distributed in the hope that it will be useful, |
| * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
| * GNU General Public License for more details. |
| */ |
| |
| #include <stdint.h> |
| #include <string.h> |
| #include <cbmem.h> |
| #include <console/console.h> |
| #include <arch/early_variables.h> |
| #include <assert.h> |
| #include <bootmode.h> |
| #include <bootstate.h> |
| #include <delay.h> |
| #include <elog.h> |
| #include <rtc.h> |
| #include <stdlib.h> |
| #include <security/vboot/vboot_common.h> |
| #include <timer.h> |
| |
| #include "chip.h" |
| #include "ec.h" |
| #include "ec_commands.h" |
| |
| #define INVALID_HCMD 0xFF |
| |
| /* |
| * Map UHEPI masks to non UHEPI commands in order to support old EC FW |
| * which does not support UHEPI command. |
| */ |
| static const struct { |
| uint8_t set_cmd; |
| uint8_t clear_cmd; |
| uint8_t get_cmd; |
| } event_map[] = { |
| [EC_HOST_EVENT_MAIN] = { |
| INVALID_HCMD, EC_CMD_HOST_EVENT_CLEAR, |
| INVALID_HCMD, |
| }, |
| [EC_HOST_EVENT_B] = { |
| INVALID_HCMD, EC_CMD_HOST_EVENT_CLEAR_B, |
| EC_CMD_HOST_EVENT_GET_B, |
| }, |
| [EC_HOST_EVENT_SCI_MASK] = { |
| EC_CMD_HOST_EVENT_SET_SCI_MASK, INVALID_HCMD, |
| EC_CMD_HOST_EVENT_GET_SCI_MASK, |
| }, |
| [EC_HOST_EVENT_SMI_MASK] = { |
| EC_CMD_HOST_EVENT_SET_SMI_MASK, INVALID_HCMD, |
| EC_CMD_HOST_EVENT_GET_SMI_MASK, |
| }, |
| [EC_HOST_EVENT_ALWAYS_REPORT_MASK] = { |
| INVALID_HCMD, INVALID_HCMD, INVALID_HCMD, |
| }, |
| [EC_HOST_EVENT_ACTIVE_WAKE_MASK] = { |
| EC_CMD_HOST_EVENT_SET_WAKE_MASK, INVALID_HCMD, |
| EC_CMD_HOST_EVENT_GET_WAKE_MASK, |
| }, |
| [EC_HOST_EVENT_LAZY_WAKE_MASK_S0IX] = { |
| EC_CMD_HOST_EVENT_SET_WAKE_MASK, INVALID_HCMD, |
| EC_CMD_HOST_EVENT_GET_WAKE_MASK, |
| }, |
| [EC_HOST_EVENT_LAZY_WAKE_MASK_S3] = { |
| EC_CMD_HOST_EVENT_SET_WAKE_MASK, INVALID_HCMD, |
| EC_CMD_HOST_EVENT_GET_WAKE_MASK, |
| }, |
| [EC_HOST_EVENT_LAZY_WAKE_MASK_S5] = { |
| EC_CMD_HOST_EVENT_SET_WAKE_MASK, INVALID_HCMD, |
| EC_CMD_HOST_EVENT_GET_WAKE_MASK, |
| }, |
| }; |
| |
| void log_recovery_mode_switch(void) |
| { |
| uint64_t *events; |
| |
| if (cbmem_find(CBMEM_ID_EC_HOSTEVENT)) |
| return; |
| |
| events = cbmem_add(CBMEM_ID_EC_HOSTEVENT, sizeof(*events)); |
| if (!events) |
| return; |
| |
| *events = google_chromeec_get_events_b(); |
| } |
| |
| static void google_chromeec_elog_add_recovery_event(void *unused) |
| { |
| uint64_t *events = cbmem_find(CBMEM_ID_EC_HOSTEVENT); |
| uint8_t event_byte = EC_EVENT_KEYBOARD_RECOVERY; |
| |
| if (!events) |
| return; |
| |
| if (!(*events & EC_HOST_EVENT_MASK(EC_HOST_EVENT_KEYBOARD_RECOVERY))) |
| return; |
| |
| if (*events & |
| EC_HOST_EVENT_MASK(EC_HOST_EVENT_KEYBOARD_RECOVERY_HW_REINIT)) |
| event_byte = EC_EVENT_KEYBOARD_RECOVERY_HWREINIT; |
| |
| elog_add_event_byte(ELOG_TYPE_EC_EVENT, event_byte); |
| } |
| |
| BOOT_STATE_INIT_ENTRY(BS_WRITE_TABLES, BS_ON_ENTRY, |
| google_chromeec_elog_add_recovery_event, NULL); |
| |
| uint8_t google_chromeec_calc_checksum(const uint8_t *data, int size) |
| { |
| int csum; |
| |
| for (csum = 0; size > 0; data++, size--) |
| csum += *data; |
| return (uint8_t)(csum & 0xff); |
| } |
| |
| int google_chromeec_kbbacklight(int percent) |
| { |
| struct chromeec_command cec_cmd; |
| struct ec_params_pwm_set_keyboard_backlight cmd_backlight; |
| struct ec_response_pwm_get_keyboard_backlight rsp_backlight; |
| /* if they were dumb, help them out */ |
| percent = percent % 101; |
| cec_cmd.cmd_code = EC_CMD_PWM_SET_KEYBOARD_BACKLIGHT; |
| cec_cmd.cmd_version = 0; |
| cmd_backlight.percent = percent; |
| cec_cmd.cmd_data_in = &cmd_backlight; |
| cec_cmd.cmd_data_out = &rsp_backlight; |
| cec_cmd.cmd_size_in = sizeof(cmd_backlight); |
| cec_cmd.cmd_size_out = sizeof(rsp_backlight); |
| cec_cmd.cmd_dev_index = 0; |
| google_chromeec_command(&cec_cmd); |
| printk(BIOS_DEBUG, "Google Chrome set keyboard backlight: %x status (%x)\n", |
| rsp_backlight.percent, cec_cmd.cmd_code); |
| return cec_cmd.cmd_code; |
| |
| } |
| |
| void google_chromeec_post(u8 postcode) |
| { |
| /* backlight is a percent. postcode is a u8. |
| * Convert the u8 to %. |
| */ |
| postcode = (postcode/4) + (postcode/8); |
| google_chromeec_kbbacklight(postcode); |
| } |
| |
| /* |
| * Query the EC for specified mask indicating enabled events. |
| * The EC maintains separate event masks for SMI, SCI and WAKE. |
| */ |
| static int google_chromeec_uhepi_cmd(uint8_t mask, uint8_t action, |
| uint64_t *value) |
| { |
| int ret; |
| struct ec_params_host_event req; |
| struct ec_response_host_event rsp; |
| struct chromeec_command cmd; |
| |
| req.action = action; |
| req.mask_type = mask; |
| if (action != EC_HOST_EVENT_GET) |
| req.value = *value; |
| else |
| *value = 0; |
| cmd.cmd_code = EC_CMD_HOST_EVENT; |
| cmd.cmd_version = 0; |
| cmd.cmd_data_in = &req; |
| cmd.cmd_size_in = sizeof(req); |
| cmd.cmd_data_out = &rsp; |
| cmd.cmd_size_out = sizeof(rsp); |
| cmd.cmd_dev_index = 0; |
| |
| ret = google_chromeec_command(&cmd); |
| |
| if (action != EC_HOST_EVENT_GET) |
| return ret; |
| if (ret == 0) |
| *value = rsp.value; |
| return ret; |
| } |
| |
| static int google_chromeec_handle_non_uhepi_cmd(uint8_t hcmd, uint8_t action, |
| uint64_t *value) |
| { |
| int ret = -1; |
| struct ec_params_host_event_mask req; |
| struct ec_response_host_event_mask rsp; |
| struct chromeec_command cmd; |
| |
| if (hcmd == INVALID_HCMD) |
| return ret; |
| |
| if (action != EC_HOST_EVENT_GET) |
| req.mask = (uint32_t)*value; |
| else |
| *value = 0; |
| |
| cmd.cmd_code = hcmd; |
| cmd.cmd_version = 0; |
| cmd.cmd_data_in = &req; |
| cmd.cmd_size_in = sizeof(req); |
| cmd.cmd_data_out = &rsp; |
| cmd.cmd_size_out = sizeof(rsp); |
| cmd.cmd_dev_index = 0; |
| |
| ret = google_chromeec_command(&cmd); |
| |
| if (action != EC_HOST_EVENT_GET) |
| return ret; |
| if (ret == 0) |
| *value = rsp.mask; |
| |
| return ret; |
| } |
| |
| bool google_chromeec_is_uhepi_supported(void) |
| { |
| #define UHEPI_SUPPORTED 1 |
| #define UHEPI_NOT_SUPPORTED 2 |
| |
| static int uhepi_support CAR_GLOBAL; |
| |
| if (!uhepi_support) { |
| uhepi_support = google_chromeec_check_feature |
| (EC_FEATURE_UNIFIED_WAKE_MASKS) > 0 ? UHEPI_SUPPORTED : |
| UHEPI_NOT_SUPPORTED; |
| printk(BIOS_DEBUG, "Chrome EC: UHEPI %s\n", |
| uhepi_support == UHEPI_SUPPORTED ? |
| "supported" : "not supported"); |
| } |
| return uhepi_support == UHEPI_SUPPORTED; |
| } |
| |
| static uint64_t google_chromeec_get_mask(u8 type) |
| { |
| u64 value = 0; |
| |
| if (google_chromeec_is_uhepi_supported()) { |
| google_chromeec_uhepi_cmd(type, EC_HOST_EVENT_GET, &value); |
| } else { |
| assert(type < ARRAY_SIZE(event_map)); |
| google_chromeec_handle_non_uhepi_cmd( |
| event_map[type].get_cmd, |
| EC_HOST_EVENT_GET, &value); |
| } |
| return value; |
| } |
| static int google_chromeec_clear_mask(u8 type, u64 mask) |
| { |
| if (google_chromeec_is_uhepi_supported()) |
| return google_chromeec_uhepi_cmd(type, |
| EC_HOST_EVENT_CLEAR, &mask); |
| |
| assert(type < ARRAY_SIZE(event_map)); |
| return google_chromeec_handle_non_uhepi_cmd( |
| event_map[type].clear_cmd, |
| EC_HOST_EVENT_CLEAR, &mask); |
| } |
| static int __unused google_chromeec_set_mask(u8 type, u64 mask) |
| { |
| if (google_chromeec_is_uhepi_supported()) |
| return google_chromeec_uhepi_cmd(type, |
| EC_HOST_EVENT_SET, &mask); |
| |
| assert(type < ARRAY_SIZE(event_map)); |
| return google_chromeec_handle_non_uhepi_cmd( |
| event_map[type].set_cmd, |
| EC_HOST_EVENT_SET, &mask); |
| } |
| |
| static int google_chromeec_set_s3_lazy_wake_mask(uint64_t mask) |
| { |
| printk(BIOS_DEBUG, "Chrome EC: Set S3 LAZY WAKE mask to 0x%016llx\n", |
| mask); |
| return google_chromeec_set_mask |
| (EC_HOST_EVENT_LAZY_WAKE_MASK_S3, mask); |
| } |
| |
| static int google_chromeec_set_s5_lazy_wake_mask(uint64_t mask) |
| { |
| printk(BIOS_DEBUG, "Chrome EC: Set S5 LAZY WAKE mask to 0x%016llx\n", |
| mask); |
| return google_chromeec_set_mask |
| (EC_HOST_EVENT_LAZY_WAKE_MASK_S5, mask); |
| } |
| |
| static int google_chromeec_set_s0ix_lazy_wake_mask(uint64_t mask) |
| { |
| printk(BIOS_DEBUG, "Chrome EC: Set S0iX LAZY WAKE mask to 0x%016llx\n", |
| mask); |
| return google_chromeec_set_mask |
| (EC_HOST_EVENT_LAZY_WAKE_MASK_S0IX, mask); |
| } |
| static void google_chromeec_set_lazy_wake_masks(uint64_t s5_mask, |
| uint64_t s3_mask, uint64_t s0ix_mask) |
| { |
| if (google_chromeec_set_s5_lazy_wake_mask(s5_mask)) |
| printk(BIOS_DEBUG, "Error: Set S5 LAZY WAKE mask failed\n"); |
| if (google_chromeec_set_s3_lazy_wake_mask(s3_mask)) |
| printk(BIOS_DEBUG, "Error: Set S3 LAZY WAKE mask failed\n"); |
| /* |
| * Make sure S0Ix is supported before trying to set up the EC's |
| * S0Ix lazy wake mask. |
| */ |
| if (s0ix_mask && google_chromeec_set_s0ix_lazy_wake_mask(s0ix_mask)) |
| printk(BIOS_DEBUG, "Error: Set S0iX LAZY WAKE mask failed\n"); |
| } |
| |
| uint64_t google_chromeec_get_events_b(void) |
| { |
| return google_chromeec_get_mask(EC_HOST_EVENT_B); |
| } |
| |
| int google_chromeec_clear_events_b(uint64_t mask) |
| { |
| printk(BIOS_DEBUG, |
| "Chrome EC: clear events_b mask to 0x%016llx\n", mask); |
| return google_chromeec_clear_mask(EC_HOST_EVENT_B, mask); |
| } |
| |
| int google_chromeec_get_mkbp_event(struct ec_response_get_next_event *event) |
| { |
| struct chromeec_command cmd; |
| |
| cmd.cmd_code = EC_CMD_GET_NEXT_EVENT; |
| cmd.cmd_version = 0; |
| cmd.cmd_data_in = NULL; |
| cmd.cmd_size_in = 0; |
| cmd.cmd_data_out = event; |
| cmd.cmd_size_out = sizeof(*event); |
| cmd.cmd_dev_index = 0; |
| |
| return google_chromeec_command(&cmd); |
| } |
| |
| /* Get the current device event mask */ |
| uint64_t google_chromeec_get_device_enabled_events(void) |
| { |
| struct ec_params_device_event req; |
| struct ec_response_device_event rsp; |
| struct chromeec_command cmd; |
| |
| req.param = EC_DEVICE_EVENT_PARAM_GET_ENABLED_EVENTS; |
| cmd.cmd_code = EC_CMD_DEVICE_EVENT; |
| cmd.cmd_version = 0; |
| cmd.cmd_data_in = &req; |
| cmd.cmd_size_in = sizeof(req); |
| cmd.cmd_data_out = &rsp; |
| cmd.cmd_size_out = sizeof(rsp); |
| cmd.cmd_dev_index = 0; |
| |
| if (google_chromeec_command(&cmd) == 0) |
| return rsp.event_mask; |
| return 0; |
| } |
| |
| /* Set the current device event mask */ |
| int google_chromeec_set_device_enabled_events(uint64_t mask) |
| { |
| struct ec_params_device_event req; |
| struct ec_response_device_event rsp; |
| struct chromeec_command cmd; |
| |
| req.event_mask = (uint32_t)mask; |
| req.param = EC_DEVICE_EVENT_PARAM_SET_ENABLED_EVENTS; |
| cmd.cmd_code = EC_CMD_DEVICE_EVENT; |
| cmd.cmd_version = 0; |
| cmd.cmd_data_in = &req; |
| cmd.cmd_size_in = sizeof(req); |
| cmd.cmd_data_out = &rsp; |
| cmd.cmd_size_out = sizeof(rsp); |
| cmd.cmd_dev_index = 0; |
| |
| return google_chromeec_command(&cmd); |
| } |
| |
| /* Read and clear pending device events */ |
| uint64_t google_chromeec_get_device_current_events(void) |
| { |
| struct ec_params_device_event req; |
| struct ec_response_device_event rsp; |
| struct chromeec_command cmd; |
| |
| req.param = EC_DEVICE_EVENT_PARAM_GET_CURRENT_EVENTS; |
| cmd.cmd_code = EC_CMD_DEVICE_EVENT; |
| cmd.cmd_version = 0; |
| cmd.cmd_data_in = &req; |
| cmd.cmd_size_in = sizeof(req); |
| cmd.cmd_data_out = &rsp; |
| cmd.cmd_size_out = sizeof(rsp); |
| cmd.cmd_dev_index = 0; |
| |
| if (google_chromeec_command(&cmd) == 0) |
| return rsp.event_mask; |
| return 0; |
| } |
| |
| static void google_chromeec_log_device_events(uint64_t mask) |
| { |
| uint64_t events; |
| int i; |
| |
| if (!CONFIG(ELOG) || !mask) |
| return; |
| |
| if (google_chromeec_check_feature(EC_FEATURE_DEVICE_EVENT) != 1) |
| return; |
| |
| events = google_chromeec_get_device_current_events() & mask; |
| printk(BIOS_INFO, "EC Device Events: 0x%016llx\n", events); |
| |
| for (i = 0; i < sizeof(events) * 8; i++) { |
| if (EC_DEVICE_EVENT_MASK(i) & events) |
| elog_add_event_byte(ELOG_TYPE_EC_DEVICE_EVENT, i); |
| } |
| } |
| |
| void google_chromeec_log_events(uint64_t mask) |
| { |
| uint64_t events; |
| int i; |
| |
| if (!CONFIG(ELOG)) |
| return; |
| |
| events = google_chromeec_get_events_b() & mask; |
| for (i = 0; i < sizeof(events) * 8; i++) { |
| if (EC_HOST_EVENT_MASK(i) & events) |
| elog_add_event_byte(ELOG_TYPE_EC_EVENT, i); |
| } |
| |
| google_chromeec_clear_events_b(events); |
| } |
| |
| void google_chromeec_events_init(const struct google_chromeec_event_info *info, |
| bool is_s3_wakeup) |
| { |
| if (is_s3_wakeup) { |
| google_chromeec_log_events(info->log_events | |
| info->s3_wake_events); |
| |
| /* Log and clear device events that may wake the system. */ |
| google_chromeec_log_device_events(info->s3_device_events); |
| |
| /* Disable SMI and wake events. */ |
| google_chromeec_set_smi_mask(0); |
| |
| /* Restore SCI event mask. */ |
| google_chromeec_set_sci_mask(info->sci_events); |
| |
| } else { |
| google_chromeec_set_smi_mask(info->smi_events); |
| |
| google_chromeec_log_events(info->log_events | |
| info->s5_wake_events); |
| |
| if (google_chromeec_is_uhepi_supported()) |
| google_chromeec_set_lazy_wake_masks |
| (info->s5_wake_events, |
| info->s3_wake_events, |
| info->s0ix_wake_events); |
| } |
| |
| /* Clear wake event mask. */ |
| google_chromeec_set_wake_mask(0); |
| |
| } |
| |
| int google_chromeec_check_feature(int feature) |
| { |
| struct chromeec_command cmd; |
| struct ec_response_get_features r; |
| |
| cmd.cmd_code = EC_CMD_GET_FEATURES; |
| cmd.cmd_version = 0; |
| cmd.cmd_size_in = 0; |
| cmd.cmd_data_out = &r; |
| cmd.cmd_size_out = sizeof(r); |
| cmd.cmd_dev_index = 0; |
| |
| if (google_chromeec_command(&cmd) != 0) |
| return -1; |
| |
| if (feature >= 8 * sizeof(r.flags)) |
| return -1; |
| |
| return r.flags[feature / 32] & EC_FEATURE_MASK_0(feature); |
| } |
| |
| int google_chromeec_set_sku_id(u32 skuid) |
| { |
| struct chromeec_command cmd; |
| struct ec_sku_id_info set_skuid = { |
| .sku_id = skuid |
| }; |
| |
| cmd.cmd_code = EC_CMD_SET_SKU_ID; |
| cmd.cmd_version = 0; |
| cmd.cmd_size_in = sizeof(set_skuid); |
| cmd.cmd_data_in = &set_skuid; |
| cmd.cmd_data_out = NULL; |
| cmd.cmd_size_out = 0; |
| cmd.cmd_dev_index = 0; |
| |
| if (google_chromeec_command(&cmd) != 0) |
| return -1; |
| |
| return 0; |
| } |
| |
| #if CONFIG(EC_GOOGLE_CHROMEEC_RTC) |
| int rtc_get(struct rtc_time *time) |
| { |
| struct chromeec_command cmd; |
| struct ec_response_rtc r; |
| |
| cmd.cmd_code = EC_CMD_RTC_GET_VALUE; |
| cmd.cmd_version = 0; |
| cmd.cmd_size_in = 0; |
| cmd.cmd_data_out = &r; |
| cmd.cmd_size_out = sizeof(r); |
| cmd.cmd_dev_index = 0; |
| |
| if (google_chromeec_command(&cmd) != 0) |
| return -1; |
| |
| return rtc_to_tm(r.time, time); |
| } |
| #endif |
| |
| int google_chromeec_reboot(int dev_idx, enum ec_reboot_cmd type, uint8_t flags) |
| { |
| struct ec_params_reboot_ec reboot_ec = { |
| .cmd = type, |
| .flags = flags, |
| }; |
| struct ec_response_get_version cec_resp = { }; |
| struct chromeec_command cec_cmd = { |
| .cmd_code = EC_CMD_REBOOT_EC, |
| .cmd_version = 0, |
| .cmd_data_in = &reboot_ec, |
| .cmd_data_out = &cec_resp, |
| .cmd_size_in = sizeof(reboot_ec), |
| .cmd_size_out = 0, /* ignore response, if any */ |
| .cmd_dev_index = dev_idx, |
| }; |
| |
| return google_chromeec_command(&cec_cmd); |
| } |
| |
| static int cbi_get_uint32(uint32_t *id, uint32_t tag) |
| { |
| struct chromeec_command cmd; |
| struct ec_params_get_cbi p; |
| uint32_t r = 0; |
| int rv; |
| |
| p.tag = tag; |
| |
| cmd.cmd_code = EC_CMD_GET_CROS_BOARD_INFO; |
| cmd.cmd_version = 0; |
| cmd.cmd_data_in = &p; |
| cmd.cmd_data_out = &r; |
| cmd.cmd_size_in = sizeof(p); |
| cmd.cmd_size_out = sizeof(r); |
| cmd.cmd_dev_index = 0; |
| |
| rv = google_chromeec_command(&cmd); |
| if (rv != 0) |
| return rv; |
| *id = r; |
| return 0; |
| } |
| |
| int google_chromeec_cbi_get_sku_id(uint32_t *id) |
| { |
| return cbi_get_uint32(id, CBI_TAG_SKU_ID); |
| } |
| |
| int google_chromeec_cbi_get_oem_id(uint32_t *id) |
| { |
| return cbi_get_uint32(id, CBI_TAG_OEM_ID); |
| } |
| |
| static int cbi_get_string(char *buf, size_t bufsize, uint32_t tag) |
| { |
| struct ec_params_get_cbi p = { |
| .tag = tag, |
| }; |
| struct chromeec_command cmd = { |
| .cmd_code = EC_CMD_GET_CROS_BOARD_INFO, |
| .cmd_version = 0, |
| .cmd_data_in = &p, |
| .cmd_data_out = buf, |
| .cmd_size_in = sizeof(p), |
| .cmd_size_out = bufsize, |
| }; |
| int rv; |
| |
| rv = google_chromeec_command(&cmd); |
| if (rv != 0) |
| return rv; |
| |
| /* Ensure NUL termination. */ |
| buf[bufsize - 1] = '\0'; |
| |
| return 0; |
| } |
| |
| int google_chromeec_cbi_get_dram_part_num(char *buf, size_t bufsize) |
| { |
| return cbi_get_string(buf, bufsize, CBI_TAG_DRAM_PART_NUM); |
| } |
| |
| int google_chromeec_cbi_get_oem_name(char *buf, size_t bufsize) |
| { |
| return cbi_get_string(buf, bufsize, CBI_TAG_OEM_NAME); |
| } |
| |
| int google_chromeec_get_board_version(uint32_t *version) |
| { |
| struct chromeec_command cmd; |
| struct ec_response_board_version board_v; |
| |
| cmd.cmd_code = EC_CMD_GET_BOARD_VERSION; |
| cmd.cmd_version = 0; |
| cmd.cmd_size_in = 0; |
| cmd.cmd_size_out = sizeof(board_v); |
| cmd.cmd_data_out = &board_v; |
| cmd.cmd_dev_index = 0; |
| |
| if (google_chromeec_command(&cmd)) |
| return -1; |
| |
| *version = board_v.board_version; |
| return 0; |
| } |
| |
| u32 google_chromeec_get_sku_id(void) |
| { |
| struct chromeec_command cmd; |
| struct ec_sku_id_info sku_v; |
| |
| cmd.cmd_code = EC_CMD_GET_SKU_ID; |
| cmd.cmd_version = 0; |
| cmd.cmd_size_in = 0; |
| cmd.cmd_size_out = sizeof(sku_v); |
| cmd.cmd_data_out = &sku_v; |
| cmd.cmd_dev_index = 0; |
| |
| if (google_chromeec_command(&cmd) != 0) |
| return 0; |
| |
| return sku_v.sku_id; |
| } |
| |
| int google_chromeec_vbnv_context(int is_read, uint8_t *data, int len) |
| { |
| struct chromeec_command cec_cmd; |
| struct ec_params_vbnvcontext cmd_vbnvcontext; |
| struct ec_response_vbnvcontext rsp_vbnvcontext; |
| int retries = 3; |
| |
| if (len != EC_VBNV_BLOCK_SIZE) |
| return -1; |
| |
| retry: |
| cec_cmd.cmd_code = EC_CMD_VBNV_CONTEXT; |
| cec_cmd.cmd_version = EC_VER_VBNV_CONTEXT; |
| cec_cmd.cmd_data_in = &cmd_vbnvcontext; |
| cec_cmd.cmd_data_out = &rsp_vbnvcontext; |
| cec_cmd.cmd_size_in = sizeof(cmd_vbnvcontext); |
| cec_cmd.cmd_size_out = is_read ? sizeof(rsp_vbnvcontext) : 0; |
| cec_cmd.cmd_dev_index = 0; |
| |
| cmd_vbnvcontext.op = is_read ? EC_VBNV_CONTEXT_OP_READ : |
| EC_VBNV_CONTEXT_OP_WRITE; |
| |
| if (!is_read) |
| memcpy(&cmd_vbnvcontext.block, data, EC_VBNV_BLOCK_SIZE); |
| |
| if (google_chromeec_command(&cec_cmd)) { |
| printk(BIOS_ERR, "ERROR: failed to %s vbnv_ec context: %d\n", |
| is_read ? "read" : "write", (int)cec_cmd.cmd_code); |
| mdelay(10); /* just in case */ |
| if (--retries) |
| goto retry; |
| } |
| |
| if (is_read) |
| memcpy(data, &rsp_vbnvcontext.block, EC_VBNV_BLOCK_SIZE); |
| |
| return cec_cmd.cmd_code; |
| } |
| |
| int google_chromeec_i2c_xfer(uint8_t chip, uint8_t addr, int alen, |
| uint8_t *buffer, int len, int is_read) |
| { |
| union { |
| struct ec_params_i2c_passthru p; |
| uint8_t outbuf[EC_HOST_PARAM_SIZE]; |
| } params; |
| union { |
| struct ec_response_i2c_passthru r; |
| uint8_t inbuf[EC_HOST_PARAM_SIZE]; |
| } response; |
| struct ec_params_i2c_passthru *p = ¶ms.p; |
| struct ec_response_i2c_passthru *r = &response.r; |
| struct ec_params_i2c_passthru_msg *msg = p->msg; |
| struct chromeec_command cmd; |
| uint8_t *pdata; |
| int read_len, write_len; |
| int size; |
| int rv; |
| |
| p->port = 0; |
| |
| if (alen != 1) { |
| printk(BIOS_ERR, "Unsupported address length %d\n", alen); |
| return -1; |
| } |
| if (is_read) { |
| read_len = len; |
| write_len = alen; |
| p->num_msgs = 2; |
| } else { |
| read_len = 0; |
| write_len = alen + len; |
| p->num_msgs = 1; |
| } |
| |
| size = sizeof(*p) + p->num_msgs * sizeof(*msg); |
| if (size + write_len > sizeof(params)) { |
| printk(BIOS_ERR, "Params too large for buffer\n"); |
| return -1; |
| } |
| if (sizeof(*r) + read_len > sizeof(response)) { |
| printk(BIOS_ERR, "Read length too big for buffer\n"); |
| return -1; |
| } |
| |
| /* Create a message to write the register address and optional data */ |
| pdata = (uint8_t *)p + size; |
| msg->addr_flags = chip; |
| msg->len = write_len; |
| pdata[0] = addr; |
| if (!is_read) |
| memcpy(pdata + 1, buffer, len); |
| msg++; |
| |
| if (read_len) { |
| msg->addr_flags = chip | EC_I2C_FLAG_READ; |
| msg->len = read_len; |
| } |
| |
| cmd.cmd_code = EC_CMD_I2C_PASSTHRU; |
| cmd.cmd_version = 0; |
| cmd.cmd_data_in = p; |
| cmd.cmd_size_in = size + write_len; |
| cmd.cmd_data_out = r; |
| cmd.cmd_size_out = sizeof(*r) + read_len; |
| cmd.cmd_dev_index = 0; |
| rv = google_chromeec_command(&cmd); |
| if (rv != 0) |
| return rv; |
| |
| /* Parse response */ |
| if (r->i2c_status & EC_I2C_STATUS_ERROR) { |
| printk(BIOS_ERR, "Transfer failed with status=0x%x\n", |
| r->i2c_status); |
| return -1; |
| } |
| |
| if (cmd.cmd_size_out < sizeof(*r) + read_len) { |
| printk(BIOS_ERR, "Truncated read response\n"); |
| return -1; |
| } |
| |
| if (read_len) |
| memcpy(buffer, r->data, read_len); |
| |
| return 0; |
| } |
| |
| int google_chromeec_set_sci_mask(uint64_t mask) |
| { |
| printk(BIOS_DEBUG, "Chrome EC: Set SCI mask to 0x%016llx\n", mask); |
| return google_chromeec_set_mask(EC_HOST_EVENT_SCI_MASK, mask); |
| } |
| |
| int google_chromeec_set_smi_mask(uint64_t mask) |
| { |
| printk(BIOS_DEBUG, "Chrome EC: Set SMI mask to 0x%016llx\n", mask); |
| return google_chromeec_set_mask(EC_HOST_EVENT_SMI_MASK, mask); |
| } |
| |
| int google_chromeec_set_wake_mask(uint64_t mask) |
| { |
| printk(BIOS_DEBUG, "Chrome EC: Set WAKE mask to 0x%016llx\n", mask); |
| return google_chromeec_set_mask |
| (EC_HOST_EVENT_ACTIVE_WAKE_MASK, mask); |
| } |
| |
| uint64_t google_chromeec_get_wake_mask(void) |
| { |
| return google_chromeec_get_mask(EC_HOST_EVENT_ACTIVE_WAKE_MASK); |
| } |
| |
| int google_chromeec_set_usb_charge_mode(u8 port_id, enum usb_charge_mode mode) |
| { |
| struct chromeec_command cmd; |
| struct ec_params_usb_charge_set_mode set_mode = { |
| .usb_port_id = port_id, |
| .mode = mode, |
| }; |
| |
| cmd.cmd_code = EC_CMD_USB_CHARGE_SET_MODE; |
| cmd.cmd_version = 0; |
| cmd.cmd_size_in = sizeof(set_mode); |
| cmd.cmd_data_in = &set_mode; |
| cmd.cmd_size_out = 0; |
| cmd.cmd_data_out = NULL; |
| cmd.cmd_dev_index = 0; |
| |
| return google_chromeec_command(&cmd); |
| } |
| |
| /* Get charger power info in Watts. Also returns type of charger */ |
| int google_chromeec_get_usb_pd_power_info(enum usb_chg_type *type, |
| u32 *max_watts) |
| { |
| struct ec_params_usb_pd_power_info req = { |
| .port = PD_POWER_CHARGING_PORT, |
| }; |
| struct ec_response_usb_pd_power_info rsp; |
| struct chromeec_command cmd = { |
| .cmd_code = EC_CMD_USB_PD_POWER_INFO, |
| .cmd_version = 0, |
| .cmd_data_in = &req, |
| .cmd_size_in = sizeof(req), |
| .cmd_data_out = &rsp, |
| .cmd_size_out = sizeof(rsp), |
| .cmd_dev_index = 0, |
| }; |
| struct usb_chg_measures m; |
| int rv = google_chromeec_command(&cmd); |
| if (rv != 0) |
| return rv; |
| /* values are given in milliAmps and milliVolts */ |
| *type = rsp.type; |
| m = rsp.meas; |
| *max_watts = (m.current_max * m.voltage_max) / 1000000; |
| |
| return 0; |
| } |
| |
| int google_chromeec_override_dedicated_charger_limit(u16 current_lim, |
| u16 voltage_lim) |
| { |
| struct ec_params_dedicated_charger_limit p = { |
| .current_lim = current_lim, |
| .voltage_lim = voltage_lim, |
| }; |
| struct chromeec_command cmd = { |
| .cmd_code = EC_CMD_OVERRIDE_DEDICATED_CHARGER_LIMIT, |
| .cmd_version = 0, |
| .cmd_data_in = &p, |
| .cmd_size_in = sizeof(p), |
| .cmd_data_out = NULL, |
| .cmd_size_out = 0, |
| .cmd_dev_index = 0, |
| }; |
| |
| return google_chromeec_command(&cmd); |
| } |
| |
| int google_chromeec_set_usb_pd_role(u8 port, enum usb_pd_control_role role) |
| { |
| struct ec_params_usb_pd_control req = { |
| .port = port, |
| .role = role, |
| .mux = USB_PD_CTRL_MUX_NO_CHANGE, |
| .swap = USB_PD_CTRL_SWAP_NONE, |
| }; |
| struct ec_response_usb_pd_control rsp; |
| struct chromeec_command cmd = { |
| .cmd_code = EC_CMD_USB_PD_CONTROL, |
| .cmd_version = 0, |
| .cmd_data_in = &req, |
| .cmd_size_in = sizeof(req), |
| .cmd_data_out = &rsp, |
| .cmd_size_out = sizeof(rsp), |
| .cmd_dev_index = 0, |
| }; |
| |
| return google_chromeec_command(&cmd); |
| } |
| |
| static int google_chromeec_hello(void) |
| { |
| struct chromeec_command cec_cmd; |
| struct ec_params_hello cmd_hello; |
| struct ec_response_hello rsp_hello; |
| cmd_hello.in_data = 0x10203040; |
| cec_cmd.cmd_code = EC_CMD_HELLO; |
| cec_cmd.cmd_version = 0; |
| cec_cmd.cmd_data_in = &cmd_hello.in_data; |
| cec_cmd.cmd_data_out = &rsp_hello.out_data; |
| cec_cmd.cmd_size_in = sizeof(cmd_hello.in_data); |
| cec_cmd.cmd_size_out = sizeof(rsp_hello.out_data); |
| cec_cmd.cmd_dev_index = 0; |
| google_chromeec_command(&cec_cmd); |
| printk(BIOS_DEBUG, "Google Chrome EC: Hello got back %x status (%x)\n", |
| rsp_hello.out_data, cec_cmd.cmd_code); |
| return cec_cmd.cmd_code; |
| } |
| |
| /* |
| * Convert a reset cause ID to human-readable string, providing total coverage |
| * of the 'cause' space. The returned string points to static storage and must |
| * not be free()ed. |
| */ |
| static const char *reset_cause_to_str(uint16_t cause) |
| { |
| /* See also ChromiumOS EC include/chipset.h for details. */ |
| static const char * const reset_causes[] = { |
| "(reset unknown)", |
| "reset: board custom", |
| "reset: ap hang detected", |
| "reset: console command", |
| "reset: keyboard sysreset", |
| "reset: keyboard warm reboot", |
| "reset: debug warm reboot", |
| "reset: at AP's request", |
| "reset: during EC initialization", |
| }; |
| |
| static const size_t shutdown_cause_begin = 1 << 15; |
| static const char * const shutdown_causes[] = { |
| "shutdown: power failure", |
| "shutdown: during EC initialization", |
| "shutdown: board custom", |
| "shutdown: battery voltage startup inhibit", |
| "shutdown: power wait asserted", |
| "shutdown: critical battery", |
| "shutdown: by console command", |
| "shutdown: entering G3", |
| "shutdown: thermal", |
| "shutdown: power button", |
| }; |
| |
| if (cause < ARRAY_SIZE(reset_causes)) |
| return reset_causes[cause]; |
| |
| if (cause < shutdown_cause_begin) |
| return "(reset unknown)"; |
| |
| if (cause < shutdown_cause_begin + ARRAY_SIZE(shutdown_causes)) |
| return shutdown_causes[cause - shutdown_cause_begin]; |
| |
| return "(shutdown unknown)"; |
| } |
| |
| /* |
| * Copy the EC's information about resets of the AP and its own uptime for |
| * debugging purposes. |
| */ |
| static void google_chromeec_log_uptimeinfo(void) |
| { |
| /* See also ec_commands.h EC_RESET_FLAG_* for details. */ |
| static const char * const reset_flag_strings[] = { |
| "other", |
| "reset-pin", |
| "brownout", |
| "power-on", |
| "watchdog", |
| "soft", |
| "hibernate", |
| "rtc-alarm", |
| "wake-pin", |
| "low-battery", |
| "sysjump", |
| "hard", |
| "ap-off", |
| "preserved", |
| "usb-resume", |
| "rdd", |
| "rbox", |
| "security" |
| }; |
| struct ec_response_uptime_info cmd_resp; |
| int i, flag, flag_count; |
| |
| struct chromeec_command get_uptime_cmd = { |
| .cmd_code = EC_CMD_GET_UPTIME_INFO, |
| .cmd_version = 0, |
| .cmd_data_in = NULL, |
| .cmd_size_in = 0, |
| .cmd_data_out = &cmd_resp, |
| .cmd_size_out = sizeof(cmd_resp), |
| .cmd_dev_index = 0, |
| }; |
| google_chromeec_command(&get_uptime_cmd); |
| if (get_uptime_cmd.cmd_code) { |
| /* |
| * Deliberately say nothing for EC's that don't support this |
| * command |
| */ |
| return; |
| } |
| |
| printk(BIOS_DEBUG, "Google Chrome EC uptime: %d.%03d seconds\n", |
| cmd_resp.time_since_ec_boot_ms / MSECS_PER_SEC, |
| cmd_resp.time_since_ec_boot_ms % MSECS_PER_SEC); |
| |
| printk(BIOS_DEBUG, "Google Chrome AP resets since EC boot: %d\n", |
| cmd_resp.ap_resets_since_ec_boot); |
| |
| printk(BIOS_DEBUG, "Google Chrome most recent AP reset causes:\n"); |
| for (i = 0; i != ARRAY_SIZE(cmd_resp.recent_ap_reset); ++i) { |
| if (cmd_resp.recent_ap_reset[i].reset_time_ms == 0) |
| continue; |
| |
| printk(BIOS_DEBUG, "\t%d.%03d: %d %s\n", |
| cmd_resp.recent_ap_reset[i].reset_time_ms / |
| MSECS_PER_SEC, |
| cmd_resp.recent_ap_reset[i].reset_time_ms % |
| MSECS_PER_SEC, |
| cmd_resp.recent_ap_reset[i].reset_cause, |
| reset_cause_to_str( |
| cmd_resp.recent_ap_reset[i].reset_cause)); |
| } |
| |
| printk(BIOS_DEBUG, "Google Chrome EC reset flags at last EC boot: "); |
| flag_count = 0; |
| for (flag = 0; flag != ARRAY_SIZE(reset_flag_strings); ++flag) { |
| if ((cmd_resp.ec_reset_flags & (1 << flag)) != 0) { |
| if (flag_count) |
| printk(BIOS_DEBUG, " | "); |
| printk(BIOS_DEBUG, reset_flag_strings[flag]); |
| flag_count++; |
| } |
| } |
| printk(BIOS_DEBUG, "\n"); |
| } |
| |
| static int ec_image_type; /* Cached EC image type (ro or rw). */ |
| |
| void google_chromeec_init(void) |
| { |
| struct chromeec_command cec_cmd; |
| struct ec_response_get_version cec_resp = {{0}}; |
| |
| google_chromeec_hello(); |
| |
| cec_cmd.cmd_code = EC_CMD_GET_VERSION; |
| cec_cmd.cmd_version = 0; |
| cec_cmd.cmd_data_out = &cec_resp; |
| cec_cmd.cmd_size_in = 0; |
| cec_cmd.cmd_size_out = sizeof(cec_resp); |
| cec_cmd.cmd_dev_index = 0; |
| google_chromeec_command(&cec_cmd); |
| |
| if (cec_cmd.cmd_code) { |
| printk(BIOS_DEBUG, |
| "Google Chrome EC: version command failed!\n"); |
| } else { |
| printk(BIOS_DEBUG, "Google Chrome EC: version:\n"); |
| printk(BIOS_DEBUG, " ro: %s\n", cec_resp.version_string_ro); |
| printk(BIOS_DEBUG, " rw: %s\n", cec_resp.version_string_rw); |
| printk(BIOS_DEBUG, " running image: %d\n", |
| cec_resp.current_image); |
| ec_image_type = cec_resp.current_image; |
| } |
| |
| google_chromeec_log_uptimeinfo(); |
| } |
| |
| int google_ec_running_ro(void) |
| { |
| return (ec_image_type == EC_IMAGE_RO); |
| } |
| |
| /** |
| * Check if EC/TCPM is in an alternate mode or not. |
| * |
| * @param svid SVID of the alternate mode to check |
| * @return 0: Not in the mode. -1: Error. 1: Yes. |
| */ |
| int google_chromeec_pd_get_amode(uint16_t svid) |
| { |
| struct ec_response_usb_pd_ports r; |
| struct chromeec_command cmd; |
| int i; |
| |
| cmd.cmd_code = EC_CMD_USB_PD_PORTS; |
| cmd.cmd_version = 0; |
| cmd.cmd_data_in = NULL; |
| cmd.cmd_size_in = 0; |
| cmd.cmd_data_out = &r; |
| cmd.cmd_size_out = sizeof(r); |
| cmd.cmd_dev_index = 0; |
| if (google_chromeec_command(&cmd) < 0) |
| return -1; |
| |
| for (i = 0; i < r.num_ports; i++) { |
| struct ec_params_usb_pd_get_mode_request p; |
| struct ec_params_usb_pd_get_mode_response res; |
| int svid_idx = 0; |
| |
| do { |
| /* Reset cmd in each iteration in case |
| google_chromeec_command changes it. */ |
| p.port = i; |
| p.svid_idx = svid_idx; |
| cmd.cmd_code = EC_CMD_USB_PD_GET_AMODE; |
| cmd.cmd_version = 0; |
| cmd.cmd_data_in = &p; |
| cmd.cmd_size_in = sizeof(p); |
| cmd.cmd_data_out = &res; |
| cmd.cmd_size_out = sizeof(res); |
| cmd.cmd_dev_index = 0; |
| |
| if (google_chromeec_command(&cmd) < 0) |
| return -1; |
| if (res.svid == svid) |
| return 1; |
| svid_idx++; |
| } while (res.svid); |
| } |
| |
| return 0; |
| } |
| |
| |
| #define USB_SID_DISPLAYPORT 0xff01 |
| |
| /** |
| * Wait for DisplayPort to be ready |
| * |
| * @param timeout Wait aborts after <timeout> ms. |
| * @return 1: Success or 0: Timeout. |
| */ |
| int google_chromeec_wait_for_displayport(long timeout) |
| { |
| struct stopwatch sw; |
| |
| printk(BIOS_INFO, "Waiting for DisplayPort\n"); |
| stopwatch_init_msecs_expire(&sw, timeout); |
| while (google_chromeec_pd_get_amode(USB_SID_DISPLAYPORT) != 1) { |
| if (stopwatch_expired(&sw)) { |
| printk(BIOS_WARNING, |
| "DisplayPort not ready after %ldms. Abort.\n", |
| timeout); |
| return 0; |
| } |
| mdelay(200); |
| } |
| printk(BIOS_INFO, "DisplayPort ready after %lu ms\n", |
| stopwatch_duration_msecs(&sw)); |
| |
| return 1; |
| } |