blob: 0b2303410156ffd136bbdaf67dd23feb51d5bf8b [file] [log] [blame]
/*
* This file is part of the coreboot project.
*
* Copyright (C) 2012 The Chromium OS Authors. All rights reserved.
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; version 2 of the License
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*/
#include <stdint.h>
#include <string.h>
#include <cbmem.h>
#include <console/console.h>
#include <assert.h>
#include <bootmode.h>
#include <bootstate.h>
#include <delay.h>
#include <elog.h>
#include <rtc.h>
#include <stdlib.h>
#include <security/vboot/vboot_common.h>
#include <timer.h>
#include "chip.h"
#include "ec.h"
#include "ec_commands.h"
#define INVALID_HCMD 0xFF
/*
* Map UHEPI masks to non UHEPI commands in order to support old EC FW
* which does not support UHEPI command.
*/
static const struct {
uint8_t set_cmd;
uint8_t clear_cmd;
uint8_t get_cmd;
} event_map[] = {
[EC_HOST_EVENT_MAIN] = {
INVALID_HCMD, EC_CMD_HOST_EVENT_CLEAR,
INVALID_HCMD,
},
[EC_HOST_EVENT_B] = {
INVALID_HCMD, EC_CMD_HOST_EVENT_CLEAR_B,
EC_CMD_HOST_EVENT_GET_B,
},
[EC_HOST_EVENT_SCI_MASK] = {
EC_CMD_HOST_EVENT_SET_SCI_MASK, INVALID_HCMD,
EC_CMD_HOST_EVENT_GET_SCI_MASK,
},
[EC_HOST_EVENT_SMI_MASK] = {
EC_CMD_HOST_EVENT_SET_SMI_MASK, INVALID_HCMD,
EC_CMD_HOST_EVENT_GET_SMI_MASK,
},
[EC_HOST_EVENT_ALWAYS_REPORT_MASK] = {
INVALID_HCMD, INVALID_HCMD, INVALID_HCMD,
},
[EC_HOST_EVENT_ACTIVE_WAKE_MASK] = {
EC_CMD_HOST_EVENT_SET_WAKE_MASK, INVALID_HCMD,
EC_CMD_HOST_EVENT_GET_WAKE_MASK,
},
[EC_HOST_EVENT_LAZY_WAKE_MASK_S0IX] = {
EC_CMD_HOST_EVENT_SET_WAKE_MASK, INVALID_HCMD,
EC_CMD_HOST_EVENT_GET_WAKE_MASK,
},
[EC_HOST_EVENT_LAZY_WAKE_MASK_S3] = {
EC_CMD_HOST_EVENT_SET_WAKE_MASK, INVALID_HCMD,
EC_CMD_HOST_EVENT_GET_WAKE_MASK,
},
[EC_HOST_EVENT_LAZY_WAKE_MASK_S5] = {
EC_CMD_HOST_EVENT_SET_WAKE_MASK, INVALID_HCMD,
EC_CMD_HOST_EVENT_GET_WAKE_MASK,
},
};
void log_recovery_mode_switch(void)
{
uint64_t *events;
if (cbmem_find(CBMEM_ID_EC_HOSTEVENT))
return;
events = cbmem_add(CBMEM_ID_EC_HOSTEVENT, sizeof(*events));
if (!events)
return;
*events = google_chromeec_get_events_b();
}
static void google_chromeec_elog_add_recovery_event(void *unused)
{
uint64_t *events = cbmem_find(CBMEM_ID_EC_HOSTEVENT);
uint8_t event_byte = EC_HOST_EVENT_KEYBOARD_RECOVERY;
if (!events)
return;
if (!(*events & EC_HOST_EVENT_MASK(EC_HOST_EVENT_KEYBOARD_RECOVERY)))
return;
if (*events &
EC_HOST_EVENT_MASK(EC_HOST_EVENT_KEYBOARD_RECOVERY_HW_REINIT))
event_byte = EC_HOST_EVENT_KEYBOARD_RECOVERY_HW_REINIT;
elog_add_event_byte(ELOG_TYPE_EC_EVENT, event_byte);
}
BOOT_STATE_INIT_ENTRY(BS_WRITE_TABLES, BS_ON_ENTRY,
google_chromeec_elog_add_recovery_event, NULL);
uint8_t google_chromeec_calc_checksum(const uint8_t *data, int size)
{
int csum;
for (csum = 0; size > 0; data++, size--)
csum += *data;
return (uint8_t)(csum & 0xff);
}
int google_chromeec_kbbacklight(int percent)
{
struct ec_params_pwm_set_keyboard_backlight params = {
.percent = percent % 101,
};
struct ec_response_pwm_get_keyboard_backlight resp = {};
struct chromeec_command cmd = {
.cmd_code = EC_CMD_PWM_SET_KEYBOARD_BACKLIGHT,
.cmd_version = 0,
.cmd_data_in = &params,
.cmd_data_out = &resp,
.cmd_size_in = sizeof(params),
.cmd_size_out = sizeof(resp),
.cmd_dev_index = 0,
};
google_chromeec_command(&cmd);
printk(BIOS_DEBUG, "Google Chrome set keyboard backlight: %x status (%x)\n",
resp.percent, cmd.cmd_code);
return cmd.cmd_code;
}
void google_chromeec_post(uint8_t postcode)
{
/* backlight is a percent. postcode is a uint8_t.
* Convert the uint8_t to %.
*/
postcode = (postcode/4) + (postcode/8);
google_chromeec_kbbacklight(postcode);
}
/*
* Query the EC for specified mask indicating enabled events.
* The EC maintains separate event masks for SMI, SCI and WAKE.
*/
static int google_chromeec_uhepi_cmd(uint8_t mask, uint8_t action,
uint64_t *value)
{
int ret;
struct ec_params_host_event params = {
.action = action,
.mask_type = mask,
};
struct ec_response_host_event resp = {};
struct chromeec_command cmd = {
.cmd_code = EC_CMD_HOST_EVENT,
.cmd_version = 0,
.cmd_data_in = &params,
.cmd_size_in = sizeof(params),
.cmd_data_out = &resp,
.cmd_size_out = sizeof(resp),
.cmd_dev_index = 0,
};
if (action != EC_HOST_EVENT_GET)
params.value = *value;
else
*value = 0;
ret = google_chromeec_command(&cmd);
if (action != EC_HOST_EVENT_GET)
return ret;
if (ret == 0)
*value = resp.value;
return ret;
}
static int google_chromeec_handle_non_uhepi_cmd(uint8_t hcmd, uint8_t action,
uint64_t *value)
{
int ret = -1;
struct ec_params_host_event_mask params = {};
struct ec_response_host_event_mask resp = {};
struct chromeec_command cmd = {
.cmd_code = hcmd,
.cmd_version = 0,
.cmd_data_in = &params,
.cmd_size_in = sizeof(params),
.cmd_data_out = &resp,
.cmd_size_out = sizeof(resp),
.cmd_dev_index = 0,
};
if (hcmd == INVALID_HCMD)
return ret;
if (action != EC_HOST_EVENT_GET)
params.mask = (uint32_t)*value;
else
*value = 0;
ret = google_chromeec_command(&cmd);
if (action != EC_HOST_EVENT_GET)
return ret;
if (ret == 0)
*value = resp.mask;
return ret;
}
bool google_chromeec_is_uhepi_supported(void)
{
#define UHEPI_SUPPORTED 1
#define UHEPI_NOT_SUPPORTED 2
static int uhepi_support;
if (!uhepi_support) {
uhepi_support = google_chromeec_check_feature
(EC_FEATURE_UNIFIED_WAKE_MASKS) > 0 ? UHEPI_SUPPORTED :
UHEPI_NOT_SUPPORTED;
printk(BIOS_DEBUG, "Chrome EC: UHEPI %s\n",
uhepi_support == UHEPI_SUPPORTED ?
"supported" : "not supported");
}
return uhepi_support == UHEPI_SUPPORTED;
}
static uint64_t google_chromeec_get_mask(uint8_t type)
{
uint64_t value = 0;
if (google_chromeec_is_uhepi_supported()) {
google_chromeec_uhepi_cmd(type, EC_HOST_EVENT_GET, &value);
} else {
assert(type < ARRAY_SIZE(event_map));
google_chromeec_handle_non_uhepi_cmd(
event_map[type].get_cmd,
EC_HOST_EVENT_GET, &value);
}
return value;
}
static int google_chromeec_clear_mask(uint8_t type, uint64_t mask)
{
if (google_chromeec_is_uhepi_supported())
return google_chromeec_uhepi_cmd(type,
EC_HOST_EVENT_CLEAR, &mask);
assert(type < ARRAY_SIZE(event_map));
return google_chromeec_handle_non_uhepi_cmd(
event_map[type].clear_cmd,
EC_HOST_EVENT_CLEAR, &mask);
}
static int __unused google_chromeec_set_mask(uint8_t type, uint64_t mask)
{
if (google_chromeec_is_uhepi_supported())
return google_chromeec_uhepi_cmd(type,
EC_HOST_EVENT_SET, &mask);
assert(type < ARRAY_SIZE(event_map));
return google_chromeec_handle_non_uhepi_cmd(
event_map[type].set_cmd,
EC_HOST_EVENT_SET, &mask);
}
static int google_chromeec_set_s3_lazy_wake_mask(uint64_t mask)
{
printk(BIOS_DEBUG, "Chrome EC: Set S3 LAZY WAKE mask to 0x%016llx\n",
mask);
return google_chromeec_set_mask
(EC_HOST_EVENT_LAZY_WAKE_MASK_S3, mask);
}
static int google_chromeec_set_s5_lazy_wake_mask(uint64_t mask)
{
printk(BIOS_DEBUG, "Chrome EC: Set S5 LAZY WAKE mask to 0x%016llx\n",
mask);
return google_chromeec_set_mask
(EC_HOST_EVENT_LAZY_WAKE_MASK_S5, mask);
}
static int google_chromeec_set_s0ix_lazy_wake_mask(uint64_t mask)
{
printk(BIOS_DEBUG, "Chrome EC: Set S0iX LAZY WAKE mask to 0x%016llx\n",
mask);
return google_chromeec_set_mask
(EC_HOST_EVENT_LAZY_WAKE_MASK_S0IX, mask);
}
static void google_chromeec_set_lazy_wake_masks(uint64_t s5_mask,
uint64_t s3_mask, uint64_t s0ix_mask)
{
if (google_chromeec_set_s5_lazy_wake_mask(s5_mask))
printk(BIOS_DEBUG, "Error: Set S5 LAZY WAKE mask failed\n");
if (google_chromeec_set_s3_lazy_wake_mask(s3_mask))
printk(BIOS_DEBUG, "Error: Set S3 LAZY WAKE mask failed\n");
/*
* Make sure S0Ix is supported before trying to set up the EC's
* S0Ix lazy wake mask.
*/
if (s0ix_mask && google_chromeec_set_s0ix_lazy_wake_mask(s0ix_mask))
printk(BIOS_DEBUG, "Error: Set S0iX LAZY WAKE mask failed\n");
}
uint64_t google_chromeec_get_events_b(void)
{
return google_chromeec_get_mask(EC_HOST_EVENT_B);
}
int google_chromeec_clear_events_b(uint64_t mask)
{
printk(BIOS_DEBUG,
"Chrome EC: clear events_b mask to 0x%016llx\n", mask);
return google_chromeec_clear_mask(EC_HOST_EVENT_B, mask);
}
int google_chromeec_get_mkbp_event(struct ec_response_get_next_event *event)
{
struct chromeec_command cmd = {
.cmd_code = EC_CMD_GET_NEXT_EVENT,
.cmd_version = 0,
.cmd_data_in = NULL,
.cmd_size_in = 0,
.cmd_data_out = event,
.cmd_size_out = sizeof(*event),
.cmd_dev_index = 0,
};
return google_chromeec_command(&cmd);
}
/* Get the current device event mask */
uint64_t google_chromeec_get_device_enabled_events(void)
{
struct ec_params_device_event params = {
.param = EC_DEVICE_EVENT_PARAM_GET_ENABLED_EVENTS,
};
struct ec_response_device_event resp = {};
struct chromeec_command cmd = {
.cmd_code = EC_CMD_DEVICE_EVENT,
.cmd_version = 0,
.cmd_data_in = &params,
.cmd_size_in = sizeof(params),
.cmd_data_out = &resp,
.cmd_size_out = sizeof(resp),
.cmd_dev_index = 0,
};
if (google_chromeec_command(&cmd) == 0)
return resp.event_mask;
return 0;
}
/* Set the current device event mask */
int google_chromeec_set_device_enabled_events(uint64_t mask)
{
struct ec_params_device_event params = {
.event_mask = (uint32_t)mask,
.param = EC_DEVICE_EVENT_PARAM_SET_ENABLED_EVENTS,
};
struct ec_response_device_event resp = {};
struct chromeec_command cmd = {
.cmd_code = EC_CMD_DEVICE_EVENT,
.cmd_version = 0,
.cmd_data_in = &params,
.cmd_size_in = sizeof(params),
.cmd_data_out = &resp,
.cmd_size_out = sizeof(resp),
.cmd_dev_index = 0,
};
return google_chromeec_command(&cmd);
}
/* Read and clear pending device events */
uint64_t google_chromeec_get_device_current_events(void)
{
struct ec_params_device_event params = {
.param = EC_DEVICE_EVENT_PARAM_GET_CURRENT_EVENTS,
};
struct ec_response_device_event resp = {};
struct chromeec_command cmd = {
.cmd_code = EC_CMD_DEVICE_EVENT,
.cmd_version = 0,
.cmd_data_in = &params,
.cmd_size_in = sizeof(params),
.cmd_data_out = &resp,
.cmd_size_out = sizeof(resp),
.cmd_dev_index = 0,
};
if (google_chromeec_command(&cmd) == 0)
return resp.event_mask;
return 0;
}
static void google_chromeec_log_device_events(uint64_t mask)
{
uint64_t events;
int i;
if (!CONFIG(ELOG) || !mask)
return;
if (google_chromeec_check_feature(EC_FEATURE_DEVICE_EVENT) != 1)
return;
events = google_chromeec_get_device_current_events() & mask;
printk(BIOS_INFO, "EC Device Events: 0x%016llx\n", events);
for (i = 0; i < sizeof(events) * 8; i++) {
if (EC_DEVICE_EVENT_MASK(i) & events)
elog_add_event_byte(ELOG_TYPE_EC_DEVICE_EVENT, i);
}
}
void google_chromeec_log_events(uint64_t mask)
{
uint64_t events;
int i;
if (!CONFIG(ELOG))
return;
events = google_chromeec_get_events_b() & mask;
for (i = 0; i < sizeof(events) * 8; i++) {
if (EC_HOST_EVENT_MASK(i) & events)
elog_add_event_byte(ELOG_TYPE_EC_EVENT, i);
}
google_chromeec_clear_events_b(events);
}
void google_chromeec_events_init(const struct google_chromeec_event_info *info,
bool is_s3_wakeup)
{
if (is_s3_wakeup) {
google_chromeec_log_events(info->log_events |
info->s3_wake_events);
/* Log and clear device events that may wake the system. */
google_chromeec_log_device_events(info->s3_device_events);
/* Disable SMI and wake events. */
google_chromeec_set_smi_mask(0);
/* Restore SCI event mask. */
google_chromeec_set_sci_mask(info->sci_events);
} else {
google_chromeec_set_smi_mask(info->smi_events);
google_chromeec_log_events(info->log_events |
info->s5_wake_events);
if (google_chromeec_is_uhepi_supported())
google_chromeec_set_lazy_wake_masks
(info->s5_wake_events,
info->s3_wake_events,
info->s0ix_wake_events);
}
/* Clear wake event mask. */
google_chromeec_set_wake_mask(0);
}
int google_chromeec_check_feature(int feature)
{
struct ec_response_get_features resp = {};
struct chromeec_command cmd = {
.cmd_code = EC_CMD_GET_FEATURES,
.cmd_version = 0,
.cmd_size_in = 0,
.cmd_data_out = &resp,
.cmd_size_out = sizeof(resp),
.cmd_dev_index = 0,
};
if (google_chromeec_command(&cmd) != 0)
return -1;
if (feature >= 8 * sizeof(resp.flags))
return -1;
return resp.flags[feature / 32] & EC_FEATURE_MASK_0(feature);
}
int google_chromeec_get_cmd_versions(int command, uint32_t *pmask)
{
struct ec_params_get_cmd_versions_v1 params = {
.cmd = command,
};
struct ec_response_get_cmd_versions resp = {};
struct chromeec_command cmd = {
.cmd_code = EC_CMD_GET_CMD_VERSIONS,
.cmd_version = 1,
.cmd_size_in = sizeof(params),
.cmd_data_in = &params,
.cmd_size_out = sizeof(resp),
.cmd_data_out = &resp,
.cmd_dev_index = 0,
};
if (google_chromeec_command(&cmd) != 0)
return -1;
*pmask = resp.version_mask;
return 0;
}
int google_chromeec_get_vboot_hash(uint32_t offset,
struct ec_response_vboot_hash *resp)
{
struct ec_params_vboot_hash params = {
.cmd = EC_VBOOT_HASH_GET,
.offset = offset,
};
struct chromeec_command cmd = {
.cmd_code = EC_CMD_VBOOT_HASH,
.cmd_version = 0,
.cmd_size_in = sizeof(params),
.cmd_data_in = &params,
.cmd_size_out = sizeof(*resp),
.cmd_data_out = resp,
.cmd_dev_index = 0,
};
if (google_chromeec_command(&cmd) != 0)
return -1;
return 0;
}
int google_chromeec_start_vboot_hash(enum ec_vboot_hash_type hash_type,
uint32_t hash_offset,
struct ec_response_vboot_hash *resp)
{
struct ec_params_vboot_hash params = {
.cmd = EC_VBOOT_HASH_START,
.hash_type = hash_type,
.nonce_size = 0,
.offset = hash_offset,
};
struct chromeec_command cmd = {
.cmd_code = EC_CMD_VBOOT_HASH,
.cmd_version = 0,
.cmd_size_in = sizeof(params),
.cmd_data_in = &params,
.cmd_size_out = sizeof(*resp),
.cmd_data_out = resp,
.cmd_dev_index = 0,
};
if (google_chromeec_command(&cmd) != 0)
return -1;
return 0;
}
int google_chromeec_flash_protect(uint32_t mask, uint32_t flags,
struct ec_response_flash_protect *resp)
{
struct ec_params_flash_protect params = {
.mask = mask,
.flags = flags,
};
struct chromeec_command cmd = {
.cmd_code = EC_CMD_FLASH_PROTECT,
.cmd_version = EC_VER_FLASH_PROTECT,
.cmd_size_in = sizeof(params),
.cmd_data_in = &params,
.cmd_size_out = sizeof(*resp),
.cmd_data_out = resp,
.cmd_dev_index = 0,
};
if (google_chromeec_command(&cmd) != 0)
return -1;
return 0;
}
int google_chromeec_flash_region_info(enum ec_flash_region region,
uint32_t *offset, uint32_t *size)
{
struct ec_params_flash_region_info params = {
.region = region,
};
struct ec_response_flash_region_info resp = {};
struct chromeec_command cmd = {
.cmd_code = EC_CMD_FLASH_REGION_INFO,
.cmd_version = EC_VER_FLASH_REGION_INFO,
.cmd_size_in = sizeof(params),
.cmd_data_in = &params,
.cmd_size_out = sizeof(resp),
.cmd_data_out = &resp,
.cmd_dev_index = 0,
};
if (google_chromeec_command(&cmd) != 0)
return -1;
if (offset)
*offset = resp.offset;
if (size)
*size = resp.size;
return 0;
}
int google_chromeec_flash_erase(uint32_t offset, uint32_t size)
{
struct ec_params_flash_erase params = {
.offset = offset,
.size = size,
};
struct chromeec_command cmd = {
.cmd_code = EC_CMD_FLASH_ERASE,
.cmd_version = 0,
.cmd_size_in = sizeof(params),
.cmd_data_in = &params,
.cmd_size_out = 0,
.cmd_data_out = NULL,
.cmd_dev_index = 0,
};
if (google_chromeec_command(&cmd) != 0)
return -1;
return 0;
}
int google_chromeec_flash_info(struct ec_response_flash_info *info)
{
struct chromeec_command cmd;
cmd.cmd_code = EC_CMD_FLASH_INFO;
cmd.cmd_version = 0;
cmd.cmd_size_in = 0;
cmd.cmd_data_in = NULL;
cmd.cmd_size_out = sizeof(*info);
cmd.cmd_data_out = info;
cmd.cmd_dev_index = 0;
if (google_chromeec_command(&cmd) != 0)
return -1;
return 0;
}
/*
* Write a block into EC flash. Expects params_data to be a buffer where
* the first N bytes are a struct ec_params_flash_write, and the rest of it
* is the data to write to flash.
*/
int google_chromeec_flash_write_block(const uint8_t *params_data,
uint32_t bufsize)
{
struct chromeec_command cmd = {
.cmd_code = EC_CMD_FLASH_WRITE,
.cmd_version = EC_VER_FLASH_WRITE,
.cmd_size_out = 0,
.cmd_data_out = NULL,
.cmd_size_in = bufsize,
.cmd_data_in = params_data,
.cmd_dev_index = 0,
};
assert(params_data);
return google_chromeec_command(&cmd);
}
/*
* EFS verification of flash.
*/
int google_chromeec_efs_verify(enum ec_flash_region region)
{
struct ec_params_efs_verify params = {
.region = region,
};
struct chromeec_command cmd = {
.cmd_code = EC_CMD_EFS_VERIFY,
.cmd_version = 0,
.cmd_size_in = sizeof(params),
.cmd_data_in = &params,
.cmd_size_out = 0,
.cmd_data_out = NULL,
.cmd_dev_index = 0,
};
int rv;
/* It's okay if the EC doesn't support EFS */
rv = google_chromeec_command(&cmd);
if (rv != 0 && (cmd.cmd_code == EC_RES_INVALID_COMMAND))
return 0;
else if (rv != 0)
return -1;
return 0;
}
int google_chromeec_battery_cutoff(uint8_t flags)
{
struct ec_params_battery_cutoff params = {
.flags = flags,
};
struct chromeec_command cmd = {
.cmd_code = EC_CMD_BATTERY_CUT_OFF,
.cmd_version = 1,
.cmd_size_in = sizeof(params),
.cmd_data_in = &params,
.cmd_data_out = NULL,
.cmd_size_out = 0,
.cmd_dev_index = 0,
};
if (google_chromeec_command(&cmd) != 0)
return -1;
return 0;
}
int google_chromeec_read_limit_power_request(int *limit_power)
{
struct ec_params_charge_state params = {
.cmd = CHARGE_STATE_CMD_GET_PARAM,
.get_param.param = CS_PARAM_LIMIT_POWER,
};
struct ec_response_charge_state resp = {};
struct chromeec_command cmd = {
.cmd_code = EC_CMD_CHARGE_STATE,
.cmd_version = 0,
.cmd_size_in = sizeof(params),
.cmd_data_in = &params,
.cmd_size_out = sizeof(resp),
.cmd_data_out = &resp,
.cmd_dev_index = 0,
};
int rv;
rv = google_chromeec_command(&cmd);
if (rv != 0 && (cmd.cmd_code == EC_RES_INVALID_COMMAND ||
cmd.cmd_code == EC_RES_INVALID_PARAM)) {
printk(BIOS_INFO, "PARAM_LIMIT_POWER not supported by EC.\n");
*limit_power = 0;
return 0;
} else if (rv != 0) {
return -1;
}
*limit_power = resp.get_param.value;
return 0;
}
int google_chromeec_get_protocol_info(
struct ec_response_get_protocol_info *resp)
{
struct chromeec_command cmd = {
.cmd_code = EC_CMD_GET_PROTOCOL_INFO,
.cmd_version = 0,
.cmd_size_in = 0,
.cmd_data_in = NULL,
.cmd_data_out = resp,
.cmd_size_out = sizeof(*resp),
.cmd_dev_index = 0,
};
if (google_chromeec_command(&cmd))
return -1;
return 0;
}
int google_chromeec_set_sku_id(uint32_t skuid)
{
struct ec_sku_id_info params = {
.sku_id = skuid
};
struct chromeec_command cmd = {
.cmd_code = EC_CMD_SET_SKU_ID,
.cmd_version = 0,
.cmd_size_in = sizeof(params),
.cmd_data_in = &params,
.cmd_data_out = NULL,
.cmd_size_out = 0,
.cmd_dev_index = 0,
};
if (google_chromeec_command(&cmd) != 0)
return -1;
return 0;
}
#if CONFIG(EC_GOOGLE_CHROMEEC_RTC)
int rtc_get(struct rtc_time *time)
{
struct ec_response_rtc resp = {};
struct chromeec_command cmd = {
.cmd_code = EC_CMD_RTC_GET_VALUE,
.cmd_version = 0,
.cmd_size_in = 0,
.cmd_data_out = &resp,
.cmd_size_out = sizeof(resp),
.cmd_dev_index = 0,
};
if (google_chromeec_command(&cmd) != 0)
return -1;
return rtc_to_tm(resp.time, time);
}
#endif
int google_chromeec_reboot(int dev_idx, enum ec_reboot_cmd type, uint8_t flags)
{
struct ec_params_reboot_ec params = {
.cmd = type,
.flags = flags,
};
struct ec_response_get_version resp = {};
struct chromeec_command cmd = {
.cmd_code = EC_CMD_REBOOT_EC,
.cmd_version = 0,
.cmd_data_in = &params,
.cmd_data_out = &resp,
.cmd_size_in = sizeof(params),
.cmd_size_out = 0, /* ignore response, if any */
.cmd_dev_index = dev_idx,
};
return google_chromeec_command(&cmd);
}
static int cbi_get_uint32(uint32_t *id, uint32_t tag)
{
struct ec_params_get_cbi params = {
.tag = tag,
};
uint32_t r = 0;
struct chromeec_command cmd = {
.cmd_code = EC_CMD_GET_CROS_BOARD_INFO,
.cmd_version = 0,
.cmd_data_in = &params,
.cmd_data_out = &r,
.cmd_size_in = sizeof(params),
.cmd_size_out = sizeof(r),
.cmd_dev_index = 0,
};
int rv;
rv = google_chromeec_command(&cmd);
if (rv != 0)
return rv;
*id = r;
return 0;
}
int google_chromeec_cbi_get_sku_id(uint32_t *id)
{
return cbi_get_uint32(id, CBI_TAG_SKU_ID);
}
int google_chromeec_cbi_get_fw_config(uint32_t *fw_config)
{
return cbi_get_uint32(fw_config, CBI_TAG_FW_CONFIG);
}
int google_chromeec_cbi_get_oem_id(uint32_t *id)
{
return cbi_get_uint32(id, CBI_TAG_OEM_ID);
}
static int cbi_get_string(char *buf, size_t bufsize, uint32_t tag)
{
struct ec_params_get_cbi params = {
.tag = tag,
};
struct chromeec_command cmd = {
.cmd_code = EC_CMD_GET_CROS_BOARD_INFO,
.cmd_version = 0,
.cmd_data_in = &params,
.cmd_data_out = buf,
.cmd_size_in = sizeof(params),
.cmd_size_out = bufsize,
};
int rv;
rv = google_chromeec_command(&cmd);
if (rv != 0)
return rv;
/* Ensure NUL termination. */
buf[bufsize - 1] = '\0';
return 0;
}
int google_chromeec_cbi_get_dram_part_num(char *buf, size_t bufsize)
{
return cbi_get_string(buf, bufsize, CBI_TAG_DRAM_PART_NUM);
}
int google_chromeec_cbi_get_oem_name(char *buf, size_t bufsize)
{
return cbi_get_string(buf, bufsize, CBI_TAG_OEM_NAME);
}
int google_chromeec_get_board_version(uint32_t *version)
{
struct ec_response_board_version resp;
struct chromeec_command cmd = {
.cmd_code = EC_CMD_GET_BOARD_VERSION,
.cmd_version = 0,
.cmd_size_in = 0,
.cmd_size_out = sizeof(resp),
.cmd_data_out = &resp,
.cmd_dev_index = 0,
};
if (google_chromeec_command(&cmd))
return -1;
*version = resp.board_version;
return 0;
}
uint32_t google_chromeec_get_sku_id(void)
{
struct ec_sku_id_info resp;
struct chromeec_command cmd = {
.cmd_code = EC_CMD_GET_SKU_ID,
.cmd_version = 0,
.cmd_size_in = 0,
.cmd_size_out = sizeof(resp),
.cmd_data_out = &resp,
.cmd_dev_index = 0,
};
if (google_chromeec_command(&cmd) != 0)
return 0;
return resp.sku_id;
}
int google_chromeec_vbnv_context(int is_read, uint8_t *data, int len)
{
struct ec_params_vbnvcontext params = {
.op = is_read ? EC_VBNV_CONTEXT_OP_READ :
EC_VBNV_CONTEXT_OP_WRITE,
};
struct ec_response_vbnvcontext resp = {};
struct chromeec_command cmd = {
.cmd_code = EC_CMD_VBNV_CONTEXT,
.cmd_version = EC_VER_VBNV_CONTEXT,
.cmd_data_in = &params,
.cmd_data_out = &resp,
.cmd_size_in = sizeof(params),
.cmd_size_out = is_read ? sizeof(resp) : 0,
.cmd_dev_index = 0,
};
int retries = 3;
if (len != EC_VBNV_BLOCK_SIZE)
return -1;
if (!is_read)
memcpy(&params.block, data, EC_VBNV_BLOCK_SIZE);
retry:
if (google_chromeec_command(&cmd)) {
printk(BIOS_ERR, "ERROR: failed to %s vbnv_ec context: %d\n",
is_read ? "read" : "write", (int)cmd.cmd_code);
mdelay(10); /* just in case */
if (--retries)
goto retry;
}
if (is_read)
memcpy(data, &resp.block, EC_VBNV_BLOCK_SIZE);
return cmd.cmd_code;
}
static uint16_t google_chromeec_get_uptime_info(
struct ec_response_uptime_info *resp)
{
struct chromeec_command cmd = {
.cmd_code = EC_CMD_GET_UPTIME_INFO,
.cmd_version = 0,
.cmd_data_in = NULL,
.cmd_size_in = 0,
.cmd_data_out = resp,
.cmd_size_out = sizeof(*resp),
.cmd_dev_index = 0,
};
google_chromeec_command(&cmd);
return cmd.cmd_code;
}
bool google_chromeec_get_ap_watchdog_flag(void)
{
struct ec_response_uptime_info resp;
return (!google_chromeec_get_uptime_info(&resp) &&
(resp.ec_reset_flags & EC_RESET_FLAG_AP_WATCHDOG));
}
int google_chromeec_i2c_xfer(uint8_t chip, uint8_t addr, int alen,
uint8_t *buffer, int len, int is_read)
{
union {
struct ec_params_i2c_passthru p;
uint8_t outbuf[EC_HOST_PARAM_SIZE];
} params;
union {
struct ec_response_i2c_passthru r;
uint8_t inbuf[EC_HOST_PARAM_SIZE];
} response;
struct ec_params_i2c_passthru *p = &params.p;
struct ec_response_i2c_passthru *r = &response.r;
struct ec_params_i2c_passthru_msg *msg = p->msg;
struct chromeec_command cmd;
uint8_t *pdata;
int read_len, write_len;
int size;
int rv;
p->port = 0;
if (alen != 1) {
printk(BIOS_ERR, "Unsupported address length %d\n", alen);
return -1;
}
if (is_read) {
read_len = len;
write_len = alen;
p->num_msgs = 2;
} else {
read_len = 0;
write_len = alen + len;
p->num_msgs = 1;
}
size = sizeof(*p) + p->num_msgs * sizeof(*msg);
if (size + write_len > sizeof(params)) {
printk(BIOS_ERR, "Params too large for buffer\n");
return -1;
}
if (sizeof(*r) + read_len > sizeof(response)) {
printk(BIOS_ERR, "Read length too big for buffer\n");
return -1;
}
/* Create a message to write the register address and optional data */
pdata = (uint8_t *)p + size;
msg->addr_flags = chip;
msg->len = write_len;
pdata[0] = addr;
if (!is_read)
memcpy(pdata + 1, buffer, len);
msg++;
if (read_len) {
msg->addr_flags = chip | EC_I2C_FLAG_READ;
msg->len = read_len;
}
cmd.cmd_code = EC_CMD_I2C_PASSTHRU;
cmd.cmd_version = 0;
cmd.cmd_data_in = p;
cmd.cmd_size_in = size + write_len;
cmd.cmd_data_out = r;
cmd.cmd_size_out = sizeof(*r) + read_len;
cmd.cmd_dev_index = 0;
rv = google_chromeec_command(&cmd);
if (rv != 0)
return rv;
/* Parse response */
if (r->i2c_status & EC_I2C_STATUS_ERROR) {
printk(BIOS_ERR, "Transfer failed with status=0x%x\n",
r->i2c_status);
return -1;
}
if (cmd.cmd_size_out < sizeof(*r) + read_len) {
printk(BIOS_ERR, "Truncated read response\n");
return -1;
}
if (read_len)
memcpy(buffer, r->data, read_len);
return 0;
}
int google_chromeec_set_sci_mask(uint64_t mask)
{
printk(BIOS_DEBUG, "Chrome EC: Set SCI mask to 0x%016llx\n", mask);
return google_chromeec_set_mask(EC_HOST_EVENT_SCI_MASK, mask);
}
int google_chromeec_set_smi_mask(uint64_t mask)
{
printk(BIOS_DEBUG, "Chrome EC: Set SMI mask to 0x%016llx\n", mask);
return google_chromeec_set_mask(EC_HOST_EVENT_SMI_MASK, mask);
}
int google_chromeec_set_wake_mask(uint64_t mask)
{
printk(BIOS_DEBUG, "Chrome EC: Set WAKE mask to 0x%016llx\n", mask);
return google_chromeec_set_mask
(EC_HOST_EVENT_ACTIVE_WAKE_MASK, mask);
}
uint64_t google_chromeec_get_wake_mask(void)
{
return google_chromeec_get_mask(EC_HOST_EVENT_ACTIVE_WAKE_MASK);
}
int google_chromeec_set_usb_charge_mode(uint8_t port_id, enum usb_charge_mode mode)
{
struct ec_params_usb_charge_set_mode params = {
.usb_port_id = port_id,
.mode = mode,
};
struct chromeec_command cmd = {
.cmd_code = EC_CMD_USB_CHARGE_SET_MODE,
.cmd_version = 0,
.cmd_size_in = sizeof(params),
.cmd_data_in = &params,
.cmd_size_out = 0,
.cmd_data_out = NULL,
.cmd_dev_index = 0,
};
return google_chromeec_command(&cmd);
}
/* Get charger power info in Watts. Also returns type of charger */
int google_chromeec_get_usb_pd_power_info(enum usb_chg_type *type,
uint32_t *max_watts)
{
struct ec_params_usb_pd_power_info params = {
.port = PD_POWER_CHARGING_PORT,
};
struct ec_response_usb_pd_power_info resp = {};
struct chromeec_command cmd = {
.cmd_code = EC_CMD_USB_PD_POWER_INFO,
.cmd_version = 0,
.cmd_data_in = &params,
.cmd_size_in = sizeof(params),
.cmd_data_out = &resp,
.cmd_size_out = sizeof(resp),
.cmd_dev_index = 0,
};
struct usb_chg_measures m;
int rv;
rv = google_chromeec_command(&cmd);
if (rv != 0)
return rv;
/* values are given in milliAmps and milliVolts */
*type = resp.type;
m = resp.meas;
*max_watts = (m.current_max * m.voltage_max) / 1000000;
return 0;
}
int google_chromeec_override_dedicated_charger_limit(uint16_t current_lim,
uint16_t voltage_lim)
{
struct ec_params_dedicated_charger_limit params = {
.current_lim = current_lim,
.voltage_lim = voltage_lim,
};
struct chromeec_command cmd = {
.cmd_code = EC_CMD_OVERRIDE_DEDICATED_CHARGER_LIMIT,
.cmd_version = 0,
.cmd_data_in = &params,
.cmd_size_in = sizeof(params),
.cmd_data_out = NULL,
.cmd_size_out = 0,
.cmd_dev_index = 0,
};
return google_chromeec_command(&cmd);
}
int google_chromeec_set_usb_pd_role(uint8_t port, enum usb_pd_control_role role)
{
struct ec_params_usb_pd_control params = {
.port = port,
.role = role,
.mux = USB_PD_CTRL_MUX_NO_CHANGE,
.swap = USB_PD_CTRL_SWAP_NONE,
};
struct ec_response_usb_pd_control resp;
struct chromeec_command cmd = {
.cmd_code = EC_CMD_USB_PD_CONTROL,
.cmd_version = 0,
.cmd_data_in = &params,
.cmd_size_in = sizeof(params),
.cmd_data_out = &resp,
.cmd_size_out = sizeof(resp),
.cmd_dev_index = 0,
};
return google_chromeec_command(&cmd);
}
int google_chromeec_hello(void)
{
struct ec_params_hello params = {
.in_data = 0x10203040,
};
struct ec_response_hello resp = {};
struct chromeec_command cmd = {
.cmd_code = EC_CMD_HELLO,
.cmd_version = 0,
.cmd_data_in = &params,
.cmd_data_out = &resp,
.cmd_size_in = sizeof(params),
.cmd_size_out = sizeof(resp),
.cmd_dev_index = 0,
};
int rv = google_chromeec_command(&cmd);
if (rv)
return -1;
if (resp.out_data != (params.in_data + 0x01020304))
return -1;
return 0;
}
/*
* Convert a reset cause ID to human-readable string, providing total coverage
* of the 'cause' space. The returned string points to static storage and must
* not be free()ed.
*/
static const char *reset_cause_to_str(uint16_t cause)
{
/* See also ChromiumOS EC include/chipset.h for details. */
static const char * const reset_causes[] = {
"(reset unknown)",
"reset: board custom",
"reset: ap hang detected",
"reset: console command",
"reset: keyboard sysreset",
"reset: keyboard warm reboot",
"reset: debug warm reboot",
"reset: at AP's request",
"reset: during EC initialization",
"reset: AP watchdog",
};
static const size_t shutdown_cause_begin = 1 << 15;
static const char * const shutdown_causes[] = {
"shutdown: power failure",
"shutdown: during EC initialization",
"shutdown: board custom",
"shutdown: battery voltage startup inhibit",
"shutdown: power wait asserted",
"shutdown: critical battery",
"shutdown: by console command",
"shutdown: entering G3",
"shutdown: thermal",
"shutdown: power button",
};
if (cause < ARRAY_SIZE(reset_causes))
return reset_causes[cause];
if (cause < shutdown_cause_begin)
return "(reset unknown)";
if (cause < shutdown_cause_begin + ARRAY_SIZE(shutdown_causes))
return shutdown_causes[cause - shutdown_cause_begin];
return "(shutdown unknown)";
}
/*
* Copy the EC's information about resets of the AP and its own uptime for
* debugging purposes.
*/
static void google_chromeec_log_uptimeinfo(void)
{
/* See also ec_commands.h EC_RESET_FLAG_* for details. */
static const char * const reset_flag_strings[] = {
"other",
"reset-pin",
"brownout",
"power-on",
"watchdog",
"soft",
"hibernate",
"rtc-alarm",
"wake-pin",
"low-battery",
"sysjump",
"hard",
"ap-off",
"preserved",
"usb-resume",
"rdd",
"rbox",
"security",
"ap-watchdog",
};
struct ec_response_uptime_info cmd_resp;
int i, flag, flag_count;
if (google_chromeec_get_uptime_info(&cmd_resp)) {
/*
* Deliberately say nothing for EC's that don't support this
* command
*/
return;
}
printk(BIOS_DEBUG, "Google Chrome EC uptime: %d.%03d seconds\n",
cmd_resp.time_since_ec_boot_ms / MSECS_PER_SEC,
cmd_resp.time_since_ec_boot_ms % MSECS_PER_SEC);
printk(BIOS_DEBUG, "Google Chrome AP resets since EC boot: %d\n",
cmd_resp.ap_resets_since_ec_boot);
printk(BIOS_DEBUG, "Google Chrome most recent AP reset causes:\n");
for (i = 0; i != ARRAY_SIZE(cmd_resp.recent_ap_reset); ++i) {
if (cmd_resp.recent_ap_reset[i].reset_time_ms == 0)
continue;
printk(BIOS_DEBUG, "\t%d.%03d: %d %s\n",
cmd_resp.recent_ap_reset[i].reset_time_ms /
MSECS_PER_SEC,
cmd_resp.recent_ap_reset[i].reset_time_ms %
MSECS_PER_SEC,
cmd_resp.recent_ap_reset[i].reset_cause,
reset_cause_to_str(
cmd_resp.recent_ap_reset[i].reset_cause));
}
printk(BIOS_DEBUG, "Google Chrome EC reset flags at last EC boot: ");
flag_count = 0;
for (flag = 0; flag != ARRAY_SIZE(reset_flag_strings); ++flag) {
if ((cmd_resp.ec_reset_flags & (1 << flag)) != 0) {
if (flag_count)
printk(BIOS_DEBUG, " | ");
printk(BIOS_DEBUG, "%s", reset_flag_strings[flag]);
flag_count++;
}
}
printk(BIOS_DEBUG, "\n");
}
/* Cache and retrieve the EC image type (ro or rw) */
enum ec_current_image google_chromeec_get_current_image(void)
{
MAYBE_STATIC_BSS enum ec_current_image ec_image_type = EC_IMAGE_UNKNOWN;
if (ec_image_type != EC_IMAGE_UNKNOWN)
return ec_image_type;
struct ec_response_get_version resp = {};
struct chromeec_command cmd = {
.cmd_code = EC_CMD_GET_VERSION,
.cmd_version = 0,
.cmd_data_out = &resp,
.cmd_size_in = 0,
.cmd_size_out = sizeof(resp),
.cmd_dev_index = 0,
};
google_chromeec_command(&cmd);
if (cmd.cmd_code) {
printk(BIOS_DEBUG,
"Google Chrome EC: version command failed!\n");
} else {
printk(BIOS_DEBUG, "Google Chrome EC: version:\n");
printk(BIOS_DEBUG, " ro: %s\n", resp.version_string_ro);
printk(BIOS_DEBUG, " rw: %s\n", resp.version_string_rw);
printk(BIOS_DEBUG, " running image: %d\n",
resp.current_image);
ec_image_type = resp.current_image;
}
/* Will still be UNKNOWN if command failed */
return ec_image_type;
}
void google_chromeec_init(void)
{
google_chromeec_log_uptimeinfo();
}
int google_ec_running_ro(void)
{
return (google_chromeec_get_current_image() == EC_IMAGE_RO);
}
/**
* Check if EC/TCPM is in an alternate mode or not.
*
* @param svid SVID of the alternate mode to check
* @return 0: Not in the mode. -1: Error. 1: Yes.
*/
int google_chromeec_pd_get_amode(uint16_t svid)
{
struct ec_response_usb_pd_ports resp;
struct chromeec_command cmd = {
.cmd_code = EC_CMD_USB_PD_PORTS,
.cmd_version = 0,
.cmd_data_in = NULL,
.cmd_size_in = 0,
.cmd_data_out = &resp,
.cmd_size_out = sizeof(resp),
.cmd_dev_index = 0,
};
int i;
if (google_chromeec_command(&cmd) < 0)
return -1;
for (i = 0; i < resp.num_ports; i++) {
struct ec_params_usb_pd_get_mode_request params;
struct ec_params_usb_pd_get_mode_response resp2;
int svid_idx = 0;
do {
/* Reset cmd in each iteration in case
google_chromeec_command changes it. */
params.port = i;
params.svid_idx = svid_idx;
cmd.cmd_code = EC_CMD_USB_PD_GET_AMODE;
cmd.cmd_version = 0;
cmd.cmd_data_in = &params;
cmd.cmd_size_in = sizeof(params);
cmd.cmd_data_out = &resp2;
cmd.cmd_size_out = sizeof(resp2);
cmd.cmd_dev_index = 0;
if (google_chromeec_command(&cmd) < 0)
return -1;
if (resp2.svid == svid)
return 1;
svid_idx++;
} while (resp2.svid);
}
return 0;
}
#define USB_SID_DISPLAYPORT 0xff01
/**
* Wait for DisplayPort to be ready
*
* @param timeout Wait aborts after <timeout> ms.
* @return 1: Success or 0: Timeout.
*/
int google_chromeec_wait_for_displayport(long timeout)
{
struct stopwatch sw;
printk(BIOS_INFO, "Waiting for DisplayPort\n");
stopwatch_init_msecs_expire(&sw, timeout);
while (google_chromeec_pd_get_amode(USB_SID_DISPLAYPORT) != 1) {
if (stopwatch_expired(&sw)) {
printk(BIOS_WARNING,
"DisplayPort not ready after %ldms. Abort.\n",
timeout);
return 0;
}
mdelay(200);
}
printk(BIOS_INFO, "DisplayPort ready after %lu ms\n",
stopwatch_duration_msecs(&sw));
return 1;
}