mb/google/brox/var/jubilant: Disable Tccold Handshake
[coreboot.git] / src / mainboard / intel / adlrvp / chromeos.c
blob4c2d1e516fd7a428c2d0899ecd3cf31f368e11b5
1 /* SPDX-License-Identifier: GPL-2.0-only */
3 #include <baseboard/gpio.h>
4 #include <bootmode.h>
5 #include <boot/coreboot_tables.h>
6 #include <gpio.h>
7 #include <types.h>
9 void fill_lb_gpios(struct lb_gpios *gpios)
11 struct lb_gpio chromeos_gpios[] = {
12 {-1, ACTIVE_HIGH, get_lid_switch(), "lid"},
13 {-1, ACTIVE_HIGH, 0, "power"},
14 {-1, ACTIVE_HIGH, gfx_get_init_done(), "oprom"},
15 {GPIO_EC_IN_RW, ACTIVE_HIGH, gpio_get(GPIO_EC_IN_RW), "EC in RW"},
17 if (CONFIG(BOARD_INTEL_ADLRVP_P_EXT_EC) || CONFIG(BOARD_INTEL_ADLRVP_N_EXT_EC) ||
18 CONFIG(BOARD_INTEL_ADLRVP_RPL_EXT_EC))
19 lb_add_gpios(gpios, chromeos_gpios, ARRAY_SIZE(chromeos_gpios));
20 else
21 lb_add_gpios(gpios, chromeos_gpios, ARRAY_SIZE(chromeos_gpios) - 1);
24 #if !CONFIG(EC_GOOGLE_CHROMEEC_SWITCHES)
25 int get_lid_switch(void)
27 /* Lid always open */
28 return 1;
31 int get_recovery_mode_switch(void)
33 return 0;
35 #endif /*!CONFIG(EC_GOOGLE_CHROMEEC_SWITCHES) */
37 int get_write_protect_state(void)
39 /* No write protect */
40 return 0;
43 #if (CONFIG(BOARD_INTEL_ADLRVP_P_EXT_EC) || CONFIG(BOARD_INTEL_ADLRVP_N_EXT_EC) ||\
44 CONFIG(BOARD_INTEL_ADLRVP_RPL_EXT_EC))
45 int get_ec_is_trusted(void)
47 /* EC is trusted if not in RW. */
48 return !gpio_get(GPIO_EC_IN_RW);
50 #endif