mirror of
https://github.com/Telecominfraproject/OpenCellular.git
synced 2025-12-09 17:35:38 +00:00
Add a new crossystem value "battery_cutoff_request" to indicate that
next reboot should cut-off battery and shutdown during firmware stage.
This request is primarily for factories to ship devices in an safe
state. Previously we have done same thing by running "ectool battery-cutoff"
but that creates a problem which "ectool" (and the one to request for
cut-off) must live in developer mode while the device must be shipped
in normal mode. The mode transition was solved by setting
"disable_dev_request=1", but that flag is may get lost on x86 systems
(having NV storage in CMOS) when the battery is cut-off .
From the experience from Ryu, such settings (dev mode transition and
battery cut-off) should be done together inside firmware execution so we
can create a new flag, battery_cutoff_request, to finalize device
properly.
BRANCH=none
BUG=chromium:601705
TEST=emerge-chell depthcharge vboot_reference chromeos-bootimage
crossystem battery_cutoff_request=1
# Unplug AC adapter
reboot
# See device rebooted and then shutdown immediately.
# Press power button and system won't boot.
# Attach AC adapter and now system boots.
CQ-DEPEND=CL:337596,CL:338193
Change-Id: I73ccae15b337cd65786106646546c67c155b8fa6
Reviewed-on: https://chromium-review.googlesource.com/337602
Commit-Ready: Hung-Te Lin <hungte@chromium.org>
Tested-by: Hung-Te Lin <hungte@chromium.org>
Reviewed-by: Duncan Laurie <dlaurie@chromium.org>
188 lines
3.4 KiB
C
188 lines
3.4 KiB
C
/* Copyright (c) 2013 The Chromium OS Authors. All rights reserved.
|
|
* Use of this source code is governed by a BSD-style license that can be
|
|
* found in the LICENSE file.
|
|
*
|
|
* Stub implementations of firmware-provided API functions.
|
|
*/
|
|
|
|
#include <stdint.h>
|
|
|
|
#define _STUB_IMPLEMENTATION_
|
|
|
|
#include <stdarg.h>
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <sys/time.h>
|
|
|
|
#include "vboot_api.h"
|
|
|
|
static enum VbEcBootMode_t vboot_mode;
|
|
|
|
void VbExSleepMs(uint32_t msec)
|
|
{
|
|
}
|
|
|
|
VbError_t VbExBeep(uint32_t msec, uint32_t frequency)
|
|
{
|
|
return VBERROR_SUCCESS;
|
|
}
|
|
|
|
VbError_t VbExDisplayInit(uint32_t *width, uint32_t *height)
|
|
{
|
|
return VBERROR_SUCCESS;
|
|
}
|
|
|
|
VbError_t VbExDisplayBacklight(uint8_t enable)
|
|
{
|
|
return VBERROR_SUCCESS;
|
|
}
|
|
|
|
VbError_t VbExDisplaySetDimension(uint32_t width, uint32_t height)
|
|
{
|
|
return VBERROR_SUCCESS;
|
|
}
|
|
|
|
VbError_t VbExDisplayScreen(uint32_t screen_type, uint32_t locale)
|
|
{
|
|
return VBERROR_SUCCESS;
|
|
}
|
|
|
|
VbError_t VbExDisplayImage(uint32_t x, uint32_t y,
|
|
void *buffer, uint32_t buffersize)
|
|
{
|
|
return VBERROR_SUCCESS;
|
|
}
|
|
|
|
VbError_t VbExDisplayDebugInfo(const char *info_str)
|
|
{
|
|
return VBERROR_SUCCESS;
|
|
}
|
|
|
|
uint32_t VbExKeyboardRead(void)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
uint32_t VbExKeyboardReadWithFlags(uint32_t *flags_ptr)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
uint32_t VbExGetSwitches(uint32_t mask)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
uint32_t VbExIsShutdownRequested(void)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
VbError_t VbExDecompress(void *inbuf, uint32_t in_size,
|
|
uint32_t compression_type,
|
|
void *outbuf, uint32_t *out_size)
|
|
{
|
|
return VBERROR_SUCCESS;
|
|
}
|
|
|
|
int VbExTrustEC(int devidx)
|
|
{
|
|
return 1;
|
|
}
|
|
|
|
VbError_t VbExEcRunningRW(int devidx, int *in_rw)
|
|
{
|
|
*in_rw = 0;
|
|
return VBERROR_SUCCESS;
|
|
}
|
|
|
|
VbError_t VbExEcJumpToRW(int devidx)
|
|
{
|
|
return VBERROR_SUCCESS;
|
|
}
|
|
|
|
VbError_t VbExEcRebootToRO(int devidx)
|
|
{
|
|
/* Nothing to reboot, so all we can do is return failure. */
|
|
return VBERROR_UNKNOWN;
|
|
}
|
|
|
|
VbError_t VbExEcDisableJump(int devidx)
|
|
{
|
|
return VBERROR_SUCCESS;
|
|
}
|
|
|
|
#define SHA256_HASH_SIZE 32
|
|
|
|
VbError_t VbExEcHashImage(int devidx, enum VbSelectFirmware_t select,
|
|
const uint8_t **hash, int *hash_size)
|
|
{
|
|
static const uint8_t fake_hash[32] = {1, 2, 3, 4};
|
|
|
|
*hash = fake_hash;
|
|
*hash_size = sizeof(fake_hash);
|
|
return VBERROR_SUCCESS;
|
|
}
|
|
|
|
VbError_t VbExEcGetExpectedImage(int devidx, enum VbSelectFirmware_t select,
|
|
const uint8_t **image, int *image_size)
|
|
{
|
|
static uint8_t fake_image[64] = {5, 6, 7, 8};
|
|
*image = fake_image;
|
|
*image_size = sizeof(fake_image);
|
|
return VBERROR_SUCCESS;
|
|
}
|
|
|
|
VbError_t VbExEcGetExpectedImageHash(int devidx, enum VbSelectFirmware_t select,
|
|
const uint8_t **hash, int *hash_size)
|
|
{
|
|
static const uint8_t fake_hash[32] = {1, 2, 3, 4};
|
|
|
|
*hash = fake_hash;
|
|
*hash_size = sizeof(fake_hash);
|
|
return VBERROR_SUCCESS;
|
|
}
|
|
|
|
VbError_t VbExEcUpdateImage(int devidx, enum VbSelectFirmware_t select,
|
|
const uint8_t *image, int image_size)
|
|
{
|
|
return VBERROR_SUCCESS;
|
|
}
|
|
|
|
VbError_t VbExEcProtect(int devidx, enum VbSelectFirmware_t select)
|
|
{
|
|
return VBERROR_SUCCESS;
|
|
}
|
|
|
|
VbError_t VbExEcEnteringMode(int devidx, enum VbEcBootMode_t mode)
|
|
{
|
|
vboot_mode = mode;
|
|
return VBERROR_SUCCESS;
|
|
}
|
|
|
|
VbError_t VbExEcVbootDone(int in_recovery)
|
|
{
|
|
return VBERROR_SUCCESS;
|
|
}
|
|
|
|
VbError_t VbExEcBatteryCutOff(void)
|
|
{
|
|
return VBERROR_SUCCESS;
|
|
}
|
|
|
|
enum VbEcBootMode_t VbGetMode(void)
|
|
{
|
|
return vboot_mode;
|
|
}
|
|
|
|
int VbExLegacy(void)
|
|
{
|
|
return 1;
|
|
}
|
|
|
|
uint8_t VbExOverrideGptEntryPriority(const GptEntry *e)
|
|
{
|
|
return 0;
|
|
}
|