|  | What:		/sys/kernel/debug/wilco_ec/h1_gpio | 
|  | Date:		April 2019 | 
|  | KernelVersion:	5.2 | 
|  | Description: | 
|  | As part of Chrome OS's FAFT (Fully Automated Firmware Testing) | 
|  | tests, we need to ensure that the H1 chip is properly setting | 
|  | some GPIO lines. The h1_gpio attribute exposes the state | 
|  | of the lines: | 
|  | - ENTRY_TO_FACT_MODE in BIT(0) | 
|  | - SPI_CHROME_SEL in BIT(1) | 
|  |  | 
|  | Output will formatted with "0x%02x\n". | 
|  |  | 
|  | What:		/sys/kernel/debug/wilco_ec/raw | 
|  | Date:		January 2019 | 
|  | KernelVersion:	5.1 | 
|  | Description: | 
|  | Write and read raw mailbox commands to the EC. | 
|  |  | 
|  | You can write a hexadecimal sentence to raw, and that series of | 
|  | bytes will be sent to the EC. Then, you can read the bytes of | 
|  | response by reading from raw. | 
|  |  | 
|  | For writing, bytes 0-1 indicate the message type, one of enum | 
|  | wilco_ec_msg_type. Byte 2+ consist of the data passed in the | 
|  | request, starting at MBOX[0]. At least three bytes are required | 
|  | for writing, two for the type and at least a single byte of | 
|  | data. | 
|  |  | 
|  | Example:: | 
|  |  | 
|  | // Request EC info type 3 (EC firmware build date) | 
|  | // Corresponds with sending type 0x00f0 with | 
|  | // MBOX = [38, 00, 03, 00] | 
|  | $ echo 00 f0 38 00 03 00 > /sys/kernel/debug/wilco_ec/raw | 
|  | // View the result. The decoded ASCII result "12/21/18" is | 
|  | // included after the raw hex. | 
|  | // Corresponds with MBOX = [00, 00, 31, 32, 2f, 32, 31, 38, ...] | 
|  | $ cat /sys/kernel/debug/wilco_ec/raw | 
|  | 00 00 31 32 2f 32 31 2f 31 38 00 38 00 01 00 2f 00  ..12/21/18.8... | 
|  |  | 
|  | Note that the first 16 bytes of the received MBOX[] will be | 
|  | printed, even if some of the data is junk, and skipping bytes | 
|  | 17 to 32. It is up to you to know how many of the first bytes of | 
|  | data are the actual response. |