1What: /sys/bus/platform/devices/GGL0001:*/BINF.2 2Date: May 2022 3KernelVersion: 5.19 4Description: 5 Returns active EC firmware of current boot (boolean). 6 7 == =============================== 8 0 Read only (recovery) firmware. 9 1 Rewritable firmware. 10 == =============================== 11 12What: /sys/bus/platform/devices/GGL0001:*/BINF.3 13Date: May 2022 14KernelVersion: 5.19 15Description: 16 Returns main firmware type for current boot (integer). 17 18 == ===================================== 19 0 Recovery. 20 1 Normal. 21 2 Developer. 22 3 Netboot (factory installation only). 23 == ===================================== 24 25What: /sys/bus/platform/devices/GGL0001:*/CHSW 26Date: May 2022 27KernelVersion: 5.19 28Description: 29 Returns switch position for Chrome OS specific hardware 30 switches when the firmware is booted (integer). 31 32 ==== =========================================== 33 0 No changes. 34 2 Recovery button was pressed. 35 4 Recovery button was pressed (EC firmware). 36 32 Developer switch was enabled. 37 512 Firmware write protection was disabled. 38 ==== =========================================== 39 40What: /sys/bus/platform/devices/GGL0001:*/FMAP 41Date: May 2022 42KernelVersion: 5.19 43Description: 44 Returns physical memory address of the start of the main 45 processor firmware flashmap. 46 47What: /sys/bus/platform/devices/GGL0001:*/FRID 48Date: May 2022 49KernelVersion: 5.19 50Description: 51 Returns firmware version for the read-only portion of the 52 main processor firmware. 53 54What: /sys/bus/platform/devices/GGL0001:*/FWID 55Date: May 2022 56KernelVersion: 5.19 57Description: 58 Returns firmware version for the rewritable portion of the 59 main processor firmware. 60 61What: /sys/bus/platform/devices/GGL0001:*/GPIO.X/GPIO.0 62Date: May 2022 63KernelVersion: 5.19 64Description: 65 Returns type of the GPIO signal for the Chrome OS specific 66 GPIO assignments (integer). 67 68 =========== ================================== 69 1 Recovery button. 70 2 Developer mode switch. 71 3 Firmware write protection switch. 72 256 to 511 Debug header GPIO 0 to GPIO 255. 73 =========== ================================== 74 75What: /sys/bus/platform/devices/GGL0001:*/GPIO.X/GPIO.1 76Date: May 2022 77KernelVersion: 5.19 78Description: 79 Returns signal attributes of the GPIO signal (integer bitfield). 80 81 == ======================= 82 0 Signal is active low. 83 1 Signal is active high. 84 == ======================= 85 86What: /sys/bus/platform/devices/GGL0001:*/GPIO.X/GPIO.2 87Date: May 2022 88KernelVersion: 5.19 89Description: 90 Returns the GPIO number on the specified GPIO 91 controller. 92 93What: /sys/bus/platform/devices/GGL0001:*/GPIO.X/GPIO.3 94Date: May 2022 95KernelVersion: 5.19 96Description: 97 Returns name of the GPIO controller. 98 99What: /sys/bus/platform/devices/GGL0001:*/HWID 100Date: May 2022 101KernelVersion: 5.19 102Description: 103 Returns hardware ID for the Chromebook. 104 105What: /sys/bus/platform/devices/GGL0001:*/MECK 106Date: May 2022 107KernelVersion: 5.19 108Description: 109 Returns the SHA-1 or SHA-256 hash that is read out of the 110 Management Engine extended registers during boot. The hash 111 is exported via ACPI so the OS can verify that the Management 112 Engine firmware has not changed. If Management Engine is not 113 present, or if the firmware was unable to read the extended registers, this buffer size can be zero. 114 115What: /sys/bus/platform/devices/GGL0001:*/VBNV.0 116Date: May 2022 117KernelVersion: 5.19 118Description: 119 Returns offset in CMOS bank 0 of the verified boot non-volatile 120 storage block, counting from the first writable CMOS byte 121 (that is, 'offset = 0' is the byte following the 14 bytes of 122 clock data). 123 124What: /sys/bus/platform/devices/GGL0001:*/VBNV.1 125Date: May 2022 126KernelVersion: 5.19 127Description: 128 Return the size in bytes of the verified boot non-volatile 129 storage block. 130 131What: /sys/bus/platform/devices/GGL0001:*/VDAT 132Date: May 2022 133KernelVersion: 5.19 134Description: 135 Returns the verified boot data block shared between the 136 firmware verification step and the kernel verification step 137 (binary). 138