Rev 1569 | Rev 1649 | Go to most recent revision | Only display areas with differences | Ignore whitespace | Details | Blame | Last modification | View Log | RSS feed
Rev 1569 | Rev 1645 | ||
---|---|---|---|
1 | /* |
1 | /* |
2 | * Copyright (C) 2006 Josef Cejka |
2 | * Copyright (C) 2006 Josef Cejka |
3 | * All rights reserved. |
3 | * All rights reserved. |
4 | * |
4 | * |
5 | * Redistribution and use in source and binary forms, with or without |
5 | * Redistribution and use in source and binary forms, with or without |
6 | * modification, are permitted provided that the following conditions |
6 | * modification, are permitted provided that the following conditions |
7 | * are met: |
7 | * are met: |
8 | * |
8 | * |
9 | * - Redistributions of source code must retain the above copyright |
9 | * - Redistributions of source code must retain the above copyright |
10 | * notice, this list of conditions and the following disclaimer. |
10 | * notice, this list of conditions and the following disclaimer. |
11 | * - Redistributions in binary form must reproduce the above copyright |
11 | * - Redistributions in binary form must reproduce the above copyright |
12 | * notice, this list of conditions and the following disclaimer in the |
12 | * notice, this list of conditions and the following disclaimer in the |
13 | * documentation and/or other materials provided with the distribution. |
13 | * documentation and/or other materials provided with the distribution. |
14 | * - The name of the author may not be used to endorse or promote products |
14 | * - The name of the author may not be used to endorse or promote products |
15 | * derived from this software without specific prior written permission. |
15 | * derived from this software without specific prior written permission. |
16 | * |
16 | * |
17 | * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR |
17 | * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR |
18 | * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES |
18 | * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES |
19 | * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. |
19 | * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. |
20 | * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, |
20 | * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, |
21 | * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT |
21 | * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT |
22 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
22 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
23 | * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
23 | * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
24 | * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
24 | * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
25 | * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
25 | * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
26 | * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
26 | * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
27 | */ |
27 | */ |
28 | 28 | ||
29 | #include <arch/kbd.h> |
29 | #include <arch/kbd.h> |
30 | #include <ipc/ipc.h> |
30 | #include <ipc/ipc.h> |
31 | #include <sysinfo.h> |
31 | #include <sysinfo.h> |
32 | 32 | ||
33 | #define KEY_F1 0x504f1b |
33 | #define KEY_F1 0x504f1b |
34 | #define KEY_F2 0x514f1b |
34 | #define KEY_F2 0x514f1b |
35 | #define KEY_F3 0x524f1b |
35 | #define KEY_F3 0x524f1b |
36 | #define KEY_F4 0x534f1b |
36 | #define KEY_F4 0x534f1b |
37 | #define KEY_F5 0x7e35315b1b |
37 | #define KEY_F5 0x7e35315b1b |
38 | #define KEY_F6 0x7e37315b1b |
38 | #define KEY_F6 0x7e37315b1b |
39 | #define KEY_F7 0x7e38315b1b |
39 | #define KEY_F7 0x7e38315b1b |
40 | #define KEY_F8 0x7e39315b1b |
40 | #define KEY_F8 0x7e39315b1b |
41 | #define KEY_F9 0x7e30325b1b |
41 | #define KEY_F9 0x7e30325b1b |
42 | #define KEY_F10 0x7e31325b1b |
42 | #define KEY_F10 0x7e31325b1b |
43 | #define KEY_F11 0x7e33325b1b |
43 | #define KEY_F11 0x7e33325b1b |
44 | #define KEY_F12 0x7e34325b1b |
44 | #define KEY_F12 0x7e34325b1b |
45 | 45 | ||
46 | 46 | ||
47 | #define FUNCTION_KEYS 0x100 |
47 | #define FUNCTION_KEYS 0x100 |
48 | 48 | ||
49 | irq_cmd_t ski_cmds[1] = { |
49 | irq_cmd_t ski_cmds[1] = { |
50 | { CMD_IA64_GETCHAR, 0, 0 } |
50 | { CMD_IA64_GETCHAR, 0, 0 } |
51 | }; |
51 | }; |
52 | 52 | ||
53 | irq_code_t ski_kbd = { |
53 | irq_code_t ski_kbd = { |
54 | 1, |
54 | 1, |
55 | ski_cmds |
55 | ski_cmds |
56 | }; |
56 | }; |
57 | 57 | ||
58 | int kbd_arch_init(void) |
58 | int kbd_arch_init(void) |
59 | { |
59 | { |
60 | if(sysinfo_value("kbd")) { |
60 | if(sysinfo_value("kbd")) { |
61 | ipc_register_irq(sysinfo_value("kbd.irq"), &ski_kbd); |
61 | ipc_register_irq(sysinfo_value("kbd.irq"), &ski_kbd); |
62 | return 1; |
62 | return 1; |
63 | } |
63 | } |
64 | 64 | ||
65 | } |
65 | } |
66 | 66 | ||
67 | /* |
67 | /* |
68 | * Please preserve this code (it can be used to determine scancodes) |
68 | * Please preserve this code (it can be used to determine scancodes) |
69 | * |
69 | * |
70 | int to_hex(int v) |
70 | int to_hex(int v) |
71 | { |
71 | { |
72 | return "0123456789ABCDEF"[v]; |
72 | return "0123456789ABCDEF"[v]; |
73 | } |
73 | } |
74 | */ |
74 | */ |
75 | 75 | ||
76 | int kbd_arch_process(keybuffer_t *keybuffer, int scan_code) |
76 | int kbd_arch_process(keybuffer_t *keybuffer, int scan_code) |
77 | { |
77 | { |
78 | static unsigned long long buf=0; |
78 | static unsigned long long buf=0; |
79 | static int count=0; |
79 | static int count=0; |
- | 80 | static int esc_count=0; |
|
80 | 81 | ||
81 | 82 | ||
82 | /* |
83 | /* |
83 | * Please preserve this code (it can be used to determine scancodes) |
84 | * Please preserve this code (it can be used to determine scancodes) |
84 | * |
- | |
85 | keybuffer_push(keybuffer, to_hex((scan_code>>4)&0xf)); |
- | |
86 | keybuffer_push(keybuffer, to_hex(scan_code&0xf)); |
- | |
87 | keybuffer_push(keybuffer, ' '); |
- | |
88 | keybuffer_push(keybuffer, ' '); |
- | |
89 | */ |
85 | */ |
- | 86 | //keybuffer_push(keybuffer, to_hex((scan_code>>4)&0xf)); |
|
- | 87 | //keybuffer_push(keybuffer, to_hex(scan_code&0xf)); |
|
- | 88 | //keybuffer_push(keybuffer, ' '); |
|
- | 89 | //keybuffer_push(keybuffer, ' '); |
|
- | 90 | //*/ |
|
90 | 91 | ||
91 | 92 | ||
92 | if (scan_code){ |
93 | if (scan_code){ |
93 | buf|=(unsigned long long) scan_code<<(8*(count++)); |
94 | buf|=(unsigned long long) scan_code<<(8*(count++)); |
94 | } else { |
95 | } else { |
- | 96 | ||
- | 97 | ||
- | 98 | if ( buf == 0x1b ) { |
|
- | 99 | esc_count++; |
|
- | 100 | if ( esc_count == 3 ) { |
|
- | 101 | __SYSCALL0(SYS_DEBUG_ENABLE_CONSOLE); |
|
- | 102 | } |
|
- | 103 | } else { |
|
- | 104 | esc_count=0; |
|
95 | 105 | } |
|
- | 106 | ||
96 | if ( ! ( buf & 0xff00 )) |
107 | if ( ! ( buf & 0xff00 )) |
97 | keybuffer_push(keybuffer, buf); |
108 | keybuffer_push(keybuffer, buf); |
98 | else { |
109 | else { |
99 | switch (buf){ |
110 | switch (buf){ |
100 | case KEY_F1: |
111 | case KEY_F1: |
101 | keybuffer_push(keybuffer,FUNCTION_KEYS | 1 ); |
112 | keybuffer_push(keybuffer,FUNCTION_KEYS | 1 ); |
102 | break; |
113 | break; |
103 | case KEY_F2: |
114 | case KEY_F2: |
104 | keybuffer_push(keybuffer,FUNCTION_KEYS | 2 ); |
115 | keybuffer_push(keybuffer,FUNCTION_KEYS | 2 ); |
105 | break; |
116 | break; |
106 | case KEY_F3: |
117 | case KEY_F3: |
107 | keybuffer_push(keybuffer,FUNCTION_KEYS | 3 ); |
118 | keybuffer_push(keybuffer,FUNCTION_KEYS | 3 ); |
108 | break; |
119 | break; |
109 | case KEY_F4: |
120 | case KEY_F4: |
110 | keybuffer_push(keybuffer,FUNCTION_KEYS | 4 ); |
121 | keybuffer_push(keybuffer,FUNCTION_KEYS | 4 ); |
111 | break; |
122 | break; |
112 | case KEY_F5: |
123 | case KEY_F5: |
113 | keybuffer_push(keybuffer,FUNCTION_KEYS | 5 ); |
124 | keybuffer_push(keybuffer,FUNCTION_KEYS | 5 ); |
114 | break; |
125 | break; |
115 | case KEY_F6: |
126 | case KEY_F6: |
116 | keybuffer_push(keybuffer,FUNCTION_KEYS | 6 ); |
127 | keybuffer_push(keybuffer,FUNCTION_KEYS | 6 ); |
117 | break; |
128 | break; |
118 | case KEY_F7: |
129 | case KEY_F7: |
119 | keybuffer_push(keybuffer,FUNCTION_KEYS | 7 ); |
130 | keybuffer_push(keybuffer,FUNCTION_KEYS | 7 ); |
120 | break; |
131 | break; |
121 | case KEY_F8: |
132 | case KEY_F8: |
122 | keybuffer_push(keybuffer,FUNCTION_KEYS | 8 ); |
133 | keybuffer_push(keybuffer,FUNCTION_KEYS | 8 ); |
123 | break; |
134 | break; |
124 | 135 | ||
125 | case KEY_F9: |
136 | case KEY_F9: |
126 | keybuffer_push(keybuffer,FUNCTION_KEYS | 9 ); |
137 | keybuffer_push(keybuffer,FUNCTION_KEYS | 9 ); |
127 | break; |
138 | break; |
128 | case KEY_F10: |
139 | case KEY_F10: |
129 | keybuffer_push(keybuffer,FUNCTION_KEYS | 10 ); |
140 | keybuffer_push(keybuffer,FUNCTION_KEYS | 10 ); |
130 | break; |
141 | break; |
131 | 142 | ||
132 | case KEY_F11: |
143 | case KEY_F11: |
133 | keybuffer_push(keybuffer,FUNCTION_KEYS | 11 ); |
144 | keybuffer_push(keybuffer,FUNCTION_KEYS | 11 ); |
134 | break; |
145 | break; |
135 | case KEY_F12: |
146 | case KEY_F12: |
136 | keybuffer_push(keybuffer,FUNCTION_KEYS | 12 ); |
147 | keybuffer_push(keybuffer,FUNCTION_KEYS | 12 ); |
137 | break; |
148 | break; |
138 | 149 | ||
139 | 150 | ||
140 | } |
151 | } |
141 | } |
152 | } |
142 | buf=count=0; |
153 | buf=count=0; |
143 | } |
154 | } |
144 | 155 | ||
145 | return 1; |
156 | return 1; |
146 | } |
157 | } |
147 | 158 |