[coreboot] Goodies for Bonn meeting

2015-09-09 Thread Vladimir 'φ-coder/phcoder' Serbinenko
Hello, all. My girlfriend Maria (CC'ed) would like to organize some
goodies for coreboot meeting. Already available are black T-shirts:
2 x M, 8 x L, 1 x XL according to my notes, it's no guarantee, I can't
double-check now as I'm travelling.
Expected price is under €20 for any of items.
Capacity is limited, first come first serve, respond to this e-mail to
order.
What else we can do:
- White t-shirt
- white cups
- colour cups
- Fridge magnets
- case for iPhone (indicate which one), not sure which ones are available
- Beer coaster
- mouse pad
- baseball cap

In addition, if you're ok with waiting about a month + delivery time we
can order:
- Black t-shirt (other than the sizes mentioned above, or once the stock
is out)
- Colour t-shirt over €20

We're doing it just for fun and to serve the community, the price is
only to cover our costs.



signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] Fwd: Coreboot T-shirts

2015-05-31 Thread Vladimir 'φ-coder/phcoder' Serbinenko
Good news: now it's possible to have them in black as well.
I received up to now only one request to which I replied by personal
mail. If you didn't receive any reply, please resend your request.
Please specify in request the size, color (white, black, few other
colors if someone is interested), quantity and if you want it single or
double-sided printing.

Please tell me until Friday.

@Carl-Daniel: Still waiting for that PDF.

On 21.05.2015 15:41, Vladimir 'phcoder' Serbinenko wrote:
 Apparently original mail didn't make it to the list. Resent
 
 
 -- Forwarded message --
 From: Vladimir 'phcoder' Serbinenko phco...@gmail.com
 Date: Thu, May 21, 2015 at 2:29 PM
 Subject: Re: [coreboot] Coreboot T-shirts
 To: Carl-Daniel Hailfinger c-d.hailfinger.devel.2...@gmx.net
 Cc: coreboot coreboot@coreboot.org
 
 
 
 Le 21 mai 2015 13:01, Carl-Daniel Hailfinger
 c-d.hailfinger.devel.2...@gmx.net a écrit :

 On 21.05.2015 12:51, Vladimir 'phcoder' Serbinenko wrote:
 A contact of mine proposes to print coreboot T-shirts for the community.
 Black printing on white T-shirt. Expected price is 30€-35€ + shipping from
 CH or DE, double-sided printing, one-sided is 5-8€ less. It will be printed
 in Russia.

 Please note that the coreboot T-Shirt I am wearing is black, with the
 logo being a white plastic foil melted/glued to the t-shirt.
 Could you ask your contact whether such a variant would be possible as
 well? The foil variant is extremely durable and IMHO a black T-Shirt
 fits a bit better with all the other hacker culture T-Shirts.

 I already did. Unfortunately it's not possible at this point
 I need to know who wants one and sizes by June 5th. For payment
 I accept paypal and bank wiring.
 It will be available in ~August. Do we have some kind of dev meeting in
 autumn where I could bring them?
 @carldani: could you give me the file used for printing?

 Sure.

 Regards,
 Carl-Daniel
 
 




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] Fwd: Coreboot T-shirts

2015-05-31 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 31.05.2015 19:27, Matthias Apitz wrote:
 El día Sunday, May 31, 2015 a las 06:45:48PM +0200, Vladimir 
 'φ-coder/phcoder' Serbinenko escribió:
 
 Good news: now it's possible to have them in black as well.
 I received up to now only one request to which I replied by personal
 mail. If you didn't receive any reply, please resend your request.
 Please specify in request the size, color (white, black, few other
 colors if someone is interested), quantity and if you want it single or
 double-sided printing.

 Please tell me until Friday.
 
 Please post again an URL of the t-shirt layout. Thanks
 
I don't have the URL. I'm waiting for Carl-Daniel to give me the file
(in any format) wit layout he used last time.
   matthias
 




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] SPD CRC failed

2015-05-31 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 21.05.2015 16:19, Michael Gerlach wrote:
 Okay here we go...
 
 I memtested the modules again and as expected no defect was found. So i
 retried latest master today and quite unusually it just boots up.
 
Quite possibly you were just missing microcode update.
 It does not reach payload-state still, but ram and frequency is detected
 correctly. Fan is turning on and backlight gets activated but no output
 is displayed. Besides it seems to die at unpredictable states. I
 attached 3 different boot logs..
 
 The only assumption could be a defect in some piece of hardware, but i
 do not had any trouble with this x230 yet..
 
 On the other hand _this_ build was compiled on the x230 itself, while
 the other builds were compiled on a x201 with an identical bootstrapped
 toolchain..
 
 Any idea what possibly cause a similar behavior too?
 
It could be something with modules. They may have very unusual
high-frequency characteristics. I didn't see it occur with code that we
have currently but it remains a theoretical possibility.
 
 
 Best regards,
 
 n3ph
 
 
 On 05/20/15 23:45, David Hendricks wrote:


 On Wed, May 20, 2015 at 1:13 PM, Michael Gerlach n...@terminal21.de
 mailto:n...@terminal21.de wrote:

 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1

 I forgot to mention that somehow the ram frequency is not detected
 correctly...

  PLL busy...done
 PLL didn't lock. Retrying at lower frequency
  PLL busy...done
 PLL didn't lock. Retrying at lower frequency
  PLL busy...done
 PLL didn't lock. Retrying at lower frequency
  PLL busy...done
 PLL didn't lock. Retrying at lower frequency
 No lock frequency found


 The SPD data should be read via SMBus long before PLL locking for the
 DRAM itself takes place.

 If you're unable to successfully read the SPDs, then it makes sense that
 later init would fail.

 -- 
 David Hendricks (dhendrix)
 Systems Software Engineer, Google Inc.
 
 
 
 


-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot


Re: [coreboot] rfkill equivalent on the X60 - first partial success

2014-12-08 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 08.12.2014 01:00, Charles Devereaux wrote:
 Sorry, but if it is like the X60 it can not be made the work.
 
 Just like in the WWAN slot, but in reverse, the USB lines are not wired
 on the WLAN slot.
 
 IIRC this is not the case on the X201 (a very nice machine, but coreboot
 support may not be as good for the moment. However the ACPI tables look
 more complete.)
 
Please provide problem descriptions when doubting the quality of my
work. Otherwise you're empty-talking.



signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] rfkill equivalent on the X60 - first partial success

2014-12-06 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 03.12.2014 23:32, Charles Devereaux wrote:
 Hello
 
 As explained before, thinkpad-acpi can't control the non-wifi radio like
 bluetooth or wwan, because it expects some ACPI entries that aren't
 there - so there is no rfkill control for these, even if some
 non-working entries are shown with 'rfkill list'
 
You have a hardware button to do an rfkill. I don't see why software
should mess more with this.
 To emulate rfkill functionality, just write directly to the ec, for ex
 to turn on wwan and wifi:
 ./ec_access -w 0x3a -v 0x60
 
Usecase?
 It works great for bluetooth, basically physically unplugging the
 device so that if you have uhci_hcd as a module, an rmmod/modprobe will
 no longer show the device on lsusb.
 
RCBA registers can disable any USB ports. But again: usecase?




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] rfkill equivalent on the X60 - first partial success

2014-12-06 Thread Vladimir 'φ-coder/phcoder' Serbinenko

  To emulate rfkill functionality, just write directly to the ec, for ex
  to turn on wwan and wifi:
  ./ec_access -w 0x3a -v 0x60
 
 Usecase?
 
 
 Example: I have a wwan card, but I mostly use it for GPS. I can save
 some power by turning it off without rebooting, while keeping wifi on with:
I'd like to see some real figures on power saved between idle wwan and
disabled wwan, I really doubt it's anything noticeable
 The hardware button is not safe enough : register 0x3A hasthe H/W
 Override bitto enable to control wireless devices even if the global
 WAN disable switch is ON. Disabling the USB ports through the RCBA
 registers (nice idea!) would prevent such an override.
 
 Also, it would save more power on the wwan that the hardware button :
 the wwan module is not fully desactivated since it replies to AT commands
 
 Several persons do not fully trust a wwan module. Physically removing it
 is the solution suggested. Disabling the usb port would be a simpler
 solution for those than do not want to physically open their laptop yet
 do not trust the hardware button due to the override bit.
 
wwan module is powered unconditionally. So if you don't trust it -
remove it. Also none of disables discussed here is irreversible if
you're concerned about rogue software.
 It seems to have several usecase.
None of them looks valid



signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] board-status binary

2014-11-22 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 22.11.2014 12:22, John Lewis wrote:
 
 
 On 21/11/14 21:58, Vladimir 'φ-coder/phcoder' Serbinenko wrote:
 On 14.11.2014 12:44, John Lewis wrote:
 Hey y'all,

 I've modified the board-status script to have as few external
 dependencies as possible, be a self-extracting, self-running binary.
 and removed the time-stamp to keep the number initial commits down. Feel
 free to tell me how bad it is and how it murdered your children. :P

 Never send binaries to the list.
 
 A link could be just as malicious. What way should I do it?
 
A link would be fine. It wouldn't make everybody uninterested in this
topic but subscribed to the list download 1M file.
 And about the idea: current code needs git tree. I tried to make changes
 to make it possible to have board-status without git tree.

 Result: those change were ignored, bikeshed or vetoed.

 Long story short: nobody cares.
 
 At some point Ron did care, otherwise we wouldn't have been talking
 about it, and I certainly do. I can tell you anecdotally which
 Chromebooks are being used and should remain live in the code-base
 (hint: all of them) but I thought we were trying to be more scientific
 about it than that.
 
Speaking is about where it usually stops. It's been very disappointing.
Usual scenario is that we get lots of discussion to do sth, everybody is
dissatisfied with current status and when I spend huge chunk of my
personal time to fix it, nobody is there to even review the patches.
That's understandable: otherwise what will we speak about next time if
the issue is solved? Still it's disappointing and I have better things
to do with my personal time than making patches nobody cares about.
The top of rename stack is at 7185. It's automated test and Stefan
agreed to it in principle in Prague, yet it's sitting there for already
3 weeks.
 John.




 




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] board-status binary

2014-11-22 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 22.11.2014 17:28, John Lewis wrote:
 
 
 On 22/11/14 15:55, Vladimir 'φ-coder/phcoder' Serbinenko wrote:
 On 22.11.2014 12:22, John Lewis wrote:


 On 21/11/14 21:58, Vladimir 'φ-coder/phcoder' Serbinenko wrote:
 On 14.11.2014 12:44, John Lewis wrote:
 Hey y'all,

 I've modified the board-status script to have as few external
 dependencies as possible, be a self-extracting, self-running binary.
 and removed the time-stamp to keep the number initial commits down.
 Feel
 free to tell me how bad it is and how it murdered your children. :P

 Never send binaries to the list.

 A link could be just as malicious. What way should I do it?

 A link would be fine. It wouldn't make everybody uninterested in this
 topic but subscribed to the list download 1M file.
 
 I understand what you mean now - people perhaps stuck on low-bandwidth
 links with expensive data plans.
 
 And about the idea: current code needs git tree. I tried to make
 changes
 to make it possible to have board-status without git tree.

 Result: those change were ignored, bikeshed or vetoed.

 Long story short: nobody cares.

 At some point Ron did care, otherwise we wouldn't have been talking
 about it, and I certainly do. I can tell you anecdotally which
 Chromebooks are being used and should remain live in the code-base
 (hint: all of them) but I thought we were trying to be more scientific
 about it than that.

 Speaking is about where it usually stops. It's been very disappointing.
 Usual scenario is that we get lots of discussion to do sth, everybody is
 dissatisfied with current status and when I spend huge chunk of my
 personal time to fix it, nobody is there to even review the patches.
 That's understandable: otherwise what will we speak about next time if
 the issue is solved? Still it's disappointing and I have better things
 to do with my personal time than making patches nobody cares about.
 The top of rename stack is at 7185. It's automated test and Stefan
 agreed to it in principle in Prague, yet it's sitting there for already
 3 weeks.
 
 Okay, well the binary as is will upload stuff to the current
 board-status repo, so maybe that's enough. I'm trying to encourage
 people to use it. We'll see if we can get maybe a few hundred people to
 upload something, given time.
 
Determining of mainboard is wrong for clones. I was trying to fix this a
while ago but I stopped carying.
 John.









 




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

[coreboot] Infrastructure work

2014-11-22 Thread Vladimir 'φ-coder/phcoder' Serbinenko
Hello, all. I know I've signed up to fix board-status and cmos but I
don't want to go through painful reviews, so I'm not going to do this,
even though maintaining current CMOS stuff is a pain in itself.



signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] board-status binary

2014-11-21 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 14.11.2014 12:44, John Lewis wrote:
 Hey y'all,
 
 I've modified the board-status script to have as few external
 dependencies as possible, be a self-extracting, self-running binary.
 and removed the time-stamp to keep the number initial commits down. Feel
 free to tell me how bad it is and how it murdered your children. :P
 
Never send binaries to the list.
And about the idea: current code needs git tree. I tried to make changes
to make it possible to have board-status without git tree.

Result: those change were ignored, bikeshed or vetoed.

Long story short: nobody cares.
 John.
 
 


-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot


Re: [coreboot] unable to build coreboot with grub

2014-10-12 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 12.10.2014 08:03, Vipin Gahlaut wrote:
 Hi,
 
 I have cloned latest coreboot and trying to build with grub2 as payload.
 in make menuconfig I select grub2 instead of seabios. when I fire make
 command it checkout latest grub and that fails to build. for 2 reasons.
 
 1. Due to some initialization errors that I managed to fix with below
 changes
 -  struct grub_linux_initrd_context initrd_ctx = { 0, };
 +  struct grub_linux_initrd_context initrd_ctx = { 0,NULL,0 };
 
Sounds like you have an old gcc
 2. grub size issue as below that I am unable to resolve and looking for
 your help. I am building for QEMU and using QEMU version 2.1.2.
 
 E: Could not add
 [payloads/external/GRUB2/grub2/build/default_payload.elf, 268862 bytes
 (262 KB)@0x0]; too big?
 E: Failed to add
 'payloads/external/GRUB2/grub2/build/default_payload.elf' into ROM image.
 
Increase ROM size.
 
 
 




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

[coreboot] Prague meeting: hardware

2014-10-12 Thread Vladimir 'φ-coder/phcoder' Serbinenko
Hello, all. I've updated
http://www.coreboot.org/PragueMeetingHardware#phcoder . If somebody
wants me to bring sth, please add a paragraph there, otherwise, I won't
take almost anything.



signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] unable to build coreboot with grub

2014-10-12 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 12.10.2014 11:57, John Lewis wrote:
 Hi,
 
 It's in Chipset Options - Size of CBFS filesystem in ROM - 0x20
 or 0x40 will work.
 
This is only for recent intel chipsets.
 Cheers,
 
 John.
 
 On 12/10/14 10:51, Vipin Gahlaut wrote:
 Thanks Vladimir,


 Can you please let me know how to increase the ROM size?


 -Original Message-
 From: Vladimir 'φ-coder/phcoder' Serbinenko [mailto:phco...@gmail.com
 mailto:phco...@gmail.com]
 Sent: Sunday, October 12, 2014 3:02 PM
 To: Vipin Gahlaut; coreboot
 Subject: Re: [coreboot] unable to build coreboot with grub

 On 12.10.2014 08:03, Vipin Gahlaut wrote:

   Hi,

  

   I have cloned latest coreboot and trying to build with grub2 as
 payload.

   in make menuconfig I select grub2 instead of seabios. when I fire make

   command it checkout latest grub and that fails to build. for 2
 reasons.

  

   1. Due to some initialization errors that I managed to fix with below

   changes

   -struct grub_linux_initrd_context initrd_ctx = { 0, };

   +struct grub_linux_initrd_context initrd_ctx = { 0,NULL,0 };

  

 Sounds like you have an old gcc

   2. grub size issue as below that I am unable to resolve and looking

   for your help. I am building for QEMU and using QEMU version 2.1.2.

  

   E: Could not add

   [payloads/external/GRUB2/grub2/build/default_payload.elf, 268862 bytes

   (262 KB)@0x0]; too big?

   E: Failed to add

   'payloads/external/GRUB2/grub2/build/default_payload.elf' into ROM
 image.

  

 Increase ROM size.

  

  

  


 On Sun, Oct 12, 2014 at 11:33 AM, Vipin Gahlaut gail...@gmail.com
 mailto:gail...@gmail.com wrote:

 Hi,

 I have cloned latest coreboot and trying to build with grub2 as
 payload. in make menuconfig I select grub2 instead of seabios. when
 I fire make command it checkout latest grub and that fails to build.
 for 2 reasons.

 1. Due to some initialization errors that I managed to fix with
 below changes
 -  struct grub_linux_initrd_context initrd_ctx = { 0, };
 +  struct grub_linux_initrd_context initrd_ctx = { 0,NULL,0 };

 2. grub size issue as below that I am unable to resolve and looking
 for your help. I am building for QEMU and using QEMU version 2.1.2.

 E: Could not add
 [payloads/external/GRUB2/grub2/build/default_payload.elf, 268862
 bytes (262 KB)@0x0]; too big?
 E: Failed to add
 'payloads/external/GRUB2/grub2/build/default_payload.elf' into ROM
 image.





 




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] unable to build coreboot with grub

2014-10-12 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 12.10.2014 12:44, Vipin Gahlaut wrote:
 I tried changing under main mainboard - rom chip size but does not seem
 to be helping. If I look at .config I suspect that the reason is
 CONFIG_BOARD_ROMSIZE_KB_256=y which doesn't change even if I change ROM
 size in main board.
CONFIG_BOARD_ROMSIZE_KB_* is the default used by
CONFIG_COREBOOT_ROMSIZE_KB_*



signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] unable to build coreboot with grub

2014-10-12 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 12.10.2014 13:03, Vipin Gahlaut wrote:
 Ok, I changed CONFIG_BOARD_ROMSIZE_KB_ to 512 directly in .config as
 this is can not be changed in menuconfig.
Don't. You don't need to change it at all.
 My .config lokks like below
 and it still it says 262KB is too big?
 
Always do make clean after config change
 # CONFIG_BOARD_ROMSIZE_KB_256 is not set
 CONFIG_BOARD_ROMSIZE_KB_512=y
 # CONFIG_COREBOOT_ROMSIZE_KB_64 is not set
 # CONFIG_COREBOOT_ROMSIZE_KB_128 is not set
 # CONFIG_COREBOOT_ROMSIZE_KB_256 is not set
 CONFIG_COREBOOT_ROMSIZE_KB_512=y
 # CONFIG_COREBOOT_ROMSIZE_KB_1024 is not set
 # CONFIG_COREBOOT_ROMSIZE_KB_2048 is not set
 # CONFIG_COREBOOT_ROMSIZE_KB_4096 is not set
 # CONFIG_COREBOOT_ROMSIZE_KB_8192 is not set
 # CONFIG_COREBOOT_ROMSIZE_KB_12288 is not set
 # CONFIG_COREBOOT_ROMSIZE_KB_16384 is not set
 CONFIG_COREBOOT_ROMSIZE_KB=512
 CONFIG_ROM_SIZE=0x8
 
 
 On Sun, Oct 12, 2014 at 4:21 PM, Vladimir 'φ-coder/phcoder' Serbinenko
 phco...@gmail.com mailto:phco...@gmail.com wrote:
 
 On 12.10.2014 12:44, Vipin Gahlaut wrote:
  I tried changing under main mainboard - rom chip size but does not seem
  to be helping. If I look at .config I suspect that the reason is
  CONFIG_BOARD_ROMSIZE_KB_256=y which doesn't change even if I change ROM
  size in main board.
 CONFIG_BOARD_ROMSIZE_KB_* is the default used by
 CONFIG_COREBOOT_ROMSIZE_KB_*
 
 




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] unable to build coreboot with grub

2014-10-12 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 12.10.2014 13:30, Vipin Gahlaut wrote:
 Thanks a lot Valdimir,
 
 After make clean ROM Size config changes kicked in as expected and I
 managed to build grub payload.
 
Please keep the list CC'ed
 Thanks you very much for your help and support.
 
 
 
 On Sun, Oct 12, 2014 at 4:39 PM, Vladimir 'φ-coder/phcoder' Serbinenko
 phco...@gmail.com mailto:phco...@gmail.com wrote:
 
 On 12.10.2014 13:03, Vipin Gahlaut wrote:
  Ok, I changed CONFIG_BOARD_ROMSIZE_KB_ to 512 directly in .config as
  this is can not be changed in menuconfig.
 Don't. You don't need to change it at all.
  My .config lokks like below
  and it still it says 262KB is too big?
 
 Always do make clean after config change
  # CONFIG_BOARD_ROMSIZE_KB_256 is not set
  CONFIG_BOARD_ROMSIZE_KB_512=y
  # CONFIG_COREBOOT_ROMSIZE_KB_64 is not set
  # CONFIG_COREBOOT_ROMSIZE_KB_128 is not set
  # CONFIG_COREBOOT_ROMSIZE_KB_256 is not set
  CONFIG_COREBOOT_ROMSIZE_KB_512=y
  # CONFIG_COREBOOT_ROMSIZE_KB_1024 is not set
  # CONFIG_COREBOOT_ROMSIZE_KB_2048 is not set
  # CONFIG_COREBOOT_ROMSIZE_KB_4096 is not set
  # CONFIG_COREBOOT_ROMSIZE_KB_8192 is not set
  # CONFIG_COREBOOT_ROMSIZE_KB_12288 is not set
  # CONFIG_COREBOOT_ROMSIZE_KB_16384 is not set
  CONFIG_COREBOOT_ROMSIZE_KB=512
  CONFIG_ROM_SIZE=0x8
 
 
  On Sun, Oct 12, 2014 at 4:21 PM, Vladimir 'φ-coder/phcoder' Serbinenko
  phco...@gmail.com mailto:phco...@gmail.com
 mailto:phco...@gmail.com mailto:phco...@gmail.com wrote:
 
  On 12.10.2014 12:44, Vipin Gahlaut wrote:
   I tried changing under main mainboard - rom chip size but
 does not seem
   to be helping. If I look at .config I suspect that the reason is
   CONFIG_BOARD_ROMSIZE_KB_256=y which doesn't change even if I
 change ROM
   size in main board.
  CONFIG_BOARD_ROMSIZE_KB_* is the default used by
  CONFIG_COREBOOT_ROMSIZE_KB_*
 
 
 
 
 




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] [coreboot-gerrit] Patch set updated for coreboot: 3906937 amdfam14: Switch to per-device ACPI

2014-10-10 Thread Vladimir 'φ-coder/phcoder' Serbinenko
Success. Addresses are slightly different and new XSDT table but both
are ok and expected.
On 11.10.2014 00:16, Paul Menzel wrote:
 Dear Vladimir,
 
 
 Am Mittwoch, den 08.10.2014, 21:29 +0200 schrieb Vladimir Serbinenko:
 Vladimir Serbinenko (phco...@gmail.com) just uploaded a new patch set to 
 gerrit, which you can find at http://review.coreboot.org/7031

 -gerrit

 commit 390693798eebf2a371b32915a5ee239ba0b3a8bd
 Author: Vladimir Serbinenko phco...@gmail.com
 Date:   Wed Oct 8 21:18:31 2014 +0200

 amdfam14: Switch to per-device ACPI
 
 Change-Id: Icc663c28713f2d872bfeb1749303ce92db953bf5
 Signed-off-by: Vladimir Serbinenko phco...@gmail.com
 ---
  src/mainboard/amd/inagua/acpi_tables.c | 206 
 
  src/mainboard/amd/persimmon/acpi_tables.c  | 205 
 
  src/mainboard/amd/south_station/acpi_tables.c  | 206 
 
  src/mainboard/amd/union_station/acpi_tables.c  | 206 
 
  src/mainboard/asrock/e350m1/acpi_tables.c  | 206 
 
  src/mainboard/gizmosphere/gizmo/acpi_tables.c  | 206 
 
  src/mainboard/jetway/nf81-t56n-lf/acpi_tables.c| 207 
 -
  src/mainboard/lippert/frontrunner-af/acpi_tables.c | 206 
 
  src/mainboard/lippert/toucan-af/acpi_tables.c  | 206 
 
  src/northbridge/amd/agesa/family14/Kconfig |   1 +
  src/northbridge/amd/agesa/family14/northbridge.c   | 131 +
  11 files changed, 132 insertions(+), 1854 deletions(-)
 
 […]
 
 please find the acpidump outputs from running on the ASRock E350M1
 attached.
 
 
 Thanks,
 
 Paul
 
 
 




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] broken boards

2014-10-10 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 11.10.2014 03:03, ron minnich wrote:
 Android defaults sometimes surprise me.
 
 When we've had this kind of issue in the past a disassembly diff   of
 good vs bad has sometimes led to diagnosis. I think you have a rough
 idea what's broken so start there. Painful but necessary.
 
.car.data is linked at wrong address.
Working:
  4 .car.data 00b4  ff7f  ff7f  00012b00  2**5
  CONTENTS
Broken:
  4 .car.data 00ac      00012b00  2**5
  CONTENTS

 Ron
 
 
 




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] broken boards

2014-10-10 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 11.10.2014 03:20, Vladimir 'φ-coder/phcoder' Serbinenko wrote:
 On 11.10.2014 03:03, ron minnich wrote:
 Android defaults sometimes surprise me.

 When we've had this kind of issue in the past a disassembly diff   of
 good vs bad has sometimes led to diagnosis. I think you have a rough
 idea what's broken so start there. Painful but necessary.

 .car.data is linked at wrong address.
 Working:
   4 .car.data 00b4  ff7f  ff7f  00012b00  2**5
   CONTENTS
 Broken:
   4 .car.data 00ac      00012b00  2**5
   CONTENTS
 
http://review.coreboot.org/7042
 Ron



 
 




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] X201i RAM upgrade not working

2014-09-21 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 21.09.2014 04:12, ron minnich wrote:
 Here's the problem. There is caching of the DRAM configuration going
 on. So, a restart is not stateless.
 
 I would be happier if you could guarantee that the mrc cache is
 disabled, or never used, each time you change the dram setup (move
 DIMMs, whatever). Because from your earlier description it sounds to
 me like that is skewing your tests.
 
 If this makes no sense let me know.
 
Cache is discarded if SPD is changed. But the easy way to be sure is to
delete mrc.cache in cbfs.
@Mono: Do you come to Prague?
 
 ron
 




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] Unsupported hardware - information listed

2014-09-09 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 09.09.2014 20:52, Luigi Bai wrote:
 Per the wiki, I am offering this information to try to determine the
 status of coreboot support, especially for Intel/PM965 or Intel/82801H.
 I didn't see either under the lists of supported hardware
Unsupported, chipset unsupported. There is a very experimental CL
http://review.coreboot.org/#/c/5807/ to make i965 work but I can bet it
doesn't work as-is and probably very far from working.



signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] [PATCH] x86: add coreboot framebuffer support

2014-09-05 Thread Vladimir 'φ-coder/phcoder' Serbinenko

 I'm not a fan of Coreboot having invented its own nonstandard hacks, but
 I guess it is pretty much unavoidable.
It's completely avoidable. The stub can copy this information to
standard framebuffer info structure. The only missing thing is to apply
patch by cjwatson or mjg59 (I'm not sure now who wrote it) for having an
ID for linear framebuffer which implies no specific hardware (it can be
any) or firmware (coreboot doesn't provide nay additional info or callback).

Please don't apply this patch it will break SeaBIOS booting with VGABIOS.



signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] [PATCH] x86: add coreboot framebuffer support

2014-09-05 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 06.09.2014 00:18, ron minnich wrote:
 Vladimir can you point me to that patch? This sounds interesting.
 
https://lkml.org/lkml/2010/8/25/190

 ron
 




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] X201i RAM upgrade not working

2014-09-05 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 06.09.2014 00:19, ron minnich wrote:
 I don't think it's random at all. Vladimir can confirm, but if he is
 caching the RAM parameters, then this 'solution' will work for you
 until the next time you reflash coreboot, or change your dram type, at
 which point it will stop working.
 
Nehalem code discards cache if there is any mismatch between cache and
modules. There are 2 techniques in use:
1) If SPD mismatches, cache is discarded, so plugging new module will
discard cache.
2) Series of witnesses ensure that cache is only used if full algorithm
would yield the same result. E.g. if the result is a middle of timing
segment, then it saves the ends of segments and checks on next boot that
ends are the same. So even reseating the modules is likely to cause
cache to be discarded.

I think that his problem is either:
1) Badly seated modules
2) Only one permutation fails.
3) Code bug triggered by specific insertion of the said module
Since I've spent countless hours will all kinds of modules inserted and
reinserted on nehalem and the only bug I'm aware of is triggered by
having over 8G (maximum for nehalem) worth of RAM which causes die()
instead of proper ignore of extra RAM, without proof to contrary I'd
guess 1 is the case.





signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] [PATCH] x86: add coreboot framebuffer support

2014-09-05 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 06.09.2014 00:31, H. Peter Anvin wrote:
 On 09/05/2014 02:23 PM, Vladimir 'φ-coder/phcoder' Serbinenko wrote:
 On 06.09.2014 00:18, ron minnich wrote:
 Vladimir can you point me to that patch? This sounds
 interesting.

 https://lkml.org/lkml/2010/8/25/190

 
 I believe *most* of this patch has already gotten merged as we now use
 simplefb on x86 as well.  So all we need is probably the ID.

Yes, efifb has the same semantics. We just need some ID with clear
documentation saying sth like implies framebuffer without anything
else so that noone will get an idea to plug e.g. vga hooks into it.

   -hpa
 
 




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] [PATCH] x86: add coreboot framebuffer support

2014-09-04 Thread Vladimir 'φ-coder/phcoder' Serbinenko
This code assumes that payload didn't change video mode which is
improper assumption if you're not a payload.
On 04.09.2014 12:25, Gerd Hoffmann wrote:
 Signed-off-by: Gerd Hoffmann kra...@redhat.com
 ---
  arch/x86/Kconfig   |  12 +++
  arch/x86/kernel/Makefile   |   1 +
  arch/x86/kernel/coreboot.c | 232 
 +
  3 files changed, 245 insertions(+)
  create mode 100644 arch/x86/kernel/coreboot.c
 
 diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig
 index 778178f..3aeb038 100644
 --- a/arch/x86/Kconfig
 +++ b/arch/x86/Kconfig
 @@ -2372,6 +2372,18 @@ config X86_SYSFB
  
 If unsure, say Y.
  
 +config COREBOOT
 + bool coreboot
 + depends on X86_SYSFB
 + depends on FB_SIMPLE
 + help
 +   Add coreboot framebuffer support to the linux kernel.  Say Y here
 +   if you want the linux kernel find and use the firmware framebuffer
 +   initialized by coreboot.  Useful when using the linux kernel as
 +   coreboot payload.
 +
 +   If unsure, or if you don't know what coreboot is, say N.
 +
  endmenu
  
  
 diff --git a/arch/x86/kernel/Makefile b/arch/x86/kernel/Makefile
 index ada2e2d..4b30b0e 100644
 --- a/arch/x86/kernel/Makefile
 +++ b/arch/x86/kernel/Makefile
 @@ -103,6 +103,7 @@ obj-$(CONFIG_UPROBES) += uprobes.o
  obj-y+= sysfb.o
  obj-$(CONFIG_X86_SYSFB)  += sysfb_simplefb.o
  obj-$(CONFIG_EFI)+= sysfb_efi.o
 +obj-$(CONFIG_COREBOOT)   += coreboot.o
  
  obj-$(CONFIG_PERF_EVENTS)+= perf_regs.o
  obj-$(CONFIG_TRACING)+= tracepoint.o
 diff --git a/arch/x86/kernel/coreboot.c b/arch/x86/kernel/coreboot.c
 new file mode 100644
 index 000..44ed3fa
 --- /dev/null
 +++ b/arch/x86/kernel/coreboot.c
 @@ -0,0 +1,232 @@
 +/*
 + * Find and parse coreboot tables.  Register framebuffer if present.
 + * See src/include/boot/coreboot_tables.h in coreboot source tree.
 + */
 +
 +#include linux/kernel.h
 +#include linux/slab.h
 +#include linux/mm.h
 +#include linux/screen_info.h
 +#include linux/platform_device.h
 +#include linux/platform_data/simplefb.h
 +#include video/vga.h
 +
 +#include asm/checksum.h
 +#include asm/io.h
 +#include asm/sysfb.h
 +
 +struct cb_header {
 + u32 signature;
 + u32 header_bytes;
 + u32 header_checksum;
 + u32 table_bytes;
 + u32 table_checksum;
 + u32 table_entries;
 +};
 +
 +#define CB_TAG_MAINBOARD0x0003
 +#define CB_TAG_VERSION  0x0004
 +#define CB_TAG_FORWARD  0x0011
 +#define CB_TAG_FRAMEBUFFER  0x0012
 +
 +struct cb_mainboard {
 + u8  vendor_idx;
 + u8  part_idx;
 + charstrings[0];
 +};
 +
 +struct cb_framebuffer {
 + u64 physical_address;
 + u32 x_resolution;
 + u32 y_resolution;
 + u32 bytes_per_line;
 + u8  bits_per_pixel;
 + u8  red_mask_pos;
 + u8  red_mask_size;
 + u8  green_mask_pos;
 + u8  green_mask_size;
 + u8  blue_mask_pos;
 + u8  blue_mask_size;
 + u8  reserved_mask_pos;
 + u8  reserved_mask_size;
 +};
 +
 +struct cb_entry {
 + u32 tag;
 + u32 size;
 + union {
 + charstring[0];
 + u64 forward;
 + struct cb_mainboard   mb;
 + struct cb_framebuffer fb;
 + } u;
 +};
 +
 +#define CB_SIGNATURE 0x4f49424C  /* LBIO */
 +
 +/* Try to locate the coreboot header in a given address range. */
 +static __init struct cb_header *coreboot_find_header(u32 addr, int len)
 +{
 + struct cb_header *cbh, *copy;
 + int offset;
 + void *map;
 +
 + map = ioremap(addr, len);
 + for (offset = 0; offset  len; offset += 16) {
 + cbh = map + offset;
 + if (!cbh)
 + continue;
 + if (cbh-signature != CB_SIGNATURE)
 + continue;
 + if (!cbh-table_bytes)
 + continue;
 + if (ip_compute_csum(cbh, sizeof(*cbh)) != 0)
 + continue;
 + if (ip_compute_csum(cbh + 1, cbh-table_bytes)
 + != cbh-table_checksum)
 + continue;
 + pr_debug(coreboot: header found at 0x%x\n,
 +  addr + offset);
 + copy = kzalloc(sizeof(*cbh) + cbh-table_bytes, GFP_KERNEL);
 + memcpy(copy, cbh, sizeof(*cbh) + cbh-table_bytes);
 + iounmap(map);
 + return copy;
 + }
 + iounmap(map);
 + return NULL;
 +}
 +
 +static __init bool check_vga_text_mode(void)
 +{
 + uint8_t reg;
 +
 + if (screen_info.orig_video_isVGA != 1)
 + return false;
 +
 + reg = inb(VGA_GFX_I);
 + if (reg == 0xff)
 + /* no vga present */
 + return false;
 +
 + outb(VGA_GFX_MISC, VGA_GFX_I);
 + reg = 

Re: [coreboot] IBM x60t test - DSDT is in fact incomplete

2014-09-01 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 01.09.2014 22:08, Charles Devereaux wrote:
 Hello
 
Keep list CC'ed.
https://wiki.ubuntu.com/Kernel/Reference/ACPITricksAndTips
 Sorry for the late reply. Yesterday I tried acpi_debug with various
 values, but even with 0x I could not get logs similar to yours :
 [17493.249126] ACPI : EC: push gpe query to the queue
 [17493.249198] ACPI : EC: = TASK =
 [17493.249207] ACPI : EC: --- status = 0x28
 [17493.249213] ACPI : EC: --- command = 0x84
 [17493.249293] ACPI : EC: = IRQ =
 [17493.249306] ACPI : EC: --- status = 0x09
 [17493.249316] ACPI : EC: --- data = 0x5c
 [17493.249329] ACPI : EC: --- status = 0x08
 
 Could you please tell me the cmdline you use, or the options you set in
 /sys to activate that kind of output?
 
 In any case, I will soon try your patch even if I could not check the
 output (I have a test motherboard where I added an ISP wiring)
 
 Thanks
 Charles
 
 
 
 On Tue, Aug 26, 2014 at 12:28 AM, Charles Devereaux
 coreb...@guylhem.net mailto:coreb...@guylhem.net wrote:
 
 (offlist reply)
 
 Hello
 
 Very interesting, indeed, but I need to use my X60t tomorrow (and I
 already bricked it once while trying some simple coreboot patch so
 I'd rather not take any risk :-)
 
 However I will try to test that as soon as possible and let you
 know, tomorrow night or wednesday.
 
 I will also report you the ACPI EC results.
 
 Did you only had to activate CONFIG_ACPI_DEBUG to get these logs?
 
 Thanks
 Charles
 
 
 
 On Mon, Aug 25, 2014 at 5:02 PM, Vladimir 'φ-coder/phcoder'
 Serbinenko phco...@gmail.com mailto:phco...@gmail.com wrote:
 
 On 25.08.2014 22 tel:25.08.2014%2022:53, Vladimir
 'φ-coder/phcoder' Serbinenko wrote:
  Ideally, the DSDT should be fixed within coreboot, but this
 goes beyond
  my present abilities.
  Not true. Just do the same changes to the corresponding *.asl
 files in
  coreboot repo and send the patch to gerrit. Other than a layer of
  preprocessing, it's exactly the same code as you got from
 disassembly.
 
  Sorry, I misread you. I thought that you extracted coreboot
 DSDT from
  running system then patched it and used as custom DSDT. I'm
 going to
  make few experiments on my x220t.
 
 
 This may interest you:
 On X220t
 stylus removal:
 [17424.931729] ACPI : EC: = TASK =
 [17424.931747] ACPI : EC: --- status = 0x28
 [17424.931755] ACPI : EC: --- command = 0x84
 [17424.931852] ACPI : EC: = IRQ =
 [17424.931865] ACPI : EC: --- status = 0x09
 [17424.931874] ACPI : EC: --- data = 0x5d
 [17424.931885] ACPI : EC: --- status = 0x08
 
 So it's _Q5D
 
 Stylus reinsert:
 [17493.249126] ACPI : EC: push gpe query to the queue
 [17493.249198] ACPI : EC: = TASK =
 [17493.249207] ACPI : EC: --- status = 0x28
 [17493.249213] ACPI : EC: --- command = 0x84
 [17493.249293] ACPI : EC: = IRQ =
 [17493.249306] ACPI : EC: --- status = 0x09
 [17493.249316] ACPI : EC: --- data = 0x5c
 [17493.249329] ACPI : EC: --- status = 0x08
 
 So it's _Q5C
 
 Turning LID around:
 [17582.701907] ACPI : EC: push gpe query to the queue
 [17582.701979] ACPI : EC: = TASK =
 [17582.701987] ACPI : EC: --- status = 0x28
 [17582.701994] ACPI : EC: --- command = 0x84
 [17582.702075] ACPI : EC: = IRQ =
 [17582.702092] ACPI : EC: --- status = 0x09
 [17582.702096] ACPI : EC: --- data = 0x5e
 [17582.702104] ACPI : EC: --- status = 0x08
 So it's _Q5E
 
 Back to laptop layout:
 [17590.610440] ACPI : EC: push gpe query to the queue
 [17590.610513] ACPI : EC: = TASK =
 [17590.610521] ACPI : EC: --- status = 0x28
 [17590.610527] ACPI : EC: --- command = 0x84
 [17590.610610] ACPI : EC: = IRQ =
 [17590.610620] ACPI : EC: --- status = 0x09
 [17590.610628] ACPI : EC: --- data = 0x5f
 [17590.610641] ACPI : EC: --- status = 0x08
 so it's _Q5F
 
 Do you get the same events on X60t?
 
 From thinkpad-acpi.c:
 TP_HKEY_EV_TABLET_TABLET= 0x5009, /* tablet
 swivel up */
 TP_HKEY_EV_TABLET_NOTEBOOK  = 0x500a, /* tablet
 swivel down */
 TP_HKEY_EV_PEN_INSERTED = 0x500b, /* tablet pen
 inserted */
 TP_HKEY_EV_PEN_REMOVED  = 0x500c, /* tablet pen
 removed */
 
 So those are the values MHKP has to return.
 
 http://review.coreboot.org/6765 implements it. Please test.
 
 
 




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http

Re: [coreboot] x60 : adding WWAN support

2014-09-01 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 01.09.2014 22:19, Charles Devereaux wrote:
 Hello
 
 I'm interested in WWAN support, mostly for the GPS features and the cool
 things you can do with them (like a stratum ntp server).
 
Most GPS receivers don't have enough precision for any timing.
 I was told a EM770W doesn't even need a network registration to output
 NMEA coordinates
 (http://forum.thinkpads.com/viewtopic.php?f=30t=114426#p735612) so I
 got one.
 
 I looked at patch #4056 which enable WWAN for the EC, but it seems to
 only part of the job: the ACPI table should also contain a GWAN key for
 thinkpad-acpi
 
Not necessary.
 Apparently, this last part cause the WWAN card not to be handled by
 thinkpad-acpi, which would otherwise provide rfkill support (usefull to
 save power, something I'd like to improve)
Soft rfkill is always available through wwan driver.

 I believe similar entries should be added to coreboot asl, but I'm not
 sure of how integrated they should be. If I understand correctly,
 following the logic of patch #5242, there should be a conditional
 statement then some acpigen.
 
5242 is very special because of wacom tablet interaction (serial device
naming)
See src/ec/lenovo/h8/acpi/ec.asl and included files for the relevant scopes




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] IBM/Lenovo X60t: LED_: Excess arguments - needs 1, found 2

2014-08-26 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 26.08.2014 08:50, Paul Menzel wrote:
 Dear Charles, dear David,
 
 
 Am Montag, den 25.08.2014, 11:21 -0600 schrieb David Hubbard:
 
 I'm focusing in on this error message first:

 ACPI Warning: For \_SB_.PCI0.LPCB.EC__.LED_: Excess arguments - needs 1,
 found 2

 Can you take a look at the .asl files in your coreboot build? I believe you
 will find something like Method (LED, 2, NotSerialized) which means the
 LED method wants 2 arguments. Then look for calls to LED () and if you
 find one only passing 1 argument, that is the problem.
 
 I also noticed that message and quickly looked through the coreboot ASL
 files, but could not find anything calling that message. Looking at the
 Linux kernel sources I was also unable to find a call site. But I’d say
 the OS call this method incorrectly.
 
It's called by acpi_thinkpad module:
status = acpi_get_handle(ec_handle, LED, led_handle);

if (!acpi_evalf(led_handle, NULL, NULL, vdd,
led, led_led_arg1[ledstatus]))
static const unsigned int led_led_arg1[] = { 0, 0x80, 0xc0 };

So first argument is 0-based LED number and the second is 0/0x80/0xc0
for state which matches EC bits pretty closely (up to some shifts).
We probably should rename out LED method to sth else and provide a
compatible LED method.
Technically whole acpi_thinkpad is outside of ACPI spec but it's needed
to use some features like Lock hotkey which is outside of ACPI spec as well.
 […]
 
 
 Thanks,
 
 Paul
 
 
 




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] IBM/Lenovo X60t: LED_: Excess arguments - needs 1, found 2

2014-08-26 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 26.08.2014 17:53, Charles Devereaux wrote:
 My understanding is that the OS does the call that correctly, but that
 coreboot ASL tables only expect one argument.
Please provide a refrence when doing such bold claims. LED method is not
specified in ACPI, so assuming that it takes any particular arguments is
wrong from OS side.



signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] IBM x60t test - DSDT is in fact incomplete

2014-08-25 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 25.08.2014 04:39, Charles Devereaux wrote:
 Hello
 
 Previously
 (http://www.coreboot.org/pipermail/coreboot/2014-July/078320.html) I
 mentioned that 3 bugs seemed to be related to the DSDT:
  - missing ACPI events when the stylus is inserted/removed
How is the OS supposed to react to them?
  - errors when trying to make the leds blink with tpacpi
details? usecase?
  - errors during TPM initialization
Some people here would call it a feature.
 Ideally, the DSDT should be fixed within coreboot, but this goes beyond
 my present abilities.
Not true. Just do the same changes to the corresponding *.asl files in
coreboot repo and send the patch to gerrit. Other than a layer of
preprocessing, it's exactly the same code as you got from disassembly.




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] IBM x60t test - DSDT is in fact incomplete

2014-08-25 Thread Vladimir 'φ-coder/phcoder' Serbinenko
 Ideally, the DSDT should be fixed within coreboot, but this goes beyond
 my present abilities.
 Not true. Just do the same changes to the corresponding *.asl files in
 coreboot repo and send the patch to gerrit. Other than a layer of
 preprocessing, it's exactly the same code as you got from disassembly.
 
Sorry, I misread you. I thought that you extracted coreboot DSDT from
running system then patched it and used as custom DSDT. I'm going to
make few experiments on my x220t.



-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot


Re: [coreboot] IBM x60t test - DSDT is in fact incomplete

2014-08-25 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 25.08.2014 22:53, Vladimir 'φ-coder/phcoder' Serbinenko wrote:
 Ideally, the DSDT should be fixed within coreboot, but this goes beyond
 my present abilities.
 Not true. Just do the same changes to the corresponding *.asl files in
 coreboot repo and send the patch to gerrit. Other than a layer of
 preprocessing, it's exactly the same code as you got from disassembly.

 Sorry, I misread you. I thought that you extracted coreboot DSDT from
 running system then patched it and used as custom DSDT. I'm going to
 make few experiments on my x220t.
 
 
This may interest you:
On X220t
stylus removal:
[17424.931729] ACPI : EC: = TASK =
[17424.931747] ACPI : EC: --- status = 0x28
[17424.931755] ACPI : EC: --- command = 0x84
[17424.931852] ACPI : EC: = IRQ =
[17424.931865] ACPI : EC: --- status = 0x09
[17424.931874] ACPI : EC: --- data = 0x5d
[17424.931885] ACPI : EC: --- status = 0x08

So it's _Q5D

Stylus reinsert:
[17493.249126] ACPI : EC: push gpe query to the queue
[17493.249198] ACPI : EC: = TASK =
[17493.249207] ACPI : EC: --- status = 0x28
[17493.249213] ACPI : EC: --- command = 0x84
[17493.249293] ACPI : EC: = IRQ =
[17493.249306] ACPI : EC: --- status = 0x09
[17493.249316] ACPI : EC: --- data = 0x5c
[17493.249329] ACPI : EC: --- status = 0x08

So it's _Q5C

Turning LID around:
[17582.701907] ACPI : EC: push gpe query to the queue
[17582.701979] ACPI : EC: = TASK =
[17582.701987] ACPI : EC: --- status = 0x28
[17582.701994] ACPI : EC: --- command = 0x84
[17582.702075] ACPI : EC: = IRQ =
[17582.702092] ACPI : EC: --- status = 0x09
[17582.702096] ACPI : EC: --- data = 0x5e
[17582.702104] ACPI : EC: --- status = 0x08
So it's _Q5E

Back to laptop layout:
[17590.610440] ACPI : EC: push gpe query to the queue
[17590.610513] ACPI : EC: = TASK =
[17590.610521] ACPI : EC: --- status = 0x28
[17590.610527] ACPI : EC: --- command = 0x84
[17590.610610] ACPI : EC: = IRQ =
[17590.610620] ACPI : EC: --- status = 0x09
[17590.610628] ACPI : EC: --- data = 0x5f
[17590.610641] ACPI : EC: --- status = 0x08
so it's _Q5F

Do you get the same events on X60t?

From thinkpad-acpi.c:
TP_HKEY_EV_TABLET_TABLET= 0x5009, /* tablet swivel up */
TP_HKEY_EV_TABLET_NOTEBOOK  = 0x500a, /* tablet swivel down */
TP_HKEY_EV_PEN_INSERTED = 0x500b, /* tablet pen inserted */
TP_HKEY_EV_PEN_REMOVED  = 0x500c, /* tablet pen removed */

So those are the values MHKP has to return.

http://review.coreboot.org/6765 implements it. Please test.

-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] disabling bios usb stack

2014-08-25 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 25.08.2014 23:28, ron minnich wrote:
 A friend asks me how to disable the usb stack in his bios. I have no
 clue, anyone?

Doesn't sound like end goal. But I'd go through setup menu to see if
something fits his *end* goal (disabling usb stack sounds like means to
goal, not the goal itself).

 ron
 


-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot


Re: [coreboot] why is firmware 32 bit as opposed to 64 bit

2014-08-10 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 10.08.2014 21:06, John de la Garza wrote:
 I understand that the calling functions in 32 bit C uses the stack and
 this is why coreboot needs to use cache as RAM.  Doesn't 64 bit C use
 registers to pass arguments to functions?  If this is the case why not
 run in 64 bit mode?
 
 Also, even if cache as RAM is used and a stack is available, why not just
 build a 64 bit binary?  What are the advantages to using a 32 bit binary?
 

long mode (64-bit) needs paging table in RAM. So no 64-bit for preram
binary. For rest it's theoretically possible but it's too much hassle
for no benefit.





signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] iy my pc supported for coreboot?

2014-08-07 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 06.08.2014 00:08, Peter Stuge wrote:
 Simon Andrä wrote:
 I want use coreboot but i dont know if my system is supportet:
 I have an Acer Predator G3620
 
 It isn't.
 
 
 I hope someone can help me
 
 As always with open source you have to help yourself.
 
Or hire someone to do it.
 
 //Peter
 




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] ISP header for x60, fallback: indicating normal boot from grub2

2014-07-19 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 19.07.2014 07:42, Charles Devereaux wrote:
 Hello,
 
 On Wed, Jul 9, 2014 at 2:15 AM, Denis 'GNUtoo' Carikli
 gnu...@no-log.org mailto:gnu...@no-log.org wrote:
 
 My pomona clip had issues with its contact pins(the ones in contact
 with the flash chip) over time, so I unmounted it and repaired it.
 
 
 I tried pushing the pins down - it looks better but it didn't help. Mine
 only work with a lot of duct tape to keep it firmly pressed to the
 motherboard. Otherwise, it slides up just a bit, enough to avoid making
 contact. It seems more like a problem with the plastic
  
 
 Example in grub.cfg:
 menuentry 'Normal' {
 cmosclean 0x30:0
 cmosclean 0x30:1
 cmosclean 0x30:2
 cmosclean 0x30:3
 cmosclean 0x30:4
 cmosclean 0x30:5
 
 halt
 }
 
 
 Interesting. Is there a reason why different values are used on gluglug
 halt? cf http://samnoble.org/thinkpad/grub/gluglug.grub.custom.cfg:
 
The values are exactly the same. Search for hex.
 There is only cbmemc, cbls and cbtime. They could be good menu options
 but the output is displayed without a pager (so you can't see them as it
 goes back to the menu - you have to enter a command line)
 
pager=1
 Of all of these, cbtime would be especially interesting to add a title
 to grub menu, to show if the boot was in normal or fallback and how long
 it took. 
 
 I'll see if it's possible to add the result of a command to grub menu




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] setting smbios values from the OS

2014-06-20 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 20.06.2014 20:08, Patrick Georgi wrote:
 Am 20.06.2014 22:01, schrieb Rafael Vanoni:
 Take serial number, for example. I'd like each different system that I
 build to have its own serial number, and building coreboot for every
 serial number doesn't scale.
 We have an .id section just below the 16bit entry point - that can
 (easily) be extended to host more fields, and our smbios table generator
 could fetch a number from there, overriding a compile time default.
 
 To start, see src/arch/x86/lib/id.inc. It's really two tables: one
 containing the offsets, one containing the data (strings are 0-terminated).
 Both tables need to be prepended with new fields, since we're in a
 top-aligned world here.
 
I think it's more sound to have a CBFS plain-text file with serial
numbers and other runtime configs. There is a fair number of board and
chipset-specific config that should be modifiable without recompilation
but are probably inappropriate for CMOS for various reasons as CMOS size
shortage or the need for persistance even across RTC power well failure
[aka bad clock battery] (think MAC address). having fixed indexes
doesn't scale.
 Patches accepted :-)
 
 
 Patrick
 
 
 




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] setting smbios values from the OS

2014-06-20 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 20.06.2014 20:43, Patrick Georgi wrote:
 Am 20.06.2014 22:40, schrieb Vladimir 'φ-coder/phcoder' Serbinenko:
 (think MAC address).
 I guess PC technology is finally beyond requiring those at fixed magic
 offsets. Some of our chipsets still need it that way.
 
 having fixed indexes doesn't scale.
 Neither do text files.
 
I disagree. If you have a file named e.g. config.txt with a syntax like:

southbridge/ibexpeak/thermal_correction: 0x1222

one value per line, it perfectly scales.
 
 Patrick
 




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] x60s tablet question : optimized kernel, coreboot with the video fix and serial ports support

2014-06-13 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 11.06.2014 09:46, derpeter wrote:
 
 I tried this last month. I cherrypickt everything execpt the video fix
 and got a working coreboot.
 Sadly i could not bring the wacom to work but i'm not sure if its a
 problem of coreboot or linux.
Submit logs then: Xorg log, dmesg and coreboot log.



signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] [HELP!!!] Pavilion EC (similar to compal/ene932) and its woes

2014-04-05 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 05.04.2014 19:02, mrnuke wrote:
 When an event happens, on the other hand, like a hotkey, or AC is removed, it 
 does not generate an SCI that would lead to a query call (_Qxx). Instead it 
 spits out an SMI. I know for a fact that the SCI and SMI GPEs are where we 
 expect them to be.
What do you mean by expected? Same as vendor BIOS? My guess is that
vendor BIOS handles SMI and then somehow triggers SCI in software. I'd
try to route all GPE to SCI.



signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] [announce] coreboot for the 21st century

2014-03-29 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 29.03.2014 07:45, Stefan Reinauer wrote:
 * Andrew Wu andrewwu...@gmail.com [140327 14:00]:
 Sorry, I checked Vortex86EX CPU datasheet, but it seems there is no
 workaround can do it.

 So if I want to get rid of romcc, maybe I have to write DRAM init code
 in assembly, That is not very easy. :(
  
 Don't worry we'll figure something out that's better than writing ram
 init in assembly.
 
Do I get it correctly that your main problem is the heavy use of
#include romcc requires? If so why don't we just create a file with
#include's from all files from romstage-y? This will remove the #include
needs.
 Stefan
 
 




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] [announce] coreboot for the 21st century

2014-03-29 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 29.03.2014 08:41, Patrick Georgi wrote:
 Am Samstag, den 29.03.2014, 08:30 +0100 schrieb Vladimir
 'φ-coder/phcoder' Serbinenko:
 Do I get it correctly that your main problem is the heavy use of
 #include romcc requires? If so why don't we just create a file with
 #include's from all files from romstage-y? This will remove the #include
 needs.
 There are also a bunch of places where we stick to some less than
 perfect C code to accommodate romcc.
 
 The #include *.c stuff is mostly the visible effect, not the cause.
 Getting romcc raminits to compile self-contained (or with their own
 specific *.c files to include) fixes both.
 
Do you mean having a separate stage raminit between bootblock and
romstage? If so it raises a question of what's romostage scope is.
 
 Patrick
 
 
 




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] Miniboot

2014-03-26 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 26.03.2014 00:33, The Gluglug wrote:
 -- alternatively:
 ship coreboot without anything in src/mainboard.
 have git repositories for each vendor/mainboard.
 user downloads what they need, and a default .config for the board of
 their choosing.
 
Git is developpement tree, not user-fetch tree. It's optimized for devs.
If you feel like sth optimized for users is needed, feel free to create
an interface you want that would piggyback on top of official git.
 On 25/03/14 23:29, The Gluglug wrote:
 This is focussed on users (non-developers).
 
 Most coreboot users only have perhaps a few machines that they are 
 building for. Maybe even just one.
 
 Yet they are downloading the entire coreboot source tree and
 selecting which board they want, configuring it, etc.
 
 My idea: -- a small set of source files (such as from
 src/mainboard/vendor/board) -- a script (perhaps a simple git
 checkout) which fetches the needed parts of the source from the
 main branch, for building that board -- default/sane
 configurations pre-defined for that board.
 
 Advantages: -- less headache for developers (user already has most
 of what they need, less likely to request support) -- less to
 download (less waiting required, especially for people with slow
 connections)
 
 Essentially, I have in mind a more modular coreboot.
 
 




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] Changes to the coreboot Project Structure

2014-03-24 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 25.03.2014 02:33, Stefan Reinauer wrote:
 * David Hubbard david.c.hubbard+coreb...@gmail.com [140323 20:33]:
 On Sun, Mar 23, 2014 at 12:58 PM, Vladimir ' -coder/phcoder' Serbinenko 
 phco...@gmail.com wrote:

 On 23.03.2014 19:24, ron minnich wrote:
  So I believe the problem is not the idea of gatekeepers, but the
  manner in which they are proposed to work. Can you tell me what about
  this upsets you? I want to understand.
 The problem is that the proposal is that all commits go through
 gatekeepers. It's bottleneck. It makes much more sense to have per-path
 maintainers and tiered code.
 E.g. we could keep all boards rather than shooting them and the ones
 that are considered to be too old can have less stringent requirements
 on commits. This will free the qualified people time to concentrate on
 boards where it's most important.
 Also it will benefit unimportant boards as well as they'll be easier
 to keep.
  Then per-path maintainer and gatekeeper are contradictory concepts. How
 one can be maintainer if he can't commit to his maintained code. I feel,
 for example, that nehalem code and resulting boards are my
 responsibility and I should be able to commit there easily. Getekeeprs
 will make this impossible as I'm more or less the only one who knows
 nehalem code *and* cares about it.
 I feel like the top-level maintainers would be only about overall
 structure, not about details in Board:foo/bar they've never even seen
 and solving disputes. Making everything go through 6 people is
 unfeasible as 6 people can't represent broad range of interests and some
 parts of code will get neglected more that they have to be of simple
 scarceness of resources.


 Without speaking for anyone or about anything else, can Stefan comment on 
 this
 proposal by Vladimir? It seems relatively cool and reasonable.
 
 Tried to do so in the other mail... There's too much risk involved in
 working directly on upstream. The downsides just outweigh the benefits
 (for everybody, really)
 
 For example, when getting to the hot phase of a new product, we don't
 even use our chromium top of tree, but create a firmware branch
 specifically for a new product. Patches relevant to that product go into
 that branch (and top of tree, aka HEAD) but NOTHING else. For every
 firmware image that is released, there are also tests involving
 thousands and thousands of reboots and suspend/resume cycles to make
 sure that the product is absolutely stable. Because if 1/100k resumes
 crashes that means for a million users there are ten users every day
 whose computers crash. This level of testing is simply not possible when
 aiming at a moving target.
 
I don't see how this prevents any of my propositions for the bulk of the
boards. The problem you describe isn't going away with your proposition.
We still want to have a top which is supposed to work on all boards.
 Stefan
 
 
 




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] Changes to the coreboot Project Structure

2014-03-24 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 25.03.2014 06:34, ron minnich wrote:
 
 
 
 On Mon, Mar 24, 2014 at 10:20 PM, Vladimir 'φ-coder/phcoder' Serbinenko
 phco...@gmail.com mailto:phco...@gmail.com wrote:
 
 
 I don't see how this prevents any of my propositions for the bulk of the
 boards. The problem you describe isn't going away with your proposition.
 We still want to have a top which is supposed to work on all boards.
 
 
 
 All boards? The Arima HDAMA, 12 years old now, not sold for maybe 10?
 All boards? Are you sure?
 
That's why I added *supposed to*. I'm aware that some boards are
probably broken and not much we can do about it.
 ron 




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] Changes to the coreboot Project Structure

2014-03-23 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 23.03.2014 04:10, Peter Stuge wrote:
 That isn't too different from creating a fork?
Fork is better. With fork we don't have to deal with the same people who
pushed the community out in the first place.



signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] Changes to the coreboot Project Structure

2014-03-23 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 23.03.2014 19:24, ron minnich wrote:
 So I believe the problem is not the idea of gatekeepers, but the
 manner in which they are proposed to work. Can you tell me what about
 this upsets you? I want to understand.
The problem is that the proposal is that all commits go through
gatekeepers. It's bottleneck. It makes much more sense to have per-path
maintainers and tiered code.
E.g. we could keep all boards rather than shooting them and the ones
that are considered to be too old can have less stringent requirements
on commits. This will free the qualified people time to concentrate on
boards where it's most important.
Also it will benefit unimportant boards as well as they'll be easier
to keep.
 Then per-path maintainer and gatekeeper are contradictory concepts. How
one can be maintainer if he can't commit to his maintained code. I feel,
for example, that nehalem code and resulting boards are my
responsibility and I should be able to commit there easily. Getekeeprs
will make this impossible as I'm more or less the only one who knows
nehalem code *and* cares about it.
I feel like the top-level maintainers would be only about overall
structure, not about details in Board:foo/bar they've never even seen
and solving disputes. Making everything go through 6 people is
unfeasible as 6 people can't represent broad range of interests and some
parts of code will get neglected more that they have to be of simple
scarceness of resources.



signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] Changes to the coreboot Project Structure

2014-03-23 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 23.03.2014 19:24, ron minnich wrote:
 I have friends who commit to grub2, and there seem to be gatekeepers
 there; how do you manage that process?
In case of grub2 I admit we have exactly the problems I described. I'm
open to having more maintainers but right now it doesn't seem to be
feasible. I proposed co-maintaining to some skilled people but they
didn't accept as of now. Here you have a chance of more people willing
to help maintain coreboot. Use this resoiurce.



signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] [announce] coreboot for the 21st century

2014-03-21 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 20.03.2014 22:33, Stefan Reinauer wrote:
 During this time we collected over 250 different
 mainboards. A great achievement,
I suppose that most of boards were contributed by non-commercial
community. Yet now you propose to basically kill this chicken nesting
golden eggs and make coreboot commercial-only.
Sorry but your proposition with handling non-commercial community
doesn't make any sense at all. You propose to represent the community by
small number of people who most likely won't be available enough and who
don't represent the community as whole. No single person or small team
can represent an entire community, no matter how these persons are
knowledgeable and competent. Commercial entity could be represented by
one person but a community of independent volunteers can't.



signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] GSoC-2014 Coreboot project

2014-03-20 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 20.03.2014 11:25, Allen Yan wrote:
 Hi, David,
When at AsusTek Suzhou, my work is mainly responsible for bios
 porting and fixing bug. There were four mainboards P5KPL-S, P5QL-E,
 P5QL-SE, P5QL. All based on Intel platform and AMI Legacy BIOS Core
In the second half year of 2008, I worked on pre-development of
 EFI-BIOS for ASUS mainboard. I wrote a Dual bootblock module and added
 NTFS support(read only) for AutoRecovery module using AMI Apito
 platform (based on EFI).
 
Do I understand it correctly, that you've had access to proprietary BIOS
code? If so which papers did you sign and under what license did you get
them? Depending on the answers it may partially or fully disqualify you
from contributing to coreboot.
 Interesting experience, but memories will fade! Details can't be
 remembered clearly.
 
 As Vladimir said, if the chipset is unsupported then writing MRC for it will 
 be a very long and difficult process. If the chipset is supported then 
 adding mainboard support may be a relatively simple task that not sufficient 
 for GSoC.
  Do we need to write MRC by ourselves in coreboot? Isn't MRC code
 supported by Intel?
 
 If you have experience with UEFI, perhaps you can implement features that 
 are missing in our Tianocore support: http://www.coreboot.org/TianoCore .
 
 Implementing UEFI CBFS driver and GOP driver are very clear goal.
 questions: I don't know whether coreboot or some payload implement
 common flash interface for flash programming software. If not, why?
 
 https://trello.com/b/pEdlwYTb/tiano-payload
 It seems that Tiano payload is a very activity project. I think I can
 try my best to implement one feature or twp for the project! Like use
 a seperate Fv in CBFS as Fault Tolerant Variable Storage
 
 Look forward to your kind advice!
 
 
 
 On 3/20/14, David Hendricks dhend...@google.com wrote:
 Hi Jinyi,
 Can you provide more details about your work as a BIOS engineer?

 As Vladimir said, if the chipset is unsupported then writing MRC for it
 will be a very long and difficult process. If the chipset is supported then
 adding mainboard support may be a relatively simple task that not
 sufficient for GSoC.

 If you have experience with UEFI, perhaps you can implement features that
 are missing in our Tianocore support: http://www.coreboot.org/TianoCore .


 On Wed, Mar 19, 2014 at 6:06 AM, Allen Yan lex...@gmail.com wrote:

 Hi,
 I am Jinyi Yan , a second year PhD candidate from Shanghai Institute
 of Micro-system and Information Technology, Chinese Academy of
 Sciences. I used to be a mainboard BIOS engineer in ASUS Technology
 Suzhou Co., Ltd for about two years (2007.7~2009.2). My major now is
 optoelectronics. But I have a lot of fun while programming, in my
 heart the working experience of being a BIOS engineer is still very
 exciting.
 I think GsoC is a nice platform for me to participate the open source
 community. When I search the GsoC projects and organizations, the
 coreboot and flashrom projects are definitely the right choices for
 me. I have a spare ASUS P5KPL PC at my hand, but the chipset is not in
 the support list of coreboot project.
 As Stefan Tauner's suggestion, maybe porting coreboot to new mainboard
 or implementing advanced coreboot features on exsiting mainboards are
 nice too.
 Now I'm not very familiar with the program structure of coreboot, so I
 expect your guidence and hope to contribute for coreboot and flashrom
 even if my application is not accpeted.
 Thanks! Look forward to your kind advice!
 Regards,
 Jinyi Yan

 --
 coreboot mailing list: coreboot@coreboot.org
 http://www.coreboot.org/mailman/listinfo/coreboot




 --
 David Hendricks (dhendrix)
 Systems Software Engineer, Google Inc.

 




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] Hey

2014-03-20 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 20.03.2014 12:12, Shant Kehyeian wrote:
 Hello,
 I have Samsung ARM chromebook series 3 Snow and I am trying to flesh
 it and change the boot process.
 So I build a coreboot.rom for that, but before I start to do that I
 would like to ask about the payload. When I did the make menuconfig it
 wasn't by default the SeaBios., there wasn't at all ...there was GRUB 2
 and I selected it...so My question is would it work as SeaBios to boot
 from usb ?
There is no arm-coreboot GRUB2 port currently.
 Thank you.
 
 




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] Hey

2014-03-20 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 20.03.2014 13:10, Shant Kehyeian wrote:
 In fact I do need the SeaBios not the GRUB2 to be able to boot from usb
 with live CD which I can format and install my preferred OS...
 
I think you're missing the ARM part. Only ARM distros have any chance
to work. Given fragmentation of ARM it may even mean that only
Linux-based works on your machine.
 
 On Thu, Mar 20, 2014 at 4:05 PM, Vladimir 'φ-coder/phcoder' Serbinenko
 phco...@gmail.com mailto:phco...@gmail.com wrote:
 
 On 20.03.2014 12:12, Shant Kehyeian wrote:
  Hello,
  I have Samsung ARM chromebook series 3 Snow and I am trying to flesh
  it and change the boot process.
  So I build a coreboot.rom for that, but before I start to do that I
  would like to ask about the payload. When I did the make
 menuconfig it
  wasn't by default the SeaBios., there wasn't at all ...there was
 GRUB 2
  and I selected it...so My question is would it work as SeaBios to boot
  from usb ?
 There is no arm-coreboot GRUB2 port currently.
  Thank you.
 
 
 
 
 




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] Hey

2014-03-20 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 20.03.2014 13:34, Shant Kehyeian wrote:
 No I just gave in menuconfig the snow board ...and then as a payload I
 chose the GRUB2...that's what I meant ...:)
 
Keep list CC'ed.
I'm surprised it compiled at all. It should have error'ed out.
 
 On Thu, Mar 20, 2014 at 12:31 PM, Vladimir 'φ-coder/phcoder' Serbinenko
 phco...@gmail.com mailto:phco...@gmail.com wrote:
 
 On 20.03.2014 13:27, Shant Kehyeian wrote:
  Yess you are saying it right...
  So I installed the coreboot source code and I compiled it with
 GRUB2 so
  ...Do you think that I will get the grub options while the boot
 process ?
  Thank you...
 
 I don't know how you managed to compile GRUB2 for ARM coreboot but it's
 unlikely to work. I'm under impression that you compile for wrong
 mainboard altogether (you've chosen mobo in make menuconfig, right?)
 
  On Thu, Mar 20, 2014 at 12:23 PM, Vladimir 'φ-coder/phcoder'
 Serbinenko
  phco...@gmail.com mailto:phco...@gmail.com
 mailto:phco...@gmail.com mailto:phco...@gmail.com wrote:
 
  On 20.03.2014 13:10, Shant Kehyeian wrote:
   In fact I do need the SeaBios not the GRUB2 to be able to boot
  from usb
   with live CD which I can format and install my preferred OS...
  
  I think you're missing the ARM part. Only ARM distros have
 any chance
  to work. Given fragmentation of ARM it may even mean that only
  Linux-based works on your machine.
  
   On Thu, Mar 20, 2014 at 4:05 PM, Vladimir 'φ-coder/phcoder'
 Serbinenko
   phco...@gmail.com mailto:phco...@gmail.com
 mailto:phco...@gmail.com mailto:phco...@gmail.com
  mailto:phco...@gmail.com mailto:phco...@gmail.com
 mailto:phco...@gmail.com mailto:phco...@gmail.com wrote:
  
   On 20.03.2014 12:12, Shant Kehyeian wrote:
Hello,
I have Samsung ARM chromebook series 3 Snow and I am
  trying to flesh
it and change the boot process.
So I build a coreboot.rom for that, but before I start
 to do
  that I
would like to ask about the payload. When I did the make
   menuconfig it
wasn't by default the SeaBios., there wasn't at all
 ...there was
   GRUB 2
and I selected it...so My question is would it work as
  SeaBios to boot
from usb ?
   There is no arm-coreboot GRUB2 port currently.
Thank you.
   
   
  
  
  
 
 
 
 
 
 




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] GSoC-2014 Coreboot project

2014-03-20 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 20.03.2014 13:45, Peter Stuge wrote:
 Vladimir 'φ-coder/phcoder' Serbinenko wrote:
 On 20.03.2014 11:25, Allen Yan wrote:
 Hi, David,
When at AsusTek Suzhou, my work is mainly responsible for bios
 porting and fixing bug.

 Do I understand it correctly, that you've had access to proprietary BIOS
 code? If so which papers did you sign and under what license did you get
 them?
 
 Vladimir, I would assume that Jinyi signed a standard employment
 agreement. Employment agreements contain a non-disclure clause
 which covers all non-public information which the employer has
 received from suppliers and customers.
 
 
 Depending on the answers it may partially or fully disqualify you
 from contributing to coreboot.
 
 I disagree, and I think your tone is rude.
 
I didn't mean to be rude. I apologise if it sounded like this. I'm
somewhat pessimistic generally and a mathematician and so I look for
problems first.
 Please be supportive of GSoC candidates who are showing an interest
 in coreboot, especially candidates such as Jinyi who can obviously
 contribute with significant relevant experience from the firmware
 domain.
 
I didn't mean to be dismissive, when I discuss problems it's to prevent
and fix them.
 Employment agreements have clauses about not working on competing
 products. coreboot in summer of 2014 does not compete with BIOS for
 commercial mainboards in 2008. I am obviously not a lawyer but I
 can not see a problem here.
 
They sometimes also have draconian non-disclosure parts. We can't know
until such issues are checked by someone qualified. I'm not. Does
coreboot has some kind of experts it can use for those cases? On GNU
projects I'd refer to copyright clerk who would in turn refer further if
needed.
 
 //Peter
 
 
 




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] [announce] coreboot for the 21st century

2014-03-20 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 20.03.2014 22:33, Stefan Reinauer wrote:
 coreboot for the 21st century
 
 setting up the project for the next decade
 
 Purpose: Purge all boards / chipsets / cpus that require ROMCC in
 romstage and known broken chipsets (sc520, i855)
 
 coreboot is now officially 15 years old. One and a half long decades
 with ups and downs. During this time we collected over 250 different
 mainboards. A great achievement, but also a great maintenance burden.
 
 * It is hard to keep 250+ mainboards working. Actually impossible.
 * Keeping them working comes at a cost. Keep old infrastructure around.
   Workarounds, special cases
 * We don’t test except on the very last stuff we’re working on
 
The boards and chipsets are sufficiently well insulated from each other
so that it's possible to improve one without breaking the others. With
board-status the potential users and devs have a good overview which
revisions work on which devices. The breakage will periodically occur no
matter if it's 25 board or 250 boards. And it will be fixed by those who
care about the particular board.
Also I feel like the amount of boards supported is actually a relatively
minor maintenance burden compared to number of *options* supported. I
think we should first go on killing the options noone really uses like
possibility disabling ACPI tables (I have a changeset for this, mixed
reception), disabling SMBIOS tables. relocatable modules should be
chosen by chipset, not be user-visible, and so on. There are more broken
option configurations than broken boards.



signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] Changes to the coreboot Project Structure

2014-03-20 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 21.03.2014 01:39, Carl-Daniel Hailfinger wrote:
 Hi Stefan,
 
 streamlining development and maintenance is definitely absoutely
 worthwhile. Getting rid of unmaintained code is also a good thing. The
 guidelines presented in your mail look mostly good IMHO, but I'd like to
 comment on a few things.
 
 Am 20.03.2014 22:55 schrieb Stefan Reinauer:
 * Significantly reduce number of submitters
   To ensure consistency, scalability and conformity with the general
   coreboot strategy, we need to define a clear committer structure that
   defines the original project structure of having a benevolent dictator
   aka project leader (Stefan Reinauer) and gatekeepers in place. The
   suggested structure will need to value both community interests and
   corporate interests equally and hence a good setup would be to have a
   final amount of six developers with submit rights, three community
   representatives and three corporate representatives (on from each major
   stakeholder):
 
 I see a huge bottleneck in restricting the number of committers to six.
 - Corporate committers will be primarily obliged to get the stuff of
 their own employer committed, but if they are ill or on vacation,
 someone else would have to take over. This would either be another
 corporate committer (in which case their own employer would have to
 authorize spending time for a different company) or a community committer.
 - Community committers are not paid, and commit in their spare time.
 Spare time is not necessarily abundant all year round. Speaking from
 experience, the flashrom project has no shortage in developers or
 submitted patches, but a real and painful shortage in
 reviewers/committers. The flashrom project patch backlog is huge due to
 this. Doing a commit is easy, but making sure that a commit follows
 certain guidelines is a huge time sink with none of the fun of writing code.
 - New contributors (corporate or community) would have to find a
 sponsor to actually commit their code. With a large committer base,
 this can happen rather quickly. With only six committers facing their
 own deadlines or other shortages of time, this could take quite a while.
 
The proposition of gatekeepers would essentially kill community effort.
Even in current infrastructure reviewing is a major slowdown. With small
number of gatekeepers there wouldn't be any significant contributions as
the gatekeepers wouldn't be able to review them in reasonable time,
which will, in turn discourage contributions. You may as well just stop
accepting community contributions right now: it turns out to be the same
thing, just a little bit quicker.
You cannot treat community as some kind of corporate entity.
   Peter Stuge, Kyösti Mälkki, N.N. (non-commercial part of the
   coreboot community)
Sounds like a joke. While Peter is competent, he's also very busy. I'd
expect his review thoughtput of perhaps a patch a week.
You can't realistically put such burden on few people.
If you want a corporate version of coreboot, I think you have to use a
workflow similar to Fedora vs Red Hat Enterprise Linux.
The changes you proposed would effectively make coreboot into corporate
project. I'd expect a community fork to emerge quickly, outside of this
new limiting infrastructure and I'll be surely moving to community fork.




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] GSoC-2014 Coreboot project

2014-03-19 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 19.03.2014 21:06, Allen Yan wrote:
 As Stefan Tauner's suggestion, maybe porting coreboot to new mainboard
Just a quick note: for porting to new chipset to be accepted, you need to:
1) Justify why this chipset is relevant. E.g. old chipsets most probably
aren't.
2) Prove that you're able to do it. New raminit isn't an easy task.
Also from quick google it seems that this board uses i945 chipset which
is already supported. Port with already supported chipset is a task for
3-5 days for experienced dev, most likeyl too small for GSoC.



signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] Building a Thinkpad X230 coreboot image

2014-03-17 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 17.03.2014 17:08, Bernie Innocenti wrote:
 Hello Vlad!
 
 First of all, thank you very much for porting Coreboot to the X230.
 
 I'm following your instructions [1] to build a coreboot image from head,
 but I'm not sure how to configure things in menuconfig. Would you mind
 sharing your .config file and a prebuilt, known-good rom file?
 
Look at board-status repository. I will not share any known-good one
as you need external flasher anyway. Sharing a binary would just
encourage people to attempt stupid things like writing it with partially
locked flash.
 Also, while I'm waiting for the SOIC test clip to ship: do you know if
 anyone is working on getting flashrom to work with the X230?
 
flashrom with layout patches works once flash is unlocked. But the only
way to unlock flash is to flash coreboot or slightly modified vendor
firmware. Either requires external flash.
 [1] http://www.coreboot.org/Board:lenovo/x230
 




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] Building a Thinkpad X230 coreboot image

2014-03-17 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 17.03.2014 20:39, Grim Schjetne wrote:
 Bernie Innocenti ber...@codewiz.org writes:
 
 First of all, thank you very much for porting Coreboot to the X230.
 
 Indeed, this has made me all the more interested in the Coreboot
 project. With an X201 and an X230 port, perhaps there is some hope
 for an X220 port as well?
It's different chipsets. So, no X201, X220 and X230 are very different
machines from coreboot point of view.
 I'm reading the wiki pages right now for ways
 I can help.
 




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] [RFT] Please test patch set intel/i945: Only write CID, PN and TCID once

2014-03-16 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 17.03.2014 08:00, Mono wrote:
 Who knows, it might(!) fix some 5 year old bug?
Then it should be no problem for you to point one to us.
coreboot is not openhardware. It never was and never will be.
Openhardware is the only way to know what your hardware actually.
Coreboot is only how to kick the hardware into working.



signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] qemu

2014-03-11 Thread Vladimir 'φ-coder/phcoder' Serbinenko
@ron: please provide more information about your qemu: version, how
built, options, patches,... Try -M pc-q35-1.7 and -M pc-i440fx-1.7. Try
specifying --no-kvm and --enable-kvm. Speyifying -cpu may help as well.
From my experience with GRUB, qemu has following flaws:
- From version to version they sometimes do subtle changes which break
firmware.
- On some CPUs kvm bugs or behaves unexpectedly.
On 10.03.2014 14:43, David Hubbard wrote:
 On Sunday, March 09, 2014 08:26:05 PM you wrote:
 On Sunday, March 09, 2014 05:14:51 PM you wrote:
  Story so far:
 
  1. pick q35 chipset
  2. qemu -M q35 etc. etc.

 $ qemu-system-i386 -M q35 --bios build/coreboot.rom

 -ENOREPRODUCE

  1. pick i440fx chipset.
  2. qemu -M pc etc. etc.

 qemu-system-i386 --bios build/coreboot.rom

 -ENOREPRODUCE

  Endless repetitions of
  qemu: unsupported keyboard cmd cmd=0x00
  or 0x80

 -ENOREPRODUCE

 Same with qemu-kvm.

  This is with crossgcc.
  I'm disappointed it's this fragile. I'm worried that feature push has
  gotten ahead of reliability push.

 Or your qemu installation is b0rk3d.
 
 Perhaps if it is that easy to break the installation -- remember, he did
 a clean checkout -- then there could be a broken dependency, or
 something similar which involves digging deeply into the build system.
 
 In other words, even if what you say is true, we still need to have this
 conversation.
 
 I feel like Coreboot is a bit fiddly to get set up right. To a degree,
 that helps communicate that working with coreboot is hard stuff. But
 still, we should implement some better quality controls, imho.
 
 Hopefully we can figure out what Ron ran into. That would be a good start.
 
 David
 
 




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] GSoC-2014- coreboot mainboard test suite

2014-03-02 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 02.03.2014 09:01, Muhammad Ramshad wrote:
 When i search through the projects and organizations the coreboot
 project grabbed my focus towards it because i am more interested in
 Digital System Design and hardware a level development like processor
 design and ISA designs.
And absolutely no idea that HTML messages are not welcome on mailing
list. Use ASCII messages. It will also prevent you from screaming big
letters in the middle of a message.



signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] `DEBUG_INTEL_ME` (incorrectly) only selected for Intel BD82x6x

2014-02-26 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 26.02.2014 04:24, mrnuke wrote:
 On Wednesday, February 19, 2014 11:06:40 PM Paul Menzel wrote:
 looking through `src/console/Kconfig` I noticed
 You mean 'src/Kconfig' ?
 
 if SOUTHBRIDGE_INTEL_BD82X6X  DEFAULT_CONSOLE_LOGLEVEL_8
 This is a layering violation. We shouldn't have hardware-specific options in 
 top-level Kconfig. This should be moved to southbridge Kconfig, and not 
 depend 
 on LOGLEVEL. Maybe we need to move ME handling to a common dir and handle the 
 Kconfigs there.
 
 which seems odd as currently other chipsets needing the Intel Management
 Engine were submitted.

 $ git grep DEBUG_INTEL_ME
 [...]
 Smells like copypasta. Yet another reason to consider unifying ME handling 
 across southbridges.
 
Don't. This particular code is a good example why it shouldn't be done.
On Ibexpeak this code (extended status print) would timeout.




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] [RFC] board_status: Add serial log to `serial_console.txt`

2014-02-19 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 19.02.2014 23:03, Paul Menzel wrote:
 Am Mittwoch, den 19.02.2014, 00:47 +0100 schrieb Vladimir 'φ-coder/phcoder' 
 Serbinenko:
 On 19.02.2014 00:18, Paul Menzel wrote:
 But in general I think I agree with Vladimir. CBMEM console should be
 supported and if not then that should be fixed.
 I also agree, but it’ll take more time and the above is a good
 work-around for the mean time.
 Strongly disagree workarounds are like glue: they stick around. This one
 is one that will stick around once implemented. It's better to avoid
 workarounds if sane solution is within reach.
 In this case you still haven't even named a single board where CBMEMC
 doesn't work.
 
 CBMEM console does not work for romstage on all AMD based boards. Ask
 Rudolf and Kyösti for more details, but as far as I understood them, the
 solution is *not* easy and not within reach at all.
 
As I already told the info from romstage is likely of minor importance
if the board boots. And if it doesn't, well no board status. If any of
the info from romstage is relevant it can be printed in ramstage as well
 
 Thanks,
 
 Paul
 
 
 




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] [RFC] board_status: Add serial log to `serial_console.txt`

2014-02-19 Thread Vladimir 'φ-coder/phcoder' Serbinenko

 
 You do not get raminit debug output printed in ramstage.
 
 Unfortunately, the case of incompatible DIMMs seems to be common one
 with recent AGESA ports so information from romstage what DIMMs have
 worked is actually relevant.
Just read this data from registers and print it.
 
 Kyösti
 
 




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] A Growing Concern

2014-02-18 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 18.02.2014 06:21, amlo...@tfwno.gf wrote:
 As a privacy and freedom oriented PC/Linux user, it scares me how modern
 day devices are becoming extremely proprietary. Companies are beginning
 to ship their laptops/tablets with proprietary EFI systems which have
 some nasty things in them. I recently purchased a Dell Venue 8 Pro(one
 of many upcoming 8 windows 8.1(x86) tablets) and while i was searching
 through its BIOS, i noticed that it had the computrace option activated.
 After disabling it, i decided to try to put coreboot on it, only to find
 that its non-existent for my device. Although it says that its disabled,
 i dont trust it one bit. While it is a beautiful, fast and
 ultra-portable PC, it bothers me how there are no free alternatives for
 it. These types of devices are growing in numbers and will most likely
 continue on through the years.
 
 All I ask of you is to try and make EFI alternatives to all these
 upcoming devices.
 
All of them? Possible but will probably cost you millions in workforce.
If you really want coreboot on some devices that interest you, you'll
have to back it up with either work(do port yourself) or money (hire
someone, you can post a bounty)
 




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] [RFC] board_status: Add serial log to `serial_console.txt`

2014-02-18 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 19.02.2014 00:18, Paul Menzel wrote:
   But in general I think I agree with Vladimir. CBMEM console should be
   supported and if not then that should be fixed.
 I also agree, but it’ll take more time and the above is a good
 work-around for the mean time.
Strongly disagree workarounds are like glue: they stick around. This one
is one that will stick around once implemented. It's better to avoid
workarounds if sane solution is within reach.
In this case you still haven't even named a single board where CBMEMC
doesn't work.



signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] Trouble with coreboot for Roda RK9 (SOLVED)

2014-02-14 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 14.02.2014 13:38, Dmitry Bagryanskiy wrote:
 //Enable Com3
 pci_write_config32(LPC_DEV, D31F0_GEN2_DEC, 0x001c02e1);
 //Enable Com4
 pci_write_config32(LPC_DEV, D31F0_GEN3_DEC, 0x001c03e1);
GEN*_DEC should not be set to com* ports. Instead there are dedicated
bits for enabling decode of serial port ranges. Consult southbridge
documentation.



signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] SeaVGABIOS with native vga init (Need testers)

2014-02-13 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 13.02.2014 01:23, Kevin O'Connor wrote:
 Looking through the output of
  
 $ git grep k8t890 src/mainboard/
  
  the boards Asus A8V-E Deluxe, Asus A8V-E SE, Asus K8V-X, Asus M2V-MX SE
  and Asus M2V should theoretically support that.
 Okay.  The SeaVGABIOS implementation is expecting a coreboot table
 (LB_TAG_FRAMEBUFFER).  So, as long as that is present it should work.
 
LB_TAG_FRAMEBUFFER is present only if display is placed in graphics
mode, otherwise EGA text mode is assumed.
EGA text mode is much easier to make use of (including for oprom) and
more compatible than graphics counterpart.
Lenovo X201 init makes use of EGA text mode as well.



signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] coreboot port for macbook2,1

2014-02-13 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 13.02.2014 23:47, Mono wrote:
 Hallo
 
 finally I managed to enable SPI on the Beaglebone Black and use it as 
 external programmer with flashrom.
 I read the macbook's flash chip twice, as suggested. Both rom files are 
 identical. But: a few days/week ago I read the flash chip with the macbook's 
 internal programmer. This file differs from what the external programmer got. 
 Some 9500 bytes (out of 2MiB) differ. apart from a few exeptions those bytes 
 are 0xff read with the internal programmer, but have random hex code when 
 read with the external programmer. Well, between the usage of internal and 
 external programmer the macbook was in normal use. I didnt expect the OS or 
 EC(?) or something to write to the flash chip while it is in normal use. what 
 do you think? what could cause this differnce? I can paste the rom contents 
 later somewhere if that would help any.
 
That is pretty normal. Some firmwares store debug log or parameters in
flash.
 best regards
 Mono
 
 On Sat, Feb 08, 2014 at 03:37:40PM +0100, Vladimir 'φ-coder/phcoder' 
 Serbinenko wrote:
 On 08.02.2014 15:27, Mono wrote:
 Hallo,

 On Mon, Feb 03, 2014 at 10:16:30PM +0100, Vladimir 'φ-coder/phcoder' 
 Serbinenko wrote:
 CY8C24794-24LFXI
 My guess: it's part of keyboard + touchpad
 Do you already know which port is USBdebug one?
 Yes, I found out with a USB stick, dmesg and lsusb -t.

 Did you already test USB debug with dbgp?
 Yes, I tested USB debug for the Thinkpad X60, I assume it would work the 
 same for Macbook.

 I meant that you can use debug port as early printk device. It's
 recommended to check dongle this way if your dongle is the real dbgp dongle.

 Um, there are much more 00's than for the Thinkpad X60. Not sure what
 this means
 Different firmware. Most likely less functions are on it (keyboard and
 touchpad are on USB and handled by another chip). You'll need to make
 directory ec/apple/h8 for it and no code from lenovo/h8 will be reusable.

 What about those Block Protect things?
 Forget them for now, you'll be flashing externally until you have
 working version anyway


 I updated the webpage about what I did ( 
 http://macbook.donderklumpen.de/coreboot/ ).
 At the moment I am looking at x60's romstage.c because I'd plan to copy as 
 much as possible from it. At the function static void ich7_enable_lpc(void) 
 I got stuck. I can make some guesses, but don't know where the details are 
 documented. If you could point me to any documentation, I'd love to read 
 it. I tried ich7 datasheet and LPC Interface Specification but did not spot 
 what the function ich7_enable_lpc does.

 By comparing the output of lspci -nnvvvxxx -s 00:1f.0 on the Thinkpad with 
 coreboot and the Macbook with factory bios I get the following:
  
 on the Thinkpad
 $ lspci -nnvvvxxx -s 00:1f.0
 00:1f.0 ISA bridge [0601]: Intel Corporation 82801GBM (ICH7-M) LPC 
 Interface Bridge [8086:27b9] (rev 02)
 Subsystem: Lenovo ThinkPad T60/R60 series [17aa:2009]
 Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- 
 Stepping- SERR- FastB2B- DisINTx-
 Status: Cap+ 66MHz- UDF- FastB2B- ParErr- DEVSEL=medium TAbort- 
 TAbort- MAbort- SERR- PERR- INTx-
 Latency: 0
 Capabilities: [e0] Vendor Specific Information: Len=0c ?
 Kernel driver in use: lpc_ich
 Kernel modules: intel_rng, lpc_ich, leds_ss4200
 00: 86 80 b9 27 07 00 10 02 02 00 01 06 00 00 80 00
 10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 20: 00 00 00 00 00 00 00 00 00 00 00 00 aa 17 09 20
 30: 00 00 00 00 e0 00 00 00 00 00 00 00 00 00 00 00
 40: 01 05 00 00 80 00 00 00 81 04 00 00 10 00 00 00
 50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 60: 80 80 80 80 d0 00 00 00 80 80 80 80 00 00 00 00
 70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 80: 10 02 0d 1f 01 16 7c 00 e1 15 0c 00 81 16 1c 00
 90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 a0: ac 06 00 00 30 00 00 00 13 1c 0a 00 00 03 00 00
 b0: 00 00 f0 00 00 00 00 00 00 00 02 0a 00 00 00 00
 c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 d0: 33 22 11 00 67 45 00 00 cf ff 00 00 08 00 00 00
 e0: 09 00 0c 10 b4 02 24 17 00 00 00 00 00 00 00 00
 f0: 01 c0 d1 fe 00 00 00 00 86 0f 02 00 00 00 00 00

 and on the Macbook
 $ lspci -nnvvvxxx -s 00:1f.0
 00:1f.0 ISA bridge [0601]: Intel Corporation 82801GBM (ICH7-M) LPC 
 Interface Bridge [8086:27b9] (rev 02)
 Subsystem: Intel Corporation Device [8086:7270]
 Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- 
 Stepping- SERR- FastB2B- DisINTx-
 Status: Cap+ 66MHz- UDF- FastB2B- ParErr- DEVSEL=medium TAbort- 
 TAbort- MAbort- SERR- PERR- INTx-
 Latency: 0
 Capabilities: [e0] Vendor Specific Information: Len=0c ?
 Kernel driver in use: lpc_ich
 Kernel modules: intel_rng, lpc_ich, leds_ss4200
 00: 86 80 b9 27 07 00 10 02 02 00 01 06 00 00 80 00
 10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 20: 00 00 00 00 00 00 00 00 00 00 00 00 86 80 70 72
 30: 00 00 00 00 e0 00 00 00 00 00 00 00

Re: [coreboot] Ram Init: Intel i945: Timing parameters

2014-02-13 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 14.02.2014 00:03, Mohit Gupta wrote:
 I am having trouble understanding i945 ram init code especially timing
 parameters. Can some explain me in layman language? When I go through
 DDR2 specification, timing related text is too complex and confusing.
 Interested in getting very simple explanation.
 
There isn't any. RAM init is difficult.
 Also, i945 ram init code is doing lot of settings in MCH. Is there any
 step by step documentation available?
 
Sure:
1) Locate intel offices
2) Locate their top-secret safes
3) Observe security
4) Buy military gear
5) Recruit and train a company (~200 people) for a year
6) Launch assault on the office
7) Break into the safe
8) Get out of Intel building
9) Read the documentation

 Regards
 Mohit Gupta
 
 




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] [RFC] board_status: Add serial log to `serial_console.txt`

2014-02-10 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 10.02.2014 23:47, David Hendricks wrote:
 On Sun, Feb 9, 2014 at 4:50 AM, Paul Menzel
 paulepan...@users.sourceforge.net
 mailto:paulepan...@users.sourceforge.net wrote:
 
 Dear coreboot folks,
 
 
 currently no coreboot messages are stored for boards not supporting
 CBMEM console (or where this option is disabled (currently by default))
 or no coreboot *romstage* messages are stored for boards, where the data
 cannot be preserved (passed to ramstage).
 
 Using the serial (or USB) console all these messages can be captured
 with no problem, so I propose to just add these captured messages into
 the file `serial_console.txt`. Of course this file probably contains
 also the payload and (Linux) kernel log, but I think that is fine.
 
 SeaBIOS’ `readserial.py` should be used for capturing the messages as it
 adds time stamps.
 
 Scripting this is going to be hard, as the log is captured on a
 different system. So for now I propose to add it manually.
 
 
 I don't think the script itself should be responsible for collecting
 serial output. Instead, how about adding an argument to override the
 default behavior of running cbmem -c on the target so that the user
 can pass in a filename? The user will simply capture the serial output
 using whatever tool they like, dump the output to a text file, and run
 the script with an argument to use the file instead of calling cbmem
 -c. Here is a proof-of-concept: http://review.coreboot.org/#/c/5191 .
 
This requires user to do right manipulations. While keyboard and chair
are usually fine, the space between them exhibits strong bug-inducing
properties. The idea of the script is to reduce a possibility of user
error creating strange reports. In this case the common erro I expect is
using a stale file fom some other version. It's a particularly nasty one
as at first glance in may look fine but would be almost useless to track
how details changed from one submit to the next. If we let user supply
files at all, it should be added to report, not replace files, and it
should have some prefix to clearly indicate that user was involved in
creating them. E.g. user_serial_log.txt
 But in general I think I agree with Vladimir. CBMEM console should be
 supported and if not then that should be fixed.
 
 -- 
 David Hendricks (dhendrix)
 Systems Software Engineer, Google Inc.
 
 




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] [RFC] board_status: Add serial log to `serial_console.txt`

2014-02-10 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 11.02.2014 01:56, mrnuke wrote:
 On Tuesday, February 11, 2014 12:04:33 AM Vladimir 'φ-coder/phcoder' 
 Serbinenko wrote:
 If we let user supply
 files at all, it should be added to report, not replace files, and it
 should have some prefix to clearly indicate that user was involved in
 creating them. E.g. user_serial_log.txt

 There is a point at which the information becomes too much. What is really 
 relevant, in my opinion, are the following three points:
 
 1. Is it an unmodified commit in master (AKA, not -dirty).
 2. Does it boot?
 3. What does not work, if any ?
 
 Point 1 and 2 are answered by cbmem -c | head. It answers point 1 with the 
 first line of output, and point 2 by the fact that getting anything from 
 cbmem 
 means you've already booted your system.
 
 Point 3 is more complicated, and it seems it is because of this point that we 
 want to collect any and all information we can possibly get our hands on.
 
 Other than cbmem -c | head and .config, a majority of people just don't 
 care 
 about all the pesky details. They're only useful when debugging problems some 
 poor guy or gal is having. In that case, we can ask them for this info 
 manually. It's not of any use in tracking down which revision + config works 
 on _this_ board.
 
This is not the only uses of board-status. It's also useful to see if
some boards have an issue which one meets in particular board. This
information is important in tracking bugs down but hard to collect
unless it's in the board-status.
 Alex
 




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] [RFC] board_status: Add serial log to `serial_console.txt`

2014-02-09 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 09.02.2014 13:50, Paul Menzel wrote:
 Dear coreboot folks,
 
 
 currently no coreboot messages are stored for boards not supporting
 CBMEM console
Is there any remaining? If so it's an issue to be fixed
 (or where this option is disabled (currently by default))
Change the defaults.
 or no coreboot *romstage* messages are stored for boards, where the data
 cannot be preserved (passed to ramstage).
 
which boards are concerned? Which boards use ROMCC for romstage? Do they
output anything useful in romstage? If so, can't it be compensated by
ramstage?
 Using the serial (or USB) console all these messages can be captured
 with no problem, so I propose to just add these captured messages into
 the file `serial_console.txt`. Of course this file probably contains
 also the payload and (Linux) kernel log, but I think that is fine.
 
 SeaBIOS’ `readserial.py` should be used for capturing the messages as it
 adds time stamps.
 
 Scripting this is going to be hard, as the log is captured on a
 different system. So for now I propose to add it manually.
 
Having to capture serial makes setup needed for board-status more
difficult. Certainely, one needs to have a recovery method for case of
brick but having a complete serial setup will heavily reduce
board-status input which already isn't huge.
 
 Thanks,
 
 Paul
 
 
 




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] [RFC] board_status: Add serial log to `serial_console.txt`

2014-02-09 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 09.02.2014 14:34, Paul Menzel wrote:
 Am Sonntag, den 09.02.2014, 14:18 +0100 schrieb Vladimir 'φ-coder/phcoder' 
 Serbinenko:
 On 09.02.2014 13:50, Paul Menzel wrote:
 
 currently no coreboot messages are stored for boards not supporting
 CBMEM console

 Is there any remaining? If so it's an issue to be fixed
 
 Sorry, no idea. I thought there were some. At least not all boards have
 been tested to my knowledge.
 
board-status is all about testing. When we see incomplete
coreboot_console.txt it means there is a bug to be fixed, not workarounded.
 (or where this option is disabled (currently by default))

 Change the defaults.
 
 It is not safe or wanted for all boards I believe. But others are more
 knowledgeable to comment on that issue.
 
I don't see any problem with enabling cbmemc by default on all boards.
 or no coreboot *romstage* messages are stored for boards, where the data
 cannot be preserved (passed to ramstage).

 which boards are concerned? Which boards use ROMCC for romstage? Do they
 output anything useful in romstage? If so, can't it be compensated by
 ramstage?
 
 In my case it is the Asus M2V-MX SE (AMD, pre-AGESA).
 
What is the info we need from it? ROMCC boards usually don't output much.
 Using the serial (or USB)
Your argument with USB console is completele broken as EHCI debug is not
supported on ROMCC boards at all.
 console all these messages can be captured
 with no problem, so I propose to just add these captured messages into
 the file `serial_console.txt`. Of course this file probably contains
 also the payload and (Linux) kernel log, but I think that is fine.

 SeaBIOS’ `readserial.py` should be used for capturing the messages as it
 adds time stamps.

 Scripting this is going to be hard, as the log is captured on a
 different system. So for now I propose to add it manually.

 Having to capture serial makes setup needed for board-status more
 difficult.
 
 Surely it will not be a requirement to capture the serial output. My
 proposal is about adding it, when it is captured already and what file
 name to use.
 
And who will care about it then?
 Certainly, one needs to have a recovery method for case of
 brick
 
 You always need that in case of a brick. What is special about serial
 log?
 
I use debricking setup perhaps every 20 flashes on a supported board.
Not every time.
 but having a complete serial setup will heavily reduce board-status
 input which already isn't huge.
 
 Again, it is not meant to be a requirement in addition to what is
 currently captured.
 
 
 Thanks,
 
 Paul
 
 
 




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] coreboot port for macbook2,1

2014-02-08 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 08.02.2014 15:27, Mono wrote:
 Hallo,
 
 On Mon, Feb 03, 2014 at 10:16:30PM +0100, Vladimir 'φ-coder/phcoder' 
 Serbinenko wrote:
 CY8C24794-24LFXI
 My guess: it's part of keyboard + touchpad
 Do you already know which port is USBdebug one?
 Yes, I found out with a USB stick, dmesg and lsusb -t.
 
 Did you already test USB debug with dbgp?
 Yes, I tested USB debug for the Thinkpad X60, I assume it would work the same 
 for Macbook.
 
I meant that you can use debug port as early printk device. It's
recommended to check dongle this way if your dongle is the real dbgp dongle.

 Um, there are much more 00's than for the Thinkpad X60. Not sure what
 this means
 Different firmware. Most likely less functions are on it (keyboard and
 touchpad are on USB and handled by another chip). You'll need to make
 directory ec/apple/h8 for it and no code from lenovo/h8 will be reusable.

 What about those Block Protect things?
 Forget them for now, you'll be flashing externally until you have
 working version anyway

 
 I updated the webpage about what I did ( 
 http://macbook.donderklumpen.de/coreboot/ ).
 At the moment I am looking at x60's romstage.c because I'd plan to copy as 
 much as possible from it. At the function static void ich7_enable_lpc(void) I 
 got stuck. I can make some guesses, but don't know where the details are 
 documented. If you could point me to any documentation, I'd love to read it. 
 I tried ich7 datasheet and LPC Interface Specification but did not spot what 
 the function ich7_enable_lpc does.
 
 By comparing the output of lspci -nnvvvxxx -s 00:1f.0 on the Thinkpad with 
 coreboot and the Macbook with factory bios I get the following:
  
 on the Thinkpad
 $ lspci -nnvvvxxx -s 00:1f.0
 00:1f.0 ISA bridge [0601]: Intel Corporation 82801GBM (ICH7-M) LPC Interface 
 Bridge [8086:27b9] (rev 02)
   Subsystem: Lenovo ThinkPad T60/R60 series [17aa:2009]
   Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- 
 Stepping- SERR- FastB2B- DisINTx-
   Status: Cap+ 66MHz- UDF- FastB2B- ParErr- DEVSEL=medium TAbort- 
 TAbort- MAbort- SERR- PERR- INTx-
   Latency: 0
   Capabilities: [e0] Vendor Specific Information: Len=0c ?
   Kernel driver in use: lpc_ich
   Kernel modules: intel_rng, lpc_ich, leds_ss4200
 00: 86 80 b9 27 07 00 10 02 02 00 01 06 00 00 80 00
 10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 20: 00 00 00 00 00 00 00 00 00 00 00 00 aa 17 09 20
 30: 00 00 00 00 e0 00 00 00 00 00 00 00 00 00 00 00
 40: 01 05 00 00 80 00 00 00 81 04 00 00 10 00 00 00
 50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 60: 80 80 80 80 d0 00 00 00 80 80 80 80 00 00 00 00
 70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 80: 10 02 0d 1f 01 16 7c 00 e1 15 0c 00 81 16 1c 00
 90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 a0: ac 06 00 00 30 00 00 00 13 1c 0a 00 00 03 00 00
 b0: 00 00 f0 00 00 00 00 00 00 00 02 0a 00 00 00 00
 c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 d0: 33 22 11 00 67 45 00 00 cf ff 00 00 08 00 00 00
 e0: 09 00 0c 10 b4 02 24 17 00 00 00 00 00 00 00 00
 f0: 01 c0 d1 fe 00 00 00 00 86 0f 02 00 00 00 00 00
 
 and on the Macbook
 $ lspci -nnvvvxxx -s 00:1f.0
 00:1f.0 ISA bridge [0601]: Intel Corporation 82801GBM (ICH7-M) LPC Interface 
 Bridge [8086:27b9] (rev 02)
   Subsystem: Intel Corporation Device [8086:7270]
   Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- 
 Stepping- SERR- FastB2B- DisINTx-
   Status: Cap+ 66MHz- UDF- FastB2B- ParErr- DEVSEL=medium TAbort- 
 TAbort- MAbort- SERR- PERR- INTx-
   Latency: 0
   Capabilities: [e0] Vendor Specific Information: Len=0c ?
   Kernel driver in use: lpc_ich
   Kernel modules: intel_rng, lpc_ich, leds_ss4200
 00: 86 80 b9 27 07 00 10 02 02 00 01 06 00 00 80 00
 10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 20: 00 00 00 00 00 00 00 00 00 00 00 00 86 80 70 72
 30: 00 00 00 00 e0 00 00 00 00 00 00 00 00 00 00 00
 40: 01 04 00 00 80 00 00 00 01 05 00 00 10 00 00 00
 50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 60: 80 80 80 80 d0 00 00 00 80 80 80 80 00 00 00 00
 70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 80: 10 00 07 38 81 06 0c 00 41 16 0c 00 00 00 00 00
 90: 01 03 1c 00 00 00 00 00 00 00 00 00 00 00 00 00
 a0: 04 02 00 00 01 00 00 00 13 1c 0a 00 00 03 00 00
 b0: 00 00 f0 00 00 00 00 00 08 80 00 00 00 00 00 00
 c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 d0: 33 22 00 00 67 45 00 00 00 ff 00 00 00 00 00 00
 e0: 09 00 0c 10 b4 02 24 17 00 00 00 00 00 00 00 00
 f0: 01 c0 d1 fe 00 00 00 00 86 0f 02 00 00 00 00 00
 
 In the Thinkpad output I can spot the values written by coreboot:
 0xd0 at 0x64 // Enable Serial IRQ, this is the same for what the Macbook 
 outputs, but where can I read that this enables serial IRQ? 
 0x0210 and 0x1f0d at 0x80 and 0x82 // decode ranges, the Macbook outputs 
 different values here
 0x1601, 0x007c, 0x15e1, 0x000c, 0x1681, 0x001c from 0x84 to 0x8e // the 
 Thinkpad has three ranges

Re: [coreboot] LinuxTag in Berlin from May 8–10, 2014

2014-02-08 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 08.02.2014 23:13, Paul Menzel wrote:
 Dear coreboot folks,
 
 
 just a short announcement that after FOSDEM last weekend the next free
 software event (in Europe(?)) is going to be LinuxTag in Berlin from May
 8–10, 2014.
 
I won't be able to attend
 The location is going to be different this year. Since several years it
 won’t be happening at Messe Berlin but at STATION BERLIN [2].
 
 So please mark that in your calender and let’s see what we can come up
 with coreboot wise for that event.
 
 
 Thanks,
 
 Paul
 
 
 [1] http://linuxtag.de/2014/en/
 [2] http://www.station-berlin.de/en/location_directions/location.html
 
 
 




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] HP Chromebook 14 (Falco)

2014-02-07 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 07.02.2014 17:57, Rubén Torrero Marijnissen wrote:
 Hi,
 
 I grew tired today of the default firmware that comes with my Google
 Chromebook 14; just when I had my Arch Linux install perfectly working
 somehow, by letting it attempt to boot Chrome OS, it messed up my
 partitions.
 
 If I have understood correctly (please, correct me if i'm wrong), the
 code for this model is alredy in place in the Git repository but no one
 has really tested it (or has reported anything on the wiki).
 
 Does anyone have more info? should I be able to flash it with flashrom
 after I build it?
 
If you use upstream, please submit board-status result
 Any help is appreciated, I will update the wiki will all the info once
 i'm done.
 
 Thanks!
 
 




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] Support for Dell desktop motherboard

2014-02-06 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 06.02.2014 23:46, Ramkumar Ramachandra wrote:
 Hi,
 
 I have a Dell T5500 desktop, and I'd like to know if Coreboot supports
 this.
No. http://www.coreboot.org/Supported_Motherboards
 According to dmidecode, the motherboard is a Dell 0D883F.
 
 Thanks.
 
 Ram
 




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

[coreboot] [RFT] Lenovo convertible tablets X60t, X201t, X230t

2014-02-04 Thread Vladimir 'φ-coder/phcoder' Serbinenko
Hello, all. I've uploaded digitizer support for X*t variants. Not tested
in current form yet (was developped on Jens Erat's X201T during FOSDEM).
Please test:
- X60t owners: http://review.coreboot.org/#/c/5113/
- X201t owners: http://review.coreboot.org/#/c/5096
- X230t owners: should work without additional support (USB).
Please report test result be it either positive or negative.



signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] coreboot port for macbook2,1

2014-02-03 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 03.02.2014 21:43, Mono wrote:
 Hallo Vladimir, Peter and Stefan
 
 thank you for your emails! You already helped me alot. I don't expect to 
 successfully close this project in a fast run and I'm willing to learn a 
 number of tools.
 
 At the moment I am still collecting hardware informations about this computer.

 I dissembled it completely and documented the chip names of what I thought 
 might be of interest.

 Please see http://macbook.donderklumpen.de/coreboot/ for what I got.

That is good example of relevant info collection.

 My biggest concern is with the EC.

 It is a Renesas H8S/2116V. I read about this chip that it makes coreboot 
 impossible on other machines,

 but I do not know whether this issue is machine specific, or if the chip 
 definitely makes coreboot impossible for this macbook too.

 Could you comment on this?

Type of EC doesn't matter. What matters is how it is connected. It may
really get in the way or have almost no impact. My guess would be that
on your system its influence is minor.
X60 has H8 as well but with very different firmware which makes it a
completely different chip from coreboot perspective.
 Also I do not know yet how I could verify whether the EC shares memory with 
 the main system.
 
That flashrom didn't create any ill effects when reading is an
indication of separate flash. If you can flash externally you can leave
the issue of internal flash for later and if you don't, don't flash.
 As for the ability of flashing the EPROM chip, I plan to test it in the near 
 future

 (at first with an empty brand new chip, then with the soldered one). The 
 EPROM is supported by flashrom

 and I plan to use a Beaglebone Black to be the programmer. (this page shows 
 Beaglebone Black can

 flash a chip via SPI also flashrom is not used here: 
 http://www.linux.com/learn/tutorials/746860-how-to-access-chips-over-the-spi-on-beaglebone-black
  )

 I already learned how to use the Beaglebone Black to debug what coreboot 
 outputs to the USB port on a Thinkpad X60.

 I assume this should work the same for the macbook (the debug port at the 
 macbook seems to exist, but the factory BIOS does not write anything to it). 
Good
 
 One more question: The macbook atm uses a 32bit EFI which when it was 
 purchased booted a 32bit kernel,

 and today boots a 64bit linux-libre kernel. Would I need to expect any 
 additional problems from the fact that

 it is not a traditional BIOS, but some EFI which is to be replaced? My 
 optimistic wish is to replace that

 EFI with coreboot plus a 64bit GRUB2 payload (same as done on my Thinkpad 
 X60). Or would the payload need to be kept at 32bit?
What Apple ships as firmware is irrelevant.
However, decision to omit BIOS comes from higher-level decision of
omiting compatibility with 95-era systems. So it's possible you won't be
able to boot old OS even with coreboot due to lack of compatibility
devices. I'd say it's a minor problem (95-era OS wouldn't work reliably
on modern system anyway)
 
 thanks again and
 with best regards
 Mono
 
 On Wed, Jan 29, 2014 at 10:24:58PM +0100, Stefan Reinauer wrote:
 * Mono m...@posteo.de [140124 23:20]:
 Hallo,
 Would you help me on a coreboot port? I just installed coreboot on a 
 Thinkpad X60 following the wiki. Now I want it on this mid-2007 macbook2,1 
 too.
 I read some pages in the wiki and started to collect information about the 
 macbook. it seems it has no superIO chip and I dont know what to think of 
 the ectool output. As I understood by now, not knowing how the ec might 
 interfere with the bios or coreboot is one of the big obstacles, no? I hope 
 that once I would try a coreboot flash, recovery might be possible by an 
 external programmer (which I do not have, yet). the flash chip is the same 
 as on the X60 (I've read the factory bios already) as is the northbridge 
 and southbridge. an usb debug port seems available.
 I've put the log files here: http://macbook.donderklumpen.de/coreboot/
 Any comment about what you think about this and how I should proceed is 
 very much welcome!

 - Make sure you have the external tools in place to recover from a bad
   flash. You will notg boot successfully on the first attempt.

 - Keep a copy of the original firmware around

 - Try to make sure that your USB debug gadget is working before starting

 - Start with one of the existing i945 based notebooks

 - find out what EC is used, and if it shares flash with the main system

 - try to get hold of schematics

 Regards,
 Stefan


 -- 
 coreboot mailing list: coreboot@coreboot.org
 http://www.coreboot.org/mailman/listinfo/coreboot
 




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] Motherboard Not on Support MB List - Specs

2014-02-03 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 03.02.2014 17:37, lee.changhan wrote:
 Hi, I have some info about my motherboard here according to the FAQ page
 to see if anyone can tell me about the compatibility between my BIOS and
 coreboot.
 
Your motherboard is not compatible with coreboot.

 1. Gigabyte GA-Z77-HD3 Motherboard
Intel(R) Core(TM) i5-3570K CPU @ 3.40GHz

 2. lspci -tvnn
 
 -[:00]-+-00.0  Intel Corporation Xeon E3-1200 v2/3rd Gen Core
 processor DRAM Controller [8086:0150]
+-01.0-[01]--+-00.0  Advanced Micro Devices, Inc. [AMD/ATI]
 Caicos [Radeon HD 6450/7450/8450] [1002:6779]
|\-00.1  Advanced Micro Devices, Inc. [AMD/ATI]
 Caicos HDMI Audio [Radeon HD 6400 Series] [1002:aa98]
+-14.0  Intel Corporation 7 Series/C210 Series Chipset Family
 USB xHCI Host Controller [8086:1e31]
+-16.0  Intel Corporation 7 Series/C210 Series Chipset Family
 MEI Controller #1 [8086:1e3a]
+-1a.0  Intel Corporation 7 Series/C210 Series Chipset Family
 USB Enhanced Host Controller #2 [8086:1e2d]
+-1b.0  Intel Corporation 7 Series/C210 Series Chipset Family
 High Definition Audio Controller [8086:1e20]
+-1c.0-[02]--
+-1c.2-[03]00.0  Realtek Semiconductor Co., Ltd.
 RTL8111/8168/8411 PCI Express Gigabit Ethernet Controller [10ec:8168]
+-1c.3-[04-05]00.0-[05]--
+-1d.0  Intel Corporation 7 Series/C210 Series Chipset Family
 USB Enhanced Host Controller #1 [8086:1e26]
+-1f.0  Intel Corporation Z77 Express Chipset LPC Controller
 [8086:1e44]
+-1f.2  Intel Corporation 7 Series/C210 Series Chipset Family
 4-port SATA Controller [IDE mode] [8086:1e00]
+-1f.3  Intel Corporation 7 Series/C210 Series Chipset Family
 SMBus Controller [8086:1e22]
\-1f.5  Intel Corporation 7 Series/C210 Series Chipset Family
 2-port SATA Controller [IDE mode] [8086:1e08]
 
 3. superiotool -dV
 superiotool r6637
 Probing for ALi Super I/O at 0x3f0...
   Failed. Returned data: id=0x, rev=0xff
 Probing for ALi Super I/O at 0x370...
   Failed. Returned data: id=0x, rev=0xff
 Probing for Fintek Super I/O at 0x2e...
   Failed. Returned data: vid=0x, id=0x
 Probing for Fintek Super I/O at 0x4e...
   Failed. Returned data: vid=0x, id=0x
 Probing for Fintek Super I/O at 0x2e...
   Failed. Returned data: vid=0x, id=0x
 Probing for Fintek Super I/O at 0x4e...
   Failed. Returned data: vid=0x, id=0x
 Probing for ITE Super I/O (init=standard) at 0x25e...
   Failed. Returned data: id=0x, rev=0xf
 Probing for ITE Super I/O (init=it8502e) at 0x25e...
   Failed. Returned data: id=0x, rev=0xf
 Probing for ITE Super I/O (init=it8761e) at 0x25e...
   Failed. Returned data: id=0x, rev=0xf
 Probing for ITE Super I/O (init=it8228e) at 0x25e...
   Failed. Returned data: id=0x, rev=0xf
 Probing for ITE Super I/O (init=0x87,0x87) at 0x25e...
   Failed. Returned data: id=0x, rev=0xf
 Probing for ITE Super I/O (init=standard) at 0x2e...
   Failed. Returned data: id=0x8728, rev=0x1
 Probing for ITE Super I/O (init=it8502e) at 0x2e...
   Failed. Returned data: id=0x, rev=0xf
 Probing for ITE Super I/O (init=it8761e) at 0x2e...
   Failed. Returned data: id=0x, rev=0xf
 Probing for ITE Super I/O (init=it8228e) at 0x2e...
   Failed. Returned data: id=0x, rev=0xf
 Probing for ITE Super I/O (init=0x87,0x87) at 0x2e...
   Failed. Returned data: id=0x, rev=0xf
 Probing for ITE Super I/O (init=standard) at 0x4e...
   Failed. Returned data: id=0x, rev=0xf
 Probing for ITE Super I/O (init=it8502e) at 0x4e...
   Failed. Returned data: id=0x, rev=0xf
 Probing for ITE Super I/O (init=it8761e) at 0x4e...
   Failed. Returned data: id=0x, rev=0xf
 Probing for ITE Super I/O (init=it8228e) at 0x4e...
   Failed. Returned data: id=0x, rev=0xf
 Probing for ITE Super I/O (init=0x87,0x87) at 0x4e...
   Failed. Returned data: id=0x, rev=0xf
 Probing for ITE Super I/O (init=legacy/it8661f) at 0x370...
   Failed. Returned data: id=0x, rev=0xf
 Probing for ITE Super I/O (init=legacy/it8671f) at 0x370...
   Failed. Returned data: id=0x, rev=0xf
 Probing for NSC Super I/O at 0x2e...
   Failed. Returned data: port=0xff, port+1=0xff
 Probing for NSC Super I/O at 0x4e...
   Failed. Returned data: port=0xff, port+1=0xff
 Probing for NSC Super I/O at 0x15c...
   Failed. Returned data: port=0xff, port+1=0xff
 Probing for NSC Super I/O at 0x164e...
   Failed. Returned data: port=0xff, port+1=0xff
 Probing for Nuvoton Super I/O at 0x164e...
   Failed. Returned data: chip_id=0x
 Probing for Nuvoton Super I/O (sid=0xfc) at 0x164e...
   Failed. Returned data: sid=0xff, id=0x, rev=0x00
 Probing for Nuvoton Super I/O at 0x2e...
   Failed. Returned data: chip_id=0x
 Probing for Nuvoton Super I/O (sid=0xfc) at 0x2e...
   Failed. Returned data: sid=0xff, id=0x, rev=0x00
 Probing for Nuvoton Super I/O at 0x4e...
   Failed. Returned data: 

Re: [coreboot] coreboot port for macbook2,1

2014-02-03 Thread Vladimir 'φ-coder/phcoder' Serbinenko
 CY8C24794-24LFXI
My guess: it's part of keyboard + touchpad
Do you already know which port is USBdebug one?
Did you already test USB debug with dbgp?

 Um, there are much more 00's than for the Thinkpad X60. Not sure what
this means
Different firmware. Most likely less functions are on it (keyboard and
touchpad are on USB and handled by another chip). You'll need to make
directory ec/apple/h8 for it and no code from lenovo/h8 will be reusable.

 What about those Block Protect things?
Forget them for now, you'll be flashing externally until you have
working version anyway



signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] Please use Git commit hooks

2014-02-02 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 02.02.2014 12:05, Paul Menzel wrote:
 Dear coreboot folks,
 
 
 if you push patches please either check them manually or simply let the
 Git commit hooks do it for you by running `make gitconfig`. I know they
 take a lot of time especially when you run them the first time in a
 session. This will be hopefully improved soon.
 
The problem is not this. The problem is that they regularly fail and
prevent you from doing any commit
 
 Thanks,
 
 Paul
 
 
 


-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot


Re: [coreboot] Lenovo Thinkpad T61

2014-01-31 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 31.01.2014 17:08, Roberto A. Foglietta wrote:
 
 
 
 2014-01-31 Peter Stuge pe...@stuge.se mailto:pe...@stuge.se:
 
 Roberto A. Foglietta wrote:
  I check the list of supported motherboards and laptops but I did
 not found
  in them the Lenovo Thinkpad T61
 
 That means that it is not supported.
 
 
 Thanks Peter for the fast answer.
  
 
 
  I would like to understand the magnitude of probability to brick
  the laptop before.
 
 The probability is 1.0.
 
 
 I am interested in the probability after some development / adaption,
 not as-is.
 
 How much developing effort do you think the support of T61 would require?
 
Northbridge (i965) is unsupported. It's almost impossible to write
raminit without having a lot of low-level experience and even then it
takes couple of months of quite intensive work.
You may get lucky and i945 raminit may work with only minor adaptations but:
1) I wouldn't count on it
2) And even then find out what exactly needs adaptation is no easy task.
I have a laptop with i965  as well, in storage but I have to tell it's
simply not worth the effort. You'd be better off cuying some recent
supported laptop (see supported mobos pages, especially chromebooks and
Lenovos) or some almost supported laptop and adapt to it. But:
a) Problems may pop up in unexpected places.
b) While guys in #coreboot are extremely helpful you end up being on
your own in 95% of problems (unless someone has a similar chipset and
works on it, currently nobody AFAIK).
c) Easiest (but not easy) to adapt would be (from easiest to difficult,
no guarantee, problems may pop up in unexpected places):
- T410. All components are already in the tree. The problem with this
laptop is that it has TSOP chip, for which clip is very expensive, so
you probably would have to solder to the chip with all the risks it
entails. Actually for most people it means to ask someone to solder for you
- Nehalem-based laptops. Main problem is likely EC
- AMD-based laptops. Main problem is likely EC.
- Lenovo *30 laptops (ivybridge). Dual graphics can be a headache but
it's feasible. If chip is TSOP, see T410 comment.
- Other ivy or sandy laptops. Depends on how much MRC code likes or
dislikes your laptop.
I repeat again that even the easiest ones are hard if you have no
low-level experience and even if you do can become hard in case of
unexpected problem.
On the other hand if you're curious about it , do it! It's a fantastic
learning experience.
 To answer to this second question I suppose you need logs, do not you?
 
lspci -vvnn is available for most laptops with quick google. It (+some
experience with individual manufacturers about EC interface) allows to
estimate hardness.
 Cheers,
 R.
  
 
 




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] Lenovo Thinkpad T61

2014-01-31 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 31.01.2014 17:21, ron minnich wrote:
 If your only way to flash the flash is via a program, or something
 embedded in the lenovo bios, stop now, or stockpile 20 or 30 of these
 laptops, because you're going to create some bricks along the way.
 
Let me elaborate on this:
RTFM http://flashrom.org/ISP
RTFM http://flashrom.org/Technology
RTFM http://flashrom.org/Supported_programmers

 ron
 




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] Lenovo Thinkpad T61

2014-01-31 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 31.01.2014 20:30, ron minnich wrote:
 If you want a laptop to tear into and learn from, the old samsung x86
 chromebook is hard to beat. ram and disk are standard and upgradable,
 you can put a clip on the flash part, ...
Lenovo X201 and X230 both have those characteristics as well. Unlike
chromebooks it doesn't come with a nice firmware preinstalled though.
But I have to admit that compared to other vendors (especially the one
called To be filled by O.E.M.), lenovo's BIOS and EFI are good.
 it's just a very hackable
 machine. I still have one and really like it.
 
 More recent ones to mess around with include the acer c720.
 
 The difficulty of dealing with chipsets is what keeps me pushing on
 chromebooks. It's a real time saver. I'd still like to find an AMD
 solution however.
 
I'm thinking of lenovo x140e. Not available in Europe though.

 ron
 




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] cmos.layout upgradability

2014-01-26 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 26.01.2014 05:55, Vladimir 'φ-coder/phcoder' Serbinenko wrote:
 http://www.coreboot.org/Infrastructure_Projects#Provide_update_paths_and_avoid_conflicts_in_addressing

 (which mentions another solution to the problem)

 Flashrom solution is interesting but it doesn't handle external
 flashing. It would be a nice addition to checksums for internal flashing
 though.
 Patrick's solution would have only one advantage compared to my
 prototype: possibility of coreboot migrating the options rather than
 resetting.
Patrick's solution relies on mathematical impossibility. You can't have
such function with only 16-bit salt. Let's take any partition of 248
(see http://mathworld.wolfram.com/PartitionFunctionP.html), then create
options A,B,C,... with sizes according to this partition. The hashing
function as per Patrick's proposal would have to map them to
non-interlapping regions. By evaluating this function at A,B,C,... you
can extract the partition if number of chunks is known. Since number of
chunks is an integer from 1 to 248 so the function has to store at least:
Log2[PartitionsP[248]]-Log2[248] 39
bits of information. So salt has to be at least 40 bits. Probably even
more if you put into mix that we also need sub-byte options and you have
to handle option names. This means:
1) You can't bruteforce such a parameter space during compile, so some
structure is needed.
2) You'll need more than 40 bits of storage in CMOS.
At this point I feel like Patrick's proposal is not practical.



signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] cmos.layout upgradability

2014-01-25 Thread Vladimir 'φ-coder/phcoder' Serbinenko
 http://www.coreboot.org/Infrastructure_Projects#Provide_update_paths_and_avoid_conflicts_in_addressing
 
 (which mentions another solution to the problem)
 
Flashrom solution is interesting but it doesn't handle external
flashing. It would be a nice addition to checksums for internal flashing
though.
Patrick's solution would have only one advantage compared to my
prototype: possibility of coreboot migrating the options rather than
resetting.
But there is a problem with attempting this: when you request for option
the hashing would always give a number, even if that option doesn't
exist. And then we're back to reading garbage for new options.
 2a) instead of having separate field we could make XOR layout checksum
 into CMOS checksum. This would save 2 bytes but will break any existing
 users if they check checksum.
 
 (IIRC we already have problems with the Linux nvram driver which does
 checksumming somehow differently. Or maybe that was fixed already.)
 
Ok. Let's hold 2a in reserve if 2 bytes is considered too expensive
 ...but the above reminded me that it is ultimately a responsibility
 of our source code and our design to never let booting fail simply
 due to some garbage in NVRAM.
 
 Code and design really must ensure a working state.
 
There are number of problems with this:
1) Overclocking options. If you overclock too much, you don't boot
successfully.
2) FILO uses options to control its behaviour. If by garbage tells to
boot from bad filename, it will probably stop unable to find the file.
3) vbnv field may be a problem.
Even if this goal is achieved we still need an upgrade way as new option
with garbage may make the system bootable but uncomfortable to most of
users, which is to avoid. E.g. disabling touchpad: I personally disable
touchpad (but through OS facilities, not coreboot) but many users would
get confused by disabled touchpad.




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

[coreboot] cmos.layout upgradability

2014-01-24 Thread Vladimir 'φ-coder/phcoder' Serbinenko
Hello, all. Due to my failue to foresee this problem if one upgrades X60
coreboot, you need to manually reset CMOS config or your trackpad may
not work as option trackpad_enable will get a garbage value. While I
admit my part of fault, I feel like we should have a way to update
options safely. I see following possibilities:
1) Hide ourselves and tell that on upgrade you always have to clear
CMOS. I don't think it's really an option as users will continue just
running flashrom and in case of external flashing, CMOS reset may
require full power removal with cell battery sometimes in difficult to
access places inside laptop.
2) Have some version field to check and if it mismatches reset CMOS to
default. To avoid having to maintain version manually I propose to
checksum option table and write 16-bit result to CMOS. 16-bit should
give enough confidence without excessively using CMOS. I've made a
prototype at http://review.coreboot.org/#/c/4790/4 . If we can agree
that it's a right approach, I'll make this prototype into complete patch
(mostly missing is laborous adding of version field)
2a) instead of having separate field we could make XOR layout checksum
into CMOS checksum. This would save 2 bytes but will break any existing
users if they check checksum.



signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

[coreboot] Fwd: Re: coreboot port for macbook2,1

2014-01-24 Thread Vladimir 'φ-coder/phcoder' Serbinenko



 Original Message 
Subject: Re: [coreboot] coreboot port for macbook2,1
Date: Sat, 25 Jan 2014 01:23:12 +0100
From: Vladimir 'φ-coder/phcoder' Serbinenko phco...@gmail.com
To: Mono m...@posteo.de

On 24.01.2014 23:20, Mono wrote:
 Hallo,
 Would you help me on a coreboot port? I just installed coreboot on a Thinkpad 
 X60 following the wiki. Now I want it on this mid-2007 macbook2,1 too.
 I read some pages in the wiki and started to collect information about the 
 macbook. it seems it has no superIO chip and I dont know what to think of the 
 ectool output. As I understood by now, not knowing how the ec might interfere 
 with the bios or coreboot is one of the big obstacles, no? I hope that once I 
 would try a coreboot flash, recovery might be possible by an external 
 programmer (which I do not have, yet). the flash chip is the same as on the 
 X60 (I've read the factory bios already) as is the northbridge and 
 southbridge. an usb debug port seems available.
 I've put the log files here: http://macbook.donderklumpen.de/coreboot/
 Any comment about what you think about this and how I should proceed is very 
 much welcome!
 
Good news is that other than EC and some minor points, your macbook is a
copy of X60. With some luck a qualified dev can do it in a week (you may
want to post bounty for it). You need to get console. EHCI debug would
be the best option on your laptop.
http://www.coreboot.org/EHCI_Debug_Port#Finding_the_USB_debug_port
Take USB 2.0 stick and plug it into different port until it appears as
device one on bus 3. You'll have to make a USB debug dongle or buy one
(short supply).
You'll also need to find your flash chip. Your laptop has this chip:
http://orzparts.com/index.php?main_page=product_infoproducts_id=732
You'll have to teardown the whole laptop, looking at every chip which
seems similar. Remember to discharge from static electricity before
opening your laptop and not to wear anything that produces it. This has
a risk of breaking your laptop, proceed at your own risk, you've been
warned.
 thanks
 Mono
 








signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] Fwd: Re: coreboot port for macbook2,1

2014-01-24 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 25.01.2014 01:23, Vladimir 'φ-coder/phcoder' Serbinenko wrote:
 
 
 
  Original Message 
 Subject: Re: [coreboot] coreboot port for macbook2,1
 Date: Sat, 25 Jan 2014 01:23:12 +0100
 From: Vladimir 'φ-coder/phcoder' Serbinenko phco...@gmail.com
 To: Mono m...@posteo.de
 
 On 24.01.2014 23:20, Mono wrote:
 Hallo,
 Would you help me on a coreboot port? I just installed coreboot on a 
 Thinkpad X60 following the wiki. Now I want it on this mid-2007 macbook2,1 
 too.
 I read some pages in the wiki and started to collect information about the 
 macbook. it seems it has no superIO chip and I dont know what to think of 
 the ectool output. As I understood by now, not knowing how the ec might 
 interfere with the bios or coreboot is one of the big obstacles, no? I hope 
 that once I would try a coreboot flash, recovery might be possible by an 
 external programmer (which I do not have, yet). the flash chip is the same 
 as on the X60 (I've read the factory bios already) as is the northbridge and 
 southbridge. an usb debug port seems available.
 I've put the log files here: http://macbook.donderklumpen.de/coreboot/
 Any comment about what you think about this and how I should proceed is very 
 much welcome!

 Good news is that other than EC and some minor points, your macbook is a
 copy of X60. With some luck a qualified dev can do it in a week (you may
 want to post bounty for it). You need to get console. EHCI debug would
 be the best option on your laptop.
 http://www.coreboot.org/EHCI_Debug_Port#Finding_the_USB_debug_port
 Take USB 2.0 stick and plug it into different port until it appears as
 device one on bus 3.
I meant port 1 on bus managed by ehci_pci (exact bus numbers are unstable)
 You'll have to make a USB debug dongle or buy one
 (short supply).
 You'll also need to find your flash chip. Your laptop has this chip:
 http://orzparts.com/index.php?main_page=product_infoproducts_id=732
 You'll have to teardown the whole laptop, looking at every chip which
 seems similar. Remember to discharge from static electricity before
 opening your laptop and not to wear anything that produces it. This has
 a risk of breaking your laptop, proceed at your own risk, you've been
 warned.
 thanks
 Mono

 
 
 
 
 
 




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] cmos.layout upgradability

2014-01-24 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 25.01.2014 01:28, mrnuke wrote:
 On Saturday, January 25, 2014 12:51:25 AM Vladimir 'φ-coder/phcoder' 
 Serbinenko wrote:
 Hello, all. Due to my failue to foresee this problem if one upgrades X60
 coreboot, you need to manually reset CMOS config or your trackpad may
 not work as option trackpad_enable will get a garbage value. While I
 admit my part of fault, I feel like we should have a way to update
 options safely. I see following possibilities:
 1) Hide ourselves and tell that on upgrade you always have to clear
 CMOS. I don't think it's really an option as users will continue just
 running flashrom and in case of external flashing, CMOS reset may
 require full power removal with cell battery sometimes in difficult to
 access places inside laptop.
 2) Have some version field to check and if it mismatches reset CMOS to
 default. To avoid having to maintain version manually I propose to
 checksum option table and write 16-bit result to CMOS. 16-bit should
 give enough confidence without excessively using CMOS. I've made a
 prototype at http://review.coreboot.org/#/c/4790/4 . If we can agree
 that it's a right approach, I'll make this prototype into complete patch
 (mostly missing is laborous adding of version field)
 2a) instead of having separate field we could make XOR layout checksum
 into CMOS checksum. This would save 2 bytes but will break any existing
 users if they check checksum.
 
 You mean it won't write the cmos.default after upgrade?
 
Not it won't. Checksum covers the same range and is at same position. So
checksum is still valid.
 And why would you need to reset CMOS if trackpad is disabled?
 
  # nvramtool -a
  # nvramtool -w trackpad_enable=Enable
 
You could do it in this particular case but user isn't required to know
this. And settings may be something more drammatic. It may happen that
the system doesn't boot with garbage settings at all. The fact that you
have to handle garbage in saved option indicates that something is wrong.




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

[coreboot] Seeking for reviewers: X201 (enable S3 al) and X230

2014-01-12 Thread Vladimir 'φ-coder/phcoder' Serbinenko
Hello, all. I've just uploaded 2 patchsets: X201 which fixes all known
issues including S3 resume but except Gnome battery reporting. Top for
x201 is at
http://review.coreboot.org/#/c/4632/
and few separate patches with theme x201 (X201-specific) and
thinkpad (having benefits for X60/T60 as well).
X230 top is at http://review.coreboot.org/#/c/4679/




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] does coreboot support kvm WPCE775x other questions

2014-01-06 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 05.01.2014 07:15, Gregg Levine wrote:
  Part of the problem with laptops is that there is a thing on them
 called an Embedded Controller, EC for short. Those devices do all of
 the housekeeping chores that the main system has delegated to them.
 For example certain functions are on it.
 
 To that end most laptops aren't supported because these devices are
 proprietary in their designs and the programing of them.
While ECs are a problem for flashrom (unless they run off a separate
flash), they are usually of marginal importance to coreboot.
You cn always use external flasher.



signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

[coreboot] Remove GENERATE_ACPI_TABLES

2014-01-06 Thread Vladimir 'φ-coder/phcoder' Serbinenko
By now most boards and OS don't run correctly if ACPI tables are not
supplied. Ability by user to enable/disable their generation is just
increasing configuration matrix for no benefit. So I propose to hardwire
it to HAVE_ACPI_TABLES.
I feel like in current config there are too many options of kind Do you
want a working system? (y/n) and they should be hardwired to right
answer rather than adding configuration.

http://review.coreboot.org/#/c/4609/



signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] Remove GENERATE_ACPI_TABLES

2014-01-06 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 07.01.2014 00:12, mrnuke wrote:
 On Monday, January 06, 2014 07:52:20 PM Vladimir 'φ-coder/phcoder' Serbinenko 
 wrote:
 By now most boards and OS don't run correctly if ACPI tables are not
 supplied. Ability by user to enable/disable their generation is just
 increasing configuration matrix for no benefit. So I propose to hardwire
 it to HAVE_ACPI_TABLES.
 
 You mean you haven't found a need for it in your recent use cases. I don't 
 think this can be used to generalize for all boards, and is most certainly a 
 naive proposal for ARM boards. So you end up depending this shit on ARCH_x86, 
 then ARM adds ACPI, then it again makes sense to HAVE_ACPI_TABLES, but only 
 for ARM, so now we make it depend on ARCH_ARM, and we get a clusterfuck by 
 the 
 end of the day.
 At the end of it all, you are proposing to take away a freedom that has hurt 
 no-one. -2. I can't see the justification.
 
You misunderstood. I don't propose to remove HAVE_ACPI_TABLES.
HAVE_ACPI_TABLES remains per-board characteristic.
The only thing I remove is GENERATE_ACPI_TABLES which is user-visible
option.
This way presence of ACPI-tables is determined by board porter based on
the need and availability of ACPI tables
 I feel like in current config there are too many options of kind Do you
 want a working system? (y/n) and they should be hardwired to right
 answer rather than adding configuration.

 Flashing coreboot is a minefield of these questions: Do you want to brick 
 your 
 system? (ok/cancel). You can't make it fool proof, and nanny-state-ing users 
 is not the solution. Provide sane defaults.
 
Right now we're at opposite end when you almost have to use genetic
algorithm to find which configuration works.
 Alex
 
 P.S. If you don't know what you're doing, you will brick your board, no 
 matter 
 how many coreboot condoms you wear.
 




signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] New laptop: Lenovo ThinkPad X230 tablet, with dumps to go with it

2014-01-04 Thread Vladimir 'φ-coder/phcoder' Serbinenko
On 15.09.2012 05:47, Keith Hui wrote:
 Hi all,
 
 I'm back. With a new laptop.
 
 I'm now rocking a Lenovo x230 tablet,

http://review.coreboot.org/#/c/4614/





signature.asc
Description: OpenPGP digital signature
-- 
coreboot mailing list: coreboot@coreboot.org
http://www.coreboot.org/mailman/listinfo/coreboot

  1   2   >