All of lore.kernel.org
 help / color / mirror / Atom feed
* Port 80H Snoop
@ 2019-09-11 23:18 Wilfred Smith
  2019-09-12  1:52 ` CS20 CHLi30
  0 siblings, 1 reply; 6+ messages in thread
From: Wilfred Smith @ 2019-09-11 23:18 UTC (permalink / raw)
  To: openbmc

Has anyone done a port 80h snoop history module? If so, pointers appreciated. Also interested in constructive peanut gallery thoughts and considerations...

^ permalink raw reply	[flat|nested] 6+ messages in thread

* RE: Port 80H Snoop
  2019-09-11 23:18 Port 80H Snoop Wilfred Smith
@ 2019-09-12  1:52 ` CS20 CHLi30
  2019-09-12  1:56   ` Wilfred Smith
  0 siblings, 1 reply; 6+ messages in thread
From: CS20 CHLi30 @ 2019-09-12  1:52 UTC (permalink / raw)
  To: Wilfred Smith, openbmc; +Cc: CS20 CHLi30

[-- Attachment #1: Type: text/plain, Size: 1582 bytes --]

Hello Wilfred Smith,

You can refer the module phosphor-host-postd and add file recipes-phosphor/host/phosphor-host-postd_%.bbappend for changing your snoop device.
(ex: SNOOP_DEVICE = "npcm7xx-lpc-bpc0")

Then, you can execute "snooper" program in shell prompt and you will see the POST code be printed on console.
You can refer the attach file about screenshot for the result of snooper. Thanks.

Best regards,
Tim

-----Original Message-----
From: openbmc [mailto:openbmc-bounces+chli30=nuvoton.com@lists.ozlabs.org] On Behalf Of Wilfred Smith
Sent: Thursday, September 12, 2019 7:19 AM
To: openbmc@lists.ozlabs.org
Subject: Port 80H Snoop

Has anyone done a port 80h snoop history module? If so, pointers appreciated. Also interested in constructive peanut gallery thoughts and considerations...
________________________________
________________________________
 The privileged confidential information contained in this email is intended for use only by the addressees as indicated by the original sender of this email. If you are not the addressee indicated in this email or are not responsible for delivery of the email to such a person, please kindly reply to the sender indicating this fact and delete all copies of it from your computer and network server immediately. Your cooperation is highly appreciated. It is advised that any unauthorized use of confidential information of Nuvoton is strictly prohibited; and any information in this email irrelevant to the official business of Nuvoton shall be deemed as neither given nor endorsed by Nuvoton.

[-- Attachment #2: snooper.jpg --]
[-- Type: image/jpeg, Size: 6717 bytes --]

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: Port 80H Snoop
  2019-09-12  1:52 ` CS20 CHLi30
@ 2019-09-12  1:56   ` Wilfred Smith
  2019-09-12  3:46     ` CS20 CHLi30
  0 siblings, 1 reply; 6+ messages in thread
From: Wilfred Smith @ 2019-09-12  1:56 UTC (permalink / raw)
  To: CS20 CHLi30; +Cc: openbmc

Tim, Many thanks. Are you also providing the ability to track the history of the port 80h snoop values? If not, are you aware of someone else having done so?

Wilfred

> On Sep 11, 2019, at 6:52 PM, CS20 CHLi30 <CHLI30@nuvoton.com> wrote:
> 
> Hello Wilfred Smith,
> 
> You can refer the module phosphor-host-postd and add file recipes-phosphor/host/phosphor-host-postd_%.bbappend for changing your snoop device.
> (ex: SNOOP_DEVICE = "npcm7xx-lpc-bpc0")
> 
> Then, you can execute "snooper" program in shell prompt and you will see the POST code be printed on console.
> You can refer the attach file about screenshot for the result of snooper. Thanks.
> 
> Best regards,
> Tim

^ permalink raw reply	[flat|nested] 6+ messages in thread

* RE: Port 80H Snoop
  2019-09-12  1:56   ` Wilfred Smith
@ 2019-09-12  3:46     ` CS20 CHLi30
  2019-09-12 17:19       ` Kun Yi
  0 siblings, 1 reply; 6+ messages in thread
From: CS20 CHLi30 @ 2019-09-12  3:46 UTC (permalink / raw)
  To: Wilfred Smith; +Cc: openbmc, CS20 CHLi30

Hi Wilfred,

Yes, I also modified example code to track the history of the port 80h snoop values.
The history will be saved to file with timestamp name for Host ON, OFF, and enter BIOS conditions.
T
his patch is just an experiment hard coded some specific Port80H codes for monitoring BIOS we used.
These code should be configurable in a mature implementation, such as GUI/REST API entries for downloading/viewing these logs, but not done due to priority change.

The link of patch for you refer it. Thanks.
https://github.com/Nuvoton-Israel/openbmc/blob/master/meta-evb/meta-evb-nuvoton/meta-evb-npcm750/recipes-phosphor/host/phosphor-host-postd/0001-support-npcm7xx-lpc-bpc0-and-snooper.patch

Best regards,
Tim

-----Original Message-----
From: Wilfred Smith [mailto:wilfredsmith@fb.com]
Sent: Thursday, September 12, 2019 9:56 AM
To: CS20 CHLi30 <CHLI30@nuvoton.com>
Cc: openbmc@lists.ozlabs.org
Subject: Re: Port 80H Snoop

Tim, Many thanks. Are you also providing the ability to track the history of the port 80h snoop values? If not, are you aware of someone else having done so?

Wilfred

> On Sep 11, 2019, at 6:52 PM, CS20 CHLi30 <CHLI30@nuvoton.com> wrote:
>
> Hello Wilfred Smith,
>
> You can refer the module phosphor-host-postd and add file recipes-phosphor/host/phosphor-host-postd_%.bbappend for changing your snoop device.
> (ex: SNOOP_DEVICE = "npcm7xx-lpc-bpc0")
>
> Then, you can execute "snooper" program in shell prompt and you will see the POST code be printed on console.
> You can refer the attach file about screenshot for the result of snooper. Thanks.
>
> Best regards,
> Tim

________________________________
________________________________
 The privileged confidential information contained in this email is intended for use only by the addressees as indicated by the original sender of this email. If you are not the addressee indicated in this email or are not responsible for delivery of the email to such a person, please kindly reply to the sender indicating this fact and delete all copies of it from your computer and network server immediately. Your cooperation is highly appreciated. It is advised that any unauthorized use of confidential information of Nuvoton is strictly prohibited; and any information in this email irrelevant to the official business of Nuvoton shall be deemed as neither given nor endorsed by Nuvoton.

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: Port 80H Snoop
  2019-09-12  3:46     ` CS20 CHLi30
@ 2019-09-12 17:19       ` Kun Yi
  2019-09-16  9:03         ` Wang, Kuiying
  0 siblings, 1 reply; 6+ messages in thread
From: Kun Yi @ 2019-09-12 17:19 UTC (permalink / raw)
  To: CS20 CHLi30, kuiying.wang, jason.m.bills; +Cc: Wilfred Smith, openbmc

Hi Wilfred/Tim,

On Wed, Sep 11, 2019 at 8:47 PM CS20 CHLi30 <CHLI30@nuvoton.com> wrote:
>
> Hi Wilfred,
>
> Yes, I also modified example code to track the history of the port 80h snoop values.
> The history will be saved to file with timestamp name for Host ON, OFF, and enter BIOS conditions.
> T
> his patch is just an experiment hard coded some specific Port80H codes for monitoring BIOS we used.
> These code should be configurable in a mature implementation, such as GUI/REST API entries for downloading/viewing these logs, but not done due to priority change.
>
> The link of patch for you refer it. Thanks.
> https://github.com/Nuvoton-Israel/openbmc/blob/master/meta-evb/meta-evb-nuvoton/meta-evb-npcm750/recipes-phosphor/host/phosphor-host-postd/0001-support-npcm7xx-lpc-bpc0-and-snooper.patch

That's nice, I did't know it existed.

>
> Best regards,
> Tim
>
> -----Original Message-----
> From: Wilfred Smith [mailto:wilfredsmith@fb.com]
> Sent: Thursday, September 12, 2019 9:56 AM
> To: CS20 CHLi30 <CHLI30@nuvoton.com>
> Cc: openbmc@lists.ozlabs.org
> Subject: Re: Port 80H Snoop
>
> Tim, Many thanks. Are you also providing the ability to track the history of the port 80h snoop values? If not, are you aware of someone else having done so?

The ability to store POST codes has been on my backlog for quite a
while. I'd be happy to review patches/proposals to integrate the
functionality into OpenBMC.

I think Kuiying had some patches to enable this:
https://gerrit.openbmc-project.xyz/c/openbmc/phosphor-post-code-manager/+/18503,
but it's not merged yet. +Kuiying and Jason might have more
information.

>
> Wilfred
>
> > On Sep 11, 2019, at 6:52 PM, CS20 CHLi30 <CHLI30@nuvoton.com> wrote:
> >
> > Hello Wilfred Smith,
> >
> > You can refer the module phosphor-host-postd and add file recipes-phosphor/host/phosphor-host-postd_%.bbappend for changing your snoop device.
> > (ex: SNOOP_DEVICE = "npcm7xx-lpc-bpc0")
> >
> > Then, you can execute "snooper" program in shell prompt and you will see the POST code be printed on console.
> > You can refer the attach file about screenshot for the result of snooper. Thanks.
> >
> > Best regards,
> > Tim
>
> ________________________________
> ________________________________
>  The privileged confidential information contained in this email is intended for use only by the addressees as indicated by the original sender of this email. If you are not the addressee indicated in this email or are not responsible for delivery of the email to such a person, please kindly reply to the sender indicating this fact and delete all copies of it from your computer and network server immediately. Your cooperation is highly appreciated. It is advised that any unauthorized use of confidential information of Nuvoton is strictly prohibited; and any information in this email irrelevant to the official business of Nuvoton shall be deemed as neither given nor endorsed by Nuvoton.



-- 
Regards,
Kun

^ permalink raw reply	[flat|nested] 6+ messages in thread

* RE: Port 80H Snoop
  2019-09-12 17:19       ` Kun Yi
@ 2019-09-16  9:03         ` Wang, Kuiying
  0 siblings, 0 replies; 6+ messages in thread
From: Wang, Kuiying @ 2019-09-16  9:03 UTC (permalink / raw)
  To: Kun Yi, CS20 CHLi30, jason.m.bills; +Cc: Wilfred Smith, openbmc

Yes, I have a repo and patches for post-code-manager based on phosphor-host-postd

https://gerrit.openbmc-project.xyz/#/c/openbmc/phosphor-post-code-manager/+/18503/
https://gerrit.openbmc-project.xyz/#/c/openbmc/phosphor-dbus-interfaces/+/20474/ 

Thanks,
Kuiying.

-----Original Message-----
From: Kun Yi [mailto:kunyi@google.com] 
Sent: Friday, September 13, 2019 1:20 AM
To: CS20 CHLi30 <CHLI30@nuvoton.com>; Wang, Kuiying <kuiying.wang@intel.com>; jason.m.bills@linux.intel.com
Cc: Wilfred Smith <wilfredsmith@fb.com>; openbmc@lists.ozlabs.org
Subject: Re: Port 80H Snoop

Hi Wilfred/Tim,

On Wed, Sep 11, 2019 at 8:47 PM CS20 CHLi30 <CHLI30@nuvoton.com> wrote:
>
> Hi Wilfred,
>
> Yes, I also modified example code to track the history of the port 80h snoop values.
> The history will be saved to file with timestamp name for Host ON, OFF, and enter BIOS conditions.
> T
> his patch is just an experiment hard coded some specific Port80H codes for monitoring BIOS we used.
> These code should be configurable in a mature implementation, such as GUI/REST API entries for downloading/viewing these logs, but not done due to priority change.
>
> The link of patch for you refer it. Thanks.
> https://github.com/Nuvoton-Israel/openbmc/blob/master/meta-evb/meta-ev
> b-nuvoton/meta-evb-npcm750/recipes-phosphor/host/phosphor-host-postd/0
> 001-support-npcm7xx-lpc-bpc0-and-snooper.patch

That's nice, I did't know it existed.

>
> Best regards,
> Tim
>
> -----Original Message-----
> From: Wilfred Smith [mailto:wilfredsmith@fb.com]
> Sent: Thursday, September 12, 2019 9:56 AM
> To: CS20 CHLi30 <CHLI30@nuvoton.com>
> Cc: openbmc@lists.ozlabs.org
> Subject: Re: Port 80H Snoop
>
> Tim, Many thanks. Are you also providing the ability to track the history of the port 80h snoop values? If not, are you aware of someone else having done so?

The ability to store POST codes has been on my backlog for quite a while. I'd be happy to review patches/proposals to integrate the functionality into OpenBMC.

I think Kuiying had some patches to enable this:
https://gerrit.openbmc-project.xyz/c/openbmc/phosphor-post-code-manager/+/18503,
but it's not merged yet. +Kuiying and Jason might have more information.

>
> Wilfred
>
> > On Sep 11, 2019, at 6:52 PM, CS20 CHLi30 <CHLI30@nuvoton.com> wrote:
> >
> > Hello Wilfred Smith,
> >
> > You can refer the module phosphor-host-postd and add file recipes-phosphor/host/phosphor-host-postd_%.bbappend for changing your snoop device.
> > (ex: SNOOP_DEVICE = "npcm7xx-lpc-bpc0")
> >
> > Then, you can execute "snooper" program in shell prompt and you will see the POST code be printed on console.
> > You can refer the attach file about screenshot for the result of snooper. Thanks.
> >
> > Best regards,
> > Tim
>
> ________________________________
> ________________________________
>  The privileged confidential information contained in this email is intended for use only by the addressees as indicated by the original sender of this email. If you are not the addressee indicated in this email or are not responsible for delivery of the email to such a person, please kindly reply to the sender indicating this fact and delete all copies of it from your computer and network server immediately. Your cooperation is highly appreciated. It is advised that any unauthorized use of confidential information of Nuvoton is strictly prohibited; and any information in this email irrelevant to the official business of Nuvoton shall be deemed as neither given nor endorsed by Nuvoton.



--
Regards,
Kun

^ permalink raw reply	[flat|nested] 6+ messages in thread

end of thread, other threads:[~2019-09-16  9:03 UTC | newest]

Thread overview: 6+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2019-09-11 23:18 Port 80H Snoop Wilfred Smith
2019-09-12  1:52 ` CS20 CHLi30
2019-09-12  1:56   ` Wilfred Smith
2019-09-12  3:46     ` CS20 CHLi30
2019-09-12 17:19       ` Kun Yi
2019-09-16  9:03         ` Wang, Kuiying

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.