Port 80H Snoop

Kun Yi kunyi at google.com
Fri Sep 13 03:19:35 AEST 2019


Hi Wilfred/Tim,

On Wed, Sep 11, 2019 at 8:47 PM CS20 CHLi30 <CHLI30 at nuvoton.com> wrote:
>
> Hi Wilfred,
>
> Yes, I also modified example code to track the history of the port 80h snoop values.
> The history will be saved to file with timestamp name for Host ON, OFF, and enter BIOS conditions.
> T
> his patch is just an experiment hard coded some specific Port80H codes for monitoring BIOS we used.
> These code should be configurable in a mature implementation, such as GUI/REST API entries for downloading/viewing these logs, but not done due to priority change.
>
> The link of patch for you refer it. Thanks.
> https://github.com/Nuvoton-Israel/openbmc/blob/master/meta-evb/meta-evb-nuvoton/meta-evb-npcm750/recipes-phosphor/host/phosphor-host-postd/0001-support-npcm7xx-lpc-bpc0-and-snooper.patch

That's nice, I did't know it existed.

>
> Best regards,
> Tim
>
> -----Original Message-----
> From: Wilfred Smith [mailto:wilfredsmith at fb.com]
> Sent: Thursday, September 12, 2019 9:56 AM
> To: CS20 CHLi30 <CHLI30 at nuvoton.com>
> Cc: openbmc at lists.ozlabs.org
> Subject: Re: Port 80H Snoop
>
> Tim, Many thanks. Are you also providing the ability to track the history of the port 80h snoop values? If not, are you aware of someone else having done so?

The ability to store POST codes has been on my backlog for quite a
while. I'd be happy to review patches/proposals to integrate the
functionality into OpenBMC.

I think Kuiying had some patches to enable this:
https://gerrit.openbmc-project.xyz/c/openbmc/phosphor-post-code-manager/+/18503,
but it's not merged yet. +Kuiying and Jason might have more
information.

>
> Wilfred
>
> > On Sep 11, 2019, at 6:52 PM, CS20 CHLi30 <CHLI30 at nuvoton.com> wrote:
> >
> > Hello Wilfred Smith,
> >
> > You can refer the module phosphor-host-postd and add file recipes-phosphor/host/phosphor-host-postd_%.bbappend for changing your snoop device.
> > (ex: SNOOP_DEVICE = "npcm7xx-lpc-bpc0")
> >
> > Then, you can execute "snooper" program in shell prompt and you will see the POST code be printed on console.
> > You can refer the attach file about screenshot for the result of snooper. Thanks.
> >
> > Best regards,
> > Tim
>
> ________________________________
> ________________________________
>  The privileged confidential information contained in this email is intended for use only by the addressees as indicated by the original sender of this email. If you are not the addressee indicated in this email or are not responsible for delivery of the email to such a person, please kindly reply to the sender indicating this fact and delete all copies of it from your computer and network server immediately. Your cooperation is highly appreciated. It is advised that any unauthorized use of confidential information of Nuvoton is strictly prohibited; and any information in this email irrelevant to the official business of Nuvoton shall be deemed as neither given nor endorsed by Nuvoton.



-- 
Regards,
Kun


More information about the openbmc mailing list