IRC log of #cubox of Thu 31 Oct 2013. All times are in CET < Back to index

00:32 _rmk 00:32 * _rmk_ fixes imx_thermal to automatically load at boot.
00:34 _rmk 00:34 * _rmk_ wonders how much other stuff is missing a MODULE_DEVICE_TABLE()
07:54 jnettlet okay today is the day.
11:29 _rmk_ ok, so there won't be any c1 support in a -final mainline for another six months :(
11:30 jnettle 11:30 * jnettlet is sad, but happy I have put the time into backporting a lot of stuff to the 3.10 based imx kernel.
11:32 _rmk_ the delay is caused by the imx people wanting to redo the way they handle the pinmux stuff in DT
11:34 _rmk_ so... if they get it sorted and into mainline during the coming merge window (due real soon now), that means it'll be in for v3.13-rc1. I'll be able to respin the stuff on top of v3.13-rc1 for the following merge window, which will then go in for the next merge window in 3 months time... and it'll show up in v3.14-rc1 shortly thereafter, and v3.14 after another 3 months.
11:36 _rmk_ if it misses this merge window then we're looking at 9 months.
13:19 unununium_ Hello everybody!
13:27 dv_ "the imx people" being ?
13:27 dv_ the freescale linux division?
13:28 _rmk_ pengutronix
13:45 jnettlet noooooo!!!!!
13:48 _rmk_ yay, Gregkh has said he will now take the imx hdmi stuff into the staging tree... but not for this merge window (too late)
13:49 _rmk_ jnettlet: I kind'a anticipated that reaction from people here that in my email over it :)
13:50 jnettlet _rmk_, :-) Great that Gregkh is taking it in for next merge
13:51 _rmk_ the only reason that's happening is because its now being worked on :p
13:52 _rmk_ with a view to sorting the damn thing out and getting it out of staging
13:52 jnettlet hurrah!!!
13:55 unununium_ Hey jnettlet! Die you have any success already?
13:55 jnettlet unununium_, aahhh not yet. I didn't know my wife was off today so my morning was sucked up doing husbandly duties
13:56 unununium_ That's good! :) Because my time is very limited today as well.
13:56 jnettlet okay then we can push. works for both of us.
13:56 unununium_ ;)
13:56 unununium_ Just didn't want to stay away without saying anything.
14:09 jnettlet no worries, we won't forget you.
14:11 unununium_ That's not what I meant. ;) I've got time. Just didn't want to keep you waiting.
14:58 Bluerise [11:32:15] <_rmk_> the delay is caused by the imx people wanting to redo the way they handle the pinmux stuff in DT
14:58 Bluerise _rmk_: Does that mean "silently work on it for 6 months and then try to push it to mainline"?
14:59 Bluerise Or will the patches be public somewhere?
15:00 _rmk_ bluerise: I don't call posting patches to mailing lists "silently work"
15:00 Bluerise ok
15:01 _rmk_ which I've already done...
15:01 _rmk_ what I'm not going to do is push out lots of stuff which isn't finalised in git trees, and then have people base stuff off that only to then find that I've changed all the commits
15:02 _rmk_ for example, the first two commits for this stuff are currently:
15:02 _rmk_ 6ff4d9d70e84 ARM: imx: initial IMX6 Cubox-i Carrier-1 support *UNSTABLE*
15:02 _rmk_ a866a9958668 ARM: imx6qdl: provide pinctrl configurations for DAT3 pull-down *UNSTABLE*
15:03 _rmk_ and a866a9958668 will most likely end up being deleted
15:03 _rmk_ once the situation with how we're going to do the DAT3 pinmux config is sorted
15:04 _rmk_ and yesterday, I replaced the top most 10 commits in my tree when Fabio sent a new revision of his HDMI addon to imx-drm.
15:05 _rmk_ with that kind of stuff going on, it's not worth trying to publish in git form.
15:06 _rmk_ and I don't want to have a branch which grows lots of cruft which can never be merged into mainline; that's not my aim - my aim is to get stuff into mainline.
15:06 Catastrophe Hi
15:07 Catastrophe Can anyone help me ? I have this error when I tried to flash uboot on SPI : /dev/mtd0 (SPI flash) is invalid
15:22 Catastrophe is the genius rabeeh is here ?
15:26 jnettlet Catastrophe, your handle is fitting
15:27 Catastrophe :)
15:27 jnettlet is this trying to use the cubox installer?
15:28 Catastrophe yes :(
15:28 Catastrophe i found this : http://server.vijge.net/static/cubox/irclog/201305/cubox-20130527.html
15:28 jnettlet Well this is the official unbricking wiki entry. http://www.solid-run.com/mw/index.php/Unbricking_CuBox_-_Reflashing_SPI_Memory
15:29 Catastrophe already done, doesn't work
15:30 jnettlet the commands fail, or they succeed and the error persists?
15:30 Catastrophe second option, they succeed and the error persists
15:30 Catastrophe like Hoof in this post : http://www.solid-run.com/phpbb/viewtopic.php?f=7&t=1307
15:33 Catastrophe huuuuum I think i resolve the problem
15:34 jnettlet did you switch the usb port?
15:35 Catastrophe no, why ?
15:36 jnettlet one the usb ports is better than the other for flashing for some reason. Can't remember which one.
15:37 Catastrophe the upper one
15:55 Catastrophe wellwellwell my problem is solve
15:55 Catastrophe how ? i don't know
16:01 _rmk_ self resolving problems... :)
19:15 dv_ rabeeh: is there some kind of rework that hasnt been done on my c1 ?
19:15 dv_ no matter what uboot version I use, I still see this problem that sometimes the c1 does not start
19:15 dv_ I see no output on serial
19:16 dv_ I have to wait a few minutes, then it works. sometimes. its as if some sort of capacitor is still charged somewhere, and has to be fully discharged before it can successfully reboot
20:55 _rmk 20:55 * _rmk_ now has most of imx-drm initialising in the main drm driver load callback... we're getting there :)
21:21 _rmk_ almost at the point where imx-drm can be unbound :)
21:58 _rmk 21:58 * _rmk_ lols.
21:58 Bluerise ?
21:59 _rmk_ http://archive.arm.linux.org.uk/lurker/message/20131031.203856.88c60a43.en.html
22:00 Bluerise wtf?
22:01 Bluerise http://arstechnica.com/security/2013/10/meet-badbios-the-mysterious-mac-and-pc-malware-that-jumps-airgaps/
22:01 Bluerise Glad we don't have that on ARM ;o
22:01 _rmk_ bluerise: I believe that article to be crap
22:01 Bluerise I don't think all of it is crap.
22:02 Bluerise but it really sounds crazy.
22:02 _rmk_ (a) no one else seems to be carrying the story
22:02 _rmk_ (b) most real OSes do a handshake with the BIOS to gain exclusive control of USB such that the BIOS never gets used for USB
22:03 Bluerise I just hope it's not real.
22:03 _rmk_ that's why I mean - I don't think it is.
22:04 _rmk_ I'm on another channel which has discussed that story over the last two days
22:05 Bluerise Ah
22:05 Bluerise conclusion?
22:06 _rmk_ same as my conclusion
22:07 _rmk_ there's other interesting things in there... "It's also possible to use high-frequency sounds broadcast over speakers to send network packets." -- That's quite a claim.
22:08 _rmk_ most audio power amps roll off at around 150kHz or lower, there's no way they'll get anywhere near the frequencies needed for network packets... let alone whether a tweeter could reproduce the high frequencies found on network cables...
22:10 _rmk_ that whole paragraph, for example, only exists in that article to make you go "oh gosh, I should move my speakers away from my network cables!"
22:10 tchebb well, this sounds like an interesting read...
22:14 tchebb huh. how odd
22:15 tchebb _rmk_: Well, you wouldn't just be sending the ethernet packets directly out the speakers, would you? Presumably there's some other protocol designed to work at low frequencies which IP is tunneled through.
22:16 jnettle 22:16 * jnettlet agrees that this is American sensationalist news reporting at the best. All headlines and no facts.
22:21 jnettlet _rmk_, I bet this is the stupid virus that embeds itself in the bios of the network adapters.
22:22 jnettlet It isn't jumping air gaps it is never completely cleaned from the machine. Because they only flash the bios change drives, but never completely discharge the machine power from the motherboard.
22:23 jnettlet Considering most modern ethernet/wifi adapters are their own SOC this isn't surprising.
22:24 _rmk_ jnettlet: if you look at the evidence behind "behaves as if it's still connected to the internet" is that the virus seemed to heal itself as they disabled other stuff... err, you don't need to be connected to the net for that to happen.
22:25 _rmk_ now, I may be more likely to believe this if they then went on to say "we removed every other machine within proximity and the virus stopped healing itself"
22:26 _rmk_ I could continue for ages to rip that article apart, but honestly, it's a waste of time.
22:27 _rmk_ or if they physicallly disconnected speakers/mics from the system
22:27 tchebb _rmk_: Didn't they? "Then, when Ruiu removed the internal speaker and microphone connected to the airgapped machine, the packets suddenly stopped."
22:27 _rmk_ I'm quite sure they would claim that this virus can infect the magnetic coil of a loudspeaker if they thought they could get away with it.
22:27 jnettlet and they also say the internal speaker of the machine. Which has zero ability to play any high frequency sounds
22:29 jnettlet if it was that big a deal hook a scope up the machine and see what the hell it is doing. This is pathetic
22:31 jnettlet "machines whisper to one another using ultrasound" bwahahahahaha
22:31 _rmk_ jnettlet: yep and provide an image of the transmitted waveform and analysis thereof.
22:31 jnettlet well I also enjoy that they claim these transmissions are "encrypted"
22:31 tchebb IThe article has way too much drama and way to little information, but what reason would the people claiming this have to make it up? They seem to be fairly prominent in the security community.
22:32 tchebb *too
22:32 jnettlet tchebb, I think they aren't so bright.
22:32 jnettlet they claim to have been working on this for 3 years and this is the best of their hypotheses
22:33 tchebb jnettlet: Yeah, that's certainly a possibility. I don't buy it either; just playing devil's advocate
22:33 jnettlet not to mention their should all be losing their jobs as they seem to be Admins for some type of computer security group.
22:34 jnettlet really just just seem to be virus herders
22:34 tchebb and it's not even like it's a high-profile target. If this isn't a targeted piece of software (and if it were, why would they target him?), why haven't there been other reports?
22:36 jnettle 22:36 * jnettlet guesses that this is a hoax. Somebody demonstrating how easy it is to "hack" the news outlets
22:37 taz hello :)
22:38 taz I'm trying to reinstall my cubox
22:38 taz I boot from the usb FAT 32 key with /boot on it
22:38 taz ad nothing appear on my screen, so I did it with a usb cable avec minicom on linux
22:38 taz and I can see my usb key booting
22:39 taz but the process block on this step : Loading Kernel Image ...
22:39 taz do you have an idea please ? :)
22:42 _rmk_ you've checked that the usb key is properly readable on another machine?
22:43 taz yes
22:43 taz ho ok i found
22:43 taz it is my version of uboot
22:43 taz it is too old
22:45 taz but I can't update my u-boot
22:45 taz I don't understand how to do it
22:45 taz because on this page http://www.solid-run.com/mw/index.php/CuBox_Installer it say it is automatic
22:46 _rmk_ I'm afraid I've never done any of the official upgrades etc so...
22:46 taz ok
23:53 taz erf i break my cubox :(
23:54 taz hello, i break the u-boot of my cubox v2 and this procedure don't recue me :/ http://www.solid-run.com/mw/index.php?title=Unbricking_CuBox#Linux_.28Ubuntu.29
23:54 taz someone for help please?