Hi.
Sorry for not replying, i got buried with other stuff.
So, after some hassle with svn, i managed to apply that patch (patch -l -m -i ../flashrom.patch) ontop of current svn tip (r1857) That indeed fixed flash reading (-r), md5 of files generated with this patch, and with r1832 match.
Here is the output, also do note "Invalid locking change 0xf8 requested" at the end!!!
# flashrom --programmer internal -r 1002.bin.patch -V flashrom v0.9.7-r1857 on Linux 3.16.0-4-686-pae (i686) flashrom is free software, get the source code at http://www.flashrom.org
flashrom was built with libpci 3.2.1, GCC 4.9.2, little endian Command line (5 args): flashrom --programmer internal -r 1002.bin.patch -V Calibrating delay loop... OS timer resolution is 1 usecs, 534M loops per second, 10 myus = 10 us, 100 myus = 100 us, 1000 myus = 999 us, 10000 myus = 10002 us, 4 myus = 4 us, OK. Initializing internal programmer No coreboot table found. Using Internal DMI decoder. DMI string chassis-type: "Desktop" DMI string system-manufacturer: "ASUSTeK COMPUTER INC." DMI string system-product-name: "PCH-DR" DMI string system-version: "1.XX " DMI string baseboard-manufacturer: "ASUSTek Computer INC." DMI string baseboard-product-name: "PCH-DR" DMI string baseboard-version: "1.XX " Found Winbond Super I/O, id 0x82 W836xx enter config mode worked or we were already in config mode. W836xx leave config mode had no effect. Active config mode, unknown reg 0x20 ID: 00. Please send the output of "flashrom -V -p internal" to flashrom@flashrom.org with W836xx: your board name: flashrom -V as the subject to help us finish support for your Super I/O. Thanks. Found chipset "Intel 6300ESB" with PCI ID 8086:25a1. Enabling flash write... 0xfff80000/0xffb80000 FWH IDSEL: 0x0 0xfff00000/0xffb00000 FWH IDSEL: 0x0 0xffe80000/0xffa80000 FWH IDSEL: 0x1 0xffe00000/0xffa00000 FWH IDSEL: 0x1 0xffd80000/0xff980000 FWH IDSEL: 0x2 0xffd00000/0xff900000 FWH IDSEL: 0x2 0xffc80000/0xff880000 FWH IDSEL: 0x3 0xffc00000/0xff800000 FWH IDSEL: 0x3 0xff700000/0xff300000 FWH IDSEL: 0x4 0xff600000/0xff200000 FWH IDSEL: 0x5 0xff500000/0xff100000 FWH IDSEL: 0x6 0xff400000/0xff000000 FWH IDSEL: 0x7 0xfff80000/0xffb80000 FWH decode enabled 0xfff00000/0xffb00000 FWH decode enabled 0xffe80000/0xffa80000 FWH decode disabled 0xffe00000/0xffa00000 FWH decode disabled 0xffd80000/0xff980000 FWH decode disabled 0xffd00000/0xff900000 FWH decode disabled 0xffc80000/0xff880000 FWH decode disabled 0xffc00000/0xff800000 FWH decode disabled 0xff700000/0xff300000 FWH decode disabled 0xff600000/0xff200000 FWH decode disabled 0xff500000/0xff100000 FWH decode disabled 0xff400000/0xff000000 FWH decode disabled Maximum FWH chip size: 0x100000 bytes
BIOS_CNTL = 0x01: BIOS Lock Enable: disabled, BIOS Write Enable: enabled OK. The following protocols are supported: FWH. Probing for Atmel AT49LH002, 256 kB: probe_82802ab: id1 0x08, id2 0x14, id1 is normal flash content, id2 is normal flash content Probing for Atmel AT49LH00B4, 512 kB: probe_82802ab: id1 0x49, id2 0x4d, id1 is normal flash content, id2 is normal flash content Probing for Atmel AT49LH004, 512 kB: probe_82802ab: id1 0x49, id2 0x4d, id1 is normal flash content, id2 is normal flash content Probing for Intel 82802AB, 512 kB: probe_82802ab: id1 0x49, id2 0x4d, id1 is normal flash content, id2 is normal flash content Probing for Intel 82802AC, 1024 kB: probe_82802ab: id1 0x49, id2 0x4d, id1 is normal flash content, id2 is normal flash content Probing for PMC Pm49FL002, 256 kB: probe_jedec_common: id1 0x9d, id2 0x6e Probing for PMC Pm49FL004, 512 kB: probe_jedec_common: id1 0x9d, id2 0x6e Found PMC flash chip "Pm49FL004" (512 kB, LPC, FWH) mapped at physical address 0xfff80000. Probing for Sharp LHF00L04, 1024 kB: probe_82802ab: id1 0x49, id2 0x4d, id1 is normal flash content, id2 is normal flash content Probing for SST SST49LF002A/B, 256 kB: probe_jedec_common: id1 0x9d, id2 0x6e Probing for SST SST49LF003A/B, 384 kB: probe_jedec_common: id1 0x9d, id2 0x6e Probing for SST SST49LF004A/B, 512 kB: probe_jedec_common: id1 0x9d, id2 0x6e Probing for SST SST49LF004C, 512 kB: probe_82802ab: id1 0x49, id2 0x4d, id1 is normal flash content, id2 is normal flash content Probing for SST SST49LF008A, 1024 kB: probe_jedec_common: id1 0x9d, id2 0x6e Probing for SST SST49LF008C, 1024 kB: probe_82802ab: id1 0x49, id2 0x4d, id1 is normal flash content, id2 is normal flash content Probing for SST SST49LF016C, 2048 kB: probe_82802ab: id1 0xff, id2 0xff, id1 parity violation, id1 is normal flash content, id2 is normal flash content Probing for ST M50FLW040A, 512 kB: probe_82802ab: id1 0x49, id2 0x4d, id1 is normal flash content, id2 is normal flash content Probing for ST M50FLW040B, 512 kB: probe_82802ab: id1 0x49, id2 0x4d, id1 is normal flash content, id2 is normal flash content Probing for ST M50FLW080A, 1024 kB: probe_82802ab: id1 0x49, id2 0x4d, id1 is normal flash content, id2 is normal flash content Probing for ST M50FLW080B, 1024 kB: probe_82802ab: id1 0x49, id2 0x4d, id1 is normal flash content, id2 is normal flash content Probing for ST M50FW002, 256 kB: probe_82802ab: id1 0x08, id2 0x14, id1 is normal flash content, id2 is normal flash content Probing for ST M50FW016, 2048 kB: probe_82802ab: id1 0xff, id2 0xff, id1 parity violation, id1 is normal flash content, id2 is normal flash content Probing for ST M50FW040, 512 kB: probe_82802ab: id1 0x49, id2 0x4d, id1 is normal flash content, id2 is normal flash content Probing for ST M50FW080, 1024 kB: probe_82802ab: id1 0x49, id2 0x4d, id1 is normal flash content, id2 is normal flash content Probing for Winbond W39V040FA, 512 kB: probe_jedec_common: id1 0x9d, id2 0x6e Probing for Winbond W39V040FB, 512 kB: probe_jedec_common: id1 0x9d, id2 0x6e Probing for Winbond W39V040FC, 512 kB: probe_jedec_common: id1 0x9d, id2 0x6e Probing for Winbond W49V002FA, 256 kB: probe_jedec_common: id1 0x9d, id2 0x6e Probing for Winbond W39V080FA, 1024 kB: probe_jedec_common: id1 0x9d, id2 0x6e Probing for Winbond W39V080FA (dual mode), 512 kB: probe_jedec_common: id1 0x9d, id2 0x6e Found PMC flash chip "Pm49FL004" (512 kB, LPC, FWH). === This flash part has status UNTESTED for operations: ERASE WRITE The test status of this chip may have been updated in the latest development version of flashrom. If you are running the latest development version, please email a report to flashrom@flashrom.org if any of the above operations work correctly for you with this flash chip. Please include the flashrom log file for all operations you tested (see the man page for details), and mention which mainboard or programmer you tested in the subject line. Thanks for your help! Invalid locking change 0xf8 requested at 0xb7323002! Please report a bug at flashrom@flashrom.org Reading flash... done. #
Roman.
On Sun, Dec 7, 2014 at 2:06 AM, Stefan Tauner < stefan.tauner@alumni.tuwien.ac.at> wrote:
Previously we added the offset of the virtual register in several functions, which produced segfaults. This patch renames a few parameters hence the rather big diff.
Thanks to Roman Lebedev for reporting this issue.
Signed-off-by: Stefan Tauner stefan.tauner@alumni.tuwien.ac.at
chipdrivers.h | 1 - jedec.c | 54 ++++++++++++++++++++++++------------------------------ 2 files changed, 24 insertions(+), 31 deletions(-)
diff --git a/chipdrivers.h b/chipdrivers.h index 8529c74..cac94f3 100644 --- a/chipdrivers.h +++ b/chipdrivers.h @@ -150,7 +150,6 @@ int unlock_regspace2_uniform_32k(struct flashctx *flash); int unlock_regspace2_uniform_64k(struct flashctx *flash); int unlock_regspace2_block_eraser_0(struct flashctx *flash); int unlock_regspace2_block_eraser_1(struct flashctx *flash); -int unlock_regspace2_block(const struct flashctx *flash, chipaddr off); int printlock_regspace2_uniform_64k(struct flashctx *flash); int printlock_regspace2_block_eraser_0(struct flashctx *flash); int printlock_regspace2_block_eraser_1(struct flashctx *flash); diff --git a/jedec.c b/jedec.c index 1345b89..944f9d0 100644 --- a/jedec.c +++ b/jedec.c @@ -589,11 +589,10 @@ static int regspace2_walk_unlockblocks(const struct flashctx *flash, const struc #define REG2_LOCKDOWN (1 << 1) #define REG2_MASK (REG2_RWLOCK | REG2_LOCKDOWN)
-static int printlock_regspace2_block(const struct flashctx *flash, chipaddr offset) +static int printlock_regspace2_block(const struct flashctx *flash, chipaddr wrprotect) {
chipaddr wrprotect = flash->virtual_registers + offset + 2; uint8_t state = chip_readb(flash, wrprotect);
msg_cdbg("Lock status of block at 0x%0*" PRIxPTR " is ",
PRIxPTR_WIDTH, offset);
msg_cdbg("Lock status of block at 0x%0*" PRIxPTR " is ",
PRIxPTR_WIDTH, wrprotect); switch (state & REG2_MASK) { case 0: msg_cdbg("Full Access.\n"); @@ -656,47 +655,43 @@ int printlock_regspace2_block_eraser_1(struct flashctx *flash) return regspace2_walk_unlockblocks(flash, unlockblocks, &printlock_regspace2_block); }
-static int changelock_regspace2_block(const struct flashctx *flash, chipaddr offset, uint8_t new_bits) +static int changelock_regspace2_block(const struct flashctx *flash, chipaddr wrprotect, uint8_t old, uint8_t new) {
chipaddr wrprotect = flash->virtual_registers + offset + 2;
uint8_t old;
if (new_bits & ~REG2_MASK) {
if (new & ~REG2_MASK) { msg_cerr("Invalid locking change 0x%02x requested at
0x%0*" PRIxPTR "! " "Please report a bug at flashrom@flashrom.org\n",
new_bits, PRIxPTR_WIDTH, offset);
new, PRIxPTR_WIDTH, wrprotect); return -1; }
old = chip_readb(flash, wrprotect); /* Early exist if no change (of read/write/lockdown) was
requested. */
if (((old ^ new_bits) & REG2_MASK) == 0) {
msg_cdbg2("Locking status at 0x%0*" PRIxPTR " not
changed\n", PRIxPTR_WIDTH, offset);
if (((old ^ new) & REG2_MASK) == 0) {
msg_cdbg2("Locking status at 0x%0*" PRIxPTR " not
changed\n", PRIxPTR_WIDTH, wrprotect); return 0; } /* Normally lockdowns can not be cleared. Try nevertheless if requested. */
if ((old & REG2_LOCKDOWN) && !(new_bits & REG2_LOCKDOWN)) {
if ((old & REG2_LOCKDOWN) && !(new & REG2_LOCKDOWN)) { chip_writeb(flash, old & ~REG2_LOCKDOWN, wrprotect); if (chip_readb(flash, wrprotect) != (old &
~REG2_LOCKDOWN)) {
msg_cerr("Lockdown can't be removed at 0x%0*"
PRIxPTR "!\n", PRIxPTR_WIDTH, offset);
msg_cerr("Lockdown can't be removed at 0x%0*"
PRIxPTR "!\n", PRIxPTR_WIDTH, wrprotect); return -1; } } /* Change read or write lock? */
if ((old ^ new_bits) & REG2_RWLOCK) {
if ((old ^ new) & REG2_RWLOCK) { /* Do not lockdown yet. */
msg_cdbg("Changing locking status at 0x%0*" PRIxPTR " to
0x%02x\n", PRIxPTR_WIDTH, offset, new_bits & REG2_RWLOCK);
chip_writeb(flash, new_bits & REG2_RWLOCK, wrprotect);
if (chip_readb(flash, wrprotect) != (new_bits &
REG2_RWLOCK)) {
msg_cerr("Locking status change FAILED at 0x%0*"
PRIxPTR "!\n", PRIxPTR_WIDTH, offset);
msg_cdbg("Changing locking status at 0x%0*" PRIxPTR " to
0x%02x\n", PRIxPTR_WIDTH, wrprotect, new & REG2_RWLOCK);
chip_writeb(flash, new & REG2_RWLOCK, wrprotect);
if (chip_readb(flash, wrprotect) != (new & REG2_RWLOCK)) {
msg_cerr("Locking status change FAILED at 0x%0*"
PRIxPTR "!\n", PRIxPTR_WIDTH, wrprotect); return -1; } } /* Enable lockdown if requested. */
if (!(old & REG2_LOCKDOWN) && (new_bits & REG2_LOCKDOWN)) {
msg_cdbg("Enabling lockdown at 0x%0*" PRIxPTR "\n",
PRIxPTR_WIDTH, offset);
chip_writeb(flash, new_bits, wrprotect);
if (chip_readb(flash, wrprotect) != new_bits) {
msg_cerr("Enabling lockdown FAILED at 0x%0*"
PRIxPTR "!\n", PRIxPTR_WIDTH, offset);
if (!(old & REG2_LOCKDOWN) && (new & REG2_LOCKDOWN)) {
msg_cdbg("Enabling lockdown at 0x%0*" PRIxPTR "\n",
PRIxPTR_WIDTH, wrprotect);
chip_writeb(flash, new, wrprotect);
if (chip_readb(flash, wrprotect) != new) {
msg_cerr("Enabling lockdown FAILED at 0x%0*"
PRIxPTR "!\n", PRIxPTR_WIDTH, wrprotect); return -1; } } @@ -704,19 +699,18 @@ static int changelock_regspace2_block(const struct flashctx *flash, chipaddr off return 0; }
-int unlock_regspace2_block(const struct flashctx *flash, chipaddr off) +static int unlock_regspace2_block_generic(const struct flashctx *flash, chipaddr wrprotect) {
chipaddr wrprotect = flash->virtual_registers + off + 2; uint8_t old = chip_readb(flash, wrprotect); /* We don't care for the lockdown bit as long as the RW locks are
0 after we're done */
return changelock_regspace2_block(flash, off, old & ~REG2_RWLOCK);
return changelock_regspace2_block(flash, wrprotect, old, old &
~REG2_RWLOCK); }
static int unlock_regspace2_uniform(struct flashctx *flash, unsigned long block_size) { const unsigned int elems = flash->chip->total_size * 1024 / block_size; struct unlockblock blocks[2] = {{.size = block_size, .count = elems}};
return regspace2_walk_unlockblocks(flash, blocks,
&unlock_regspace2_block);
return regspace2_walk_unlockblocks(flash, blocks,
&unlock_regspace2_block_generic); }
int unlock_regspace2_uniform_64k(struct flashctx *flash) @@ -734,7 +728,7 @@ int unlock_regspace2_block_eraser_0(struct flashctx *flash) // FIXME: this depends on the eraseblocks not to be filled up completely (i.e. to be null-terminated). const struct unlockblock *unlockblocks = (const struct unlockblock *)flash->chip->block_erasers[0].eraseblocks;
return regspace2_walk_unlockblocks(flash, unlockblocks,
&unlock_regspace2_block);
return regspace2_walk_unlockblocks(flash, unlockblocks,
&unlock_regspace2_block_generic); }
int unlock_regspace2_block_eraser_1(struct flashctx *flash) @@ -742,6 +736,6 @@ int unlock_regspace2_block_eraser_1(struct flashctx *flash) // FIXME: this depends on the eraseblocks not to be filled up completely (i.e. to be null-terminated). const struct unlockblock *unlockblocks = (const struct unlockblock *)flash->chip->block_erasers[1].eraseblocks;
return regspace2_walk_unlockblocks(flash, unlockblocks,
&unlock_regspace2_block);
return regspace2_walk_unlockblocks(flash, unlockblocks,
&unlock_regspace2_block_generic); }
-- Kind regards, Stefan Tauner