Re: [meta-intel] [PATCH 2/2] meta-intel.inc: allow disabling of Intel microcode

2014-09-18 Thread Hart, Darren
On 9/17/14, 13:51, Kamble, Nitin A nitin.a.kam...@intel.com wrote:

The problem with this of course is we can't use it easily with the common
BSPs and ultimately we want to eliminate as many of the other BSPs as
possible.

What is the exact issue with microcode? How does it break certain systems
when enabled on the intel common BSPs?

1st there is no boot issue related to microcode. What was reported is a
build issue. His initrd file was not built correctly. And we believe that
it happened because he used older version of poky/oecore. So that is
turning out to be a build setup issue.

Here are the updates on the bug:
https://bugzilla.yoctoproject.org/show_bug.cgi?id=6730


Nitin

Oh great!

So what's the status of this then? Can it be enabled by default?

-- 
Darren Hart Open Source Technology Center
darren.h...@intel.com   Intel Corporation


-- 
___
meta-intel mailing list
meta-intel@yoctoproject.org
https://lists.yoctoproject.org/listinfo/meta-intel


Re: [meta-intel] [PATCH 1/2] intel-corei7-64.conf: include the AMT daemon in the images

2014-09-18 Thread Hart, Darren
On 9/17/14, 15:52, Kamble, Nitin A nitin.a.kam...@intel.com wrote:



On 9/17/14, 12:58 PM, Hart, Darren darren.h...@intel.com wrote:

On 9/17/14, 12:44, Kamble, Nitin A nitin.a.kam...@intel.com wrote:

From: Nitin A Kamble nitin.a.kam...@intel.com

Some of the platforms supported by the intel-corei7-64 BSP have AMT
feature
on the platform. Enable it so that it can get utilized with this BSP.

How does this impact boot of systems without AMT support? 32 and 64 bit?

This change just adds the AMT module to the images. It would not affect
booting unless a system has broken AMT firmware. In that case the
machine-setup-tool configuration can be used to blacklist the mei kernel
driver.

Nitin

Thanks,

Acked-by: Darren Hart dvh...@linux.intel.com





Signed-off-by: Nitin A Kamble nitin.a.kam...@intel.com
---
 conf/machine/intel-corei7-64.conf | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/conf/machine/intel-corei7-64.conf
b/conf/machine/intel-corei7-64.conf
index c3b08bc..97d57b3 100644
--- a/conf/machine/intel-corei7-64.conf
+++ b/conf/machine/intel-corei7-64.conf
@@ -16,7 +16,7 @@ MACHINE_FEATURES += wifi 3g
 
 MACHINE_HWCODECS ?= va-intel gst-va-intel
 
-MACHINE_EXTRA_RRECOMMENDS += linux-firmware
+MACHINE_EXTRA_RRECOMMENDS += linux-firmware lms8
 
 XSERVER ?= ${XSERVER_X86_BASE} \
 ${XSERVER_X86_EXT} \
-- 
1.8.1.4




-- 
Darren Hart   Open Source Technology Center
darren.h...@intel.com Intel Corporation






-- 
Darren Hart Open Source Technology Center
darren.h...@intel.com   Intel Corporation


-- 
___
meta-intel mailing list
meta-intel@yoctoproject.org
https://lists.yoctoproject.org/listinfo/meta-intel


Re: [meta-intel] [PATCH 2/2] meta-intel.inc: allow disabling of Intel microcode

2014-09-18 Thread Hart, Darren
On 9/18/14, 9:18, Kamble, Nitin A nitin.a.kam...@intel.com wrote:



On 9/18/14, 9:13 AM, Hart, Darren darren.h...@intel.com wrote:

On 9/17/14, 13:51, Kamble, Nitin A nitin.a.kam...@intel.com wrote:

The problem with this of course is we can't use it easily with the
common
BSPs and ultimately we want to eliminate as many of the other BSPs as
possible.

What is the exact issue with microcode? How does it break certain
systems
when enabled on the intel common BSPs?

1st there is no boot issue related to microcode. What was reported is a
build issue. His initrd file was not built correctly. And we believe
that
it happened because he used older version of poky/oecore. So that is
turning out to be a build setup issue.

Here are the updates on the bug:
https://bugzilla.yoctoproject.org/show_bug.cgi?id=6730


Nitin

Oh great!

So what's the status of this then? Can it be enabled by default?


I see no blockage for enabling by default. But usages like microyocto may
want to disable the feature to save some space. So I am working on make
the the intel microcode feature available as a machine feature, and all
the machines in meta-intel will include the machine feature.

Right, and I should have said make it the default for intel-core*
machines. 

Thanks Nitin,

-- 
Darren Hart Open Source Technology Center
darren.h...@intel.com   Intel Corporation


-- 
___
meta-intel mailing list
meta-intel@yoctoproject.org
https://lists.yoctoproject.org/listinfo/meta-intel


Re: [meta-intel] [PATCH 2/2] meta-intel.inc: allow disabling of Intel microcode

2014-09-17 Thread Hart, Darren
On 9/17/14, 13:23, Kamble, Nitin A nitin.a.kam...@intel.com wrote:



No, we had this discussion. These BSPs need to build out of the box
without special flags to disable feature that would otherwise break it on
supported systems. If Microcode can't be enabled generically and safely,
then it needs to be opt-in, not opt-out.

--
Darren
We discussed this a bit on jabber. The new proposal is to make it a
MACHINE_FEATURE and add it to all the machine .conf files from meta-intel.

The problem with this of course is we can't use it easily with the common
BSPs and ultimately we want to eliminate as many of the other BSPs as
possible.

What is the exact issue with microcode? How does it break certain systems
when enabled on the intel common BSPs?


-- 
Darren Hart Open Source Technology Center
darren.h...@intel.com   Intel Corporation


-- 
___
meta-intel mailing list
meta-intel@yoctoproject.org
https://lists.yoctoproject.org/listinfo/meta-intel


Re: [meta-intel] [Patch v5 3/5] intel-microcode: a recipe for Intel microcode datafile

2014-09-02 Thread Hart, Darren
On 8/29/14, 10:22, Kamble, Nitin A nitin.a.kam...@intel.com wrote:

From: Nitin A Kamble nitin.a.kam...@intel.com

This recipe provides the microcode datafile for Intel Processors.

The recipe provides:
 1. microcode.dat file for microcode updating from user space with the
iucode-tool utility.
 2. the microcode cpio file which gets bundled with the initrd to support
microcode loading at early boot time.

[ YOCTO #5114 ]

Signed-off-by: Ross Burton ross.bur...@intel.com
Signed-off-by: Nitin A Kamble nitin.a.kam...@intel.com

Acked-by: Darren Hart dvh...@linux.intel.com

-- 
Darren Hart Open Source Technology Center
darren.h...@intel.com   Intel Corporation


-- 
___
meta-intel mailing list
meta-intel@yoctoproject.org
https://lists.yoctoproject.org/listinfo/meta-intel


Re: [meta-intel] [Patch v5 5/5] use the INITRD list mechanism for early microcode loading

2014-09-02 Thread Hart, Darren
On 9/2/14, 8:29, Kamble, Nitin A nitin.a.kam...@intel.com wrote:



 -Original Message-
 From: Burton, Ross [mailto:ross.bur...@intel.com]
 Sent: Monday, September 01, 2014 8:39 AM
 To: Kamble, Nitin A
 Cc: Zanussi, Tom; Hart, Darren; meta-intel@yoctoproject.org
 Subject: Re: [Patch v5 5/5] use the INITRD list mechanism for early
microcode
 loading
 
 On 29 August 2014 18:22,  nitin.a.kam...@intel.com wrote:
   # if enabled, include user space intel microcode loading support in
the
 generated images.
   MACHINE_EXTRA_RRECOMMENDS = intel-microcode iucode-tool
  +
  +# if enabled, use the microcode added initrd
 
 I don't see any conditional tests for the if enabled part of the
comment.
 
 Ross

Good catch, I have fixed the comment on the contrib branch now.

Hrm... I confess I forget where we left this. Do we not need the enabled
condition? What happens if you try to build images for meta-intel systems
without the meta-intel license whitelisted? My understanding is that those
recipes still need to parse, but that will fail if the license
requirements are not met.


-- 
Darren Hart Open Source Technology Center
darren.h...@intel.com   Intel Corporation


-- 
___
meta-intel mailing list
meta-intel@yoctoproject.org
https://lists.yoctoproject.org/listinfo/meta-intel


Re: [meta-intel] [Patch v4 4/6] image-ucode.bbclass: a new bbclass for initramfs images

2014-07-21 Thread Hart, Darren
On 7/21/14, 12:29, Burton, Ross ross.bur...@intel.com wrote:

On 19 July 2014 01:18,  nitin.a.kam...@intel.com wrote:
 +IMAGE_TYPES += cpio.gz.ucode
 +COMPRESSIONTYPES += gz.ucode
 +COMPRESS_CMD_gz.ucode = ${COMPRESS_CMD_gz}; cat ${EARLY_UCODE_CPIO}
${IMAGE_NAME}.rootfs.${type}.gz  ${IMAGE_NAME}.rootfs.${type}.gz.ucode
 +COMPRESS_DEPENDS_gz.ucode = ${COMPRESS_DEPENDS_gz} intel-microcode

Something about this has always bugged me and I just realised what it
is.  As I understand it the kernel allows an arbitrary number of cpio
archives to be appended to the kernel, but our image creation code
expects one.  This class is basically working around that limitation
by being a specialised image type that appends another hard-coded
file.

If the image creation code was changed to expect a list, then we
wouldn't need this class at all but could simply do INITRD +=
$(EARLY_UCODE_CPIO).

Ross


Ooooh, clever boy.

-- 
Darren Hart Open Source Technology Center
darren.h...@intel.com   Intel Corporation


-- 
___
meta-intel mailing list
meta-intel@yoctoproject.org
https://lists.yoctoproject.org/listinfo/meta-intel


Re: [meta-intel] [PATCH 1/1] image-ucode.bbclass: add dependency on the microcode cpio provider

2014-07-18 Thread Hart, Darren
On 7/18/14, 9:55, Kamble, Nitin A nitin.a.kam...@intel.com wrote:

From: Nitin A Kamble nitin.a.kam...@intel.com

The ${EARLY_UCODE_CPIO} file is generated by the intel-microcode recipe.
Even
though the intel-microcode recipe is included for every Intel BSP,
mention it
here additionally as it won't hurt anything, and it can reveal the
dependency
to the reviewer easily.

Signed-off-by: Nitin A Kamble nitin.a.kam...@intel.com
---
 classes/image-ucode.bbclass | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/classes/image-ucode.bbclass b/classes/image-ucode.bbclass
index a0a3240..93ac28e 100644
--- a/classes/image-ucode.bbclass
+++ b/classes/image-ucode.bbclass
@@ -11,7 +11,7 @@
 IMAGE_TYPES += cpio.gz.ucode
 COMPRESSIONTYPES += gz.ucode
 COMPRESS_CMD_gz.ucode = ${COMPRESS_CMD_gz}; cat ${EARLY_UCODE_CPIO}
${IMAGE_NAME}.rootfs.${type}.gz  ${IMAGE_NAME}.rootfs.${type}.gz.ucode
-COMPRESS_DEPENDS_gz.ucode = ${COMPRESS_DEPENDS_gz}
+COMPRESS_DEPENDS_gz.ucode = ${COMPRESS_DEPENDS_gz} intel-microcode
 
 # Extentions to image-live.bbclass
 EARLY_UCODE_CPIO ?= ${DEPLOY_DIR_IMAGE}/microcode.cpio
-- 
1.8.1.4




OK, but this should just be done as part of 5/7 of the previous series
which hasn't been merged yet. Can you include it and update your contrib
branch? No need to resend. I'll then review for any pending comments and
pull.

One thing I don't think I've seen discussed is the level of testing this
has received. Maybe I missed it? In any case - what level of testing has
this received?

-- 
Darren Hart Open Source Technology Center
darren.h...@intel.com   Intel Corporation


-- 
___
meta-intel mailing list
meta-intel@yoctoproject.org
https://lists.yoctoproject.org/listinfo/meta-intel


Re: [meta-intel] [Patch v2 6/7] core-image-minimal-initramfs: extend to support early microcode loading

2014-07-18 Thread Hart, Darren
On 7/18/14, 10:59, Hart, Darren darren.h...@intel.com wrote:

On 7/17/14, 15:27, Kamble, Nitin A nitin.a.kam...@intel.com wrote:

 +IMAGE_FSTYPES_meta-intel = cpio.gz.ucode
 --
 1.8.1.4
 
 
 
 Hrm A meta-intel override... Do we need to introduce a layer
override,
 or would the intel-common overrides be sufficient? It would reduce the
 complexity a bit.
 
I have renamed the override to intel-common now.

Well, what about the comment below?


Nitin

 I do see the value in the layer override though as it applies to the
BSPs
 that are not yet intel-common - or won't ever be.

If you use the intel common overrides, then machines that don't share a
common kernel cannot have microcode support? That seems overly restrictive
to me.

Ah, you are not using the same override as the common pkgarch, I
misunderstood what you meant by intel-common. OK, this is fine either
way.


 
 So..
 
 Acked-by: Darren Hart dvh...@linux.intel.com
 
 
 --
 Darren Hart Open Source Technology
 Center
 darren.h...@intel.com   Intel 
 Corporation
 




-- 
Darren HartOpen Source Technology Center
darren.h...@intel.com  Intel Corporation





-- 
Darren Hart Open Source Technology Center
darren.h...@intel.com   Intel Corporation


-- 
___
meta-intel mailing list
meta-intel@yoctoproject.org
https://lists.yoctoproject.org/listinfo/meta-intel


Re: [meta-intel] [Patch v2 6/7] core-image-minimal-initramfs: extend to support early microcode loading

2014-07-18 Thread Hart, Darren
On 7/17/14, 15:27, Kamble, Nitin A nitin.a.kam...@intel.com wrote:

 +IMAGE_FSTYPES_meta-intel = cpio.gz.ucode
 --
 1.8.1.4
 
 
 
 Hrm A meta-intel override... Do we need to introduce a layer
override,
 or would the intel-common overrides be sufficient? It would reduce the
 complexity a bit.
 
I have renamed the override to intel-common now.

Well, what about the comment below?


Nitin

 I do see the value in the layer override though as it applies to the
BSPs
 that are not yet intel-common - or won't ever be.

If you use the intel common overrides, then machines that don't share a
common kernel cannot have microcode support? That seems overly restrictive
to me.

 
 So..
 
 Acked-by: Darren Hart dvh...@linux.intel.com
 
 
 --
 Darren Hart  Open Source Technology
 Center
 darren.h...@intel.comIntel 
 Corporation
 




-- 
Darren Hart Open Source Technology Center
darren.h...@intel.com   Intel Corporation


-- 
___
meta-intel mailing list
meta-intel@yoctoproject.org
https://lists.yoctoproject.org/listinfo/meta-intel


Re: [meta-intel] [Patch v2 1/7] meta-intel BSPs: include meta-intel.inc

2014-07-11 Thread Hart, Darren
On 7/11/14, 11:59, Kamble, Nitin A nitin.a.kam...@intel.com wrote:

From: Nitin A Kamble nitin.a.kam...@intel.com

To get common intel BSP configurations such as user land microcode loading
support, each Intel BSP configuration needs to include the meta-intel.inc
file. With the exception of few, many of the meta-intel BSP configuration
files already include the meta-intel.inc file. With this commit now, all
the remaining BSPs from the meta-intel layer also include meta-intel.inc
file.

  The Intel platforms BSPs hosted outside of the meta-intel layer, such as
minnow, need to include meta-intel.inc to get the common Intel features.

Signed-off-by: Nitin A Kamble nitin.a.kam...@intel.com

Yes, agreed, all meta-intel BSPs should include meta-intel.inc. I had
considered making this implicit in the intel-common*... But not all BSPs
will use that, and including this everywhere makes it obvious and is more
consistent.

Reviewed-by: Darren Hart dvh...@linux.intel.com

-- 
Darren Hart Open Source Technology Center
darren.h...@intel.com   Intel Corporation


-- 
___
meta-intel mailing list
meta-intel@yoctoproject.org
https://lists.yoctoproject.org/listinfo/meta-intel


Re: [meta-intel] [Patch v2 2/7] iucode-tool: a new recipe for loading Intel CPU microcode

2014-07-11 Thread Hart, Darren
On 7/11/14, 11:59, Kamble, Nitin A nitin.a.kam...@intel.com wrote:

From: Nitin A Kamble nitin.a.kam...@intel.com

iucode_tool is a program to manipulate Intel i686 and X86-64 processor
microcode update collections, and to use the kernel facilities to update
the microcode on Intel system processors.

Signed-off-by: Ross Burton ross.bur...@intel.com
Signed-Off-By: Nitin A Kamble nitin.a.kam...@intel.com

Proper location and recipe format appears correct.

Reviewed-by: Darren Hart dvh...@linux.intel.com

-- 
Darren Hart Open Source Technology Center
darren.h...@intel.com   Intel Corporation


-- 
___
meta-intel mailing list
meta-intel@yoctoproject.org
https://lists.yoctoproject.org/listinfo/meta-intel


Re: [meta-intel] [Patch v2 3/7] intel-microcode: a recipe for Intel microcode datafile

2014-07-11 Thread Hart, Darren
On 7/11/14, 11:59, Kamble, Nitin A nitin.a.kam...@intel.com wrote:

From: Nitin A Kamble nitin.a.kam...@intel.com

This recipe provides the microcode datafile for Intel Processors.

The recipe provides:
 1. microcode.dat file for microcode updating from user space with the
iucode-tool utility.
 2. the microcode cpio file which gets bundled with the initrd to support
microcode loading at early boot time.

Note that this recipe has LICENSE_FLAGS so will need to be whitelisted
before
it's usable.

This should be documented in the layer someplace. Can be done as a
follow-up patch.


[ YOCTO #5114 ]

Signed-off-by: Ross Burton ross.bur...@intel.com
Signed-off-by: Nitin A Kamble nitin.a.kam...@intel.com
---
 common/custom-licenses/Intel-Microcode-License | 123
+
 .../microcode/intel-microcode_20140430.bb  |  53 +
 2 files changed, 176 insertions(+)
 create mode 100644 common/custom-licenses/Intel-Microcode-License
 create mode 100644
common/recipes-core/microcode/intel-microcode_20140430.bb

...


diff --git a/common/recipes-core/microcode/intel-microcode_20140430.bb
b/common/recipes-core/microcode/intel-microcode_20140430.bb
new file mode 100644
index 000..f8aa45f
--- /dev/null
+++ b/common/recipes-core/microcode/intel-microcode_20140430.bb
@@ -0,0 +1,53 @@
+SUMMARY = Intel Processor Microcode Datafile for Linux
+HOMEPAGE = http://www.intel.com/;
+DESCRIPTION = The microcode data file contains the latest microcode\
+ definitions for all Intel processors. Intel releases microcode updates\
+ to correct processor behavior as documented in the respective processor\
+ specification updates. While the regular approach to getting this
microcode\
+ update is via a BIOS upgrade, Intel realizes that this can be an\
+ administrative hassle. The Linux operating system and VMware ESX\
+ products have a mechanism to update the microcode after booting.\
+ For example, this file will be used by the operating system mechanism\
+ if the file is placed in the /etc/firmware directory of the Linux
system.
+
+LICENSE = Intel-Microcode-License
+LICENSE_FLAGS = license_${PN}_${PV}
+LIC_FILES_CHKSUM =
file://microcode.dat;md5=64b91c8f504ef24a040ca129d1c2f657
+
+SRC_URI = 
http://downloadmirror.intel.com/23829/eng/microcode-20140430.tgz;
+SRC_URI[md5sum] = 99c811133b002d1e73150f667a6a77f4
+SRC_URI[sha256sum] =
2e67767fd561164a2b09831020c2d36600ad336a9c0c117f1964edef284e4351


Why do we provide both? Is this accepted best practice? Just seems like
extra maintenance to me...


Otherwise, looks good, no objections.

-- 
Darren Hart Open Source Technology Center
darren.h...@intel.com   Intel Corporation


-- 
___
meta-intel mailing list
meta-intel@yoctoproject.org
https://lists.yoctoproject.org/listinfo/meta-intel


Re: [meta-intel] [Patch v2 4/7] meta-intel BSPs: enable user space microcode loading support

2014-07-11 Thread Hart, Darren
On 7/11/14, 11:59, Kamble, Nitin A nitin.a.kam...@intel.com wrote:

From: Nitin A Kamble nitin.a.kam...@intel.com

Enable user space microcode loading support for all the BSPs using the
meta-intel.inc file.

Signed-off-by: Nitin A Kamble nitin.a.kam...@intel.com
---
 conf/machine/include/meta-intel.inc | 5 +
 1 file changed, 5 insertions(+)

diff --git a/conf/machine/include/meta-intel.inc
b/conf/machine/include/meta-intel.inc
index fb9b4a8..4baefc8 100644
--- a/conf/machine/include/meta-intel.inc
+++ b/conf/machine/include/meta-intel.inc
@@ -24,3 +24,8 @@ XSERVER_X86_MATROX_MGA = xf86-video-mga \
 
 XSERVER_X86_ASPEED_AST = xf86-video-ast \

+
+
+
+# Enable all BSPs from meta-intel layer with user space Intel microcode
loading support.
+MACHINE_EXTRA_RRECOMMENDS += intel-microcode iucode-tool
-- 
1.8.1.4



Seems like 4 and 7 can be done together. Any particular reason to keep
them separate?


-- 
Darren Hart Open Source Technology Center
darren.h...@intel.com   Intel Corporation


-- 
___
meta-intel mailing list
meta-intel@yoctoproject.org
https://lists.yoctoproject.org/listinfo/meta-intel


Re: [meta-intel] [Patch v2 6/7] core-image-minimal-initramfs: extend to support early microcode loading

2014-07-11 Thread Hart, Darren
On 7/11/14, 11:59, Kamble, Nitin A nitin.a.kam...@intel.com wrote:

From: Nitin A Kamble nitin.a.kam...@intel.com

Consumes the intel-earlyload-microcode-image to generate an initrd which
is
extended with the earlyload microcode support.

This recipe now generates this additional initrd image:
  core-image-minimal-initramfs-${MACHINE}.cpio.gz.ucode

Signed-off-by: Nitin A Kamble nitin.a.kam...@intel.com
---
 common/recipes-core/images/core-image-minimal-initramfs.bbappend | 3 +++
 1 file changed, 3 insertions(+)
 create mode 100644
common/recipes-core/images/core-image-minimal-initramfs.bbappend

diff --git 
a/common/recipes-core/images/core-image-minimal-initramfs.bbappend
b/common/recipes-core/images/core-image-minimal-initramfs.bbappend
new file mode 100644
index 000..d836400
--- /dev/null
+++ b/common/recipes-core/images/core-image-minimal-initramfs.bbappend
@@ -0,0 +1,3 @@
+inherit image-ucode
+
+IMAGE_FSTYPES_meta-intel = cpio.gz.ucode
-- 
1.8.1.4



Hrm A meta-intel override... Do we need to introduce a layer override,
or would the intel-common overrides be sufficient? It would reduce the
complexity a bit.

I do see the value in the layer override though as it applies to the BSPs
that are not yet intel-common - or won't ever be.

So..

Acked-by: Darren Hart dvh...@linux.intel.com


-- 
Darren Hart Open Source Technology Center
darren.h...@intel.com   Intel Corporation


-- 
___
meta-intel mailing list
meta-intel@yoctoproject.org
https://lists.yoctoproject.org/listinfo/meta-intel


Re: [meta-intel] [PATCH 2/3] emenlow-noemgd: linux-yocto_3.14: use standard/base machine branch

2014-05-13 Thread Hart, Darren
On 5/13/14, 10:31, Kamble, Nitin A nitin.a.kam...@intel.com wrote:

From: Nitin A Kamble nitin.a.kam...@intel.com

There is no need to use the standard/emenlow branch, as it points
to the same commit as standard/base branch.

Signed-off-by: Nitin A Kamble nitin.a.kam...@intel.com

Acked-by: Darren Hart dvh...@linux.intel.com


---
 meta-emenlow/recipes-kernel/linux/linux-yocto_3.14.bbappend | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/meta-emenlow/recipes-kernel/linux/linux-yocto_3.14.bbappend
b/meta-emenlow/recipes-kernel/linux/linux-yocto_3.14.bbappend
index 5d40da7..dae087d 100644
--- a/meta-emenlow/recipes-kernel/linux/linux-yocto_3.14.bbappend
+++ b/meta-emenlow/recipes-kernel/linux/linux-yocto_3.14.bbappend
@@ -2,7 +2,7 @@ FILESEXTRAPATHS_prepend := ${THISDIR}/${PN}:
 
 COMPATIBLE_MACHINE_emenlow-noemgd = emenlow-noemgd
 KMACHINE_emenlow-noemgd = emenlow
-KBRANCH_emenlow-noemgd = standard/emenlow
+KBRANCH_emenlow-noemgd = standard/base
 KERNEL_FEATURES_append_emenlow-noemgd =  features/drm-gma500/drm-gma500
 
 LINUX_VERSION_emenlow-noemgd = 3.14.2
-- 
1.8.1.4




-- 
Darren Hart Open Source Technology Center
darren.h...@intel.com   Intel Corporation


-- 
___
meta-intel mailing list
meta-intel@yoctoproject.org
https://lists.yoctoproject.org/listinfo/meta-intel


Re: [meta-intel] [PATCH 3/3] fri2-noemgd: linux-yocto_3.14: use standard/base machine branch

2014-05-13 Thread Hart, Darren
On 5/13/14, 10:32, Kamble, Nitin A nitin.a.kam...@intel.com wrote:

From: Nitin A Kamble nitin.a.kam...@intel.com

There is no need to use the standard/fri2 branch, as it points
to the same commit as standard/base branch.

Signed-off-by: Nitin A Kamble nitin.a.kam...@intel.com

Acked-by: Darren Hart dvh...@linux.intel.com


---
 meta-fri2/recipes-kernel/linux/linux-yocto_3.14.bbappend | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/meta-fri2/recipes-kernel/linux/linux-yocto_3.14.bbappend
b/meta-fri2/recipes-kernel/linux/linux-yocto_3.14.bbappend
index 49bf44d..7b437f7 100644
--- a/meta-fri2/recipes-kernel/linux/linux-yocto_3.14.bbappend
+++ b/meta-fri2/recipes-kernel/linux/linux-yocto_3.14.bbappend
@@ -2,7 +2,7 @@ FILESEXTRAPATHS_prepend := ${THISDIR}/${PN}:
 
 COMPATIBLE_MACHINE_fri2-noemgd = fri2-noemgd
 KMACHINE_fri2-noemgd = fri2
-KBRANCH_fri2-noemgd = standard/fri2
+KBRANCH_fri2-noemgd = standard/base
 KERNEL_FEATURES_append_fri2-noemgd =  cfg/vesafb
 LINUX_VERSION_fri2-noemgd = 3.14.2
 SRCREV_machine_fri2-noemgd = b0b9c962ea01f9356fc1542b9696ebe4a38e196a
-- 
1.8.1.4




-- 
Darren Hart Open Source Technology Center
darren.h...@intel.com   Intel Corporation


-- 
___
meta-intel mailing list
meta-intel@yoctoproject.org
https://lists.yoctoproject.org/listinfo/meta-intel


Re: [meta-intel] [PATCH 1/6] Remove chiefriver, sys940x n450 BSPs

2014-03-26 Thread Hart, Darren
On 3/25/14, 22:08, Kamble, Nitin A nitin.a.kam...@intel.com wrote:

From: Nitin A Kamble nitin.a.kam...@intel.com

Configuration for the chiefriver, sys940x, sys940x-noemgd, n450 BSPs are
deleted. The consolidated BSPs viz intel-corei7-64 and intel-core2-32
support these boards.

As part of the usual retirement process, a heads-up email was sent to the
meta-intel mailing list requesting any feedback regarding retirement of
these BSPs. The community did not had any concerning feedback to
reconsider the retirement decision.

The MAINTAINERS file and the layer version of the meta-intel layer are
updated to reflect removal of the BSPs.

Signed-off-by: Nitin A Kamble nitin.a.kam...@intel.com
CC: Darren Hart dvh...@linux.intel.com

Reviewed-by: Darren Hart dvh...@linux.intel.com

-- 
Darren Hart
Yocto Project - Linux Kernel
Intel Open Source Technology Center



-- 
___
meta-intel mailing list
meta-intel@yoctoproject.org
https://lists.yoctoproject.org/listinfo/meta-intel


Re: [meta-intel] [PATCH 2/6] emenlow: linux-yocto-3.10 update srcrevs to 3.10.33

2014-03-26 Thread Hart, Darren
On 3/25/14, 22:08, Kamble, Nitin A nitin.a.kam...@intel.com wrote:

From: Nitin A Kamble nitin.a.kam...@intel.com

Sync up with the latest branch HEADs on the linux-yocto_3.10 repository.

Signed-off-by: Nitin A Kamble nitin.a.kam...@intel.com

Hrm... Why are emgd and noemgd using different meta SRCREVs?

+SRCREV_meta_emenlow = 99c503a92885060bebf2bba6747735e8e9346a40

+SRCREV_meta_emenlow-noemgd = 6e0e756d51372c8b176c5d1e6f786545bceed351


--
Darren

---
 meta-emenlow/recipes-kernel/linux/linux-yocto_3.10.bbappend | 12
++--
 1 file changed, 6 insertions(+), 6 deletions(-)

diff --git a/meta-emenlow/recipes-kernel/linux/linux-yocto_3.10.bbappend
b/meta-emenlow/recipes-kernel/linux/linux-yocto_3.10.bbappend
index 6075783..2d4a5bc 100644
--- a/meta-emenlow/recipes-kernel/linux/linux-yocto_3.10.bbappend
+++ b/meta-emenlow/recipes-kernel/linux/linux-yocto_3.10.bbappend
@@ -11,13 +11,13 @@ KMACHINE_emenlow-noemgd = emenlow
 KBRANCH_emenlow-noemgd = standard/emenlow
 KERNEL_FEATURES_append_emenlow-noemgd =  features/drm-gma500/drm-gma500
 
-LINUX_VERSION = 3.10.19
+LINUX_VERSION = 3.10.33
 
-SRCREV_meta_emenlow = d9cd83c0292bd4e2a6754a96761027252e726a42
-SRCREV_machine_emenlow = a9ec82e355130160f9094e670bd5be0022a84194
-SRCREV_emgd_emenlow = 39c44dd7838bfd228938219cdb21ca30c4d0cbbf
+SRCREV_meta_emenlow = 99c503a92885060bebf2bba6747735e8e9346a40
+SRCREV_machine_emenlow = 21df0c8486e129a4087970a07b423c533ae05de7
+SRCREV_emgd_emenlow = 42d5e4548e8e79e094fa8697949eed4cf6af00a3
 
-SRCREV_meta_emenlow-noemgd = d9cd83c0292bd4e2a6754a96761027252e726a42
-SRCREV_machine_emenlow-noemgd =
a9ec82e355130160f9094e670bd5be0022a84194
+SRCREV_meta_emenlow-noemgd = 6e0e756d51372c8b176c5d1e6f786545bceed351
+SRCREV_machine_emenlow-noemgd =
21df0c8486e129a4087970a07b423c533ae05de7
 
 SRC_URI_emenlow =
git://git.yoctoproject.org/linux-yocto-3.10.git;protocol=git;nocheckout=1
;branch=${KBRANCH},${KMETA},emgd-1.18;name=machine,meta,emgd
-- 
1.8.1.4





-- 
Darren Hart
Yocto Project - Linux Kernel
Intel Open Source Technology Center



-- 
___
meta-intel mailing list
meta-intel@yoctoproject.org
https://lists.yoctoproject.org/listinfo/meta-intel


Re: [meta-intel] [PATCH 4/6] nuc: linux-yocto-3.10 update srcrevs to 3.10.33

2014-03-26 Thread Hart, Darren
On 3/25/14, 22:08, Kamble, Nitin A nitin.a.kam...@intel.com wrote:

From: Nitin A Kamble nitin.a.kam...@intel.com

Sync up with the latest branch HEADs on the linux-yocto_3.10 repository.

Signed-off-by: Nitin A Kamble nitin.a.kam...@intel.com
---
 meta-nuc/recipes-kernel/linux/linux-yocto_3.10.bbappend | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/meta-nuc/recipes-kernel/linux/linux-yocto_3.10.bbappend
b/meta-nuc/recipes-kernel/linux/linux-yocto_3.10.bbappend
index ec67460..237b572 100644
--- a/meta-nuc/recipes-kernel/linux/linux-yocto_3.10.bbappend
+++ b/meta-nuc/recipes-kernel/linux/linux-yocto_3.10.bbappend
@@ -7,9 +7,9 @@ KBRANCH_nuc = standard/common-pc-64/chiefriver

If we're deleting chiefriver, we should also kill the branch, and the
branch is the same as standard/base, so we should just be using that too.
Also, if we are using the common kernel for nuc, this entire recipe should
be deleted.

-- 
Darren Hart
Yocto Project - Linux Kernel
Intel Open Source Technology Center



-- 
___
meta-intel mailing list
meta-intel@yoctoproject.org
https://lists.yoctoproject.org/listinfo/meta-intel


Re: [meta-intel] [PATCH 5/6] crownbay: linux-yocto-3.10 update srcrevs to 3.10.33

2014-03-26 Thread Hart, Darren
On 3/25/14, 22:08, Kamble, Nitin A nitin.a.kam...@intel.com wrote:

From: Nitin A Kamble nitin.a.kam...@intel.com

Even these should have commit messages. For example, see:

commit f122b5a10114416c55d015305fdd011d86e71353
Author: Darren Hart dvh...@linux.intel.com
Date:   2014-03-24

fri2: Update linux-yocto 3.10 SRCREV (3.10.33-LTSI)

Update to the HEAD of standard/fri2 (3.10.33-LTSI). This also works
around an open issue with do_validate_branches where feature branches
are reset the HEAD of the machine branch if they contain that commit.

Signed-off-by: Darren Hart dvh...@linux.intel.com



It only takes a minute to write the message, but it's there forever and
you never know who might need some context about what we were doing around
this time.

--
Darren


Signed-off-by: Nitin A Kamble nitin.a.kam...@intel.com
---
 meta-crownbay/recipes-kernel/linux/linux-yocto_3.10.bbappend | 8 
 1 file changed, 4 insertions(+), 4 deletions(-)

diff --git a/meta-crownbay/recipes-kernel/linux/linux-yocto_3.10.bbappend
b/meta-crownbay/recipes-kernel/linux/linux-yocto_3.10.bbappend
index 37cf96e..c2339fa 100644
--- a/meta-crownbay/recipes-kernel/linux/linux-yocto_3.10.bbappend
+++ b/meta-crownbay/recipes-kernel/linux/linux-yocto_3.10.bbappend
@@ -11,13 +11,13 @@ KMACHINE_crownbay-noemgd = crownbay
 KBRANCH_crownbay-noemgd = standard/crownbay
 KERNEL_FEATURES_append_crownbay-noemgd =  cfg/vesafb
 
-LINUX_VERSION = 3.10.32
+LINUX_VERSION = 3.10.33
 
-SRCREV_meta_crownbay = 6e0e756d51372c8b176c5d1e6f786545bceed351
-SRCREV_machine_crownbay = 78afd3095c9b37efbbfbfdc25eb3833ef3c6a718
+SRCREV_meta_crownbay = 99c503a92885060bebf2bba6747735e8e9346a40
+SRCREV_machine_crownbay = 21df0c8486e129a4087970a07b423c533ae05de7
 SRCREV_emgd_crownbay = 42d5e4548e8e79e094fa8697949eed4cf6af00a3
 
 SRCREV_meta_crownbay-noemgd = 6e0e756d51372c8b176c5d1e6f786545bceed351
-SRCREV_machine_crownbay-noemgd =
78afd3095c9b37efbbfbfdc25eb3833ef3c6a718
+SRCREV_machine_crownbay-noemgd =
21df0c8486e129a4087970a07b423c533ae05de7
 
 SRC_URI_crownbay =
git://git.yoctoproject.org/linux-yocto-3.10.git;protocol=git;nocheckout=1
;branch=${KBRANCH},${KMETA},emgd-1.18;name=machine,meta,emgd
-- 
1.8.1.4




-- 
Darren Hart
Yocto Project - Linux Kernel
Intel Open Source Technology Center



-- 
___
meta-intel mailing list
meta-intel@yoctoproject.org
https://lists.yoctoproject.org/listinfo/meta-intel


Re: [meta-intel] [PATCH 6/6] common linux-yocto-3.10: specify kernel SRCREVs

2014-03-26 Thread Hart, Darren
On 3/25/14, 22:08, Kamble, Nitin A nitin.a.kam...@intel.com wrote:

From: Nitin A Kamble nitin.a.kam...@intel.com

Define the kernel branch SRCREVs in meta-intel layer, so that other
layers can not break the common BSP kernel unknowingly.

Using the latest HEADs of the git branches for SRCREVs.

Signed-off-by: Nitin A Kamble nitin.a.kam...@intel.com

Thanks Nitin,

Reviewed-by: Darren Hart dvh...@linux.intel.com


---
 common/recipes-kernel/linux/linux-yocto_3.10.bbappend | 12 ++--
 1 file changed, 6 insertions(+), 6 deletions(-)

diff --git a/common/recipes-kernel/linux/linux-yocto_3.10.bbappend
b/common/recipes-kernel/linux/linux-yocto_3.10.bbappend
index 01e3f77..650919f 100644
--- a/common/recipes-kernel/linux/linux-yocto_3.10.bbappend
+++ b/common/recipes-kernel/linux/linux-yocto_3.10.bbappend
@@ -2,18 +2,18 @@ FILESEXTRAPATHS_prepend := ${THISDIR}/${PN}:
 
 KERNEL_FEATURES_INTEL_COMMON += features/amt/mei/mei.scc
 
-#LINUX_VERSION_core2-32-intel-common = 3.10
+LINUX_VERSION_core2-32-intel-common = 3.10.33
 COMPATIBLE_MACHINE_core2-32-intel-common = ${MACHINE}
-#SRCREV_meta_core2-32-intel-common = ${AUTOREV}
-#SRCREV_machine_core2-32-intel-common = ${AUTOREV}
+SRCREV_meta_core2-32-intel-common =
99c503a92885060bebf2bba6747735e8e9346a40
+SRCREV_machine_core2-32-intel-common =
21df0c8486e129a4087970a07b423c533ae05de7
 KMACHINE_core2-32-intel-common = intel-core2-32
 KBRANCH_core2-32-intel-common = standard/base
 KERNEL_FEATURES_append_core2-32-intel-common =
${KERNEL_FEATURES_INTEL_COMMON}
 
-#LINUX_VERSION_corei7-64-intel-common = 3.10
+LINUX_VERSION_corei7-64-intel-common = 3.10.33
 COMPATIBLE_MACHINE_corei7-64-intel-common = ${MACHINE}
-#SRCREV_meta_corei7-64-intel-common = ${AUTOREV}
-#SRCREV_machine_corei7-64-intel-common = ${AUTOREV}
+SRCREV_meta_corei7-64-intel-common =
99c503a92885060bebf2bba6747735e8e9346a40
+SRCREV_machine_corei7-64-intel-common =
21df0c8486e129a4087970a07b423c533ae05de7
 KMACHINE_intel-corei7-64-intel-common = intel-corei7-64
 KBRANCH_intel-corei7-64-intel-common = standard/base
 KERNEL_FEATURES_append_corei7-64-intel-common =
${KERNEL_FEATURES_INTEL_COMMON}
-- 
1.8.1.4




-- 
Darren Hart
Yocto Project - Linux Kernel
Intel Open Source Technology Center



-- 
___
meta-intel mailing list
meta-intel@yoctoproject.org
https://lists.yoctoproject.org/listinfo/meta-intel


Re: [meta-intel] Build failure

2014-03-17 Thread Hart, Darren
I believe I know what the issue is, I'll have a patch out by EOD.

On 3/17/14, 2:22, Richard Purdie richard.pur...@linuxfoundation.org
wrote:

After the recent linux-yocto-rt changes, we're seeing a build failure:

http://autobuilder.yoctoproject.org/main/builders/nightly-intel-gpl/builds
/90/steps/BuildImages/logs/stdio

Reproducer is MACHINE=fri2-emgd bitbake universe -c fetch
(or just bitbake linux-yocto-rt)

Cheers,

Richard




-- 
Darren Hart
Yocto Project - Linux Kernel
Intel Open Source Technology Center



-- 
___
meta-intel mailing list
meta-intel@yoctoproject.org
https://lists.yoctoproject.org/listinfo/meta-intel


Re: [meta-intel] [PATCH 4/6] lms7: update the source download URL

2014-03-06 Thread Hart, Darren
On 3/6/14, 12:52, Kamble, Nitin A nitin.a.kam...@intel.com wrote:



 -Original Message-
 From: Hart, Darren
 Sent: Wednesday, March 05, 2014 11:08 PM
 To: Kamble, Nitin A; Zanussi, Tom; meta-intel@yoctoproject.org
 Subject: Re: [PATCH 4/6] lms7: update the source download URL
 
 On 3/5/14, 20:58, Kamble, Nitin A nitin.a.kam...@intel.com wrote:
 
 
 On 3/5/2014 7:48 PM, Hart, Darren wrote:
  On 3/5/14, 17:58, Kamble, Nitin A nitin.a.kam...@intel.com wrote:
 
  From: Nitin A Kamble nitin.a.kam...@intel.com
 
  The old URL is not working anymore. Using a new URL for source zip
 file.
 
  Signed-off-by: Nitin A Kamble nitin.a.kam...@intel.com
  ---
  common/recipes-bsp/amt/lms7_7.1.20.bb | 2 +-
  1 file changed, 1 insertion(+), 1 deletion(-)
 
  diff --git a/common/recipes-bsp/amt/lms7_7.1.20.bb
  b/common/recipes-bsp/amt/lms7_7.1.20.bb
  index 9bc9ef1..261f968 100644
  --- a/common/recipes-bsp/amt/lms7_7.1.20.bb
  +++ b/common/recipes-bsp/amt/lms7_7.1.20.bb
  @@ -8,7 +8,7 @@ LICENSE = BSD_LMS
  PR = r0
  BPN=lms
  PV_SUB = 25
  -SRC_URI =
 
 http://software.intel.com/file/37962;downloadfilename=${BPN}+${PV}.
 $
 {PV
 _S
  UB}.zip \
  +SRC_URI =
 
 http://software.intel.com/sites/default/files/m/4/e/a/9/b/37962-lms_
 7.1
 .2
  0.25.zip
  I suppose there is no real harm in dropping the use of the PR/PV/etc
 variables in the URL, but seems a bit odd to do so, any particular
 reason  to do so?
 I copy pasted the actual URL.  The filename is changed too, so there is
 no fixed naming scheme here to make good use of the variables.
 
 OK, so doesn't that leave BPN now unused? And BPN basically unused,
 except in do_unpack() where it is used in the tar filename... Which
should
 probably match how you refer to it in the SRC_URI.

BPN var is also used in the packaging, so BPN is not left unused. But if
it is a concern I can easily revert the SRC_URI filename to use all the
variables.

Sorry, I meant BPN and PV_SUB It was late.

Anyway, this isn't critical stuff, it just seems a bit inconsistent, which
can lead to confusion and bugs later when things are updated. Have a look
at it, do what you think needs doing to make it consistent and avoid
leaving unused variables lying around, and I'm sure it'll be fine.

-- 
Darren Hart
Yocto Project - Linux Kernel
Intel Open Source Technology Center



___
meta-intel mailing list
meta-intel@yoctoproject.org
https://lists.yoctoproject.org/listinfo/meta-intel


Re: [meta-intel] [Patch v2 1/1] lms7: update the source download URL

2014-03-06 Thread Hart, Darren
On 3/6/14, 13:51, Kamble, Nitin A nitin.a.kam...@intel.com wrote:

From: Nitin A Kamble nitin.a.kam...@intel.com

The old URL is not working anymore. Using a new URL for source zip file.

Signed-off-by: Nitin A Kamble nitin.a.kam...@intel.com

Acked-by: Darren Hart dvh...@linux.intel.com



-- 
Darren Hart
Yocto Project - Linux Kernel
Intel Open Source Technology Center



___
meta-intel mailing list
meta-intel@yoctoproject.org
https://lists.yoctoproject.org/listinfo/meta-intel


Re: [meta-intel] [PATCH 3/6] alsa-state: ALSA config for intel-corei7-64 BSP

2014-03-05 Thread Hart, Darren
On 3/5/14, 17:58, Kamble, Nitin A nitin.a.kam...@intel.com wrote:

From: Nitin A Kamble nitin.a.kam...@intel.com

Provide ALSA config file for intel-corei7-64 BSP which enables
ALSA sound on hardware like NUC.

This is HIGHLY machine specific unless I am sorely mistaken, this should
not be made part of a generic BSP.

-- 
Darren Hart
Yocto Project - Linux Kernel
Intel Open Source Technology Center



___
meta-intel mailing list
meta-intel@yoctoproject.org
https://lists.yoctoproject.org/listinfo/meta-intel


Re: [meta-intel] [PATCH 4/6] lms7: update the source download URL

2014-03-05 Thread Hart, Darren
On 3/5/14, 17:58, Kamble, Nitin A nitin.a.kam...@intel.com wrote:

From: Nitin A Kamble nitin.a.kam...@intel.com

The old URL is not working anymore. Using a new URL for source zip file.

Signed-off-by: Nitin A Kamble nitin.a.kam...@intel.com
---
 common/recipes-bsp/amt/lms7_7.1.20.bb | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/common/recipes-bsp/amt/lms7_7.1.20.bb
b/common/recipes-bsp/amt/lms7_7.1.20.bb
index 9bc9ef1..261f968 100644
--- a/common/recipes-bsp/amt/lms7_7.1.20.bb
+++ b/common/recipes-bsp/amt/lms7_7.1.20.bb
@@ -8,7 +8,7 @@ LICENSE = BSD_LMS
 PR = r0
 BPN=lms
 PV_SUB = 25
-SRC_URI = 
http://software.intel.com/file/37962;downloadfilename=${BPN}+${PV}.${PV_S
UB}.zip \
+SRC_URI = 
http://software.intel.com/sites/default/files/m/4/e/a/9/b/37962-lms_7.1.2
0.25.zip 

I suppose there is no real harm in dropping the use of the PR/PV/etc
variables in the URL, but seems a bit odd to do so, any particular reason
to do so?

-- 
Darren Hart
Yocto Project - Linux Kernel
Intel Open Source Technology Center



___
meta-intel mailing list
meta-intel@yoctoproject.org
https://lists.yoctoproject.org/listinfo/meta-intel


Re: [meta-intel] [PATCH 5/6] nuc BSP: include AMT 8+ support

2014-03-05 Thread Hart, Darren
On 3/5/14, 17:58, Kamble, Nitin A nitin.a.kam...@intel.com wrote:

From: Nitin A Kamble nitin.a.kam...@intel.com

Include support for Intel Active Management Technology version 8+ on the
NUC BSP.

Signed-off-by: Nitin A Kamble nitin.a.kam...@intel.com

Acked-by: Darren Hart dvh...@linux.intel.com


---
 meta-nuc/conf/machine/nuc.conf | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/meta-nuc/conf/machine/nuc.conf
b/meta-nuc/conf/machine/nuc.conf
index 7dcfcc8..631d360 100644
--- a/meta-nuc/conf/machine/nuc.conf
+++ b/meta-nuc/conf/machine/nuc.conf
@@ -19,7 +19,7 @@ XSERVER ?= ${XSERVER_X86_BASE} \
${XSERVER_X86_I965} \

 
-MACHINE_EXTRA_RRECOMMENDS += linux-firmware-iwlwifi-6000g2b-6
+MACHINE_EXTRA_RRECOMMENDS += linux-firmware-iwlwifi-6000g2b-6 lms8
 
 # disable the serial port configuration
 SERIAL_CONSOLE = 
-- 
1.8.1.4




-- 
Darren Hart
Yocto Project - Linux Kernel
Intel Open Source Technology Center



___
meta-intel mailing list
meta-intel@yoctoproject.org
https://lists.yoctoproject.org/listinfo/meta-intel


Re: [meta-intel] [PATCH 4/6] lms7: update the source download URL

2014-03-05 Thread Hart, Darren
On 3/5/14, 20:58, Kamble, Nitin A nitin.a.kam...@intel.com wrote:


On 3/5/2014 7:48 PM, Hart, Darren wrote:
 On 3/5/14, 17:58, Kamble, Nitin A nitin.a.kam...@intel.com wrote:

 From: Nitin A Kamble nitin.a.kam...@intel.com

 The old URL is not working anymore. Using a new URL for source zip
file.

 Signed-off-by: Nitin A Kamble nitin.a.kam...@intel.com
 ---
 common/recipes-bsp/amt/lms7_7.1.20.bb | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

 diff --git a/common/recipes-bsp/amt/lms7_7.1.20.bb
 b/common/recipes-bsp/amt/lms7_7.1.20.bb
 index 9bc9ef1..261f968 100644
 --- a/common/recipes-bsp/amt/lms7_7.1.20.bb
 +++ b/common/recipes-bsp/amt/lms7_7.1.20.bb
 @@ -8,7 +8,7 @@ LICENSE = BSD_LMS
 PR = r0
 BPN=lms
 PV_SUB = 25
 -SRC_URI =
 
http://software.intel.com/file/37962;downloadfilename=${BPN}+${PV}.${PV
_S
 UB}.zip \
 +SRC_URI =
 
http://software.intel.com/sites/default/files/m/4/e/a/9/b/37962-lms_7.1
.2
 0.25.zip
 I suppose there is no real harm in dropping the use of the PR/PV/etc
 variables in the URL, but seems a bit odd to do so, any particular
reason
 to do so?
I copy pasted the actual URL.  The filename is changed too, so there is
no fixed naming scheme here to make good use of the variables.

OK, so doesn't that leave BPN now unused? And BPN basically unused, except
in do_unpack() where it is used in the tar filename... Which should
probably match how you refer to it in the SRC_URI.

-- 
Darren Hart
Yocto Project - Linux Kernel
Intel Open Source Technology Center



___
meta-intel mailing list
meta-intel@yoctoproject.org
https://lists.yoctoproject.org/listinfo/meta-intel


Re: [meta-intel] [PATCH 3/6] alsa-state: ALSA config for intel-corei7-64 BSP

2014-03-05 Thread Hart, Darren
On 3/5/14, 20:56, Kamble, Nitin A nitin.a.kam...@intel.com wrote:


On 3/5/2014 7:47 PM, Hart, Darren wrote:
 On 3/5/14, 17:58, Kamble, Nitin A nitin.a.kam...@intel.com wrote:

 From: Nitin A Kamble nitin.a.kam...@intel.com

 Provide ALSA config file for intel-corei7-64 BSP which enables
 ALSA sound on hardware like NUC.
 This is HIGHLY machine specific unless I am sorely mistaken, this should
 not be made part of a generic BSP.
This is a static file, but there is another initscripts commit in this
pull request, which changes this file as per the machine needs.


I saw the initiscript patch which dynamically rewrites asound.conf. It
seems to me there are a great deal of variables it can't really account
for. But independent of that, I don't think we want to use initscripts
that run at every boot to dynamically overwrite configuration files.

We should have a higher level design and planning discussion before we
start creating one-off solutions for each config file. I suspect if we
decide to have some kind of a runtime config, we'll want a run-once
mechanism, or possibly something that runs in the installer, not at every
boot.

Did you already have some broader scheme in mind as to how to address the
larger problem of supporting multiple platforms with a single image.

-- 
Darren Hart
Yocto Project - Linux Kernel
Intel Open Source Technology Center



___
meta-intel mailing list
meta-intel@yoctoproject.org
https://lists.yoctoproject.org/listinfo/meta-intel


Re: [meta-intel] Next Gen Intel BSPs

2014-02-25 Thread Hart, Darren
On 2/25/14, 21:44, Zanussi, Tom tom.zanu...@intel.com wrote:

On Thu, 2014-02-20 at 20:56 -0600, Tom Zanussi wrote:
 On Tue, 2014-02-11 at 18:18 -0600, Hart, Darren wrote:
  All,
  
  I have just pushed the next-gen Intel BSP changes following the meta
  commits to linux-yocto-dev and linux-yocto-3.10.
  
  Changes include:
  
  1) New common BSPs:
  intel-core2-32:  Support core2 and old atom (pre-baytrail) CPUs
  intel-corei7-64: Support Nehalem and Baytrail and newer
core/xeon/atom CPUs
  
  [ ] Beth: Can you please add these two BSPs to meta-intel-nightly?
  
  2) New INTEL_COMMON_PACKAGE_ARCH
  This is set to ${TUNE_PKGARCH}-intel-common and applies to any BSP
  including intel-common-pkgarch.inc. This demotes the linux-yocto and
  linux-yocto-dev recipes to a PACKAGE_ARCH less specific than
MACHINE_ARCH
  (the default for linux-yocto*). For machines that include the
  intel-common-pkgarch.inc and delete their linux-yocto*bbappend Files,
they
  will reuse the intel-common linux-yocto* package. This is either the
  intel-core2-32-intel-common or the intel-corei7-64-intel-common
kernel,
  the same one used for the two new BSPs.
  
  Using the new intel-common PACKAGE_ARCH is an opt-in mechanism.
Currently
  only the two new BSPs are using it, although the linux-yocto
meta-data is
  already building in support for all the non-emgd meta-intel BSPs.
  
  Next step is to add the inclusion of the intel-common-pkgarch.inc to
every
  BSP and delete the linux-yocto machine-specific bbappend and
  build/boot/verify each BSP. Such a patch series exists here:
  
  
http://git.yoctoproject.org/cgit/cgit.cgi/meta-intel-contrib/log/?h=dvhar
t/
  bsp-ng
  
  
 
 Just FYI...
 
 crownbay-noemgd from bsp-ng boots but X doesn't start (last good boot or
 normal non-bsp-ng bSP was 2/12 so it's either this patchset or something
 in master since then, will look into it...):
 
 using poky/master: bb0c26960d3b05070346cdfdfd05d6fd4ad0a7b1
 

So the problem here is some kind of interference with the CONFIG_GMA600,
which is now turned on by default - I'll have to either dig into find
the actual problem or just turn it off for _crownbay-noegd...

Oh... Hrm... We should actually be able to use that driver now on the
Tunnel Creek systems as of 3.10-LTSI and 3.13+. Scott Garman tested it on
the MinnowBoard, I haven't done so myself unfortunately. Do we specify
another driver in the xorg.conf or something that is causing some
confusion about which driver to use?

--
Darren


Tom

 
 Stopping Bootlog daemon: bootlogd.
 Loading extension GLX
 
 Poky (Yocto Project Reference Distro) 1.5+snapshot-20140221
crownbay-noemgd /dev/ttyS0
 
 crownbay-noemgd login: vesa: Ignoring device with a bound kernel driver
 (EE) 
 Fatal server error:
 (EE) no screens found(EE)
 (EE) 
 Please consult the The X.Org Foundation support
  at http://wiki.x.org
  for help. 
 (EE) Please also check the log file at /var/log/Xorg.0.log for
additional information.
 (EE) 
 (EE) Server terminated with error (1). Closing log file.
 
 Poky (Yocto Project Reference Distro) 1.5+snapshot-20140221
crownbay-noemgd /dev/ttyS0
 
 crownbay-noemgd login: xinit: giving up
 xinit: unable to connect to X server: Connection refused
 xinit: server error
 
 Poky (Yocto Project Reference Distro) 1.5+snapshot-20140221
crownbay-noemgd /dev/ttyS0
 
 
  This adds amt/mei to the intel-common kernel as well as autoloading
of uio
  and iwlwifi to accommodate crystal forest,romley, and fri2 default
  settings.
  
  This branch is running meta-intel-nightly Build #42 on ab03
  
  [ ] Nitin, can you help nurse this patch series into something ready
to
  commit? Including some boot testing?
  
  [ ] Boon Leon, this update the ISG BSPs as well to use the common
kernel.
  This only impacts the upcoming 1.6 release. Please review and boot
test
  and let us know if you have any objections to these changes to your
BSPs.
  
  This series also purges all the 3.4 and 3.8 linux-yocto* bbappends
from
  the meta-intel master branch as they are no longer supported for 1.6.
With
  3.10 LTSI now merged, the time has come to remove them.
  
  The diffstat here is rather pleasing from a maintenance perspective
:-)
  
  $ git diff origin/master.. | diffstat -s
   81 files changed, 62 insertions(+), 934 deletions(-)
  
  
  Thanks,
  
 





-- 
Darren Hart
Yocto Project - Linux Kernel
Intel Open Source Technology Center



___
meta-intel mailing list
meta-intel@yoctoproject.org
https://lists.yoctoproject.org/listinfo/meta-intel


Re: [meta-intel] Next Gen Intel BSPs (GMA600 on TunnelCreek)

2014-02-25 Thread Hart, Darren
Scott, question for you below...

On 2/25/14, 21:56, Zanussi, Tom tom.zanu...@intel.com wrote:

On Tue, 2014-02-25 at 07:48 -0600, Hart, Darren wrote:
 On 2/25/14, 21:44, Zanussi, Tom tom.zanu...@intel.com wrote:
 
 On Thu, 2014-02-20 at 20:56 -0600, Tom Zanussi wrote:
  On Tue, 2014-02-11 at 18:18 -0600, Hart, Darren wrote:
   All,
   
   I have just pushed the next-gen Intel BSP changes following the
meta
   commits to linux-yocto-dev and linux-yocto-3.10.
   
   Changes include:
   
   1) New common BSPs:
   intel-core2-32:  Support core2 and old atom (pre-baytrail) CPUs
   intel-corei7-64: Support Nehalem and Baytrail and newer
 core/xeon/atom CPUs
   
   [ ] Beth: Can you please add these two BSPs to meta-intel-nightly?
   
   2) New INTEL_COMMON_PACKAGE_ARCH
   This is set to ${TUNE_PKGARCH}-intel-common and applies to any BSP
   including intel-common-pkgarch.inc. This demotes the linux-yocto
and
   linux-yocto-dev recipes to a PACKAGE_ARCH less specific than
 MACHINE_ARCH
   (the default for linux-yocto*). For machines that include the
   intel-common-pkgarch.inc and delete their linux-yocto*bbappend
Files,
 they
   will reuse the intel-common linux-yocto* package. This is either
the
   intel-core2-32-intel-common or the intel-corei7-64-intel-common
 kernel,
   the same one used for the two new BSPs.
   
   Using the new intel-common PACKAGE_ARCH is an opt-in mechanism.
 Currently
   only the two new BSPs are using it, although the linux-yocto
 meta-data is
   already building in support for all the non-emgd meta-intel BSPs.
   
   Next step is to add the inclusion of the intel-common-pkgarch.inc
to
 every
   BSP and delete the linux-yocto machine-specific bbappend and
   build/boot/verify each BSP. Such a patch series exists here:
   
   
 
http://git.yoctoproject.org/cgit/cgit.cgi/meta-intel-contrib/log/?h=dvh
ar
 t/
   bsp-ng
   
   
  
  Just FYI...
  
  crownbay-noemgd from bsp-ng boots but X doesn't start (last good
boot or
  normal non-bsp-ng bSP was 2/12 so it's either this patchset or
something
  in master since then, will look into it...):
  
  using poky/master: bb0c26960d3b05070346cdfdfd05d6fd4ad0a7b1
  
 
 So the problem here is some kind of interference with the
CONFIG_GMA600,
 which is now turned on by default - I'll have to either dig into find
 the actual problem or just turn it off for _crownbay-noegd...
 
 Oh... Hrm... We should actually be able to use that driver now on the
 Tunnel Creek systems as of 3.10-LTSI and 3.13+. Scott Garman tested it
on
 the MinnowBoard, I haven't done so myself unfortunately. Do we specify
 another driver in the xorg.conf or something that is causing some
 confusion about which driver to use?
 

No, there's no special xorg.conf for crownbay-noemgd...

Scott, did you have to do something special to get the gma600 driver
working on the MinnowBoard? Did it require you to write an xorg.conf?

-- 
Darren Hart
Yocto Project - Linux Kernel
Intel Open Source Technology Center



___
meta-intel mailing list
meta-intel@yoctoproject.org
https://lists.yoctoproject.org/listinfo/meta-intel


Re: [meta-intel] Next Gen Intel BSPs

2014-02-21 Thread Hart, Darren
On 2/20/14, 18:56, Zanussi, Tom tom.zanu...@intel.com wrote:

On Tue, 2014-02-11 at 18:18 -0600, Hart, Darren wrote:
 All,
 
 I have just pushed the next-gen Intel BSP changes following the meta
 commits to linux-yocto-dev and linux-yocto-3.10.
 
 Changes include:
 
 1) New common BSPs:
 intel-core2-32:  Support core2 and old atom (pre-baytrail) CPUs
 intel-corei7-64: Support Nehalem and Baytrail and newer core/xeon/atom
CPUs
 
 [ ] Beth: Can you please add these two BSPs to meta-intel-nightly?
 
 2) New INTEL_COMMON_PACKAGE_ARCH
 This is set to ${TUNE_PKGARCH}-intel-common and applies to any BSP
 including intel-common-pkgarch.inc. This demotes the linux-yocto and
 linux-yocto-dev recipes to a PACKAGE_ARCH less specific than
MACHINE_ARCH
 (the default for linux-yocto*). For machines that include the
 intel-common-pkgarch.inc and delete their linux-yocto*bbappend Files,
they
 will reuse the intel-common linux-yocto* package. This is either the
 intel-core2-32-intel-common or the intel-corei7-64-intel-common kernel,
 the same one used for the two new BSPs.
 
 Using the new intel-common PACKAGE_ARCH is an opt-in mechanism.
Currently
 only the two new BSPs are using it, although the linux-yocto meta-data
is
 already building in support for all the non-emgd meta-intel BSPs.
 
 Next step is to add the inclusion of the intel-common-pkgarch.inc to
every
 BSP and delete the linux-yocto machine-specific bbappend and
 build/boot/verify each BSP. Such a patch series exists here:
 
 
http://git.yoctoproject.org/cgit/cgit.cgi/meta-intel-contrib/log/?h=dvhar
t/
 bsp-ng
 
 

Just FYI...

crownbay-noemgd from bsp-ng boots but X doesn't start (last good boot or
normal non-bsp-ng bSP was 2/12 so it's either this patchset or something
in master since then, will look into it...):

Thanks Tom,

I discovered tonight that I botched the PACKAGE_EXTRA_ARCHS variable in
intel-common-pkgarch. I omitted the trailing S, causing the kernel-modules
package to not be found and not be installed. I've pushed the fix to
meta-intel/master, and updated the dvhart/bsp-ng branch on top of it and
pushed that out to contrib. Probably worth trying with that now. Sorry
about that :-/

--
Darren


using poky/master: bb0c26960d3b05070346cdfdfd05d6fd4ad0a7b1


Stopping Bootlog daemon: bootlogd.
Loading extension GLX

Poky (Yocto Project Reference Distro) 1.5+snapshot-20140221
crownbay-noemgd /dev/ttyS0

crownbay-noemgd login: vesa: Ignoring device with a bound kernel driver
(EE) 
Fatal server error:
(EE) no screens found(EE)
(EE) 
Please consult the The X.Org Foundation support
 at http://wiki.x.org
 for help. 
(EE) Please also check the log file at /var/log/Xorg.0.log for
additional information.
(EE) 
(EE) Server terminated with error (1). Closing log file.

Poky (Yocto Project Reference Distro) 1.5+snapshot-20140221
crownbay-noemgd /dev/ttyS0

crownbay-noemgd login: xinit: giving up
xinit: unable to connect to X server: Connection refused
xinit: server error

Poky (Yocto Project Reference Distro) 1.5+snapshot-20140221
crownbay-noemgd /dev/ttyS0


 This adds amt/mei to the intel-common kernel as well as autoloading of
uio
 and iwlwifi to accommodate crystal forest,romley, and fri2 default
 settings.
 
 This branch is running meta-intel-nightly Build #42 on ab03
 
 [ ] Nitin, can you help nurse this patch series into something ready to
 commit? Including some boot testing?
 
 [ ] Boon Leon, this update the ISG BSPs as well to use the common
kernel.
 This only impacts the upcoming 1.6 release. Please review and boot test
 and let us know if you have any objections to these changes to your
BSPs.
 
 This series also purges all the 3.4 and 3.8 linux-yocto* bbappends from
 the meta-intel master branch as they are no longer supported for 1.6.
With
 3.10 LTSI now merged, the time has come to remove them.
 
 The diffstat here is rather pleasing from a maintenance perspective :-)
 
 $ git diff origin/master.. | diffstat -s
  81 files changed, 62 insertions(+), 934 deletions(-)
 
 
 Thanks,
 





-- 
Darren Hart
Yocto Project - Linux Kernel
Intel Open Source Technology Center



___
meta-intel mailing list
meta-intel@yoctoproject.org
https://lists.yoctoproject.org/listinfo/meta-intel


Re: [meta-intel] grub-efi change pending

2013-12-11 Thread Hart, Darren
Thanks for the heads up!

Saul Wold s...@linux.intel.com wrote:


Guys,

We have a change pending in MUT which will rename the grub-efi-native to
grub-efi, this will affect meta-intel as some BSP might have a .bbappend
file.

Can you have a look at
http://git.yoctoproject.org/cgit/cgit.cgi/poky-contrib/commit/?h=stage/master_under_testid=c22ff1ee899126cee8e5edd9fb8c3f487f6f932e

Darren has already reviewed these, but they will require some action on
your part.

Thanks
--
 Sau!

Saul Wold
Yocto Component Wrangler @ Intel
Yocto Project / Poky Build System

___
meta-intel mailing list
meta-intel@yoctoproject.org
https://lists.yoctoproject.org/listinfo/meta-intel


Re: [meta-intel] [PATCH] ia32-base: Remove cpio and ext3 defaults

2013-11-21 Thread Hart, Darren
On Thu, 2013-11-21 at 15:25 +, Richard Purdie wrote:
 On real IA hardware, neither the ext3 or cpio images are particularly useful
 or used. cpio is legacy from initramfs and that specific image now overrides
 FSTYPES accordingly. The size difference in filesystems makes ext3 as a file
 format less useful, mainly being useful in the qemu case.
 
 When needed users can still override the default FSTYPES so having
 saner defaults makes sense. This improves build times and uses less
 network bandwidth for builds and releases.
 
 Signed-off-by: Richard Purdie richard.pur...@linuxfoundation.org

I'm fine with this, although it raises the question if we ought to be
doing anything more than tar rootfs in include files like this. there
are ia32 machines where a live image is not useful (although rare). Most
x86 BSPs would add live - but then again, most x86 BSPs will be starting
to consolidate on the genericx86 BSPs anyway

But, this is a clear improvement as is.

Acked-by: Darren Hart dvh...@linux.intel.com

 ---
 diff --git a/meta/conf/machine/include/ia32-base.inc 
 b/meta/conf/machine/include/ia32-base.inc
 index 8a20bca..e15f927 100644
 --- a/meta/conf/machine/include/ia32-base.inc
 +++ b/meta/conf/machine/include/ia32-base.inc
 @@ -10,7 +10,7 @@ MACHINE_FEATURES += screen keyboard pci usbhost ext2 ext3 
 x86 \
  
  MACHINE_EXTRA_RRECOMMENDS += kernel-modules
  
 -IMAGE_FSTYPES += ext3 cpio.gz live
 +IMAGE_FSTYPES += live
  
  KERNEL_IMAGETYPE ?= bzImage
  
 
 

-- 
Darren Hart
Intel Open Source Technology Center
Yocto Project - Linux Kernel

___
meta-intel mailing list
meta-intel@yoctoproject.org
https://lists.yoctoproject.org/listinfo/meta-intel