Open Surface RT
Discord CommunityXDA Page
  • Open Surface RT Home
  • Get started
    • Secure Boot
    • Windows 10
    • Linux
    • Discord
  • Changelog
  • Common
    • Boot Process
      • Special Boot modes
      • Tegra SoC's
        • Fusée Gelée
          • APX Mode (USB Recovery Mode "RCM")
          • Payloads
            • Dump platform key (SBK)
      • UEFI
        • Secure Boot
          • Windows Bootmanager Exploit
          • Yahallo - Disable Secureboot
        • UEFI Boot Sequence
        • FAT32 isn't FAT32
    • Windows RT
      • Jailbreak Exploits
      • Recovery Toolkit
      • Recovery Images
    • Windows 10
      • Software Support
      • Fake Builds
      • Known Issues
  • Tools
    • Windows Media Builder
    • Surface RT & 2 Jailbreak USB
  • Surface RT
    • Linux
      • Devicetree
        • APX devicetree
        • UEFI devicetree
      • Kernel
        • Kernel source
          • grate-driver
          • Mainline
        • Configure & Build
          • Appended devicetree
        • Prebuilt binaries
      • Booting
        • Kernel parameters
        • UEFI boot
        • APX boot
          • Das U-Boot
          • Fusée Gelée
            • BCT Table
            • NvFlash (Modified)
          • Boot Linux
            • Binaries
            • Prepare SD Card
      • Root Filesystem
        • Distributions
          • postmarketOS
          • Raspberry Pi OS
        • Simple RootFS
      • Trouble Shooting
    • Hardware
      • Tegra3 - Technical Reference Manual
      • J14 OEM Debug Connector
      • UART
        • 1.8V UART with Voltage divider
        • Raspberry Pi UART-Setup
      • GPIOs
        • decode - Pin number to Letter
        • GPIOs in Linux
      • IC's
        • SPI Flash
        • MMC
          • 1 - μSD Card
          • 3 - WIFI SDIO: Marvell: 88W8797
          • 4 - eMMC
        • I2C devices
          • Bus 0 - MS HID
            • 0x00 - Microsoft: Type/Touch Cover
            • 0x28 - [WIP] Microsoft: ?SensorCollection?
              • TBC - Ambient Light Sensor
              • TBC - Kionix: KXTJ9 - Accelerometer
          • Bus 1 - 2nd Board
            • 0x2D
            • 0x39 - Display Panel ThermalZone
            • 0x5B - ATMEL: mXT1386E - TouchController
          • Bus 2 - CAMs
          • Bus 3 - HDMI DDC
          • Bus 4 - System
            • 0x0A - ACPI: Control Method Battery
            • 0x1A - Wolfson: WM8962 - AudioCodec
            • 0x2D - TI: TPS659110 - PMIC
            • 0x4C - onsemi: NCT1008 - Temperatur sensor
            • 0x60 - TI: TPS62361B - Processor Supply
        • LVDS Encoder
      • Display
      • Battery
    • Firmware
      • Extract Firmware
      • Decrypt Firmware
      • Encrypt Firmware
      • BCT
      • RPMB partition on EMMC
    • UEFI
      • ACPI Tables
        • DSDT
        • SSDT
        • WDSA
        • MADT / APIC
        • Not interesting (yet)
          • BGRT
          • CSRT
          • DBG2
          • FACP
          • FPDT
          • MSDM
          • RSDP
          • TMP2
          • XSDT
      • Memory Mapping
      • Device Tables
      • PinMux
      • Compiling GRUB2
  • Surface RT2
    • Hardware
      • Specifications
      • ACPI (DSDT) Tables
      • Memory Mapping
      • EFI System Tables
      • BCT Table
      • IC's
      • Display
      • Battery
  • Other devices
    • Lenovo Ideapad Yoga 11
      • Linux
  • Development
    • !!! PLEASE READ !!!
      • !TODO for everyone
      • CTS devNotes
        • initrd
        • !TODO
          • Surface RT
          • Surface 2
        • battery
        • TZ Exploit - CTS
        • tCover Linux support
          • Kernel module
        • Dump Bootrom
        • git for dummys [WIP!] (like me)
      • Leander devNotes
        • !TODO
        • UEFI Privilege Escalation Exploit Documentation
          • Yahallo: Free memory access
          • UEFI Privilege Escalation: Execute code in Secure mode
          • Removing trustzone
        • EFI linux booting
          • Configs we already tried
          • Qemu emulation
            • GDB Debugging
              • VSCode integration
        • EFI Signing / Secure Boot
      • GRUB2 Booting Notes
      • Cross Compiling
      • Interesting Repo's
      • Devicetree information
      • Do gifs work?
      • Uboot information
      • jwa4 Notes
        • Windows Media Builder
        • Surface RT & 2 Jailbreak USB
Powered by GitBook
On this page
  • Timing
  • Raw EDID from ACPI
  • Decoded EDID
  • Translated to devicetree
  • GPIOs
  • Connector

Was this helpful?

Export as PDF
  1. Surface RT
  2. Hardware

Display

PreviousLVDS EncoderNextBattery

Last updated 3 years ago

Was this helpful?

Timing

Raw EDID from ACPI

0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x00, 0x4c, 0xa3, 0x42, 0x31, 0x00, 0x00, 0x00, 0x00,
0x00, 0x15, 0x01, 0x04, 0xa0, 0x17, 0x0d, 0x78, 0x0a, 0x87, 0xf5, 0x94, 0x57, 0x4f, 0x8c, 0x27,
0x27, 0x50, 0x54, 0x00, 0x00, 0x00, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01,
0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x1e, 0x1c, 0x56, 0xb0, 0x50, 0x00, 0x0a, 0x30, 0x0e, 0x38,
0x13, 0x00, 0xeb, 0x84, 0x00, 0x00, 0x00, 0x19, 0x00, 0x00, 0x00, 0x0f, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x44, 0xdc, 0x03, 0x74, 0x00, 0x00, 0x00, 0x00, 0xfe, 0x00, 0x53,
0x41, 0x4d, 0x53, 0x55, 0x4e, 0x47, 0x0a, 0x20, 0x20, 0x20, 0x20, 0x20, 0x00, 0x00, 0x00, 0xfe,
0x00, 0x31, 0x30, 0x36, 0x41, 0x4c, 0x30, 0x31, 0x2d, 0x30, 0x30, 0x31, 0x0a, 0x20, 0x00, 0x7e

Decoded EDID

Many tools exist which can decode EDID. On Ubuntu you can use edid-decode. The ouput is below...

edid_sRT.txt
/* cut binary dump*/
EDID version: 1.4
Manufacturer: SEC Model 12610 Serial Number 0
Made in year 2011
Digital display
8 bits per primary color channel
Digital interface is not defined
Maximum image size: 23 cm x 13 cm
Gamma: 2.20
Supported color formats: RGB 4:4:4, YCrCb 4:4:4
First detailed timing includes the native pixel format and preferred refresh rate
Color Characteristics
  Red:   0.5800, 0.3398
  Green: 0.3095, 0.5498
  Blue:  0.1552, 0.1552
  White: 0.3134, 0.3291
Established Timings I & II: none
Standard Timings: none
Detailed mode: Clock 71.980 MHz, 235 mm x 132 mm
               1366 1380 1436 1542 ( 14  56 106)
                768  769  772  778 (  1   3   6)
               -hsync -vsync
               VertFreq: 60.000 Hz, HorFreq: 46.680 kHz
Manufacturer-Specified Display Descriptor (0x0f): 00 0f 00 00 00 00 00 00 00 00 00 44 dc 03 74 00  ...........D..t.
Alphanumeric Data String: SAMSUNG
Alphanumeric Data String: 106AL01-001
Checksum: 0x7e

Translated to devicetree

WIP At the we use a samsung display with same resolution and similar timings which works. But to optimize the devicetree someone has to decode EDID to panel-timings

GPIOs

Controlling the following GPIOs from UEFI Shell gave the result below. The GPIOs were extracted from ACPI

GPIO

Backlight

Logo

Note

Function

B2

Y

N

Image fades out

LVDS power down

DD0

N

Y

Logo can bee seen with

external light source

backlight power

DD2

N

N

Display is dead

panel power

H0

N

Y

PWM brightness control

PWM brightness

Connector

Pin

2/3 Panel VDD

GPIO DD2

25 BL_PWM

GPIO H0

26 Backlight enable

GPIO DD0

28/29/30 LED Anode

Always connected to 12V

You can also use this page

page 57

EDID reader
https://elixir.bootlin.com/linux/latest/source/include/drm/drm_modes.h#L201
https://glenwing.github.io/docs/VESA-DMT-1.12.pdf
https://www.panelook.com/LTL106AL01-002_Samsung_10.6_LCM_overview_19126.html
linux/panel-timing.yaml at master · torvalds/linuxGitHub
Logo
1MB
LTL106AL01-002_Rev.P00_20140514_201506075567.pdf
pdf
128B
edid_sRT.bin
Binary version of EDID
1KB
edid_sRT.txt
Human Readable version of EDID