Hello Paul Menzel, Stefan Reinauer, Philipp Deppenwiese, build bot (Jenkins), Martin Roth, Patrick Georgi,
I'd like you to reexamine a change. Please visit
https://review.coreboot.org/c/coreboot/+/28640
to look at the new patch set (#85).
Change subject: mb/clevo/n130wu: Add mainboard
......................................................................
mb/clevo/n130wu: Add mainboard
Devices:
- N130WU / N131WU
Working:
- Compiling
- Seabios, iPXE
- NVMe, SATA3, booting from SSD into Arch Linux
- USB2, USB3
- Graphics, mDP, HDMI
- Sound
- Webcam
- WLAN, LAN, Bluetooth, LTE
- Keyboard, touchpad
- TPM
- flashrom support; reading / flashing from Linux
Works, but needs testing:
- Thunderbolt
WIP:
- Documentation
Not working:
- EC ACPI
Untested:
- Virtualization
Change-Id: I364f5849ef88f43b85efbd7a635a27e54d08c513
Signed-off-by: Felix Singer <migy(a)darmstadt.ccc.de>
---
A Documentation/mainboard/clevo/index.md
A Documentation/mainboard/clevo/n130wu/index.md
A Documentation/mainboard/clevo/n130wu/n130wu_overview.jpg
M Documentation/mainboard/index.md
A src/mainboard/clevo/Kconfig
A src/mainboard/clevo/Kconfig.name
A src/mainboard/clevo/kbl-u/Kconfig
A src/mainboard/clevo/kbl-u/Kconfig.name
A src/mainboard/clevo/kbl-u/Makefile.inc
A src/mainboard/clevo/kbl-u/acpi/ec.asl
A src/mainboard/clevo/kbl-u/acpi/superio.asl
A src/mainboard/clevo/kbl-u/acpi_tables.c
A src/mainboard/clevo/kbl-u/board_info.txt
A src/mainboard/clevo/kbl-u/dsdt.asl
A src/mainboard/clevo/kbl-u/gpio.h
A src/mainboard/clevo/kbl-u/hda_verb.c
A src/mainboard/clevo/kbl-u/pei_data.c
A src/mainboard/clevo/kbl-u/pei_data.h
A src/mainboard/clevo/kbl-u/ramstage.c
A src/mainboard/clevo/kbl-u/romstage.c
A src/mainboard/clevo/kbl-u/variants/n13xwu/data.vbt
A src/mainboard/clevo/kbl-u/variants/n13xwu/devicetree.cb
22 files changed, 1,286 insertions(+), 0 deletions(-)
git pull ssh://review.coreboot.org:29418/coreboot refs/changes/40/28640/85
--
To view, visit https://review.coreboot.org/c/coreboot/+/28640
To unsubscribe, or for help writing mail filters, visit https://review.coreboot.org/settings
Gerrit-Project: coreboot
Gerrit-Branch: master
Gerrit-Change-Id: I364f5849ef88f43b85efbd7a635a27e54d08c513
Gerrit-Change-Number: 28640
Gerrit-PatchSet: 85
Gerrit-Owner: Felix Singer <migy(a)darmstadt.ccc.de>
Gerrit-Reviewer: Felix Singer <migy(a)darmstadt.ccc.de>
Gerrit-Reviewer: Martin Roth <martinroth(a)google.com>
Gerrit-Reviewer: Patrick Georgi <pgeorgi(a)google.com>
Gerrit-Reviewer: Paul Menzel <paulepanter(a)users.sourceforge.net>
Gerrit-Reviewer: Philipp Deppenwiese <zaolin.daisuki(a)gmail.com>
Gerrit-Reviewer: Stefan Reinauer <stefan.reinauer(a)coreboot.org>
Gerrit-Reviewer: build bot (Jenkins) <no-reply(a)coreboot.org>
Gerrit-CC: Angel Pons <th3fanbus(a)gmail.com>
Gerrit-CC: Arthur Heymans <arthur(a)aheymans.xyz>
Gerrit-CC: HAOUAS Elyes <ehaouas(a)noos.fr>
Gerrit-CC: Nico Huber <nico.h(a)gmx.de>
Gerrit-CC: Patrick Rudolph <siro(a)das-labor.org>
Gerrit-CC: Shaleen jain <shaleen(a)jain.sh>
Gerrit-MessageType: newpatchset
Werner Zeh has uploaded this change for review. ( https://review.coreboot.org/c/coreboot/+/31414
Change subject: Documentation: Add KASAN to the project ideas list
......................................................................
Documentation: Add KASAN to the project ideas list
Adding the Kernel Address Sanitizer feature to coreboot would help to
find bugs.
Change-Id: If00010e81147ec50e037678230df17c6888e40a2
Signed-off-by: Werner Zeh <werner.zeh(a)siemens.com>
---
M Documentation/contributing/project_ideas.md
1 file changed, 19 insertions(+), 0 deletions(-)
git pull ssh://review.coreboot.org:29418/coreboot refs/changes/14/31414/1
diff --git a/Documentation/contributing/project_ideas.md b/Documentation/contributing/project_ideas.md
index 0a39a88..1c23cc6 100644
--- a/Documentation/contributing/project_ideas.md
+++ b/Documentation/contributing/project_ideas.md
@@ -72,3 +72,22 @@
hardware is available.
### Mentors
+
+## Add Kernel Address Sanitizer functionality to coreboot
+The Kernel Address Sanitizer (KASAN) is a runtime dynamic memory error detector.
+The idea is to check every memory access (variables) for its validity
+during runtime and find bugs like stack overflow or out-of-bounds accesses.
+Implementing this stub into coreboot like "Undefined behavior sanitizer support"
+would help to ensure code quality and make the runtime code more robust.
+
+### Requirements
+* knowledge in the coreboot build system and the concept of stages
+* the KASAN feature can be improved in a way so that the memory space needed
+ during runtime is not on a fixed address provided during compile time but
+ determined during runtime. For this to achieve a small patch to the GCC will
+ be helpful. Therefore minor GCC knowledge would be beneficial.
+* Implementation can be initially done in QEMU and improved on different
+ mainboards and platforms
+
+### Mentors
+* Werner Zeh <werner.zeh(a)gmx.net>
--
To view, visit https://review.coreboot.org/c/coreboot/+/31414
To unsubscribe, or for help writing mail filters, visit https://review.coreboot.org/settings
Gerrit-Project: coreboot
Gerrit-Branch: master
Gerrit-Change-Id: If00010e81147ec50e037678230df17c6888e40a2
Gerrit-Change-Number: 31414
Gerrit-PatchSet: 1
Gerrit-Owner: Werner Zeh <werner.zeh(a)siemens.com>
Gerrit-MessageType: newchange