Issue #424 has been reported by Krystian Hebel.
----------------------------------------
Feature #424: Create and implement option to choose either TCG or vboot PCR assignment
https://ticket.coreboot.org/issues/424
* Author: Krystian Hebel
* Status: New
* Priority: Normal
* Target version: none
* Start date: 2022-10-12
----------------------------------------
As with TPM event log, standardized TCG assignment should be chosen by default, with opt-in possibility to choose existing behaviour for platforms that depend on it.
--
You have received this notification because you have either subscribed to it, or are involved in it.
To change your notification preferences, please click here: https://ticket.coreboot.org/my/account
Issue #423 has been reported by Krystian Hebel.
----------------------------------------
Feature #423: Implement legacy and crypto agile TPM event log formats
https://ticket.coreboot.org/issues/423
* Author: Krystian Hebel
* Status: New
* Priority: Normal
* Target version: none
* Start date: 2022-10-12
----------------------------------------
Legacy format is simple, it always uses SHA1 and its entries can be described by a C structure, with one field of variable length at the end.
Crypto agile format is slightly more complicated. There can be more than one digest in entry, and their sizes depend on algorithm. There is code for marshaling of required structures in security/tpm/tss/tcg-2.0, but it assumes TPM endianness (BE), while entries in event log are always LE.
Headers for both formats have vendorInfo field, which can be used to hold additional data, not described by specification. An example of such may be offset to next entry to be added, which saves code from walking through all entries (possibly with different sizes) for each new entry.
--
You have received this notification because you have either subscribed to it, or are involved in it.
To change your notification preferences, please click here: https://ticket.coreboot.org/my/account
Issue #422 has been reported by Krystian Hebel.
----------------------------------------
Feature #422: Create Kconfig menu for TPM event log format
https://ticket.coreboot.org/issues/422
* Author: Krystian Hebel
* Status: New
* Priority: Normal
* Target version: none
* Start date: 2022-10-12
----------------------------------------
New entries should default to one of TCG formats, depending on selected TPM family. Choice of other format shouldn't be restricted. Use of current proprietary format should be explicitly selected by boards that depend on it.
Additionally, config menu should allow to choose at compilation time the hashing algorithms that are to be used. This would allow for limiting size of code for cases with restricted available space.
--
You have received this notification because you have either subscribed to it, or are involved in it.
To change your notification preferences, please click here: https://ticket.coreboot.org/my/account
Issue #310 has been updated by Angel Pons.
Affected OS set to All (coreboot bug)
Affected hardware set to ThinkPad T440p
Status changed from Response Needed to Resolved
----------------------------------------
Bug #310: Coreboot 4.14 fails on a Lenvovo T440p
https://ticket.coreboot.org/issues/310#change-1160
* Author: David Hoelscher
* Status: Resolved
* Priority: Normal
* Assignee: Angel Pons
* Start date: 2021-06-02
* Affected hardware: ThinkPad T440p
* Affected OS: All (coreboot bug)
----------------------------------------
Hi all,
coreboot 4.14 dies on early boot. The T440p ended with led blinking and beep sound.
This was my first try - so i think it was maybe a problem with mrc.bin or vga.rom. But if I skip back to version 4.13, everything works fine (4.13 working config is appended). I don't know how to get debug information on this early stage of boot. Does anyone has a hint? A Raspberry Pi as an external flasher is available.
Further - is it possible to flash only the 4 MB BIOS chip? This IC is very easy accessible. I am afraid to disassemble the complete backplate to access the other 8MB chip again. Initially I flashed the complete Rom without ME on both chips.
---Files--------------------------------
Coreboot_4.13.config (23.6 KB)
descriptor.bin (4 KB)
--
You have received this notification because you have either subscribed to it, or are involved in it.
To change your notification preferences, please click here: https://ticket.coreboot.org/my/account
Hi guys,
We've been using SMM only for security chipset lockdown enablement via coreboot payload (VaultBoot) and have tested it on x11ssh-tf (KabyLake) back in 2019 and it works well: ✓
https://github.com/hardenedlinux/Debian-GNU-Linux-Profiles/blob/master/scri…
So it's confirmed that users are able to control where or when to enable BIOS LOCK in KabyLake. But it didn't work when I tested coreboot on a coffeelake machine (x11sch) last year. All lockdown is enabled by default regardless of whether CHIPSET_LOCKDOWN_COREBOOT is set or not. IIRC, it is locked down even if I try to disable it via FSP params:
https://github.com/intel/FSP/blob/master/CoffeeLakeFspBinPkg/Fsp.bsf#L737
I've been looking into the leaked material from Insyde lately and found out that the NDA'ed FSP seems able to enable/disable any locks out there:
https://twitter.com/citypw/status/1580541897604751361
Is this a bug or a feature that intends not to allow users to disable BIOS lock (others as well) via Intel' public FSP binary blobs?
Thanks,
regards
Shawn
[1] FSP-S Issues
https://review.coreboot.org/plugins/gitiles/coreboot/+/refs/changes/28/3632…
Hi everyone,
As mentioned in this week's leadership meeting, membership in the Open
Source Firmware Foundation (OSFF) has been under consideration for
some time and we feel that we should move ahead. We plan to join by
the end of this month if possible.
This will be in addition to our membership with the Software Freedom
Conservancy who handles donations to coreboot.org and legal services
and will continue to do so. We've reviewed membership documents and so
far we do not see any conflict in this arrangement.
From a community standpoint, we'd like to know if there are any
objections or good reasons *not* to move ahead with membership in
OSFF. Feel free to reply on the list or in private with your thoughts.
More info about OSFF can be found here: https://opensourcefirmware.foundation/
Hi everyone.
I'm a bit stuck on this.
As I've said before in other emails here, I'm trying to bring up an AsRock
FM2A88X+ with coreboot. I've used as a model the code for the a88xm-e and
accomplished my first goal, which was to have a working UART, but I need to
boot with the original AMI BIOS first (first boot after mechanical off) for
it to work.
The problem seems to be the 48 MHz clock that SB feeds to the SIO.
Coreboot's a88xm-e code has the code to configure it early, in
sbxxx_enable_48mhzout, and so have I, but I've checked it with an
oscilloscope and there's no clock there,
So I turned to the docs. Regarding that clock, we can read,
"The USBCK/14M_25M_48M_OSC pin (G8) as well as the 14M_25M_48M_OSC pin
(J26) output a 14.318MHz clock on
the first power up if the internal system clock generator mode strap is
selected. [1]
14M_25M_48M_OSC is the pin we are interested in. From what I see on the
boardfile, the strap is configured as internal system clock.
Later,
"The output will generate 12.5 MHz on power up after the FCH PWR_GOOD is
asserted.
The output frequency will be 12.5 MHz until the internal PLL is initialized
after which time
the output will switch to 14.318 MHz clock." [2]
So, it seems that, after the FCH PWR_GOOD and *without any firmware
intervention*, we should get 12.5 MHz on that pin. I've checked it with the
original AMI BIOS and that's correct, ~150 ms after the assertion of
PWR_GOOD we get the 12.5 MHz clock. On the other hand, with my coreboot
image, FCH PWR_GOOD is asserted, but there is no clock.
From what I said, I deduce that the AMI BIOS must be doing something that I
do not, but, as I understand the databook, the 12.5 MHz should be
*automatic* after a PWR_GOOD.
Maybe someone with more experience with AMD chipsets could help me here,
especially considering that we have a working image with the same chipset.
I'd appreciate any hints or advice about how to proceed.
[1] Bolton Databook (
https://www.amd.com/system/files/TechDocs/Bolton_D2-D2H-D3-D4_Databook.pdf),
Chapter 4, Table 13
[2] Bolton Databook, Chapter 6, Table 52
Issue #417 has been reported by Simon Brand.
----------------------------------------
Feature #417: Show platform key on boot when secure boot is enabled
https://ticket.coreboot.org/issues/417
* Author: Simon Brand
* Status: New
* Priority: Normal
* Target version: none
* Start date: 2022-10-02
* Related links: [0] https://source.android.com/docs/security/features/verifiedboot/boot-flow#lo…
[1] https://issuetracker.google.com/issues/217720443
[2] https://source.codeaurora.org/quic/la/abl/tianocore/edk2/tree/QcomModulePkg…
* Affected hardware: All
* Affected OS: All but Windows
----------------------------------------
I think it is useful to show the hash of the platform key, if a different platform key than default (Microsoft trusted Platform Key) is the current platform key and secure boot is enabled. It must be shown, before the operating system could have been started (to avoid the OS showing it with an older UEFI, which lacks this feature), also it makes sense to pause the screen, so you can verify the hash.
Why?
To make sure the correct operation system is loading and nobody tampered the devices platform key and disk.
Android smartphones have this feature for several years. [0]
Please keep in mind, that the screenshots are not fully up-to-date, devices show not only the first 8 digits, but the full root of trust hash since a few months. [1]
The reference source code is available here: [2]
--
You have received this notification because you have either subscribed to it, or are involved in it.
To change your notification preferences, please click here: https://ticket.coreboot.org/my/account