Dear Coreboot team,
Good days. We are an OEM&OEM Firewall mini pc manufacturer in SHENZHEN China. We are developing 2.5G firewall Mini PC hareware(we already finished them). And as Coreboot is very poweful and well knowned in firewall field so we are wonding that if we can become a coreboot registered motherboard vendor so user could use coreboot on our devices. May we know how to achieve its requirements ?
Waitng for your comments and thanks a lot.
Best Regards
He Chen
Good day folks,
In a recent change[0], it was proposed that we drop support for the Intel
Ice Lake platform.
The only mainboard supporting the platform was the Intel RVP, but as far as
anyone knows,
it appears the project never progressed past the initial silicon, and so
the code is now
unmaintained and also unused. Since Ice Lake is very similar to TGL & ADL,
it poses a
maintenance burden when dealing with Intel common code e.g., anything in
src/soc/intel/common.
According to [1], this should be announced in upcoming release notes first,
and removal
could happen in 6 months.
Wondering if anyone has any thoughts on why we should keep it around,
otherwise let's update the upcoming release notes to give the "official"
notice
that it will be dropped.
Cheers,
- Tim
[0]https://review.coreboot.org/c/coreboot/+/60053
[1]https://doc.coreboot.org/releases/templates.html
Dear friends, I'm happy to tell you about the upcoming "vPub v5"
online party which starts this Thursday (26 May) at 4 PM UTC. Here's a
homepage of our online party - https://vpub.dasharo.com/
Aside from having fun, we'd like to discuss and learn more about the
wonderful open-source projects from the embedded world of firmware &
hardware - and their advantages of liberty, security and quality. Some
examples of the possible topics:
*) new opensource coreboot BIOS port for a fresh retail Intel Alder
Lake MSI PRO Z690-A WiFi DDR4 motherboard & its' testing results by
QubesOS users. This port has been done by our 3mdeb company and is
quite a spectacular accomplishment - because it's for a new
motherboard still widely available as new! (usually by the time an
opensource firmware is ported to some motherboard, it's long gone from
the market and the people have to search for the old used ones);
*) RustSBI - a software supervisor for RISC-V written on Rust
programming language;
*) qspimux - a hardware adapter for the safe remote flashing of SPI
flash chip (used for storing the firmwares) without detaching it from
a target motherboard;
*) lnDSO150 - an alternative firmware for the popular handheld DSO
oscilloscopes;
*) bcm5719-fw - an alternative firmware for the network card Broadcom BCM5719;
*) swtpm - a software Trusted Platform Module emulator and the ways of using it;
*) TrenchBoot - a framework which uses multiple projects to improve
the security of firmware booting.
Thank you for a wonderful time with us at our past parties and your
kind feedback! We hope that this one will be as exciting as the
previous ones (which lasted for 10-12 hours) - and will be waiting for
you. Expect a great time in a cosy community of opensource enthusiasts
from all over the world! ;-)
--
Best regards, Mike Banon
Open Source Community Manager of 3mdeb - https://3mdeb.com/
Hi
After last week's SMM loader problem on all but the BSP, I noticed another
problem in the SMM setup.
The permanent smihandler is currently built as a relocatable module such
that coreboot
can place it wherever it thinks it's a good idea. (TSEG is not known at
buildtime).
These relocatable modules have an alignment requirement.
It looks however that the code to deal with the alignment requirement is
also wrong
and aligns the handler upwards instead of downwards which makes it encroach
either an SSE2
FX_SAVE area or an SMM register save state. It's hard to know whether this
is easily exploitable.
I would think that a carefully crafted SMM save state on the right AP
arbitrary code executing might be possible. On the other hand I noticed
last week that launching SMM on APs is broken too so this is likely a
lesser problem.
Anyway the fix is in https://review.coreboot.org/c/coreboot/+/63475
(It has a comment indicating what code was causing this problem)
Please review and update your coreboot code!
Kind regards
Arthur
Hi
We spend more time debating whether to keep AGESA in the master branch than
actually reviewing code to maintains it.
Here are some patches series I would like to be tested & reviewed:
- Agesa was never properly linked and relied on default linker behavior
to append unmatched data. Here is the fix:
https://review.coreboot.org/q/topic:AGESA_DATA
- Use MRC cache for non volatile data
https://review.coreboot.org/q/topic:AGESA_MRC_CACHE
- Use CLFLUSH to make sure code hits DRAM and incidently avoid
inconsistent MTRRs (bonus is compressed postcar stage):
https://review.coreboot.org/q/topic:compress_postcar
Kind regards
Arthur
Hi everyone,
after two crazy years, we decided it's time to do a open source
firmware hackathon. It will take place from 10th June - 12th June in
Darmstadt, Germany. For more details and tickets, have a look on this
site [1].
The hackathon will cover open source firmware projects, like coreboot,
oreboot, flashrom, LinuxBoot and any topics related to them. We have
two lecture rooms (2x 80 people) for discussions and presentations.
Currently, only 17 tickets are left. Everyone is welcome, no matter if
beginner or professional.
24h breakfast, snacks and soft drinks are provided for free.
Would love to see you there!
// Felix
[1] https://osfw.foundation/events/osff-summer-hackathon-2022/
Hi
To make sure headers don't create conflicts, guards are added to all of
them.
But the guard needs to be correct: e.g.
https://review.coreboot.org/c/coreboot/+/64360/2
Most compilers implement '#pragma once ' as an alternative.
Should we use this instead across the tree, as it is less error prone and
less code?
Sidenote: clang warns about wrong header guards.
https://review.coreboot.org/c/coreboot/+/62173/23 hooks up clang to our CI
for some platforms ;-).
Kind regards
Arthur