[coreboot] [coreboot - Bug #327] MBOX3, OperationRegion (OPRG, SystemMemory, ASLS, 0x2000) causes windows uefi tianocore BSOD ACPI_BIOS_ERROR

2022-06-20 Thread Mat Phillips via coreboot
Issue #327 has been updated by Mat Phillips. Paul Menzel wrote in #note-9: > @Mat, on what board did you test? > Thinkpad x230. I7 CPU (doubt that's relevant though) The dmesg file attached to this ticket is from that laptop. Bug

[coreboot] [coreboot - Bug #327] MBOX3, OperationRegion (OPRG, SystemMemory, ASLS, 0x2000) causes windows uefi tianocore BSOD ACPI_BIOS_ERROR

2022-06-19 Thread Mat Phillips
Issue #327 has been updated by Mat Phillips. Matt DeVillier wrote in #note-6: > > When set to 0x1000 windows UEFI tianocore mode boots fine > > This seems to be a board-specific issue rather than platform or tree-wide > issue. The IGD OpRegion spec published by Intel themselves

Re: [coreboot] x220: cannot modify nvramcui options with newest coreboot (git a96e31b)

2018-04-27 Thread Mat
BUTTON_DEFAULT_ENABLE is not set # CONFIG_POWER_BUTTON_DEFAULT_DISABLE is not set # CONFIG_POWER_BUTTON_FORCE_ENABLE is not set # CONFIG_POWER_BUTTON_FORCE_DISABLE is not set # CONFIG_POWER_BUTTON_IS_OPTIONAL is not set # CONFIG_REG_SCRIPT is not set # CONFIG_CREATE_BOARD_CHECKLIST is not set # CONFIG_MAK

Re: [coreboot] x220: cannot modify nvramcui options with newest coreboot (git a96e31b)

2018-04-26 Thread Mat
HAS_TPM_CR50 is not set 571a599,600 > CONFIG_CONSOLE_CBMEM_BUFFER_SIZE=0x2 > # CONFIG_CONSOLE_CBMEM_DUMP_TO_UART is not set 583a613,616 > CONFIG_POST_DEVICE_NONE=y > # CONFIG_POST_DEVICE_LPC is not set > # CONFIG_POST_DEVICE_PCI_PCIE is not set > CONFIG_POST_IO_PORT=0x80 641a675 > # CONFIG_COMPRESSE

[coreboot] x220: cannot modify nvramcui options with newest coreboot (git a96e31b)

2018-04-26 Thread Mat
hexadecimal digits appearing on the screen. It didn't happen with previous version (around 2018.01) Could you please help? regards, Mat -- coreboot mailing list: coreboot@coreboot.org https://mail.coreboot.org/mailman/listinfo/coreboot

Re: [coreboot] lenovo x220, tool to extract binary blobs from BIOS update

2018-04-26 Thread Mat
.org> wrote: > Hi! > > On 24.04.2018 21:27, Mat wrote: > > > I'd like to have system updated against spectre, and other possible > vulnerabilities as much as possible. > > With the retpoline option in the Linux kernel, it should be usually safe > (see attachment). >

Re: [coreboot] lenovo x220, tool to extract binary blobs from BIOS update

2018-04-26 Thread Mat
Thank You On Thu, Apr 26, 2018 at 5:09 PM, Matt DeVillier wrote: > On Thu, Apr 26, 2018 at 10:05 AM diffusae via coreboot < > coreboot@coreboot.org> wrote: > >> >> Don't know, if gbe.bin or ifd.bin is vulnerable. >> > > they are configuration "blobs" not binary blobs, no executable code > > -- >

Re: [coreboot] lenovo x220, tool to extract binary blobs from BIOS update

2018-04-24 Thread Mat
> not sure what you are looking for, but I guess this is what you need, > (microcode updates are publicly available and gfx init is > open source) I'd like to have system updated against spectre, and other possible vulnerabilities as much as possible. If lenovo (or any other vendor) releases upd

[coreboot] lenovo x220, tool to extract binary blobs from BIOS update

2018-04-24 Thread Mat
I have coreboot running on my x220. lately lenovo released firmware update (8duj29us.exe from https://support.lenovo.com/pl/en/downloads/ds018805) and I'd like to update coreboot with new blobs from that BIOS. Unfortunatelly I have difficulties with extracting binary blobs from it and need help. I