Issue #327 has been updated by Mat Phillips.
Paul Menzel wrote in #note-9:
> @Mat, on what board did you test?
>
Thinkpad x230. I7 CPU (doubt that's relevant though) The dmesg file attached to
this ticket is from that laptop.
Bug
Issue #327 has been updated by Mat Phillips.
Matt DeVillier wrote in #note-6:
> > When set to 0x1000 windows UEFI tianocore mode boots fine
>
> This seems to be a board-specific issue rather than platform or tree-wide
> issue. The IGD OpRegion spec published by Intel themselves
BUTTON_DEFAULT_ENABLE is not set
# CONFIG_POWER_BUTTON_DEFAULT_DISABLE is not set
# CONFIG_POWER_BUTTON_FORCE_ENABLE is not set
# CONFIG_POWER_BUTTON_FORCE_DISABLE is not set
# CONFIG_POWER_BUTTON_IS_OPTIONAL is not set
# CONFIG_REG_SCRIPT is not set
# CONFIG_CREATE_BOARD_CHECKLIST is not set
# CONFIG_MAK
HAS_TPM_CR50 is not set
571a599,600
> CONFIG_CONSOLE_CBMEM_BUFFER_SIZE=0x2
> # CONFIG_CONSOLE_CBMEM_DUMP_TO_UART is not set
583a613,616
> CONFIG_POST_DEVICE_NONE=y
> # CONFIG_POST_DEVICE_LPC is not set
> # CONFIG_POST_DEVICE_PCI_PCIE is not set
> CONFIG_POST_IO_PORT=0x80
641a675
> # CONFIG_COMPRESSE
hexadecimal digits appearing on the screen.
It didn't happen with previous version (around 2018.01)
Could you please help?
regards,
Mat
--
coreboot mailing list: coreboot@coreboot.org
https://mail.coreboot.org/mailman/listinfo/coreboot
.org> wrote:
> Hi!
>
> On 24.04.2018 21:27, Mat wrote:
>
> > I'd like to have system updated against spectre, and other possible
> vulnerabilities as much as possible.
>
> With the retpoline option in the Linux kernel, it should be usually safe
> (see attachment).
>
Thank You
On Thu, Apr 26, 2018 at 5:09 PM, Matt DeVillier
wrote:
> On Thu, Apr 26, 2018 at 10:05 AM diffusae via coreboot <
> coreboot@coreboot.org> wrote:
>
>>
>> Don't know, if gbe.bin or ifd.bin is vulnerable.
>>
>
> they are configuration "blobs" not binary blobs, no executable code
>
> --
>
> not sure what you are looking for, but I guess this is what you need,
> (microcode updates are publicly available and gfx init is
> open source)
I'd like to have system updated against spectre, and other possible
vulnerabilities as much as possible.
If lenovo (or any other vendor) releases upd
I have coreboot running on my x220. lately lenovo released firmware
update (8duj29us.exe from
https://support.lenovo.com/pl/en/downloads/ds018805) and I'd like to
update coreboot with new blobs from that BIOS.
Unfortunatelly I have
difficulties with extracting binary blobs from it and need help. I
9 matches
Mail list logo