commit | c740c65fb916c6db320090bb2ca00991c55fafaa | [log] [tgz] |
---|---|---|
author | Yu-Ping Wu <yupingso@chromium.org> | Wed Aug 23 02:28:09 2023 +0000 |
committer | Felix Held <felix-coreboot@felixheld.de> | Thu Aug 24 12:55:11 2023 +0000 |
tree | b27bc11aee2749bce1155a2ae1fda8e22400bf7f | |
parent | d597320d8e2218d64ba63bf6170f5283f4978556 [diff] |
Update vboot submodule to upstream main Updating from commit id 0c11187c: 2023-08-07 11:41:45 +0000 - (vboot_reference: Rename Cr50 to GSC when applicable) to commit id 24cb127a: 2023-08-22 00:19:10 +0000 - (sign_uefi_unittest.py: Fix long-line lint) This brings in 24 new commits: 24cb127a sign_uefi_unittest.py: Fix long-line lint 52ac0c71 dump_fmap: Rename format name from 'pretty' to 'parser' 068376d9 dump_fmap: Add description about formats f67ae949 crossystem: stop supporting legacy chromeos_acpi driver e6bd72f7 Revert "futility/cmd_vpd: Add vpd listing subcommand" c7593acc futility: updater: fix build warning 'incompatible function pointer' 394fbfad crossystem: Binary search RW_NVRAM to find the active entry a5b80353 keygeneration: drop ec_{data,root}_key 1c9b603d futility: updater: Refactor manifest generation 0a4be4a0 futility: updater: Use signer_config for all boards by default f9d1f0b0 futility: Fix closing file in error path 4dbadfb3 vboot_reference: Remove VB2_RECOVERY_CR50_BOOT_MODE 11bdc1f5 futility: updater: Enable keyset in signer_config based manifest 35e69bcd futility: Change FLMSTR values set by --unlock_me 0ca8212b futility: updater: Use signer_config manifest instead of setvars 0e24a8ef scripts: use new fw updater pack/repack commands 4378179b futility/cmd_vpd: Add vpd listing subcommand 2fc252d8 futility: updater: Remove deprecated Glados platform quirks 3119182d x86/crossystem: Fix snprintf error for hostlib 06a0b9d0 sign_uefi: Remove exception catching bcfd831e sign_uefi: Clarify comment for removing signatures 4cb7b0e5 crossystem: support new chromeos_acpi driver eb37f19d vboot: remove trailing newline from sysfs ec173ee4 vboot: rename ReadFileString() to ReadFileFirstLine() Change-Id: I6c92791404dc1c6a3efc8bb9046fe5017ba794fb Signed-off-by: Yu-Ping Wu <yupingso@chromium.org> Reviewed-on: https://review.coreboot.org/c/coreboot/+/77381 Tested-by: build bot (Jenkins) <no-reply@coreboot.org> Reviewed-by: Yidi Lin <yidilin@google.com>
coreboot is a Free Software project aimed at replacing the proprietary firmware (BIOS/UEFI) found in most computers. coreboot performs the required hardware initialization to configure the system, then passes control to a different executable, referred to in coreboot as the payload. Most often, the primary function of the payload is to boot the operating system (OS).
With the separation of hardware initialization and later boot logic, coreboot is perfect for a wide variety of situations. It can be used for specialized applications that run directly in the firmware, running operating systems from flash, loading custom bootloaders, or implementing firmware standards, like PC BIOS services or UEFI. This flexibility allows coreboot systems to include only the features necessary in the target application, reducing the amount of code and flash space required.
All source code for coreboot is stored in git. It is downloaded with the command:
git clone https://review.coreboot.org/coreboot.git
.
Code reviews are done in the project's Gerrit instance.
The code may be browsed via coreboot's Gitiles instance.
The coreboot project also maintains a mirror of the project on github. This is read-only, as coreboot does not accept github pull requests, but allows browsing and downloading the coreboot source.
After the basic initialization of the hardware has been performed, any desired "payload" can be started by coreboot.
See https://doc.coreboot.org/payloads.html for a list of some of coreboot's supported payloads.
The coreboot project supports a wide range of architectures, chipsets, devices, and mainboards. While not all of these are documented, you can find some information in the Architecture-specific documentation or the SOC-specific documentation.
For details about the specific mainboard devices that coreboot supports, please consult the Mainboard-specific documentation or the Board Status pages.
Releases are currently done by coreboot every quarter. The release archives contain the entire coreboot codebase from the time of the release, along with any external submodules. The submodules containing binaries are separated from the general release archives. All of the packages required to build the coreboot toolchains are also kept at coreboot.org in case the websites change, or those specific packages become unavailable in the future.
All releases are available on the coreboot download page.
Please note that the coreboot releases are best considered as snapshots of the codebase, and do not currently guarantee any sort of extra stability.
The coreboot build, associated utilities and payloads require many additional tools and packages to build. The actual coreboot binary is typically built using a coreboot-controlled toolchain to provide reproducibility across various platforms. It is also possible, though not recommended, to make it directly with your system toolchain. Operating systems and distributions come with an unknown variety of system tools and utilities installed. Because of this, it isn't reasonable to list all the required packages to do a build, but the documentation lists the requirements for a few different Linux distributions.
To see the list of tools and libraries, along with a list of instructions to get started building coreboot, go to the Starting from scratch tutorial page.
That same page goes through how to use QEMU to boot the build and see the output.
Further details on the project, as well as links to documentation and more can be found on the coreboot website:
You can contact us directly on the coreboot mailing list:
https://doc.coreboot.org/community/forums.html
There are many files in the coreboot tree that we feel are not copyrightable due to a lack of creative content.
"In order to qualify for copyright protection in the United States, a work must satisfy the originality requirement, which has two parts. The work must have “at least a modicum” of creativity, and it must be the independent creation of its author."
https://guides.lib.umich.edu/copyrightbasics/copyrightability
Similar terms apply to other locations.
These uncopyrightable files include:
As non-creative content, these files are in the public domain by default. As such, the coreboot project excludes them from the project's general license even though they may be included in a final binary.
If there are questions or concerns about this policy, please get in touch with the coreboot project via the mailing list.
The copyright on coreboot is owned by quite a large number of individual developers and companies. A list of companies and individuals with known copyright claims is present at the top level of the coreboot source tree in the 'AUTHORS' file. Please check the git history of each of the source files for details.
Because of the way coreboot began, using a significant amount of source code from the Linux kernel, it's licensed the same way as the Linux Kernel, with GNU General Public License (GPL) Version 2. Individual files are licensed under various licenses, though all are compatible with GPLv2. The resulting coreboot image is licensed under the GPL, version 2. All source files should have an SPDX license identifier at the top for clarification.
Files under coreboot/Documentation/ are licensed under CC-BY 4.0 terms. As an exception, files under Documentation/ with a history older than 2017-05-24 might be under different licenses.
Files in the coreboot/src/commonlib/bsd directory are all licensed with the BSD-3-clause license. Many are also dual-licensed GPL-2.0-only or GPL-2.0-or-later. These files are intended to be shared with libpayload or other BSD licensed projects.
The libpayload project contained in coreboot/payloads/libpayload may be licensed as BSD or GPL, depending on the code pulled in during the build process. All GPL source code should be excluded unless the Kconfig option to include it is set.
Since 2017, coreboot has been a member of The Software Freedom Conservancy, a nonprofit organization devoted to ethical technology and driving initiatives to make technology more inclusive. The conservancy acts as coreboot's fiscal sponsor and legal advisor.