Skip to content

EBBR Notes 2022.01.17

Grant Likely edited this page Jan 17, 2022 · 1 revision

Attendees

  • Grant Likely (Arm)
  • Ilias Apalodimas (Linaro)
  • Bill Mills (Linaro)
  • Andreas Färber (SUSE)
  • Danial Thompson (Linaro)
  • Etienne Carriere (ST)
  • Heinrich Schuchardt (Canonical)
  • Jose Marinho (Arm)
  • Mark Brown (Arm)
  • Matthias Brugger (SUSE)
  • Ricardo Salveti (Foundries.io)
  • Ruchika Gupta (Linaro)
  • Sughos Ganu (Arm)

Agenda

  • UEFI Conformance Profiles table
  • A/B Update Presentation (Ilias & Jose)
  • Requirement to disable or remove command line when secure (Ilias)

Notes

UEFI Conformance Profiles

The UEFI spec has added an option for the firmware to report a UEFI Conformance Profile which indicates that firmware does not line up with the full minimum requirements listed in the UEFI spec, but rather implements an identified subset which an OS may need to know.

Reference link: https://bugzilla.tianocore.org/show_bug.cgi?id=3591

Concerns:

  • U-Boot isn't fully compliant with EBBR, and so cannot claim EBBR in the UEFI Conformance Profile table. In particular parts of HII aren't implemented, or aren't implemented correctly. Grant's not too concerned about this as either U-Boot has HII bugs which can be fixed. Having a bug doesn't invalidate EBBR compliance. Or, EBBR can be updated to drop the unnecessary parts of HII. In both cases, claiming compatibility should not be a problem.

  • Also concerned that the table isn't needed and OSes will not use it. Need feedback from OS vendors on whether or not this feature is useful.

Actions:

  • OS vendor reps are asked to provide opinion on whether or not the conformance profile table is valuable
  • Heinrich and Grant to look at HII requirements and tighten the scope if necessary
  • Grant to ping Samer on feedback about the conformance profile table

A/B Update Presentation

Ilias presented the Dependable Boot A/B update flow. (Slide link to be added here)

Clone this wiki locally