Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Gcc8 #1

Merged
merged 120 commits into from
Aug 10, 2018
Merged

Gcc8 #1

merged 120 commits into from
Aug 10, 2018

Commits on Mar 14, 2018

  1. Allow insecure boot mode to bypass kexec sig checks

    There was a bug in the "force" boot mode where it would still fail if
    signatures didn't match. This was because the check_config function
    validates the signatures for kexec files. I've added a few conditionals
    here so that in the case of a forced boot mode, we can bypass those
    signature checks that would prevent boot and error out to a recovery
    console.
    kylerankin committed Mar 14, 2018
    Configuration menu
    Copy the full SHA
    6657541 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    eaaa1da View commit details
    Browse the repository at this point in the history

Commits on Mar 26, 2018

  1. Update flashrom to 1.0

    kakaroto committed Mar 26, 2018
    Configuration menu
    Copy the full SHA
    02145a8 View commit details
    Browse the repository at this point in the history

Commits on Apr 2, 2018

  1. Configuration menu
    Copy the full SHA
    f60f054 View commit details
    Browse the repository at this point in the history

Commits on Apr 3, 2018

  1. Add GUI package update handler w/ checksum update function

    Part of the Heads workflow involves handling legitimate changes to /boot
    as part of the package manager. This is a challenging workflow to handle
    as package managers on many systems work in a completely unattended way
    (and some even reboot first, apply updates, and then reboot again).
    
    We need to be able to detect changes that are potentially caused by a
    package manager so to do that I've set up a trigger within the OS
    (currently just for Debian) that runs both before and after package
    updates. It verifies the signatures in /boot and if they fail before
    package updates it creates a log file in
    /boot/kexec_package_trigger_pre.txt. If they fail after package updates
    run /boot/kexec_package_trigger_post.txt is created. These files contain
    the following fields:
    
    CHANGED_FILES: A list of files in /boot that failed the sha256sum check
    UPDATE_INITRAMFS_PACKAGE: An (optional) list of packages known to
    trigger initramfs changes
    
    Following those fields is a list of log output from the last package
    manager run which contains its own formatted fields (I'm pulling from
    /var/lib/dpkg/info).
    
    When a user selects a boot option, gui-init first verifies the
    checksums just to catch errors before calling kexec-select-boot. If
    there are any errors it looks for these package logs and if they exist,
    it displays appropriate warnings. If the files are absent it displays a
    more generic warning. The user is also given an opportunity to re-sign
    the /boot hashes.
    kylerankin committed Apr 3, 2018
    Configuration menu
    Copy the full SHA
    887c790 View commit details
    Browse the repository at this point in the history
  2. Librem13v2: Enable IOMMU and Pass-through mode

    By enabling Pass-through iommu, it fixes the GPU glitching issues
    we've had with IOMMU, and it also allows us to boot a target kernel
    without having to give it intel_iommu=igfx_off as argument.
    kakaroto committed Apr 3, 2018
    Configuration menu
    Copy the full SHA
    1fc114b View commit details
    Browse the repository at this point in the history
  3. Librem13v2: Update to 4.7-Purism-4

    Fixes access to the EC through the Index I/O interface
    Fixes AC and DC LoadLine values to avoid overheating problems
    Fix Turbo mode value from EC
    Change version name to have '-heads' suffix
    kakaroto committed Apr 3, 2018
    Configuration menu
    Copy the full SHA
    16d9c40 View commit details
    Browse the repository at this point in the history

Commits on Apr 4, 2018

  1. Add a gui menu for changed boot entries

    Currently when the boot entries change, kexec-select-boot dies. Given
    the normal loop is set up to catch this event and display a regular boot
    menu at the next iteration of the loop, instead of dying it would be
    better to just warn and then return from that function back into the
    main loop. In addition to that I added a GUI menu for the same warning
    when in GUI mode.
    kylerankin committed Apr 4, 2018
    Configuration menu
    Copy the full SHA
    5434e0b View commit details
    Browse the repository at this point in the history
  2. Fix tab on return line

    kylerankin committed Apr 4, 2018
    Configuration menu
    Copy the full SHA
    d1e6dcb View commit details
    Browse the repository at this point in the history

Commits on Apr 10, 2018

  1. Configuration menu
    Copy the full SHA
    23e0dc8 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    b887104 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    c7bbe70 View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    d14b0f5 View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    0eff991 View commit details
    Browse the repository at this point in the history

Commits on Apr 11, 2018

  1. Add red background to boot console for insecure "force" boot

    In the event a user does pick the insecure "force" boot option that
    bypasses checksum and signing checks in Heads, it would be nice to
    provide a clear visual warning during the boot process that they are in
    this state. This change will add a kernel argument that changes the boot
    console background to be red and removes any boot splash that might
    obscure it, in the event the user picks the insecure boot mode.
    
    Since a user should only boot into this mode during emergencies, having
    it be apparent that it's an unsafe mode helps ensure the user doesn't
    pick this boot option needlessly.
    kylerankin committed Apr 11, 2018
    Configuration menu
    Copy the full SHA
    c99d5a8 View commit details
    Browse the repository at this point in the history

Commits on Apr 18, 2018

  1. Configuration menu
    Copy the full SHA
    4fe148a View commit details
    Browse the repository at this point in the history

Commits on Apr 19, 2018

  1. Configuration menu
    Copy the full SHA
    19ef20e View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    ee9bb29 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    a91be6b View commit details
    Browse the repository at this point in the history

Commits on Apr 20, 2018

  1. Configuration menu
    Copy the full SHA
    7dee390 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    acf16c7 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    37feebd View commit details
    Browse the repository at this point in the history
  4. Add all supported network modules to network-init-recovery

    also fix verbiage in comments
    flammit committed Apr 20, 2018
    Configuration menu
    Copy the full SHA
    d0294b1 View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    e0c1ab2 View commit details
    Browse the repository at this point in the history
  6. Configuration menu
    Copy the full SHA
    8b1d194 View commit details
    Browse the repository at this point in the history
  7. Drop unnecessary flashtools.patch

    Also added convenience call to import keys and removed credentials
    flammit committed Apr 20, 2018
    Configuration menu
    Copy the full SHA
    8644a36 View commit details
    Browse the repository at this point in the history
  8. Skip boot choice confirmation in "force" mode

    When a user gets confirmation of their boot menu choice, that's largely
    to give them the option of making their boot choice the default. In the
    case of "force mode" there's no reason for the user to be presented with
    that dialog so this change skips right ahead to the boot once they have
    kylerankin committed Apr 20, 2018
    Configuration menu
    Copy the full SHA
    a308bc9 View commit details
    Browse the repository at this point in the history
  9. Add "heads/" prefix to all Heads-related cbfs files

    Needed to identify which files should be preserved between upgrades
    such as "heads/initrd/*" or "heads/counter"
    flammit committed Apr 20, 2018
    Configuration menu
    Copy the full SHA
    48ca75a View commit details
    Browse the repository at this point in the history

Commits on Apr 22, 2018

  1. Configuration menu
    Copy the full SHA
    1cbae3c View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    789c2db View commit details
    Browse the repository at this point in the history

Commits on Apr 24, 2018

  1. Configuration menu
    Copy the full SHA
    28256ca View commit details
    Browse the repository at this point in the history

Commits on Apr 25, 2018

  1. Colorize warning and error messages in fbwhiptail

    Since fbwhiptail allows us to customize the background colors, we should
    colorize warnings and error messages to provide a user with an
    additional subtle cue that there might be a problem. I have added two
    additional configuration options:
    
    CONFIG_WARNING_BG_COLOR
    CONFIG_ERROR_BG_COLOR
    
    and in the librem13v2.config file you can see an example for how to set
    them to be yellow and red gradients, respectively. I've also updated the
    main two scripts that use whiptail to include those background colors.
    
    If you decide to use regular whiptail, just don't set these config
    options and it should behave as expected.
    kylerankin committed Apr 25, 2018
    Configuration menu
    Copy the full SHA
    22a8d6f View commit details
    Browse the repository at this point in the history

Commits on Apr 29, 2018

  1. FB Whiptail: coreboot FB without text support, linux with i915 suppor…

    …t. Still flickering when Xen owns FB.
    tlaurion committed Apr 29, 2018
    Configuration menu
    Copy the full SHA
    1a7dff3 View commit details
    Browse the repository at this point in the history
  2. Fix u-root parallel build

    vejmarie committed Apr 29, 2018
    Configuration menu
    Copy the full SHA
    a90858c View commit details
    Browse the repository at this point in the history

Commits on Apr 30, 2018

  1. Configuration menu
    Copy the full SHA
    f34e43a View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    c0f3a4b View commit details
    Browse the repository at this point in the history
  3. Enhance parallel build

    vejmarie committed Apr 30, 2018
    Configuration menu
    Copy the full SHA
    4c8e97e View commit details
    Browse the repository at this point in the history
  4. Fix uinit setup

    vejmarie committed Apr 30, 2018
    Configuration menu
    Copy the full SHA
    6104c5b View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    cbbcbcd View commit details
    Browse the repository at this point in the history
  6. Configuration menu
    Copy the full SHA
    463f91c View commit details
    Browse the repository at this point in the history
  7. Configuration menu
    Copy the full SHA
    eedf5a3 View commit details
    Browse the repository at this point in the history
  8. Configuration menu
    Copy the full SHA
    7372595 View commit details
    Browse the repository at this point in the history
  9. Configuration menu
    Copy the full SHA
    05a36ce View commit details
    Browse the repository at this point in the history
  10. Configuration menu
    Copy the full SHA
    cd23257 View commit details
    Browse the repository at this point in the history
  11. Configuration menu
    Copy the full SHA
    1a04226 View commit details
    Browse the repository at this point in the history
  12. Configuration menu
    Copy the full SHA
    03a0e39 View commit details
    Browse the repository at this point in the history
  13. Configuration menu
    Copy the full SHA
    ca5a7e0 View commit details
    Browse the repository at this point in the history
  14. Configuration menu
    Copy the full SHA
    8108e41 View commit details
    Browse the repository at this point in the history

Commits on May 1, 2018

  1. Wrap whiptail text that's over 80 characters

    While the whiptail program wraps text appropriately based on column
    size, the fbwhiptail program doesn't, leading to text that scrolls off
    the window where it can no longer be read. This change wraps the longer
    text output so it all fits.
    kylerankin committed May 1, 2018
    Configuration menu
    Copy the full SHA
    f26a14c View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    480b01c View commit details
    Browse the repository at this point in the history
  3. Extend whiptail window to 90 columns wide

    Wrapping text to 80 characters works but due to font size and padding
    the maximum 80 character lines start to get truncated. Extending the
    window to 90 characters will resolve this.
    kylerankin committed May 1, 2018
    Configuration menu
    Copy the full SHA
    745d843 View commit details
    Browse the repository at this point in the history

Commits on May 2, 2018

  1. Configuration menu
    Copy the full SHA
    a772b27 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    589e67d View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    022ca81 View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    e5740c6 View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    a1eae91 View commit details
    Browse the repository at this point in the history
  6. Configuration menu
    Copy the full SHA
    3dc4672 View commit details
    Browse the repository at this point in the history
  7. Configuration menu
    Copy the full SHA
    17bcc68 View commit details
    Browse the repository at this point in the history
  8. Configuration menu
    Copy the full SHA
    f70fabd View commit details
    Browse the repository at this point in the history

Commits on May 3, 2018

  1. Configuration menu
    Copy the full SHA
    4fdbe88 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    2b79f00 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    3d6eeb6 View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    0b644b1 View commit details
    Browse the repository at this point in the history

Commits on May 4, 2018

  1. Configuration menu
    Copy the full SHA
    7f8cec0 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    8bea99f View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    958c26e View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    492b94a View commit details
    Browse the repository at this point in the history

Commits on May 5, 2018

  1. Configuration menu
    Copy the full SHA
    7b57db9 View commit details
    Browse the repository at this point in the history

Commits on May 6, 2018

  1. Add back flashrom support for KGPE-D16

    Also fix up flashrom-x230.sh command only read bios area
    flammit committed May 6, 2018
    Configuration menu
    Copy the full SHA
    bb0e13c View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    a61d565 View commit details
    Browse the repository at this point in the history

Commits on May 7, 2018

  1. Configuration menu
    Copy the full SHA
    11cb444 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    2ab9062 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    9c95b4e View commit details
    Browse the repository at this point in the history
  4. Merge branch 'master' of https://github.com/osresearch/heads into X23…

    …0-CCACHE-GUI_INIT-LINUX_I915FB-COREBOOT_NO_TEXTBUFFER
    tlaurion committed May 7, 2018
    Configuration menu
    Copy the full SHA
    2ede0b3 View commit details
    Browse the repository at this point in the history
  5. x230-flash depends on independent and minimal linux-x230-flash.config…

    …. ash_history content replaced with usefull commands. Everything is there to generate keys from Yubikey/Nitrokey, export armored versions to external media and cbfs them into reproducible rom and flash resulting rom with flashrom-x230.sh.
    tlaurion committed May 7, 2018
    Configuration menu
    Copy the full SHA
    3d23cad View commit details
    Browse the repository at this point in the history
  6. Configuration menu
    Copy the full SHA
    fbcedd7 View commit details
    Browse the repository at this point in the history
  7. Configuration menu
    Copy the full SHA
    93e77c3 View commit details
    Browse the repository at this point in the history
  8. Configuration menu
    Copy the full SHA
    b0ca83d View commit details
    Browse the repository at this point in the history

Commits on May 9, 2018

  1. Make TPM counter label a variable

    Currently the TPM counter label is hard-coded. By changing it to a
    variable in this function we can reuse all of the TPM counter functions
    to create other monotonic counters in the TPM (if the hardware supports
    it) with custom labels.
    kylerankin committed May 9, 2018
    Configuration menu
    Copy the full SHA
    ec2d7df View commit details
    Browse the repository at this point in the history
  2. Fix tabbing

    kylerankin committed May 9, 2018
    Configuration menu
    Copy the full SHA
    fc72daa View commit details
    Browse the repository at this point in the history

Commits on May 11, 2018

  1. Add generic flash script

    Based on the conversation for PR linuxboot#406, we decided to go with a more
    generic script for general-purpose flashing instead of having individual
    (and therefore very similar) flash scripts for each board type. This
    script currently handles flashrom on Librem and X230 board types and
    introduces a new CONFIG_BOARD option that sets specific flashrom
    arguments based on the board.
    
    It also adds support to gui-init to call this flash script.
    kylerankin committed May 11, 2018
    Configuration menu
    Copy the full SHA
    45ae20f View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    89b008a View commit details
    Browse the repository at this point in the history
  3. Split flash GUI into separate script

    To keep the flash logic simpler the GUI logic has been split into a
    flash-gui.sh program so flash.sh behaves closer to the original flashrom
    scripts it was based from. I've also removed the previous flashrom
    scripts and incorporated their options into flash.sh. Finally I set
    CONFIG_BOARD via the Makefile instead of setting a duplicate option in
    each board's config.
    kylerankin committed May 11, 2018
    Configuration menu
    Copy the full SHA
    3c88bc5 View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    b276e35 View commit details
    Browse the repository at this point in the history

Commits on May 12, 2018

  1. qemu-coreboot: Add modules libata, libahci and ahci to initrd

    To be able to boot a disk image, passed to QEMU with `-hda
    /path/qemu.img`, the appropriate modules are needed. Strange, `libata`
    is not enough, and the drive is only detected, when the module `ahci` is
    loaded.
    
    > ata1.00: ATA-7: QEMU HARDDISK, 2.5+, max UDMA/100
    
    Tested with QEMU emulator version 2.11.1(Debian 1:2.11+dfsg-1ubuntu7)
    with the command below,
    
        qemu-system-x86_64 -enable-kvm -M q35 -m 1G -bios \
        qemu-coreboot/coreboot.rom -serial stdio -L /dev/shm -hda \
        /dev/shm/qemu-debian.img
    
    where `qemu-debian.img` is created with grml-debootstrap.
    
        grml-debootstrap --vmfile --vmsize 3G --target \
        /dev/shm/qemu-debian.img -r sid
    paulmenzel committed May 12, 2018
    Configuration menu
    Copy the full SHA
    1585f59 View commit details
    Browse the repository at this point in the history

Commits on May 15, 2018

  1. Add read mode to flash.sh

    If we want to modify a running BIOS we will need the ability to pull
    down the current BIOS, modify it, and then reflash. This change adds a
    read option to flash.sh and pulls down three versions of the BIOS and
    only exists successfully if all three match.
    kylerankin committed May 15, 2018
    Configuration menu
    Copy the full SHA
    a9bf4eb View commit details
    Browse the repository at this point in the history

Commits on May 17, 2018

  1. Add BIOS ROM editing features to flash GUI

    In addition to being able to flash a ROM from the GUI, it would also be
    useful for a user to be able to add a GPG key to their keyring using the
    flashing tool. This change adds the ability for a user to edit both a
    ROM located on a USB key and also edit the running BIOS by using
    flashrom to make a local copy of the running BIOS, edit it, then reflash
    it. This also supports the upcoming delete feature in CBFS for
    circumstances where keyring files already exist within CBFS.
    kylerankin committed May 17, 2018
    Configuration menu
    Copy the full SHA
    258420d View commit details
    Browse the repository at this point in the history

Commits on May 18, 2018

  1. Configuration menu
    Copy the full SHA
    c1be56c View commit details
    Browse the repository at this point in the history
  2. boards/qemu-coreboot: Set boot device to /dev/sda1

    QEMU emulated drive is detected as `/dev/sda1`. Set it up as the boot
    device.
    
    Use the same value as in for `qemu-linuxboot.config`.
    paulmenzel committed May 18, 2018
    Configuration menu
    Copy the full SHA
    c5665b7 View commit details
    Browse the repository at this point in the history
  3. boards/qemu-coreboot: Set /dev/sdb1 as USB boot device

    QEMU’s USB device is detected as `/dev/sdb1`.
    paulmenzel committed May 18, 2018
    Configuration menu
    Copy the full SHA
    2839364 View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    191ef56 View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    eda2525 View commit details
    Browse the repository at this point in the history
  6. Configuration menu
    Copy the full SHA
    33e9dda View commit details
    Browse the repository at this point in the history
  7. Configuration menu
    Copy the full SHA
    6d9b0a7 View commit details
    Browse the repository at this point in the history
  8. Configuration menu
    Copy the full SHA
    cfa6c3a View commit details
    Browse the repository at this point in the history

Commits on May 19, 2018

  1. Add additional kernel command line options for ISO boot

    Allows Qubes/Ubuntu/Fedora ISO media to be used by default
    without a custom kexec_iso_add.txt config
    flammit committed May 19, 2018
    Configuration menu
    Copy the full SHA
    736538a View commit details
    Browse the repository at this point in the history

Commits on May 23, 2018

  1. Add VBT file to coreboot image.

    Adding the VBT file makes it available through some ACPI memory area
    and apparently the VBT contains the information needed by the i915 driver
    in order to figure out how to control the screen's backlight.
    Without the VBT, we can't control the screen backlight with Fn-F5/Fn-F6
    anymore.
    kakaroto committed May 23, 2018
    Configuration menu
    Copy the full SHA
    4b34cca View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    8dc2f86 View commit details
    Browse the repository at this point in the history

Commits on May 28, 2018

  1. Configuration menu
    Copy the full SHA
    8d50b6a View commit details
    Browse the repository at this point in the history

Commits on May 29, 2018

  1. Configuration menu
    Copy the full SHA
    29f0f91 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    2c44800 View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    c7bad87 View commit details
    Browse the repository at this point in the history

Commits on Jun 1, 2018

  1. Configuration menu
    Copy the full SHA
    d88cc4f View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    4b264fb View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    1d36654 View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    584c070 View commit details
    Browse the repository at this point in the history

Commits on Jun 7, 2018

  1. Configuration menu
    Copy the full SHA
    85eebd0 View commit details
    Browse the repository at this point in the history

Commits on Jul 17, 2018

  1. Configuration menu
    Copy the full SHA
    22b1241 View commit details
    Browse the repository at this point in the history

Commits on Jul 18, 2018

  1. Configuration menu
    Copy the full SHA
    770c696 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    6170b4c View commit details
    Browse the repository at this point in the history
  3. Configuration menu
    Copy the full SHA
    1d2dfd4 View commit details
    Browse the repository at this point in the history

Commits on Jul 25, 2018

  1. Start updating to coreboot 4.8.1

    missing librem patches
    flammit authored and kakaroto committed Jul 25, 2018
    Configuration menu
    Copy the full SHA
    342fa49 View commit details
    Browse the repository at this point in the history
  2. Update patches for librem boards

    flammit authored and kakaroto committed Jul 25, 2018
    Configuration menu
    Copy the full SHA
    020b96d View commit details
    Browse the repository at this point in the history
  3. Remove duplicate measurements on librem components

    also fix indentation issues
    flammit authored and kakaroto committed Jul 25, 2018
    Configuration menu
    Copy the full SHA
    43c40fd View commit details
    Browse the repository at this point in the history
  4. Configuration menu
    Copy the full SHA
    c2f6881 View commit details
    Browse the repository at this point in the history
  5. blobs/librem_skl: Update URLs and add ME rar check

    Purism coreboot-files repo moves from code.puri.sm to source.puri.sm
    and the ME rar file moved from a mediafire to a mega.nz file which
    doesn't allow us to get a direct link to the file, so we need to
    tell the user about it and ask them to download the file manually.
    kakaroto committed Jul 25, 2018
    Configuration menu
    Copy the full SHA
    0a052af View commit details
    Browse the repository at this point in the history

Commits on Jul 26, 2018

  1. Configuration menu
    Copy the full SHA
    e446ced View commit details
    Browse the repository at this point in the history

Commits on Jul 28, 2018

  1. Add patches to update coreboot crossgcc to v1.52

    crossgcc is now using gcc 8.1.0 which will compile without issues
    if your host system has gcc 8.x
    This is required if we are to build on a new system (such as latest Fedora)
    kakaroto committed Jul 28, 2018
    Configuration menu
    Copy the full SHA
    5aa8369 View commit details
    Browse the repository at this point in the history
  2. Add Purism patches for coreboot 4.8.1 to bring it to 4.8.1-Purism-2

    These patches add RMRR fixes to the DMAR which alows GPU iommu without
    glitching.
    
    This also updates the config to show the new proper local version
    and enables the option to clean the ME
    kakaroto committed Jul 28, 2018
    Configuration menu
    Copy the full SHA
    bef618e View commit details
    Browse the repository at this point in the history
  3. Update fbwhiptail URL

    kakaroto committed Jul 28, 2018
    Configuration menu
    Copy the full SHA
    b13cc5e View commit details
    Browse the repository at this point in the history