diff --git a/docs/unified/protectli/building-manual.md b/docs/unified/protectli/building-manual.md new file mode 100644 index 0000000000..3bcef0f55a --- /dev/null +++ b/docs/unified/protectli/building-manual.md @@ -0,0 +1,373 @@ +# Building manual + +=== "fw6" + + ## Requirements + + - Docker + + follow [Install Docker Engine on Ubuntu](https://docs.docker.com/engine/install/ubuntu/) + + follow [Post-installation steps for Linux](https://docs.docker.com/engine/install/linux-postinstall/) + - Git + + `sudo apt-get install git` + + ## Building + + To build Dasharo firmware image, follow the steps below: + + 1. Clone the coreboot repository: + + ```bash + git clone https://github.com/Dasharo/coreboot.git -b protectli_vault_kbl/release + ``` + + To build a specific version replace `protectli_vault_kbl/release` to + `protectli_vault_kbl_v1.0.x` where `x` is the version number. + + 2. Start build process (note it requires certain blobs to proceed): + + ```bash + cd coreboot + git submodule update --init --checkout + # you will need to obtain the ZIP with blobs at this point + unzip protectli_blobs.zip -d 3rdparty/blobs/mainboard + ./build.sh fw6 + ``` + +=== "v1x1x" + + ## Intro + + This document describes the procedure for compiling coreboot for Protectli + V1210, V1410 and V1610. + + ## Requirements + + - Docker + + follow [Install Docker Engine on Ubuntu](https://docs.docker.com/engine/install/ubuntu/) + + follow [Post-installation steps for Linux](https://docs.docker.com/engine/install/linux-postinstall/) + - Git + + ## Build Dasharo BIOS firmware + + > This build procedure produces full firmware binary including blobs such as + > FSP, and ME. Currently, access to them is restricted to the OEM (Protectli) via + > a private repository. + + 1. Clone the coreboot repository: + + ```bash + git clone https://github.com/Dasharo/coreboot + ``` + + 2. Checkout the desired version, e.g. `v0.9.2`: + + ```bash + cd coreboot + git checkout protectli_vault_jsl_v0.9.2 + ``` + + 3. Checkout submodules: + + ```bash + git submodule update --init --checkout + ``` + + 4. Obtain the Protectli blobs package (only for versions v0.9.0 and v0.9.1): + + > Replace `` with a a proper path to the repository + > in a form of: `git@repo-path.git`. You should checkout to the same tag as + > in case of the coreboot repository. + + ```bash + cd 3rdparty/blobs/mainboard/ + git init + git remote add origin + git fetch origin && git checkout protectli_vault_jsl_v0.9.0 + cd - + ``` + + 5. Build the firmware: + + + for V1210 + + ```bash + ./build.sh V1210 + ``` + + + for V1410 + + ```bash + ./build.sh V1410 + ``` + + + for V1610 + + ```bash + ./build.sh V1610 + ``` + + The resulting coreboot image will be placed in the coreboot directory as + `protectli_V1210.rom`, `protectli_V1410.rom` or `protectli_V1610.rom` + respectvely. + +=== "vp46xx" + + ## Intro + + This document describes the procedure for compiling coreboot for Protectli + VP4630, VP4650 and VP4670. + + ## Requirements + + - Docker + + follow [Install Docker Engine on Ubuntu](https://docs.docker.com/engine/install/ubuntu/) + + follow [Post-installation steps for Linux](https://docs.docker.com/engine/install/linux-postinstall/) + - Git + + ## Build Dasharo BIOS firmware + + > This build procedure produces full firmware binary including blobs such as + > FSP, and ME. Currently, access to them is restricted to the OEM (Protectli) via + > a private repository. + + Since version v1.0.18 VP4630 and VP4650 use different configuration file than + VP4670. Versions v1.0.17 and older do not support VP4650 and VP4670 at all. + + Versions v1.1.1 and newer support all variants with a single binary. + + 1. Clone the coreboot repository: + + ```bash + git clone https://github.com/Dasharo/coreboot + ``` + + 2. Checkout the desired version, e.g. `v1.1.0`: + + ```bash + cd coreboot + git checkout protectli_vault_cml_v1.1.0 + ``` + + 3. Checkout submodules: + + ```bash + git submodule update --init --checkout + ``` + + 4. Obtain the Protectli blobs package (only for version v1.1.0 and older): + + > Replace `` with a a proper path to the repository + > in a form of: `git@repo-path.git`. You should checkout to the same tag as + > in case of the coreboot repository. + + ```bash + cd 3rdparty/blobs/mainboard/ + git init + git remote add origin + git fetch origin && git checkout protectli_vault_cml_v1.1.0 + cd - + ``` + + 5. Build the firmware: + + === "v1.1.1 or newer" + + ```bash + ./build.sh vp46xx + ``` + + The resulting coreboot image will be placed in the coreboot directory as + `protectli_vault_cml__vp46xx.rom`. + + === "V1.1.0 or older" + + === "VP4630 and VP4650" + + ```bash + ./build.sh vp4630_vp4650 + ``` + + The resulting coreboot image will be placed in the coreboot + directory as `protectli_vault_cml__vp4630_vp4650.rom`. + + === "VP4670" + + ```bash + ./build.sh vp4670 + ``` + + The resulting coreboot image will be placed in the coreboot + directory as `protectli_vault_cml__vp4670.rom`. + +=== "vp66xx" + + ## Intro + + This document describes the procedure for compiling coreboot for Protectli + VP6630/VP6650/VP6670. + + ## Requirements + + - Docker + + follow [Install Docker Engine on Ubuntu](https://docs.docker.com/engine/install/ubuntu/) + + follow [Post-installation steps for Linux](https://docs.docker.com/engine/install/linux-postinstall/) + - Git + + ## Build Dasharo BIOS firmware + + > This build procedure produces full firmware binary including blobs such as + > FSP, and ME. Currently, access to them is restricted to the OEM (Protectli) via + > a private repository. + + 1. Clone the coreboot repository: + + ```bash + git clone https://github.com/Dasharo/coreboot + ``` + + 2. Checkout the desired version, e.g. `v0.9.0`: + + ```bash + cd coreboot + git checkout protectli_vault_adl_v0.9.0 + ``` + + 3. Checkout submodules: + + ```bash + git submodule update --init --checkout + ``` + + 4. Build the firmware: + + ```bash + ./build.sh vp66xx + ``` + + The resulting coreboot image will be placed in the coreboot directory as + `protectli_vp66xx.rom`. + +=== "vp2410" + + ## Intro + + This document describes the procedure for compiling coreboot for Protectli + VP2410. + + ## Requirements + + - Docker + + follow [Install Docker Engine on Ubuntu](https://docs.docker.com/engine/install/ubuntu/) + + follow [Post-installation steps for Linux](https://docs.docker.com/engine/install/linux-postinstall/) + - Git + + ## Build Dasharo BIOS firmware + + > This build procedure produces full firmware binary including blobs such as + > FSP, and ME. Currently, access to them is restricted to the OEM (Protectli) via + > a private repository. + + 1. Clone the coreboot repository: + + ```bash + git clone https://github.com/Dasharo/coreboot + ``` + + 1. Checkout the desired version, e.g. `v1.0.15`: + + ```bash + cd coreboot + git checkout protectli_vault_glk_v1.0.15 + ``` + + 1. Checkout submodules: + + ```bash + git submodule update --init --checkout + ``` + + 1. Obtain the Protectli blobs package (only for v1.0.15 or older): + + > Replace `` with a a proper path to the repository + > in a form of: `git@repo-path.git`. You should checkout to the same tag as + > in case of the coreboot repository. + + ```bash + cd 3rdparty/blobs/mainboard/ + git init + git remote add origin + git fetch origin && git checkout protectli_vault_glk_v1.0.15 + cd - + ln -s ../blobs/mainboard/protectli/vault_glk/GeminilakeFspBinPkg/ 3rdparty/fsp/GeminilakeFspBinPkg + ``` + + 1. Build the firmware: + + ```bash + ./build.sh vp2410 + ``` + + The resulting coreboot image will be placed in the coreboot directory as + `protectli_vp2410_.rom`. + +=== "vp2420" + + ## Intro + + This document describes the procedure for compiling coreboot for Protectli + VP2420. + + ## Requirements + + - Docker + + follow [Install Docker Engine on Ubuntu](https://docs.docker.com/engine/install/ubuntu/) + + follow [Post-installation steps for Linux](https://docs.docker.com/engine/install/linux-postinstall/) + - Git + + ## Build Dasharo BIOS firmware + + > This build procedure produces full firmware binary including blobs such as + > FSP, and ME. Currently, access to them is restricted to the OEM (Protectli) via + > a private repository. + + 1. Clone the coreboot repository: + + ```bash + git clone https://github.com/Dasharo/coreboot + ``` + + 1. Checkout the desired version, e.g. `v1.1.0`: + + ```bash + cd coreboot + git checkout protectli_vault_ehl_v1.1.0 + ``` + + 1. Checkout submodules: + + ```bash + git submodule update --init --checkout + ``` + + 1. Obtain the Protectli blobs package (only v1.1.0 or older): + + > Replace `` with a a proper path to the repository + > in a form of: `git@repo-path.git`. You should checkout to the same tag as + > in case of the coreboot repository. + + ```bash + cd 3rdparty/blobs/mainboard/ + git init + git remote add origin + git fetch origin && git checkout protectli_vault_ehl_v1.1.0 + cd - + ``` + + 1. Build the firmware: + + ```bash + ./build.sh vp2420 + ``` + + The resulting coreboot image will be placed in the coreboot directory as + `protectli_vp2420_.rom`. diff --git a/docs/unified/protectli/firmware-update.md b/docs/unified/protectli/firmware-update.md new file mode 100644 index 0000000000..0c252358fc --- /dev/null +++ b/docs/unified/protectli/firmware-update.md @@ -0,0 +1,223 @@ +# Firmware update + +The following documentation describes the process of Dasharo open-source +firmware update. If your device is currently flashed with the proprietary +firmware please refer to the [Initial deployment](initial-deployment.md) +documentation. + +The update process may be different, depending on the currently installed +Dasharo firmware version. + +For simplicity of the update process, we recommend using +[Dasharo Tools Suite](../../dasharo-tools-suite/overview.md). + +=== "v1x1x" + + Before starting the update procedure be sure to disable Secure Boot: + + 1. Power on the device. + 2. While the device is booting, hold the `DELETE` key to enter the UEFI Setup + Menu. + 3. Enter the `Device Manager` menu. + 4. Enter the [Secure Boot Configuration](../../dasharo-menu-docs/device-manager.md#secure-boot-configuration) + submenu. + 5. Verify that the `Current Secure Boot State` field says Disabled - if not, + unselect the `Attempt Secure Boot` option below then press `F10` to save + the changes. + 6. Reboot the device to properly apply the changes. + + The settings of all the above options can be restored after a firmware + update. + + ## Updating Dasharo + + ```bash + flashrom -p internal -w protectli__v.rom --fmap -i COREBOOT + ``` + +=== "vp46xx" + + Before starting the update procedure be sure to disable Dasharo BIOS Boot + medium lock and Secure Boot: + + 1. Power on the device. + 2. While the device is booting, hold the `DELETE` key to enter the UEFI Setup + Menu. + 3. Enter the `Dasharo System Features` menu using the arrow keys and Enter. + 4. Enter the [Dasharo Security Options](https://docs.dasharo.com/dasharo-menu-docs/dasharo-system-features/#dasharo-security-options) + submenu. + 5. Verify the state of the `Lock the BIOS boot medium` option - if the option + is chosen, press `Space` and then `F10` to save the changes. + 6. Go back to the main menu using the `ESC` key. + 7. Enter the `Device Manager` menu. + 8. Enter the [Secure Boot Configuration](https://docs.dasharo.com/dasharo-menu-docs/device-manager/#secure-boot-configuration) + submenu. + 9. Verify that the `Current Secure Boot State` field says Disabled - if not, + unselect the `Attempt Secure Boot` option below then press `F10` to save + the changes. + 10. Reboot the device to properly apply the changes. + + The settings of all the above options can be restored after a firmware + update. + + ## Updating to Dasharo v1.2.0 + + Due to the major changes, such as ME update, and firmware layout adjustments + (to store the boot logo), flashing of the whole firmware is required: + + ```shell + flashrom -p internal -w protectli_vp46xx_v1.2.0.rom + ``` + + ## Updating to Dasharo v1.0.18 or v1.0.19 or v1.1.0 + + From v1.0.18 Dasharo firmware is rebased on the more up-to-date revision of + coreboot. + + If the current version of the firmware on the device is older than v1.0.18 or + you are migrating from proprietary firmware the whole flash chip should be + flashed as described in [Initial Deployment](initial-deployment.md). + + If the current version of the firmware on the device is v1.0.18 and it should + be updated to v1.0.19 or v1.1.0, only the `WP_RO` and `RW_SECTION_A` + should be flashed. To do this the following command should be used: + + ```bash + flashrom -p internal -w protectli_vault_cml_v1.0.19.rom --fmap -i WP_RO -i RW_SECTION_A + ``` + + ## Updating on Dasharo v1.0.16 or v1.0.17 + + Only the `RW_SECTION_A` partition of the flash needs to be updated. Flash it + using the following command: + + ```bash + flashrom -p internal -w protectli_vault_cml_v1.0.16.rom --fmap -i RW_SECTION_A + ``` + + This command also preserves Dasharo UEFI settings and the boot order. + + ## Updating on older Dasharo versions + + In this case, the whole `bios` region must be updated. + + ```bash + flashrom -p internal -w protectli_vault_cml_v1.0.13.rom --ifd -i bios + ``` + +=== "vp66xx" + + Before starting the update procedure be sure to disable Secure Boot: + + 1. Power on the device. + 2. While the device is booting, hold the `DELETE` key to enter the UEFI Setup + Menu. + 3. Enter the `Device Manager` menu. + 4. Enter the [Secure Boot Configuration](../../dasharo-menu-docs/device-manager.md#secure-boot-configuration) + submenu. + 5. Verify that the `Current Secure Boot State` field says Disabled - if not, + unselect the `Attempt Secure Boot` option below then press `F10` to save + the changes. + 6. Reboot the device to properly apply the changes. + + The settings of all the above options can be restored after a firmware + update. + + ## Updating Dasharo + + ```bash + flashrom -p internal -w protectli_vp66xx_v.rom --fmap -i RW_SECTION_A + ``` + +=== "vp2410" + + Before starting the update procedure be sure to disable Dasharo BIOS Boot + medium lock, SMM BIOS Write Protection and Secure boot: + + 1. Power on the device. + 2. While the device is booting, hold the `DELETE` key to enter the UEFI Setup + Menu. + 3. Enter the `Dasharo System Features` menu using the arrow keys and Enter. + 4. Enter the [Dasharo Security Options](https://docs.dasharo.com/dasharo-menu-docs/dasharo-system-features/#dasharo-security-options) + submenu. + 5. Verify the state of the `Lock the BIOS boot medium` and + `Enable SMM BIOS write protection` options - if any of those are set, + press `Space` to unselect them and then `F10` to save the changes. + 6. Go back to the main menu using the `ESC` key. + 7. Enter the `Device Manager` menu. + 8. Enter the [Secure Boot Configuration](https://docs.dasharo.com/dasharo-menu-docs/device-manager/#secure-boot-configuration) + submenu. + 9. Verify that the `Current Secure Boot State` field says Disabled - if not, + unselect the `Attempt Secure Boot` option below then press `F10` to save + the changes. + 10. Reboot the device to properly apply the changes. + + The settings of all the above options can be restored after a firmware + update. + + ## Updating minor versions v1.x.y (e.g. from v1.0.x to v1.1.0) + + Full binary should be flashed: + + ```bash + flashrom -p internal -w [path] + ``` + + ## Updating patch version v1.0.x/v1.1.x + + Only the `COREBOOT` and `IFWI` partition of the flash needs to be updated. + Flash it using the following command: + + ```bash + flashrom -p internal -w [path] --fmap -i COREBOOT -i IFWI + ``` + + This command also preserves Dasharo UEFI settings and the boot order. + +=== "vp2420" + + Before starting the update procedure be sure to disable Dasharo BIOS + Boot medium lock, SMM BIOS Write Protection and Secure boot: + + 1. Power on the device. + 2. While the device is booting, hold the `DELETE` key to enter the UEFI Setup + Menu. + 3. Enter the `Dasharo System Features` menu using the arrow keys and Enter. + 4. Enter the [Dasharo Security Options](https://docs.dasharo.com/dasharo-menu-docs/dasharo-system-features/#dasharo-security-options) + submenu. + 5. Verify the state of the `Lock the BIOS boot medium` and + `Enable SMM BIOS write protection` options - if any of those are set, + press `Space` to unselect them and then `F10` to save the changes. + 6. Go back to the main menu using the `ESC` key. + 7. Enter the `Device Manager` menu. + 8. Enter the [Secure Boot Configuration](https://docs.dasharo.com/dasharo-menu-docs/device-manager/#secure-boot-configuration) + submenu. + 9. Verify that the `Current Secure Boot State` field says Disabled - if not, + unselect the `Attempt Secure Boot` option below then press `F10` to + save the changes. + 10. Reboot the device to properly apply the changes. + + The settings of all the above options can be restored after a firmware + update. + + ## Updating minor versions v1.x.y + + Both `WP_RO` and `RW_SECTION_A` partitions of the flash needs to be updated. + Flash it using the following command: + + ```bash + flashrom -p internal -w [path] --fmap -i RW_SECTION_A -i WP_RO + ``` + + This command also preserves current Dasharo UEFI settings and the boot order. + + ## Updating patch version v1.0.x + + Only the `RW_SECTION_A` partition of the flash needs to be updated. Flash it + using the following command: + + ```bash + flashrom -p internal -w [path] --fmap -i RW_SECTION_A + ``` + + This command also preserves Dasharo UEFI settings and the boot order. diff --git a/docs/unified/protectli/hardware-matrix.md b/docs/unified/protectli/hardware-matrix.md new file mode 100644 index 0000000000..4ea19f88a0 --- /dev/null +++ b/docs/unified/protectli/hardware-matrix.md @@ -0,0 +1,407 @@ +# Hardware configuration matrix + +## Introduction + +This document describes the hardware configuration used for validation of the +coreboot port on the Protectli devices. + +=== "fw6" + + ## Protectli FW6E Dasharo + + | Component | Description | + |------------------------|----------------------------------------------------------| + | **CPU** | IIntel(R) Celeron(TM) 3865U | + | **SSD** | M.2 SSD SATA: Hoodisk SSL032GTTC7-S9A-2S | + | | external SATA 2.5 inch: Goodram SSDPR-CL100-240-G2 240GB | + | **RAM** | CRUCIAL CT4G4SFS824A | + | | CRUCIAL CT4G4SFS824A | + | **Wireless card** | Qualcomm Atheros QCA9377 | + | **LTE miniPCIe card** | Quectel EC-20   | + | **Display** | HDMI 1920x1080p | + | **Ethernet** | 6x Intel i211 (on-board) | + | **Attached devices** | 1. SanDisk USB 3.2Gen1 16 GB | + | | 2. SanDisk USB 3.2Gen1 16 GB | + | | 3. SanDisk USB 3.2Gen1 16 GB | + | | 4. USB Type-C Hub Pro UCN3286 | + | **USB Keyboard** | DELL KB216 | + | **Power supply** | Channel Well Technology 12V, 7.5A 90W | + + ## Protectli FW6B Dasharo + + | Component | Description | + |------------------------|----------------------------------------------------------| + | **CPU** | Intel(R) Core(TM) i3-7100U | + | **SSD** | M.2 SSD SATA: Hoodisk SSL032GTTC7-S9A-2S | + | | external SATA 2.5 inch: Goodram SSDPR-CL100-240-G2 240GB | + | **RAM** | CRUCIAL CT4G4SFS824A | + | | CRUCIAL CT4G4SFS824A | + | **Wireless card** | Qualcomm Atheros QCA9377 | + | **LTE miniPCIe card** | Quectel EC-20   | + | **Display** | HDMI 1920x1080p | + | **Ethernet** | 6x Intel i211 (on-board) | + | **Attached devices** | 1. SanDisk USB 3.2Gen1 16 GB | + | | 2. SanDisk USB 3.2Gen1 16 GB | + | | 3. SanDisk USB 3.2Gen1 16 GB | + | | 4. USB Type-C Hub Pro UCN3286 | + | **USB Keyboard** | DELL KB216 | + | **Power supply** | Channel Well Technology 12V, 7.5A 90W | + + ## Protectli FW6C Dasharo + + | Component | Description | + |------------------------|----------------------------------------------------------| + | **CPU** | Intel(R) Core(TM) i5-7200U | + | **SSD** | M.2 SSD SATA: Hoodisk SSL032GTTC7-S9A-2S | + | | external SATA 2.5 inch: Goodram SSDPR-CL100-240-G2 240GB | + | **RAM** | CRUCIAL CT4G4SFS824A | + | | CRUCIAL CT4G4SFS824A | + | **Wireless card** | Qualcomm Atheros QCA9377 | + | **LTE miniPCIe card** | Quectel EC-20   | + | **Display** | HDMI 1920x1080p | + | **Ethernet** | 6x Intel i210 (on-board) | + | **Attached devices** | 1. SanDisk USB 3.2Gen1 16 GB | + | | 2. SanDisk USB 3.2Gen1 16 GB | + | | 3. SanDisk USB 3.2Gen1 16 GB | + | | 4. USB Type-C Hub Pro UCN3286 | + | **USB Keyboard** | DELL KB216 | + | **Power supply** | Channel Well Technology 12V, 7.5A 90W | + + ## Protectli FW6D Dasharo + + | Component | Description | + |------------------------|----------------------------------------------------------| + | **CPU** | Intel(R) Core(TM) i5-8250U | + | **SSD** | M.2 SSD SATA: Hoodisk SSL032GTTC7-S9A-2S | + | | external SATA 2.5 inch: Goodram SSDPR-CL100-240-G2 240GB | + | **RAM** | CRUCIAL CT4G4SFS824A | + | | CRUCIAL CT4G4SFS824A | + | **Wireless card** | Qualcomm Atheros QCA9377 | + | **LTE miniPCIe card** | Quectel EC-20   | + | **Display** | HDMI 1920x1080p | + | **Ethernet** | 6x Intel i210 (on-board) | + | **Attached devices** | 1. SanDisk USB 3.2Gen1 16 GB | + | | 2. SanDisk USB 3.2Gen1 16 GB | + | | 3. SanDisk USB 3.2Gen1 16 GB | + | | 4. USB Type-C Hub Pro UCN3286 | + | **USB Keyboard** | DELL KB216 | + | **Power supply** | Channel Well Technology 12V, 7.5A 90W | + + ## Protectli FW6E Dasharo + + | Component | Description | + |------------------------|----------------------------------------------------------| + | **CPU** | Intel(R) Core(TM) i5-8250U | + | **SSD** | M.2 SSD SATA: Hoodisk SSL032GTTC7-S9A-2S | + | | external SATA 2.5 inch: Goodram SSDPR-CL100-240-G2 240GB | + | **RAM** | CRUCIAL CT4G4SFS824A | + | | CRUCIAL CT4G4SFS824A | + | **Wireless card** | Qualcomm Atheros QCA9377 | + | **LTE miniPCIe card** | Quectel EC-20   | + | **Display** | HDMI 1920x1080p | + | **Ethernet** | 6x Intel i210 (on-board) | + | **Attached devices** | 1. SanDisk USB 3.2Gen1 16 GB | + | | 2. SanDisk USB 3.2Gen1 16 GB | + | | 3. SanDisk USB 3.2Gen1 16 GB | + | | 4. USB Type-C Hub Pro UCN3286 | + | **USB Keyboard** | DELL KB216 | + | **Power supply** | Channel Well Technology 12V, 7.5A 90W | + +=== "v1x1x" + + ## Protectli V1210 + + | Component | Description | + |--------------------------------|---------------------------------------------| + | **CPU** | Intel(R) Celeron(R) N5105 @ 2.00GHz | + | **RAM** | Micron MT53D512M64D4RQ-046 | + | **Flash memory** | Winbond 25Q128JVSIQ | + | **USB Keyboard** | DELL KB216 | + | **USB Mouse** | DELL MS116p | + | **USB pendrives** | 1. SanDisk Ultra Flair USB 3.0 16 GB | + | **Display** | HDMI 1920x1080p | + | **Ethernet controller** | 2x intel i226 (on-board) | + | **Internal devices** | Audio subsystem | + | **4G Modem** | AMIT MDG200-0T001 | + | **Network** | Local network wired connection | + | **Remote Testing Environment** | RTE v1.1.0 | + | **Power Control** | RTE v1.1.0 | + | **Power supply** | Power Adapter GA-0481204000V | + + ## Protectli V1211 + + | Component | Description | + |--------------------------------|---------------------------------------------| + | **CPU** | Intel(R) Celeron(R) N5105 @ 2.00GHz | + | **RAM** | Micron MT53D512M64D4RQ-046 | + | **Flash memory** | Winbond 25Q128JVSIQ | + | **USB Keyboard** | DELL KB216 | + | **USB Mouse** | DELL MS116p | + | **USB pendrives** | 1. SanDisk Ultra Flair USB 3.0 16 GB | + | **Display** | HDMI 1920x1080p | + | **Ethernet controller** | 2x intel i226 (on-board) | + | **Internal devices** | Audio subsystem | + | **4G Modem** | AMIT MDG200-0T001 | + | **Network** | Local network wired connection | + | **Remote Testing Environment** | RTE v1.1.0 | + | **Power Control** | RTE v1.1.0 | + | **Power supply** | Power Adapter GA-0481204000V | + + ## Protectli V1410 + + | Component | Description | + |--------------------------------|---------------------------------------------| + | **CPU** | Intel(R) Celeron(R) N5105 @ 2.00GHz | + | **RAM** | Micron MT53D512M64D4RQ-046 | + | **Flash memory** | Winbond W25Q128.V | + | **USB Keyboard** | DELL KB216 | + | **USB Mouse** | DELL MS116p | + | **USB pendrives** | 1. SanDisk Ultra Flair USB 3.0 16 GB | + | **Display** | HDMI 1920x1080p | + | **Ethernet controller** | 4x intel i226 (on-board) | + | **Internal devices** | Audio subsystem | + | **4G Modem** | AMIT MDG200-0T001 | + | **Network** | Local network wired connection | + | **Remote Testing Environment** | RTE v1.1.0 | + | **Power Control** | RTE v1.1.0 | + | **Power supply** | Power Adapter GA-0481204000V | + + ## Protectli V1610 + + | Component | Description | + |--------------------------------|---------------------------------------------| + | **CPU** | Intel(R) Pentium(R) Silver N6005 @ 2.00GHz | + | **RAM** | Micron MT53E512M32D4NQ-053 | + | **Flash memory** | Winbond 25Q128JVSIQ | + | **USB Keyboard** | DELL KB216 | + | **USB Mouse** | DELL MS116p | + | **USB pendrives** | 1. SanDisk Ultra Flair USB 3.0 16 GB | + | **Display** | HDMI 1920x1080p | + | **Ethernet controller** | 6x intel i226 (on-board) | + | **Internal devices** | Audio subsystem | + | **4G Modem** | AMIT MDG200-0T001 | + | **Network** | Local network wired connection | + | **Remote Testing Environment** | RTE v1.1.0 | + | **Power Control** | RTE v1.1.0 | + | **Power supply** | Power Adapter GA-0481204000V | + +=== "vp46xx" + + ## Protectli VP4630 + + | Component | Description | + |--------------------------------|---------------------------------------------| + | **CPU** | Intel Core i3-10110U | + | **RAM** | Slot 1: Empty | + | | Slot 2: SAMSUNG M471A4G43MB1-CTD | + | **Flash memory** | Macronix KH25L12835F | + | **SSD** | Kingston NV1 250GB SNVS/250G | + | **MMC drive** | SAMSUNG KLM8G1GETF-B041 (on-board) | + | **USB pendrives** | 1. SanDisk Ultra Flair USB 3.0 16 GB | + | **USB Keyboard** | DELL KB216 | + | **USB Mouse** | DELL MS116p | + | **Wireless card** | Intel Wi-Fi 6 AX200 | + | **4G Modem** | AMIT MDG200-0T001 | + | **Display** | Display 1: HDMI 1920x1080p | + | | Display 2: DP 1920x1080p | + | **Ethernet controller** | 6x intel i225 (on-board) | + | **Internal devices** | Audio subsystem | + | **TPM** | Protectli TPM | + | **Network** | Local network wired connection | + | **Remote Testing Environment** | RTE v1.1.0 | + | **Power Control** | RTE v1.1.0 | + | **Power supply** | Channel Well Technology 12V, 5.0A 60W | + + ## Protectli VP4650 + + | Component | Description | + |--------------------------------|---------------------------------------------| + | **CPU** | Intel Core i5-10210U | + | **RAM** | Slot 1: Kingston KVR24S17S8/8 | + | | Slot 2: Kingston KVR26S19S8/16 | + | **Flash memory** | Macronix KH25L12835F | + | **SSD** | Samsung 980 PRO NVMe 250 GB | + | **MMC drive** | SAMSUNG KLM8G1GETF-B041 (on-board) | + | **USB Keyboard** | DELL KB216 | + | **USB Mouse** | DELL MS116p | + | **Wireless card** | JJPLUS JWW6051 | + | **4G Modem** | AMIT MDG200-0T001 | + | **Display** | Display 1: HDMI 1920x1080p | + | | Display 2: DP 1920x1080p | + | **Ethernet controller** | 6x intel i225 (on-board) | + | **Internal devices** | Audio subsystem | + | **TPM** | Protectli TPM | + | **Network** | Local network wired connection | + | **Remote Testing Environment** | RTE v1.1.0 | + | **Power Control** | RTE v1.1.0 | + | **Power supply** | Channel Well Technology 12V, 7.5A 90W | + + ## Protectli VP4670 ver1 + + | Component | Description | + |--------------------------------|---------------------------------------------| + | **CPU** | Intel Core i7-10810U | + | **RAM** | Slot 1: CRUCIAL CT16G4SFRA32A | + | | Slot 2: CRUCIAL CT16G4SFRA32A | + | **Flash memory** | Macronix KH25L12835F | + | **SSD** | SAMSUNG 870 QVO SATA 2.5" SSD 1TB | + | **MMC drive** | SAMSUNG KLM8G1GETF-B041 (on-board) | + | **USB Keyboard** | DELL KB216 | + | **USB Mouse** | DELL MS116p | + | **Wireless card** | JJPLUS JWW6051 | + | **4G Modem** | AMIT MDG200-0T001 | + | **Display** | Display 1: HDMI 1920x1080p | + | | Display 2: DP 1920x1080p | + | **Ethernet controller** | 6x intel i225 (on-board) | + | **Internal devices** | Audio subsystem | + | **TPM** | Protectli TPM | + | **Network** | Local network wired connection | + | **Remote Testing Environment** | RTE v1.1.0 | + | **Power control** | Sonoff S26 | + | **Power supply** | Channel Well Technology 12V, 7.5A 90W | + + ## Protectli VP4670 ver2 + + | Component | Description | + |--------------------------------|---------------------------------------------| + | **CPU** | Intel Core i7-10810U | + | **RAM** | Slot 1: CRUCIAL CT16G4SFRA32A | + | | Slot 2: CRUCIAL CT16G4SFRA32A | + | **Flash memory** | Macronix KH25L12835F | + | **SSD** | Kingston NV2 M.2 NVMe 500 GB SNV2S/500G | + | **MMC drive** | SAMSUNG KLM8G1GETF-B041 (on-board) | + | **USB Keyboard** | DELL KB216 | + | **USB Mouse** | DELL MS116p | + | **Wireless card** | JJPLUS JWW6051 | + | **4G Modem** | AMIT MDG200-0T001 | + | **Display** | Display 1: HDMI 1920x1080p | + | | Display 2: DP 1920x1080p | + | **Ethernet controller** | 6x intel i225 (on-board) | + | **Internal devices** | Audio subsystem | + | **TPM** | Protectli TPM | + | **Network** | Local network wired connection | + | **Remote Testing Environment** | RTE v1.1.0 | + | **Power control** | Sonoff S26 | + | **Power supply** | Channel Well Technology 12V, 7.5A 90W | + +=== "vp66xx" + + ## Protectli VP6630 + + | Component | Description | + |--------------------------------|---------------------------------------------| + | **CPU** | Intel(R) Core(TM) i3-1215U @ 1.20GHz | + | **RAM** | TBD | + | **Flash memory** | Macronix KH25L12835F | + | **USB Keyboard** | DELL KB216 | + | **USB Mouse** | DELL MS116p | + | **USB pendrives** | 1. SanDisk Ultra Flair USB 3.0 16 GB | + | **Display** | Display 1: HDMI 1920x1080p | + | | Display 2: DP 1920x1080p | + | **Ethernet controller** | 2x Intel i225/i226 (on-board) | + | **Internal devices** | TBD | + | **4G Modem** | TBD | + | **Network** | Local network wired connection | + | **Remote Testing Environment** | RTE v1.1.0 | + | **Power Control** | Sonoff | + | **Power supply** | TBD | + + ## Protectli VP6650 + + | Component | Description | + |--------------------------------|---------------------------------------------| + | **CPU** | Intel(R) Core(TM) i5-1235U @ 1.30GHz | + | **RAM** | TBD | + | **Flash memory** | Macronix KH25L12835F | + | **USB Keyboard** | DELL KB216 | + | **USB Mouse** | DELL MS116p | + | **USB pendrives** | 1. SanDisk Ultra Flair USB 3.0 16 GB | + | **Display** | Display 1: HDMI 1920x1080p | + | | Display 2: DP 1920x1080p | + | **Ethernet controller** | 4x Intel i225/i226 (on-board) | + | **Internal devices** | TBD | + | **4G Modem** | TBD | + | **Network** | Local network wired connection | + | **Remote Testing Environment** | RTE v1.1.0 | + | **Power Control** | Sonoff | + | **Power supply** | TBD | + + ## Protectli VP6670 + + | Component | Description | + |--------------------------------|---------------------------------------------| + | **CPU** | Intel(R) Core(TM) i7-1255U @ 1.70GHz | + | **RAM** | TBD | + | **Flash memory** | Macronix KH25L12835F | + | **USB Keyboard** | DELL KB216 | + | **USB Mouse** | DELL MS116p | + | **USB pendrives** | 1. SanDisk Ultra Flair USB 3.0 16 GB | + | **Display** | Display 1: HDMI 1920x1080p | + | | Display 2: DP 1920x1080p | + | **Ethernet controller** | 4x Intel i225/i226 (on-board) | + | **Internal devices** | TBD | + | **4G Modem** | TBD | + | **Network** | Local network wired connection | + | **Remote Testing Environment** | RTE v1.1.0 | + | **Power Control** | Sonoff | + | **Power supply** | TBD | + +=== "vp2410" + + ## Protectli VP2410 + + | Component | Description | + |------------------------|----------------------------------------------------------| + | **CPU** | Intel Celeron J4125 @ 2.70GHz | + | **RAM** | CRUCIAL CT4G4SFS824A | + | | SAMSUNG M471A4G43MB1-CTD | + | | SAMSUNG M471A1K43CB1-CTD | + | | SAMSUNG M471A5244BB0-CRC | + | | KINGSTON KVR24S17S8/8 | + | | KINGSTON KVR26S19S8/16 | + | | KINGSTON KVR26S21S6/8 | + | **Flash memory** | Macronix MX25U6473F | + | **SSD** | CRUCIAL CT500MX500SSD1 | + | **MMC drive** | SAMSUNG 8GTF4R (on-board) | + | **USB pendrives** | 1. SanDisk USB 3.2Gen1 16 GB | + | | 2. SanDisk USB 3.2Gen1 16 GB | + | | 3. USB Type-C Hub Pro UCN3286 | + | **Attached devices** | 1. Logitech, Inc. Keyboard K120 | + | | 2. Dell Mouse MS116p | + | | 3. USB Type-C Hub Pro UCN3286 | + | **LTE miniPCIe card** | Quectel EC-20 | + | **Wireless card** | Intel Wi-Fi 6 AX200 | + | **Display** | HDMI 1920x1080p, DP 1920x1080p | + | **Ethernet** | 4x intel i211 (on-board) | + | **TPM** | PC Engines TPM1A LPC TPM | + | **Power supply** | Channel Well Technology 12V, 5.0A 60W | + + > Note, that in **RAM** section all used during verification procedure modules + > have been listed. Device has only one RAM mounting slot. + +=== "vp2420" + + ## Protectli VP2420 + + | Component | Description | + |------------------------|----------------------------------------------------------| + | **CPU** | Intel(R) Celeron(R) J6412 @ 2.00GHz | + | **RAM** | KINGSTON KVR29S21S6/8 | + | **Flash memory** | Macronix MX25U6435E/F | + | **SSD** | 1. SSD Samsung 860 EVO M.2 NZ-N6E250 250GB | + | | 2. SSDPR-CL100-240-g2 | + | **MMC drive** | SAMSUNG 8GTF4R (on-board) | + | **USB pendrives** | 1. SanDisk USB 3.2Gen1 16 GB | + | | 2. SanDisk USB 3.2Gen1 16 GB | + | | 3. USB Type-C Hub Pro UCN3286 | + | **USB headers** | USB Expander | + | **Attached devices** | 1. Logitech, Inc. Keyboard K120 | + | | 2. Dell Mouse MS116p | + | | 3. USB Type-C Hub Pro UCN3286 | + | **Wireless card** | Intel Wi-Fi 6 AX200 | + | **Display** | HDMI 1920x1080p, DP 1920x1080p | + | **Ethernet** | 4x intel i225 (on-board) | + | **Power supply** | Channel Well Technology 12V, 5.0A 60W | + + > Note, that in **RAM** section all used during verification procedure modules + > have been listed. Device has only one RAM mounting slot. diff --git a/docs/variants/protectli_vp2410/protectli_vp2410_v1.1.0.rom_openness_chart.png b/docs/unified/protectli/images/protectli_vp2410_v1.1.0.rom_openness_chart.png similarity index 100% rename from docs/variants/protectli_vp2410/protectli_vp2410_v1.1.0.rom_openness_chart.png rename to docs/unified/protectli/images/protectli_vp2410_v1.1.0.rom_openness_chart.png diff --git a/docs/variants/protectli_vp2410/protectli_vp2410_v1.1.0.rom_openness_chart_full_image.png b/docs/unified/protectli/images/protectli_vp2410_v1.1.0.rom_openness_chart_full_image.png similarity index 100% rename from docs/variants/protectli_vp2410/protectli_vp2410_v1.1.0.rom_openness_chart_full_image.png rename to docs/unified/protectli/images/protectli_vp2410_v1.1.0.rom_openness_chart_full_image.png diff --git a/docs/variants/protectli_vp2420/protectli_vp2420_v1.2.0.rom_openness_chart.png b/docs/unified/protectli/images/protectli_vp2420_v1.2.0.rom_openness_chart.png similarity index 100% rename from docs/variants/protectli_vp2420/protectli_vp2420_v1.2.0.rom_openness_chart.png rename to docs/unified/protectli/images/protectli_vp2420_v1.2.0.rom_openness_chart.png diff --git a/docs/variants/protectli_vp2420/protectli_vp2420_v1.2.0.rom_openness_chart_full_image.png b/docs/unified/protectli/images/protectli_vp2420_v1.2.0.rom_openness_chart_full_image.png similarity index 100% rename from docs/variants/protectli_vp2420/protectli_vp2420_v1.2.0.rom_openness_chart_full_image.png rename to docs/unified/protectli/images/protectli_vp2420_v1.2.0.rom_openness_chart_full_image.png diff --git a/docs/variants/protectli_vp46xx/protectli_vp46xx_v1.2.0.rom_openness_chart.png b/docs/unified/protectli/images/protectli_vp46xx_v1.2.0.rom_openness_chart.png similarity index 100% rename from docs/variants/protectli_vp46xx/protectli_vp46xx_v1.2.0.rom_openness_chart.png rename to docs/unified/protectli/images/protectli_vp46xx_v1.2.0.rom_openness_chart.png diff --git a/docs/variants/protectli_vp46xx/protectli_vp46xx_v1.2.0.rom_openness_chart_full_image.png b/docs/unified/protectli/images/protectli_vp46xx_v1.2.0.rom_openness_chart_full_image.png similarity index 100% rename from docs/variants/protectli_vp46xx/protectli_vp46xx_v1.2.0.rom_openness_chart_full_image.png rename to docs/unified/protectli/images/protectli_vp46xx_v1.2.0.rom_openness_chart_full_image.png diff --git a/docs/unified/protectli/initial-deployment.md b/docs/unified/protectli/initial-deployment.md new file mode 100644 index 0000000000..16f4eaa0cd --- /dev/null +++ b/docs/unified/protectli/initial-deployment.md @@ -0,0 +1,137 @@ +# Initial deployment + +Initial flashing of Dasharo firmware can be done from Linux using flashrom with +the internal programmer. This document describes the process of building, +installing and running flashrom on Ubuntu 22.04. + +## Build flashrom + +Please follow generic guide for [Dasharo flashrom fork](../../osf-trivia-list/deployment.md#how-to-install-dasharo-flashrom-fork). + +## Reading flash contents + +Always prepare a backup of the current firmware image. To read from the flash +and save it to a file (`dump.rom`), execute the following command: + +```bash +flashrom -p internal -r dump.rom +``` + +## Flashing Dasharo + +=== "fw6" + + ## Reading flash contents + + Always prepare a backup of the current firmware image. To read from the flash + and save them to a file (`dump.rom`), execute the following command: + + ```bash + sudo flashrom -p internal -r dump.rom + ``` + + ## Flashing Dasharo + + ```bash + flashrom -p internal -w [path] --ifd -i bios + ``` + + To flash Dasharo on the platform, execute the following command - replace `[path]` + with the path to the Dasharo image you want to flash, e.g. `protectli_fw6_DF_v1.0.14.rom`. + + ```bash + sudo flashrom -p internal -w protectli_fw6_DF_v1.0.14.rom --ifd -i bios + ``` + + After successful operation reboot the platform. + +=== "v1x1x" + + To flash Dasharo on the platform, execute the following command - replace + `[path]` with the path to the Dasharo image you want to flash, e.g. + `protectli_vault_V1210_v0.9.0.rom`. + + ```bash + flashrom -p internal -w [path] --ifd -i bios + ``` + + This will flash the BIOS region only. After the operation is successful, + reboot the platform. + +=== "vp46xx" + + To flash Dasharo on the platform, execute the following command - + replace `[path]` with the path to the Dasharo image you want to flash, e.g. + `protectli_vault_cml_v1.0.13.rom`. + + ```bash + flashrom -p internal -w [path] + ``` + + This will flash the full image, including the Intel ME. The operation + requires a hard reset of the platform. To perform a hard reset: + + 1. Power off the platform. Note, it may not power off completely due to + flashed ME. + 2. Disconnect power supply from the board when OS finishes all tasks after + power off (the screen goes dark or black). + 3. Disconnect the RTC/CMOS battery OR clear the CMOS using the pin header + located near memory slots. Wait about half a minute (unshort the pins). + 4. Connect the power supply back. + 5. The platform should power on normally now. You can connect the battery + 6. back if it was disconnected. + +=== "v66xx" + + To flash Dasharo on the platform, execute the following command - replace + `[path]` with the path to the Dasharo image you want to flash, e.g. + `protectli_vp66xx_v0.9.0.rom`. + + ```bash + flashrom -p internal -w [path] --ifd -i bios + ``` + + This will flash the BIOS region only. After the operation is successful, + reboot the platform. + +=== "vp2410" + + To flash Dasharo on the platform, execute the following command - + replace `[path]` with the path to the Dasharo image you want to flash, + e.g. `protectli_vault_glk_v1.0.15.rom`. + + If stock firmware is currently installed: + + ```bash + flashrom -p internal -w [path] + ``` + + If Dasharo is currently installed, only the COREBOOT and IFWI partitions + of the flash needs to be updated. Flash it using the following command: + + ```bash + flashrom -p internal -w protectli_vault_glk_v1.0.15.rom --fmap -i COREBOOT -i IFWI + ``` + + This command also preserves Dasharo UEFI settings and the boot order. + +=== "vp2420" + + To flash Dasharo on the platform, execute the following command - replace + `[path]` with the path to the Dasharo image you want to flash, e.g. + `protectli_vault_ehl_v1.0.0.rom`. + + If stock firmware is currently installed: + + ```bash + flashrom -p internal -w [path] --ifd -i bios + ``` + + If Dasharo is currently installed, only the `RW_SECTION_A` partition of the + flash needs to be updated. Flash it using the following command: + + ```bash + flashrom -p internal -w protectli_vault_ehl_v1.x.y.rom --fmap -i RW_SECTION_A + ``` + + This command also preserves Dasharo UEFI settings and the boot order. diff --git a/docs/unified/protectli/openness-score.md b/docs/unified/protectli/openness-score.md new file mode 100644 index 0000000000..1f0e8f9cc4 --- /dev/null +++ b/docs/unified/protectli/openness-score.md @@ -0,0 +1,346 @@ +# Dasharo Openness Score + +This page contains the [Dasharo Openness +Score](../../glossary.md#dasharo-openness-score) for Protectli Dasharo +releases. The content of the page is generated with [Dasharo Openness Score +utility](https://github.com/Dasharo/Openness-Score). + +=== "vp46xx" + + ## v1.2.0 + + Openness Score for protectli_vp46xx_v1.2.0.rom + + Open-source code percentage: **32.3%** + Closed-source code percentage: **67.7%** + + * Image size: 16777216 (0x1000000) + * Number of regions: 25 + * Number of CBFSes: 3 + * Total open-source code size: 4751528 (0x4880a8) + * Total closed-source code size: 9978470 (0x984266) + * Total data size: 497394 (0x796f2) + * Total empty size: 1549824 (0x17a600) + + ![](images/protectli_vp46xx_v1.2.0.rom_openness_chart.png) + + ![](images/protectli_vp46xx_v1.2.0.rom_openness_chart_full_image.png) + + > Numbers given above already include the calculations from CBFS regions + > presented below + + ### FMAP regions + + | FMAP region | Offset | Size | Category | + | ----------- | ------ | ---- | -------- | + | SI_ME | 0x1000 | 0x5ff000 | closed-source | + | SI_DESC | 0x0 | 0x1000 | data | + | RECOVERY_MRC_CACHE | 0x600000 | 0x10000 | data | + | RW_MRC_CACHE | 0x610000 | 0x10000 | data | + | SMMSTORE | 0x620000 | 0x40000 | data | + | SHARED_DATA | 0x660000 | 0x2000 | data | + | VBLOCK_DEV | 0x662000 | 0x2000 | data | + | RW_NVRAM | 0x664000 | 0x6000 | data | + | VBLOCK_A | 0x6ea000 | 0x2000 | data | + | RW_FWID_A | 0xb7ff00 | 0x100 | data | + | RO_VPD | 0xb80000 | 0x4000 | data | + | FMAP | 0xb84000 | 0x800 | data | + | RO_FRID | 0xb84800 | 0x100 | data | + | RO_FRID_PAD | 0xb84900 | 0x700 | data | + | GBB | 0xb85000 | 0x3000 | data | + + ### CBFS BOOTSPLASH + + * CBFS size: 524288 + * Number of files: 1 + * Open-source files size: 0 (0x0) + * Closed-source files size: 0 (0x0) + * Data size: 28 (0x1c) + * Empty size: 524260 (0x7ffe4) + + > Numbers given above are already normalized (i.e. they already include size + > of metadata and possible closed-source LAN drivers included in the payload + > which are not visible in the table below) + + | CBFS filename | CBFS filetype | Size | Compression | Category | + | ------------- | ------------- | ---- | ----------- | -------- | + | (empty) | null | 524260 | none | empty | + + ### CBFS FW_MAIN_A + + * CBFS size: 4800256 + * Number of files: 16 + * Open-source files size: 2325656 (0x237c98) + * Closed-source files size: 1845555 (0x1c2933) + * Data size: 8261 (0x2045) + * Empty size: 620784 (0x978f0) + + > Numbers given above are already normalized (i.e. they already include size + > of metadata and possible closed-source LAN drivers included in the payload + > which are not visible in the table below) + + | CBFS filename | CBFS filetype | Size | Compression | Category | + | ------------- | ------------- | ---- | ----------- | -------- | + | fallback/romstage | stage | 71104 | none | open-source | + | fallback/ramstage | stage | 132189 | LZMA | open-source | + | fallback/dsdt.aml | raw | 8831 | none | open-source | + | fallback/postcar | stage | 31588 | none | open-source | + | fallback/payload | simple elf | 2081944 | none | open-source | + | cpu_microcode_blob.bin | microcode | 300032 | none | closed-source | + | fspm.bin | fsp | 581632 | none | closed-source | + | fspm_2.bin | fsp | 581632 | none | closed-source | + | fsps.bin | fsp | 191132 | LZMA | closed-source | + | fsps_2.bin | fsp | 191127 | LZMA | closed-source | + | config | raw | 4993 | LZMA | data | + | revision | raw | 859 | none | data | + | build_info | raw | 103 | none | data | + | vbt.bin | raw | 1183 | LZMA | data | + | (empty) | null | 164 | none | empty | + | (empty) | null | 4004 | none | empty | + + ### CBFS COREBOOT + + * CBFS size: 4685824 + * Number of files: 22 + * Open-source files size: 2425872 (0x250410) + * Closed-source files size: 1845555 (0x1c2933) + * Data size: 9617 (0x2591) + * Empty size: 404780 (0x62d2c) + + > Numbers given above are already normalized (i.e. they already include size + > of metadata and possible closed-source LAN drivers included in the payload + > which are not visible in the table below) + + | CBFS filename | CBFS filetype | Size | Compression | Category | + | ------------- | ------------- | ---- | ----------- | -------- | + | fallback/romstage | stage | 71104 | none | open-source | + | fallback/ramstage | stage | 132189 | LZMA | open-source | + | fallback/dsdt.aml | raw | 8831 | none | open-source | + | fallback/postcar | stage | 31588 | none | open-source | + | fallback/payload | simple elf | 2081944 | none | open-source | + | fallback/verstage | stage | 61752 | none | open-source | + | bootblock | bootblock | 38464 | none | open-source | + | cpu_microcode_blob.bin | microcode | 300032 | none | closed-source | + | fspm.bin | fsp | 581632 | none | closed-source | + | fspm_2.bin | fsp | 581632 | none | closed-source | + | fsps.bin | fsp | 191132 | LZMA | closed-source | + | fsps_2.bin | fsp | 191127 | LZMA | closed-source | + | cbfs_master_header | cbfs header | 28 | none | data | + | intel_fit | intel_fit | 80 | none | data | + | config | raw | 4993 | LZMA | data | + | revision | raw | 859 | none | data | + | build_info | raw | 103 | none | data | + | cmos_layout.bin | cmos_layout | 708 | none | data | + | vbt.bin | raw | 1183 | LZMA | data | + | (empty) | null | 420 | none | empty | + | (empty) | null | 2724 | none | empty | + | (empty) | null | 401636 | none | empty | + +=== "vp2410" + + ## v1.1.0 + + Openness Score for protectli_vp2410_v1.1.0.rom + + Open-source code percentage: **31.7%** + Closed-source code percentage: **68.3%** + + * Image size: 8388608 (0x800000) + * Number of regions: 17 + * Number of CBFSes: 2 + * Total open-source code size: 2313343 (0x234c7f) + * Total closed-source code size: 4983646 (0x4c0b5e) + * Total data size: 409627 (0x6401b) + * Total empty size: 681992 (0xa6808) + + ![](images/protectli_vp2410_v1.1.0.rom_openness_chart.png) + + ![](images/protectli_vp2410_v1.1.0.rom_openness_chart_full_image.png) + + > Numbers given above already include the calculations from CBFS regions + > presented below + + ### FMAP regions + + | FMAP region | Offset | Size | Category | + | ----------- | ------ | ---- | -------- | + | IFWI | 0x1000 | 0x2ff000 | closed-source | + | SI_DESC | 0x0 | 0x1000 | data | + | RECOVERY_MRC_CACHE | 0x300000 | 0x10000 | data | + | RW_MRC_CACHE | 0x310000 | 0x10000 | data | + | FMAP | 0x3a1000 | 0x1000 | data | + | SMMSTORE | 0x67f000 | 0x40000 | data | + + ### CBFS BOOTSPLASH + + * CBFS size: 524288 + * Number of files: 1 + * Open-source files size: 0 (0x0) + * Closed-source files size: 0 (0x0) + * Data size: 28 (0x1c) + * Empty size: 524260 (0x7ffe4) + + > Numbers given above are already normalized (i.e. they already include size + > of metadata and possible closed-source LAN drivers included in the payload + > which are not visible in the table below) + + | CBFS filename | CBFS filetype | Size | Compression | Category | + | ------------- | ------------- | ---- | ----------- | -------- | + | (empty) | null | 524260 | none | empty | + + ### CBFS COREBOOT + + * CBFS size: 3002368 + * Number of files: 17 + * Open-source files size: 2313343 (0x234c7f) + * Closed-source files size: 523102 (0x7fb5e) + * Data size: 8191 (0x1fff) + * Empty size: 157732 (0x26824) + + > Numbers given above are already normalized (i.e. they already include size + > of metadata and possible closed-source LAN drivers included in the payload + > which are not visible in the table below) + + | CBFS filename | CBFS filetype | Size | Compression | Category | + | ------------- | ------------- | ---- | ----------- | -------- | + | fallback/payload | simple elf | 2080815 | none | open-source | + | fallback/romstage | stage | 47192 | LZ4 | open-source | + | fallback/ramstage | stage | 125678 | LZMA | open-source | + | fallback/dsdt.aml | raw | 7126 | none | open-source | + | pt | raw | 20480 | none | open-source | + | pdpt | raw | 32 | none | open-source | + | fallback/postcar | stage | 32020 | none | open-source | + | cpu_microcode_blob.bin | microcode | 152576 | none | closed-source | + | fspm.bin | fsp | 178014 | LZ4 | closed-source | + | fsps.bin | fsp | 192512 | none | closed-source | + | cbfs_master_header | cbfs header | 28 | none | data | + | config | raw | 4505 | LZMA | data | + | revision | raw | 859 | none | data | + | build_info | raw | 103 | none | data | + | vbt.bin | raw | 1271 | LZMA | data | + | header_pointer | cbfs header | 4 | none | data | + | (empty) | null | 157732 | none | empty | + +=== "vp2420" + + ## v1.2.0 + + Openness Score for protectli_vp2420_v1.2.0.rom + + Open-source code percentage: **35.3%** + Closed-source code percentage: **64.7%** + + * Image size: 16777216 (0x1000000) + * Number of regions: 26 + * Number of CBFSes: 3 + * Total open-source code size: 4806882 (0x4958e2) + * Total closed-source code size: 8800924 (0x864a9c) + * Total data size: 627958 (0x994f6) + * Total empty size: 2541452 (0x26c78c) + + ![](images/protectli_vp2420_v1.2.0.rom_openness_chart.png) + + ![](images/protectli_vp2420_v1.2.0.rom_openness_chart_full_image.png) + + > Numbers given above already include the calculations from CBFS regions + > presented below + + ### FMAP regions + + | FMAP region | Offset | Size | Category | + | ----------- | ------ | ---- | -------- | + | SI_ME | 0x1000 | 0x6ff000 | closed-source | + | SI_DESC | 0x0 | 0x1000 | data | + | RECOVERY_MRC_CACHE | 0x700000 | 0x10000 | data | + | RW_MRC_CACHE | 0x710000 | 0x10000 | data | + | SMMSTORE | 0x720000 | 0x40000 | data | + | SHARED_DATA | 0x760000 | 0x2000 | data | + | VBLOCK_DEV | 0x762000 | 0x2000 | data | + | RW_NVRAM | 0x764000 | 0x6000 | data | + | CONSOLE | 0x76a000 | 0x20000 | data | + | VBLOCK_A | 0x88a000 | 0x2000 | data | + | RW_FWID_A | 0xbfff00 | 0x100 | data | + | RO_VPD | 0xc00000 | 0x4000 | data | + | FMAP | 0xc04000 | 0x800 | data | + | RO_FRID | 0xc04800 | 0x100 | data | + | RO_FRID_PAD | 0xc04900 | 0x700 | data | + | GBB | 0xc05000 | 0x3000 | data | + + ### CBFS BOOTSPLASH + + * CBFS size: 1048576 + * Number of files: 1 + * Open-source files size: 0 (0x0) + * Closed-source files size: 0 (0x0) + * Data size: 28 (0x1c) + * Empty size: 1048548 (0xfffe4) + + > Numbers given above are already normalized (i.e. they already include size + > of metadata and possible closed-source LAN drivers included in the payload + > which are not visible in the table below) + + | CBFS filename | CBFS filetype | Size | Compression | Category | + | ------------- | ------------- | ---- | ----------- | -------- | + | (empty) | null | 1048548 | none | empty | + + ### CBFS FW_MAIN_A + + * CBFS size: 3620608 + * Number of files: 13 + * Open-source files size: 2365521 (0x241851) + * Closed-source files size: 732494 (0xb2d4e) + * Data size: 8513 (0x2141) + * Empty size: 514080 (0x7d820) + + > Numbers given above are already normalized (i.e. they already include size + > of metadata and possible closed-source LAN drivers included in the payload + > which are not visible in the table below) + + | CBFS filename | CBFS filetype | Size | Compression | Category | + | ------------- | ------------- | ---- | ----------- | -------- | + | fallback/payload | simple elf | 2081638 | none | open-source | + | fallback/romstage | stage | 85520 | none | open-source | + | fallback/ramstage | stage | 129116 | LZMA | open-source | + | fallback/dsdt.aml | raw | 9759 | none | open-source | + | fallback/postcar | stage | 59488 | none | open-source | + | cpu_microcode_blob.bin | microcode | 20480 | none | closed-source | + | fspm.bin | fsp | 495616 | none | closed-source | + | fsps.bin | fsp | 216398 | LZ4 | closed-source | + | config | raw | 4815 | LZMA | data | + | revision | raw | 859 | none | data | + | build_info | raw | 103 | none | data | + | vbt.bin | raw | 1200 | LZMA | data | + | (empty) | null | 514080 | none | empty | + + ### CBFS COREBOOT + + * CBFS size: 4161536 + * Number of files: 17 + * Open-source files size: 2441361 (0x254091) + * Closed-source files size: 732494 (0xb2d4e) + * Data size: 8857 (0x2299) + * Empty size: 978824 (0xeef88) + + > Numbers given above are already normalized (i.e. they already include size + > of metadata and possible closed-source LAN drivers included in the payload + > which are not visible in the table below) + + | CBFS filename | CBFS filetype | Size | Compression | Category | + | ------------- | ------------- | ---- | ----------- | -------- | + | fallback/payload | simple elf | 2081638 | none | open-source | + | fallback/romstage | stage | 85520 | none | open-source | + | fallback/ramstage | stage | 129116 | LZMA | open-source | + | fallback/dsdt.aml | raw | 9759 | none | open-source | + | fallback/postcar | stage | 59488 | none | open-source | + | bootblock | bootblock | 75840 | none | open-source | + | cpu_microcode_blob.bin | microcode | 20480 | none | closed-source | + | fspm.bin | fsp | 495616 | none | closed-source | + | fsps.bin | fsp | 216398 | LZ4 | closed-source | + | cbfs_master_header | cbfs header | 28 | none | data | + | intel_fit | intel_fit | 80 | none | data | + | config | raw | 4815 | LZMA | data | + | revision | raw | 859 | none | data | + | build_info | raw | 103 | none | data | + | vbt.bin | raw | 1200 | LZMA | data | + | (empty) | null | 1060 | none | empty | + | (empty) | null | 977764 | none | empty | diff --git a/docs/unified/protectli/overview.md b/docs/unified/protectli/overview.md new file mode 100644 index 0000000000..7403bff7fa --- /dev/null +++ b/docs/unified/protectli/overview.md @@ -0,0 +1,223 @@ +# Overview + +Select Model: + +=== "FW6" + *[Releases](../../variants/protectli_fw6/releases.md) - list of all releases + * [Building manual](../../variants/protectli_fw6/building-manual.md) - how + to build Dasharo for Protectli FW6 + *[Installation manual](../../variants/protectli_fw6/installation-manual.md) - + how to install Dasharo + for Protectli FW6 + * [Hardware configuration matrix](../../variants/protectli_fw6/hardware-matrix.md) - + definition of hardware + configuration used during validation + * [Test matrix](../../variants/protectli_fw6/test-matrix.md) - validation + scope for the Protectli FW6 + +=== "v1x1x" + The Vault is a small form network appliance built for use as a firewall / + router, virtualization platform, a daily-driven personal computer, and more. + The V1210/V1410/V1610 feature an Intel Jasper Lake CPU, soldered down LPDDR4X + memory, Intel i225-V/i226-V 2.5G Ethernet ports, 4x USB-A 3.x ports, eMMC, + PCIe NVMe storage, M.2 WIFI and WWAN slots, serial console over USB-C and + a firmware TPM. + + * V1210 - Intel® Celeron® N5105, 2x i225/i226, 4GB LPDDR4X + * V1410 - Intel® Celeron® N5105, 4x i225/i226, 8GB LPDDR4X + * V1610 - Intel® Pentium® Silver N6005, 6x i225/i226, 16GB LPDDR4X + + ## Documentation sections + + * [Releases](../../variants/protectli_v1x1x/releases.md) - groups information about all releases. + * [Building manual](../../variants/protectli_v1x1x/building-manual.md) - describes how to build Dasharo for + Protectli V1210/V1410/V1610. + * [Initial deployment](../../variants/protectli_v1x1x/initial-deployment.md) - describes initial Dasharo + deployment methods (i. e. flashing new firmware) for Protectli + V1210/V1410/V1610. + * [Firmware update](../../variants/protectli_v1x1x/firmware-update.md) - explains supported Dasharo + open-source firmware update methods. + * [Recovery](../../variants/protectli_v1x1x/recovery.md) - gathers information on how to recover the platform + from potential failure. + * [Hardware configuration matrix](../../variants/protectli_v1x1x/hardware-matrix.md) - describes the + platform's hardware configuration used during the Dasharo firmware + validation procedure. + * [Test matrix](../../variants/protectli_v1x1x/test-matrix.md) - describes validation scope used during + Dasharo firmware validation procedure. + +=== "vp46xx" + The Vault is a small form network appliance built for use as a firewall / + router, virtualization platform, a daily-driven personal computer, and more. + The VP46XX is the second platform of the Vault Pro series with higher + performance and newer technology than the original FW6 series. + + ![](/images/VP4630_banner-1.jpg) + + The VP46XX features an Intel 10th Generation CPU, 2x DDR4 DIMM modules, 6x + Intel i225-V 2.5G Ethernet ports, PCIe x4/SATA NVMe storage, LPC TPM, M.2 + WIFI and WWAN slots. + + * VP4630 - Intel Core i3-10110U + * VP4650 - Intel Core i5-10210U + * VP4670 - Intel Core i7-10810U (both v1 and v2 versions, see the + [Intel FSP repo for details](https://github.com/intel/FSP/tree/master/CometLakeFspBinPkg#differentiating-cometlake1-and-cometlake2))) + + For more information please refer to the references below. + + ## References + + * [Buy VP4630 in Protectli shop](https://protectli.com/product/vp4630/) + + ## Documentation sections + + * [Releases](../../variants/protectli_vp46xx/releases.md) - groups + information about all releases. + * [Building manual](../../variants/protectli_vp46xx/building-manual.md) - + describes how to build Dasharo for + NovaCustom NV4x. + * [Initial deployment](../../variants/protectli_vp46xx/initial-deployment.md) - + describes initial Dasharo + deployment methods (i. e. flashing new firmware) for Protectli VP46xx. + * [Firmware update](../../variants/protectli_vp46xx/firmware-update.md) - + explains supported Dasharo + open-source firmware update methods. + * [Recovery](../../variants/protectli_vp46xx/recovery.md) - gathers + information on how to recover the platform + from potential failure. + * [Hardware configuration matrix](../../variants/protectli_vp46xx/hardware-matrix.md) - + describes the + platform's hardware configuration used during the Dasharo firmware + validation procedure. + * [Test matrix](../../variants/protectli_vp46xx/test-matrix.md) - describes + validation scope used during + Dasharo firmware validation procedure. + * [Post-installation setup](../../variants/protectli_vp46xx/post-install.md) + +=== "vp2410" + The Vault Pro is a small form network appliance built for use as a firewall + / router, virtualization platform, a daily-driven personal computer, + and more. The VP2410 is based on a 4 network port design that leverages + a low power, but versatile Intel Celeron J4125 CPU. + + ![](/images/VP2410.png) + + The VP2410 can accommodate up to 16GB DDR4 RAM and 2TB m.2 SATA SSD + storage drive. The built-in 8GB eMMC module can be used for booting a + light-weight OS for example, or for use as optional storage. + + VP2410 specification: + + * Intel Celeron® J4125 Quad Core at 2 GHz (Burst up to 2.7 GHz) + * 4 Intel® Gigabit Ethernet NIC ports + * 8GB eMMC module on board + * Intel® AES-NI support + * Fanless and Silent + * Included 12v Power Supply, VESA mount kit, Serial Console Cable, + SATA data and power cables for internal SSD, Quick Start Guide + + For more information please refer to the references below. + + ## References + + * [Protectli knowledge base](https://kb.protectli.com/) + * [Buy VP2410 in Protectli shop](https://eu.protectli.com/product/vp2410) + + ## Documentation sections + + * [Releases](../../variants/protectli_vp2410/releases.md) - groups + information about all releases. + * [Building manual](../../variants/protectli_vp2410/building-manual.md) - + describes how to build Dasharo for Protecli 2410. + * [Initial deployment](../../variants/protectli_vp2410/initial-deployment.md) - + describes initial Dasharo deployment methods (i. e. flashing new + firmware) for Protectli VP2410. + * [Recovery](../../variants/protectli_vp2410/recovery.md) - gathers + information on how to recover the platform from potential failure. + * [Hardware configuration matrix](../../variants/protectli_vp2410/hardware-matrix.md) - + describes the platform's hardware configuration used during the Dasharo + firmware validation procedure. + * [Test matrix](../../variants/protectli_vp2410/test-matrix.md) - describes + validation scope used during Dasharo firmware validation procedure. + +=== "vp2420" + The Vault Pro is a small form network appliance built for use as a firewall + / router, virtualization platform, a daily-driven personal computer, + and more. The VP2420 is based on a 4 x 2.5 G network port design that + leverages a low power, but versatile Intel Celeron J6412 CPU. + + ![](/images/VP2420.png) + + The VP2420 can accommodate up to 32 GB DDR4 RAM and 2 TB M.2 SATA SSD + storage drive (Note: The VP2420 supports M.2 SATA drives, not NVMe + drives). The built-in 8 GB eMMC module can be used for booting a + light-weight OS for example, or for use as optional storage. + + VP2410 specification: + + * Intel Celeron® J6412 Quad Core at 2 GHz (Burst up to 2.6 GHz) + * 4 Intel® 2.5 Gigabit Ethernet NIC ports + * M.2 SATA SSD Slot (Note: This device does not support NVMe drives) + * 8 GB eMMC module on board + * Intel® AES-NI support + * Fanless and Silent + * Included 12v Power Supply, VESA mount kit, Serial Console Cable, + SATA data and power cables for internal SSD, Quick Start Guide + + For more information please refer to the references below.` + + ## References + + * [Protectli knowledge base](https://kb.protectli.com/) + * [Buy VP2420 in Protectli shop](https://eu.protectli.com/product/vp2420/) + + ## Documentation sections + + * [Releases](../../variants/protectli_vp2420/releases.md) - groups + information about all releases. + * [Building manual](../../variants/protectli_vp2420/building-manual.md) - + describes how to build Dasharo for Protecli 2420. + * [Initial deployment](../../variants/protectli_vp2420/initial-deployment.md) - + describes initial Dasharo deployment methods (i. e. flashing new + firmware) for Protectli VP2420. + * [Recovery](../../variants/protectli_vp2420/recovery.md) - gathers + information on how to recover the platform from potential failure. + * [Hardware configuration matrix](../../variants/protectli_vp2420/hardware-matrix.md) - + describes the platform's hardware configuration used during the Dasharo + firmware validation procedure. + * [Test matrix](../../variants/protectli_vp2420/test-matrix.md) - describes + validation scope used during Dasharo firmware validation procedure. + + diff --git a/docs/unified/protectli/post-install.md b/docs/unified/protectli/post-install.md new file mode 100644 index 0000000000..02a65c72ad --- /dev/null +++ b/docs/unified/protectli/post-install.md @@ -0,0 +1,41 @@ +# Post-installation setup + +This document contains extra steps to perform after installing Dasharo in order +to enable full functionality. + +=== "vp46xx" + + ## Linux + + This section covers Linux post-install steps tested on Ubuntu 22.04. It is + likely that similar procedures would for others Linux distributions as well. + + ### Cards using ath10k_pci driver report a firmware failure at module load + + If you experience ath10k_pci failing to load with error in dmesg similar to: + + ```text + [ 11.098547] ath10k_pci 0000:07:00.0: wmi unified ready event not received + [ 11.148567] ath10k_pci 0000:07:00.0: device has crashed during init + [ 11.176535] ath10k_pci 0000:07:00.0: device has crashed during init + [ 11.176539] ath10k_pci 0000:07:00.0: failed to wait for target init: -70 + [ 11.177684] ath10k_pci 0000:07:00.0: could not init core (-110) + [ 11.177711] ath10k_pci 0000:07:00.0: could not probe fw (-110) + ``` + + follow https://kb.protectli.com/kb/wifi-on-the-vault/ (Firmware Fix section) + to fix the problem. + +=== "vp66xx" + ## Windows + + This section covers Windows post-install steps tested on Windows 11. + + ### Qualcomm Atheros cards may be missing driver + + If you experience Windows to fail to recognize Qualcomm Atheros WiFi cards, + you may need to install the necessary driver manually. + + Download the Windows driver from [ath-drivers.eu](https://www.ath-drivers.eu/download-driver-nr-382-for-atheros-QCA6174A-and-Windows10.html) + Using `Device Manager`, select `Update Driver` for `Network Device` located in + `Other devices` and choose to install the downloaded driver. diff --git a/docs/unified/protectli/recovery.md b/docs/unified/protectli/recovery.md new file mode 100644 index 0000000000..6f7149b386 --- /dev/null +++ b/docs/unified/protectli/recovery.md @@ -0,0 +1,284 @@ +# Recovery + +=== "v1x1x" + + ## Intro + + The following documentation describes the process of recovering hardware from + the brick state with [RTE](../../transparent-validation/rte/introduction.md) and + Dasharo open-source firmware. + + ## Prerequisites + + * [Prepared RTE](../../transparent-validation/rte/v1.1.0/quick-start-guide.md) + * 6x female-female wire cables + + ## Connections + + To prepare the stand for flashing follow the steps described below: + + 1. Open the platform cover. + 2. Connect the 6-pin flash header to the + [SPI header](../../transparent-validation/rte/v1.1.0/specification.md) + on RTE. + + | SPI header | 6 pin header | + |:----------:|:------------:| + | Vcc | pin 1 (Vcc) | + | GND | pin 2 (GND) | + | CS | pin 4 (CS) | + | SCLK | pin 6 (CLK) | + | MISO | pin 5 (MISO) | + | MOSI | pin 3 (MOSI) | + + ```txt + ______ + > | | + Vcc 3.3V ----1 2---- GND + | | + MOSI ----3 4---- CS + | | + MISO ----5 6---- CLK + |______| + ``` + + ## Firmware flashing + + To flash firmware follow the steps described below: + + 1. Login to RTE via `ssh` or `minicom`. + 2. Turn on the platform by connecting the power supply. + 3. Wait at least 5 seconds. + 4. Turn off the platform by using the power button. + 5. Wait at least 3 seconds. + 6. Set the proper state of the SPI by using the following commands on RTE: + + ```bash + # set SPI Vcc to 3.3V + echo 1 > /sys/class/gpio/gpio405/value + # SPI Vcc on + echo 1 > /sys/class/gpio/gpio406/value + # SPI lines ON + echo 1 > /sys/class/gpio/gpio404/value + ``` + + 7. Wait at least 2 seconds. + 8. Disconnect the power supply from the platform. + 9. Wait at least 2 seconds. + 10. Flash the platform by using the following command: + + ```bash + flashrom -p linux_spi:dev=/dev/spidev1.0,spispeed=16000 -w [path_to_binary] + ``` + + > Flashing with flashrom takes about 1 minute. + + 11. Change back the state of the SPI by using the following commands: + + ```bash + echo 0 > /sys/class/gpio/gpio404/value + echo 0 > /sys/class/gpio/gpio406/value + ``` + + 12. Turn on the platform by connecting the power supply. + + The first boot of the platform after proceeding with the above procedure can + take much longer than standard. + +=== "vp46xx" + + ## Intro + + The following documentation describes platform-specific details of setting up + Protectli VP46XX for recovery from brick state with + [RTE](../../transparent-validation/rte/introduction.md) + and Dasharo open-source firmware. + + ## Connections + + Set up the connections required for external flashing as described in + [Generic Testing Stand Setup](../../unified-test-documentation/generic-testing-stand-setup.md). + Protectli VP46XX are flashed using the Pomona clip connection variant. Use + the pictures below to easily locate essential components on the mainboard. + + ### SPI flash chip location + + ![](../../images/protectli_recovery/vp46xx_location_of_flash_chip.jpg) + + ### CMOS header location + + ![](../../images/protectli_recovery/vp46xx_location_of_CMOS_header.jpg) + + ## Firmware flashing + + To flash firmware, follow the steps described in + [Generic Testing Stand Setup](../../unified-test-documentation/generic-testing-stand-setup.md) + , noting that: + * The chip voltage for this platform is **3.3V** + * The proper flashrom parameters for this platform are: + + ```bash + flashrom -p linux_spi:dev=/dev/spidev1.0,spispeed=16000 -c "MX25L12835F/MX25L12845E/MX25L12865E" -w [path_to_binary] + ``` + +=== "vp66xx" + + ## Intro + + The following documentation describes the process of recovering hardware from + the brick state with [RTE](../../transparent-validation/rte/introduction.md) and + Dasharo open-source firmware. + + ## Prerequisites + + * [Prepared RTE](../../transparent-validation/rte/v1.1.0/quick-start-guide.md) + * 6x female-female wire cables + + ## Connections + + To prepare the stand for flashing follow the steps described below: + + 1. Open the platform cover. + 2. Connect the J1 and J2 flash headers to the [SPI + header](../../transparent-validation/rte/v1.1.0/specification.md) on RTE. + + | SPI header | VP66xx J2 | + |:----------:|:------------:| + | Vcc | pin 1 (Vcc) | + | SCLK | pin 3 (CLK) | + | MOSI | pin 4 (MOSI) | + + | SPI header | VP66xx J1 | + |:----------:|:------------:| + | GND | pin 4 (GND) | + | CS | pin 1 (CS) | + | MISO | pin 2 (MISO) | + + ## Firmware flashing + + To flash firmware follow the steps described below: + + 3. Login to RTE via `ssh` or `minicom`. + 4. Turn on the platform by connecting the power supply. + 5. Wait at least 5 seconds. + 6. Turn off the platform by using the power button. + 7. Wait at least 3 seconds. + 8. Set the proper state of the SPI by using the following commands on RTE: + + ```bash + # set SPI Vcc to 3.3V + echo 1 > /sys/class/gpio/gpio405/value + # SPI Vcc on + echo 1 > /sys/class/gpio/gpio406/value + # SPI lines ON + echo 1 > /sys/class/gpio/gpio404/value + ``` + + 9. Wait at least 2 seconds. + 10. Disconnect the power supply from the platform. + 11. Wait at least 2 seconds. + 12. Flash the platform by using the following command: + + ```bash + flashrom -p linux_spi:dev=/dev/spidev1.0,spispeed=16000 -w [path_to_binary] + ``` + + > Flashing with flashrom takes about 1 minute. + + 13. Change back the state of the SPI by using the following commands: + + ```bash + echo 0 > /sys/class/gpio/gpio404/value + echo 0 > /sys/class/gpio/gpio406/value + ``` + + 14. Reset the CMOS battery (short JCMOS1 header for a couple of seconds). + 15. Turn on the platform by connecting the power supply. + + The first boot of the platform after proceeding with the above procedure can + take much longer than standard. + +=== "vp2410" + + ## Intro + + The following documentation describes the process of recovering hardware from + the brick state with [RTE](../../transparent-validation/rte/introduction.md) and + Dasharo open-source firmware. + + ## Connections + + Set up the connections required for external flashing as described in + [Generic Testing Stand Setup](../../unified-test-documentation/generic-testing-stand-setup.md) + Protectli VP2410 are flashed using the Pomona clip connection variant. Use + the pictures below to easily locate essential components on the mainboard. + + ### SPI flash chip location + + Completely remove the motherboard from the platform cover. + + ![](../../images/protectli_recovery/vp2410_disassembly.jpg) + ![](../../images/protectli_recovery/vp2410_location_of_flash_chip.jpg) + + > If there is little thermal paste on the CPU, apply it before reassembling + > the motherboard to the platform cover. + + ### CMOS header location + + ![](../../images/protectli_recovery/vp2410_location_of_CMOS_header.jpg) + + ## Firmware flashing + + To flash firmware, follow the steps described in + [Generic Testing Stand Setup](../../unified-test-documentation/generic-testing-stand-setup.md) + , noting that: + * The chip voltage for this platform is **1.8V** + * The proper flashrom parameters for this platform are: + + ```bash + flashrom -p linux_spi:dev=/dev/spidev1.0,spispeed=16000 -c "MX25U6435E/F" -w [path_to_binary] + ``` + +=== "vp2420" + + ## Intro + + The following documentation describes describes platform-specific details of + setting up Protectli VP2420 for recovery from brick state with + [RTE](../../transparent-validation/rte/introduction.md) and Dasharo open-source + firmware. + + ## Prerequisites + + * [Prepared RTE](../../transparent-validation/rte/v1.1.0/quick-start-guide.md) + * SOIC-8 Pomona clip + * 6x female-female wire cables + + ## Connections + + Set up the connections required for external flashing as described in + [Generic Testing Stand Setup](../../unified-test-documentation/generic-testing-stand-setup.md). + Protectli VP2420 are flashed using the Pomona clip connection variant. Use + the pictures below to easily locate essential components on the mainboard. + + ### SPI flash chip + + ![](../../images/protectli_recovery/vp2420_location_of_flash_chip.jpg) + ![](../../images/protectli_recovery/flash_chip.jpg) + ![](../../images/protectli_recovery/pomona_clip_connected_to_flash_chip.jpg) + + ### CMOS header + + ![](../../images/protectli_recovery/vp2420_location_of_CMOS_header.jpg) + + ## Firmware flashing + + To flash firmware, follow the steps described in + [Generic Testing Stand Setup](../../unified-test-documentation/generic-testing-stand-setup.md) + , noting that: + * The chip voltage for this platform is **3.3V** + * The proper flashrom parameters for this platform are: + + ```bash + flashrom -p linux_spi:dev=/dev/spidev1.0,spispeed=16000 -c "MX25L12835F/MX25L12845E/MX25L12865E" -w [path_to_binary] + ``` diff --git a/docs/unified/protectli/releases.md b/docs/unified/protectli/releases.md new file mode 100644 index 0000000000..7866a33306 --- /dev/null +++ b/docs/unified/protectli/releases.md @@ -0,0 +1,821 @@ +# Release Notes + +=== "fw6" + Following Release Notes describe status of Open Source Firmware development for + Protectli FW6. + + For details about our release process please read + [Dasharo Standard Release Process](../../dev-proc/standard-release-process.md). + +
+ [Subscribe to Protectli FW6 Dasharo Release Newsletter] + [newsletter]{.md-button .md-button--primary .center} +
+ + Test results for this platform can be found + [here](https://docs.google.com/spreadsheets/d/1wI0qBSLdaluayYsm_lIa9iJ9LnPnCOZ9eNOyrKSc-j4/edit?usp=sharing). + + ## v1.0.14 - 2022-05-13 + + ### Changed + + - Throttling temperature to 75 Celsius degrees + + ### Known issues + + - Samsung memory modules do not work properly on older FW6A/B/C (SKU6LAV20) + + ### Binaries + + [protectli_vault_kbl_v1.0.14.rom][v1.0.14_rom]{.md-button} + [sha256][v1.0.14_hash]{.md-button} + [sha256.sig][v1.0.14_sig]{.md-button} + + To verify binary integrity with hash and signature please follow the + instructions in [Dasharo release signature verification](/guides/signature-verification) + using [this key](https://raw.githubusercontent.com/3mdeb/3mdeb-secpack/master/customer-keys/protectli/release-keys/protectli-dasharo-firewall-release-1.0-key.asc) + + ### SBOM (Software Bill of Materials) + + - [coreboot based on 87f9fc85 revision e04b0ac8](https://github.com/Dasharo/coreboot/commits/e04b0ac8) + - [seabios based on v1.0.6 revision 03bcdcaf](https://github.com/Dasharo/SeaBIOS/commits/03bcdcaf) + - [ipxe based on 2019.3 stable revision ebf2eaf5](https://github.com/ipxe/ipxe/commits/ebf2eaf5) + - [memtest based on v002 revision dd5b4ff2](https://review.coreboot.org/admin/repos/memtest86plus,general) + - Management Engine: ME 11.8.50.3399, + SHA256: e1ce735139b6d9ebb81d7f6db288b0a896c39e4b1e606324b915bec949b6aca6 + - microcode: + + CPU signature: 0x0406E3, Date: 03.10.2019, Revision: 0xD6 + + CPU signature: 0x0806E9, Date: 27.04.2020, Revision: 0xD6 + + CPU signature: 0x0806E9, Date: 27.04.2020, Revision: 0xD6 + + CPU signature: 0x0806EA, Date: 27.04.2020, Revision: 0xD6 + - VBIOS: + + VBIOS blob for FW6A/B/C, + SHA256: 470d3faefb09432bea00d637ec6b3ff51854e6cff0ee56627c0773acaffa4830 + + VBIOS blob for FW6D/E, + SHA256: d1c746127e5288942efae65907739e18ff395fab70925b44dbafafd9e7b30cd7 + + [newsletter]: https://newsletter.3mdeb.com/subscription/n2EpSxtqL + [v1.0.14_rom]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_kbl/v1.0.14/protectli_vault_kbl_v1.0.14.rom + [v1.0.14_hash]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_kbl/v1.0.14/protectli_vault_kbl_v1.0.14.rom.sha256 + [v1.0.14_sig]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_kbl/v1.0.14/protectli_vault_kbl_v1.0.14.rom.sha256.sig + +=== "v1x1x" + Following Release Notes describe status of Open Source Firmware development + for Protectli V1210/V1410/V1610 + + For details about our release process please read + [Dasharo Standard Release Process](../../dev-proc/standard-release-process.md). + +
+ [Subscribe to Protectli V1210/V1410/V1610 Dasharo Release Newsletter] + [newsletter]{.md-button .md-button--primary .center} +
+ + Test results for this platform can be found + [here](https://docs.google.com/spreadsheets/d/1wI0qBSLdaluayYsm_lIa9iJ9LnPnCOZ9eNOyrKSc-j4/edit#gid=1316498194). + + [newsletter]: https://newsletter.3mdeb.com/subscription/n2EpSxtqL + + + [![empty-pixel](../../images/empty_pixel.png)](overview.md) + +=== "vp46xx" + Following Release Notes describe status of Open Source Firmware development for + Protectli VP46xx + + For details about our release process please read + [Dasharo Standard Release Process](../../dev-proc/standard-release-process.md). + +
+ [Subscribe to Protectli VP46xx Dasharo Release Newsletter] + [newsletter]{.md-button .md-button--primary .center} +
+ + Test results for this platform can be found + [here](https://docs.google.com/spreadsheets/d/1wI0qBSLdaluayYsm_lIa9iJ9LnPnCOZ9eNOyrKSc-j4/edit?usp=sharing). + + ## v1.2.0 - 2024-03-25 + + Test results for this release can be found + [here](https://docs.google.com/spreadsheets/d/1wSE6xA3K3nXewwLn5lV39_2wZL1kg5AkGb4mvmG3bwE/edit#gid=2016830329). + + ### Added + + - [Setup menu password configuration](https://docs.dasharo.com/dasharo-menu-docs/overview/#dasharo-menu-guides) + - [Serial port console redirection option in setup menu](https://docs.dasharo.com/dasharo-menu-docs/dasharo-system-features/#serial-port-configuration) + - [Customizable Serial Number and UUID via CBFS support](https://github.com/Dasharo/dcu) + - [Customizable boot logo support](https://github.com/Dasharo/dcu) + - [Support for taking screenshots in the firmware](https://docs.dasharo.com/dev-proc/screenshots/#taking-screenshots) + - [ESP partition scanning in look for grubx64.efi or shimx64.efi or Windows bootmgr](https://github.com/Dasharo/dasharo-issues/issues/94) + - Microsoft and Windows 2023 UEFI Secure Boot certificates + - UEFI 2.8 errata C compliance in EDKII fork + + ### Changed + + - Rebased to coreboot 4.21 + - Enroll default UEFI Secure Boot keys on the first boot + - [Improved UEFI Secure Boot menu user experience](https://docs.dasharo.com/dasharo-menu-docs/device-manager/#secure-boot-configuration) + - Scope of reset to defaults hotkey to global in firmware setup + - Updated microcode to the newer version; refer to SBOM section below + - Updated ME to the newer version; refer to SBOM section below + - Prepared unified support for v1 and v2 CPUs resulting in a single binary for + all 3 board variants + + ### Fixed + + - [Auto Boot Time-out is reset to 0 when F9 is pressed](https://github.com/Dasharo/dasharo-issues/issues/513) + - [Reset to defaults with F9 causes the wrong settings to be restored](https://github.com/Dasharo/dasharo-issues/issues/355) + - [RTC time and date resetting to the coreboot build date on 29th February](https://review.coreboot.org/c/coreboot/+/80790) + + ### Known issues + + - [Unexpected errors in dmesg on VP4670 v2 with 1.2.0](https://github.com/Dasharo/dasharo-issues/issues/746) + - [Maximum reported frequency is base frequency, not turbo frequency (Windows 11)](https://github.com/Dasharo/dasharo-issues/issues/522) + - [No ability to change active PCR banks with TPM PPI in FW](https://github.com/Dasharo/dasharo-issues/issues/521) + - [DisplayPort output does not work with 16:10 (1920x1200) monitors](https://github.com/Dasharo/dasharo-issues/issues/531) + + ### Binaries + + [protectli_vp46xx_v1.2.0.rom][protectli_vp46xx_v1.2.0.rom_file]{.md-button} + [sha256][protectli_vp46xx_v1.2.0.rom_hash]{.md-button} + [sha256.sig][protectli_vp46xx_v1.2.0.rom_sig]{.md-button} + + [protectli_vp46xx_v1.2.0_dev_signed.rom][protectli_vp46xx_v1.2.0_dev_signed.rom_file]{.md-button} + [sha256][protectli_vp46xx_v1.2.0_dev_signed.rom_hash]{.md-button} + [sha256.sig][protectli_vp46xx_v1.2.0_dev_signed.rom_sig]{.md-button} + + To verify binary integrity with hash and signature please follow the + instructions in [Dasharo release signature verification](/guides/signature-verification) + using [this key](https://raw.githubusercontent.com/3mdeb/3mdeb-secpack/master/customer-keys/protectli/release-keys/dasharo-release-1.2.x-for-protectli-signing-key.asc) + + ### SBOM (Software Bill of Materials) + + - [Dasharo coreboot fork based on 4.21 revision add9d720](https://github.com/Dasharo/coreboot/tree/add9d720) + - [Dasharo EDKII fork based on edk2-stable202002 revision 2a15268b](https://github.com/Dasharo/edk2/tree/2a15268b) + - [iPXE based on 2023.12 revision 838611b3](https://github.com/Dasharo/ipxe/tree/838611b3) + - [vboot based on 0c11187c75 revision 0c11187c](https://chromium.googlesource.com/chromiumos/platform/vboot_reference/+/0c11187c/) + - [Intel Management Engine based on v14.0.47.1558 revision d0b63476](https://github.com/Dasharo/dasharo-blobs/blob/d0b63476/protectli/vault_cml/me.bin) + - [Intel Flash Descriptor based on v1.0 revision d0b63476](https://github.com/Dasharo/dasharo-blobs/blob/d0b63476/protectli/vault_cml/descriptor.bin) + - [Intel Firmware Support Package based on CometLake1 9.0.7B.20 revision 481ea7cf](https://github.com/intel/FSP/tree/481ea7cf/CometLakeFspBinPkg/CometLake1) + - [Intel Firmware Support Package based on CometLake2 9.2.7B.20 revision 481ea7cf](https://github.com/intel/FSP/tree/481ea7cf/CometLakeFspBinPkg/CometLake2) + - [Intel microcode based on CML-U42 V0 0x000000f8 revision microcode-20230808](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/tree/microcode-20230808/intel-ucode/06-8e-0c) + - [Intel microcode based on CML-U62 V1 A0 0x000000f8 revision microcode-20230808](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/tree/microcode-20230808/intel-ucode/06-a6-00) + - [Intel microcode based on CML-U62 V2 K1 0x000000f8 revision microcode-20230808](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/tree/microcode-20230808/intel-ucode/06-a6-01) + + [protectli_vp46xx_v1.2.0.rom_file]: https://dl.3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/v1.2.0/protectli_vp46xx_v1.2.0.rom + [protectli_vp46xx_v1.2.0.rom_hash]: https://dl.3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/v1.2.0/protectli_vp46xx_v1.2.0.rom.sha256 + [protectli_vp46xx_v1.2.0.rom_sig]: https://dl.3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/v1.2.0/protectli_vp46xx_v1.2.0.rom.sha256.sig + [protectli_vp46xx_v1.2.0_dev_signed.rom_file]: https://dl.3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/v1.2.0/protectli_vp46xx_v1.2.0_dev_signed.rom + [protectli_vp46xx_v1.2.0_dev_signed.rom_hash]: https://dl.3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/v1.2.0/protectli_vp46xx_v1.2.0_dev_signed.rom.sha256 + [protectli_vp46xx_v1.2.0_dev_signed.rom_sig]: https://dl.3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/v1.2.0/protectli_vp46xx_v1.2.0_dev_signed.rom.sha256.sig + + ## v1.1.0 - 2023-06-05 + + Release version v1.1.0 is currently only available for the VP4670 platform. + + ### Added + + - [USB stack and mass storage enable/disable option](https://docs.dasharo.com/dasharo-menu-docs/dasharo-system-features/#usb-configuration) + - [SMM BIOS write protection enable/disable option](https://docs.dasharo.com/dasharo-menu-docs/dasharo-system-features/#dasharo-security-options) + + ### Changed + + - Reverted to use FSP GOP for graphics initialization as it caused problems with + Windows 11 display on VP4670 + - Switched to use driver for IT8784E Super I/O, which is present on the boards + - CPU power limits increased from baseline to performance + - [Updating from v1.0.x requires flashing the WP_RO recovery partition](https://docs.dasharo.com/variants/protectli_vp46xx/firmware-update/#updating-to-dasharo-v1018-or-v1019-or-v110) + - [Firmware version v1.1.x are signed with a new key](https://raw.githubusercontent.com/3mdeb/3mdeb-secpack/master/customer-keys/protectli/release-keys/dasharo-release-1.1.x-for-protectli-signing-key.asc) + + ### Fixed + + - [Booting problems with Ubuntu 22.04](https://github.com/Dasharo/dasharo-issues/issues/370) + - [Low CPU frequency values](https://github.com/Dasharo/dasharo-issues/issues/369) + - Disabled C states deeper than C1 on VP4670 to fix Proxmox booting issue + - [Protectli VP4670 - windows crashes after installing updates](https://github.com/Dasharo/dasharo-issues/issues/302) + - [The inconvenience of using external headsets VP46XX](https://github.com/Dasharo/dasharo-issues/issues/167) + + ### Known issues + + - [Popup with information about recovery mode is still displayed after flashing with a valid binary](https://github.com/Dasharo/dasharo-issues/issues/320) + + ### Binaries + + [protectli_vp4670_v1.1.0.rom][protectli_vp4670_v1.1.0.rom_file]{.md-button} + [sha256][protectli_vp4670_v1.1.0.rom_hash]{.md-button} + [sha256.sig][protectli_vp4670_v1.1.0.rom_sig]{.md-button} + + To verify binary integrity with hash and signature please follow the + instructions in [Dasharo release signature verification](/guides/signature-verification) + using [this key](https://raw.githubusercontent.com/3mdeb/3mdeb-secpack/master/customer-keys/protectli/release-keys/dasharo-release-1.1.x-for-protectli-signing-key.asc) + + ### SBOM (Software Bill of Materials) + + - [coreboot based on c6ee1509da revision dcc5f2e2](https://github.com/Dasharo/coreboot/tree/dcc5f2e2) + - [edk2 based on 7f90b9cd revision 19bf14b4](https://github.com/Dasharo/edk2/tree/19bf14b4) + - [iPXE based on 6ba671ac revision 6ba671ac](https://github.com/ipxe/ipxe/tree/6ba671ac) + + [newsletter]: https://newsletter.3mdeb.com/subscription/n2EpSxtqL + [protectli_vp4670_v1.1.0.rom_file]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/v1.1.0/protectli_vp4670_v1.1.0.rom + [protectli_vp4670_v1.1.0.rom_hash]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/v1.1.0/protectli_vp4670_v1.1.0.rom.sha256 + [protectli_vp4670_v1.1.0.rom_sig]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/v1.1.0/protectli_vp4670_v1.1.0.rom.sha256.sig + + ## v1.0.19 - 2022-12-08 + + ### Changed + + - ME is now disabled by default (ME soft-disable) + - vboot is now run as separate verstage (previously was run inside bootblock) + - increased pre-RAM console buffer to fit more early cbmem logs + + ### Binaries + + [protectli_vp4630_vp4650_v1.0.19.rom][protectli_vp4630_vp4650_v1.0.19.rom_file]{.md-button} + [sha256][protectli_vp4630_vp4650_v1.0.19.rom_hash]{.md-button} + [sha256.sig][protectli_vp4630_vp4650_v1.0.19.rom_sig]{.md-button} + + [protectli_vp4670_v1.0.19.rom][protectli_vp4670_v1.0.19.rom_file]{.md-button} + [sha256][protectli_vp4670_v1.0.19.rom_hash]{.md-button} + [sha256.sig][protectli_vp4670_v1.0.19.rom_sig]{.md-button} + + To verify binary integrity with hash and signature please follow the + instructions in [Dasharo release signature verification](/guides/signature-verification) + using [this key](https://raw.githubusercontent.com/3mdeb/3mdeb-secpack/master/customer-keys/protectli/release-keys/protectli-dasharo-firewall-release-1.0-key.asc) + + ### SBOM (Software Bill of Materials) + + - [coreboot based on c6ee1509da revision 9034fb12](https://github.com/Dasharo/coreboot/tree/9034fb12) + - [edk2 based on 7f90b9cd revision e31b7a71](https://github.com/Dasharo/edk2/tree/e31b7a71) + - [iPXE for EFI revision 988d2](https://github.com/ipxe/ipxe/tree/988d2c13cdf0f0b4140685af35ced70ac5b3283c) + - VP4670: [Cometlake1 FSP 9.0.7B.20](https://github.com/intel/FSP/tree/12160fe64bc1caaba3c2d6be44da0cd8787a2561/CometLakeFspBinPkg/CometLake1) + - VP4630 and VP4650: [Cometlake2 FSP 9.2.7B.20](https://github.com/intel/FSP/tree/12160fe64bc1caaba3c2d6be44da0cd8787a2561/CometLakeFspBinPkg/CometLake2) + - Intel i225 EFI driver version 0.10.4, + SHA256: 2d234ecf629fc10dc0c291a1390de3d27a05c6ecbd935628b6ff154f386d061e + - Management Engine: Custom image based on ME 14.0.47.1558, + SHA256: 7fa37e108176c9a2d0df60c93b10b3ad9c7725f1f82b87197a2991208c4cffec + - microcode: + + CPU signature: 0x0806EC, Date: 17.11.2021, Revision: 0xF0 + + CPU signature: 0x0A0660, Date: 15.11.2021, Revision: 0xF0 + + CPU signature: 0x0A0661, Date: 16.11.2021, Revision: 0xF0 + + ## v1.0.18 - 2022-11-16 + + Test results for this release can be found + [here](https://docs.google.com/spreadsheets/d/1wI0qBSLdaluayYsm_lIa9iJ9LnPnCOZ9eNOyrKSc-j4/edit#gid=1613384145). + + ### Added + + - Support for VP4650 and VP4670 platforms + - Platform will beep 12 times and blink HDD led on critical firmware errors + + ### Changed + + - Disabled Intel PTT (fTPM) + - [Removed workaround for graphics power management as the issue no longer reproduces on newer revision of the hardware](https://github.com/Dasharo/dasharo-issues/issues/26) + - Binaries are built with coreboot-sdk 2021-09-23_b0d87f753c (was 0ad5fbd48d) + - Open-source graphics initialization with libgfxinit instead of proprietary and + closed FSP GOP driver + + ### Binaries + + [protectli_vp4630_vp4650_v1.0.18.rom][protectli_vp4630_vp4650_v1.0.18.rom_file]{.md-button} + [sha256][protectli_vp4630_vp4650_v1.0.18.rom_hash]{.md-button} + [sha256.sig][protectli_vp4630_vp4650_v1.0.18.rom_sig]{.md-button} + + [protectli_vp4670_v1.0.18.rom][protectli_vp4670_v1.0.18.rom_file]{.md-button} + [sha256][protectli_vp4670_v1.0.18.rom_hash]{.md-button} + [sha256.sig][protectli_vp4670_v1.0.18.rom_sig]{.md-button} + + To verify binary integrity with hash and signature please follow the + instructions in [Dasharo release signature verification](/guides/signature-verification) + using [this key](https://raw.githubusercontent.com/3mdeb/3mdeb-secpack/master/customer-keys/protectli/release-keys/protectli-dasharo-firewall-release-1.0-key.asc) + + ### SBOM (Software Bill of Materials) + + - [coreboot based on c6ee1509da revision ed9f6fe0](https://github.com/Dasharo/coreboot/tree/ed9f6fe0) + - [edk2 based on 7f90b9cd revision e31b7a71](https://github.com/Dasharo/edk2/tree/e31b7a71) + - [iPXE for EFI revision 988d2](https://github.com/ipxe/ipxe/tree/988d2c13cdf0f0b4140685af35ced70ac5b3283c) + - VP4670: [Cometlake1 FSP 9.0.7B.20](https://github.com/intel/FSP/tree/12160fe64bc1caaba3c2d6be44da0cd8787a2561/CometLakeFspBinPkg/CometLake1) + - VP4630 and VP4650: [Cometlake2 FSP 9.2.7B.20](https://github.com/intel/FSP/tree/12160fe64bc1caaba3c2d6be44da0cd8787a2561/CometLakeFspBinPkg/CometLake2) + - Intel i225 EFI driver version 0.10.4, + SHA256: 2d234ecf629fc10dc0c291a1390de3d27a05c6ecbd935628b6ff154f386d061e + - Management Engine: Custom image based on ME 14.0.47.1558, + SHA256: 7fa37e108176c9a2d0df60c93b10b3ad9c7725f1f82b87197a2991208c4cffec + - microcode: + + CPU signature: 0x0806EC, Date: 17.11.2021, Revision: 0xF0 + + CPU signature: 0x0A0660, Date: 15.11.2021, Revision: 0xF0 + + CPU signature: 0x0A0661, Date: 16.11.2021, Revision: 0xF0 + + ## v1.0.17 - 2022-08-17 + + Test results for this release can be found + [here](https://docs.google.com/spreadsheets/d/1wI0qBSLdaluayYsm_lIa9iJ9LnPnCOZ9eNOyrKSc-j4/edit#gid=1613384145). + + ### Added + + - [Tools for resigning Vboot images with one RW partition](https://docs.dasharo.com/guides/vboot-signing/) + + ### Changed + + - Set thermal throttling temperature to 80 degrees + - Disabled UEFI Secure Boot by default + + ### Fixed + + - Platform rebooting every 56 minutes + - Incorrect menu labels displayed in network boot menu + - Built-in audio jack does not work + + ### Binaries + + [protectli_vault_cml_v1.0.17.rom_file][protectli_vault_cml_v1.0.17.rom_file]{.md-button} + [protectli_vault_cml_v1.0.17.rom_hash][protectli_vault_cml_v1.0.17.rom_hash]{.md-button} + [protectli_vault_cml_v1.0.17.rom_sig][protectli_vault_cml_v1.0.17.rom_sig]{.md-button} + + To verify binary integrity with hash and signature please follow the + instructions in [Dasharo release signature verification](/guides/signature-verification) + using [this key](https://raw.githubusercontent.com/3mdeb/3mdeb-secpack/master/customer-keys/protectli/release-keys/protectli-dasharo-firewall-release-1.0-key.asc) + + ### SBOM (Software Bill of Materials) + + - [coreboot based on 4.16 revision d662831d](https://github.com/Dasharo/coreboot/tree/d662831d) + - [edk2 based on 7f90b9cd revision 576aa6a4](https://github.com/Dasharo/edk2/tree/576aa6a4) + - [iPXE for EFI revision 988d2](https://github.com/ipxe/ipxe/tree/988d2c13cdf0f0b4140685af35ced70ac5b3283c) + - [Cometlake2 FSP 9.2.7B.20](https://github.com/intel/FSP/tree/10eae55b8eb0febfa2dfabf4017701b072866170/CometLakeFspBinPkg/CometLake2) + - Intel i225 EFI driver version 0.10.4, + SHA256: 2d234ecf629fc10dc0c291a1390de3d27a05c6ecbd935628b6ff154f386d061e + - Management Engine: Custom image based on ME 14.0.47.1558, + SHA256: 7fa37e108176c9a2d0df60c93b10b3ad9c7725f1f82b87197a2991208c4cffec + - microcode: + + CPU signature: 0x0806EC, Date: 28.04.2021, Revision: 0xEC + + CPU signature: 0x0A0660, Date: 28.04.2021, Revision: 0xEA + + CPU signature: 0x0A0661, Date: 29.04.2021, Revision: 0xEC + + ## v1.0.16 - 2022-07-13 + + Test results for this release can be found + [here](https://docs.google.com/spreadsheets/d/1wI0qBSLdaluayYsm_lIa9iJ9LnPnCOZ9eNOyrKSc-j4/edit#gid=1613384145). + + ### Added + + - [Vboot Verified Boot](https://docs.dasharo.com/guides/vboot-signing/) + - [TPM Measured Boot](https://docs.dasharo.com/unified-test-documentation/dasharo-security/203-measured-boot/) + - [Vboot recovery notification in UEFI Payload](https://docs.dasharo.com/unified-test-documentation/dasharo-security/201-verified-boot/) + - [UEFI Shell](https://docs.dasharo.com/unified-test-documentation/dasharo-compatibility/30P-uefi-shell/) + - [UEFI Secure Boot](https://docs.dasharo.com/unified-test-documentation/dasharo-security/206-secure-boot/) + - [Intel ME soft disable](https://docs.dasharo.com/unified-test-documentation/dasharo-security/20F-me-neuter/) + - [BIOS flash protection for Vboot recovery region](https://docs.dasharo.com/unified-test-documentation/dasharo-security/20J-bios-lock-support/) + + ### Changed + + - [Changed supported CPUs to Comet Lake stepping 2](https://github.com/intel/FSP/tree/master/CometLakeFspBinPkg#comet-lake-binary-differences) + + ### Fixed + + - [i225 network controller initialization takes too much time](https://github.com/Dasharo/dasharo-issues/issues/65) + - [CVE-2022-29264](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-29264) + + ### Binaries + + [protectli_vault_cml_v1.0.16.rom][v1.0.16_rom]{.md-button} + [sha256][v1.0.16_hash]{.md-button} + [sha256.sig][v1.0.16_sig]{.md-button} + + To verify binary integrity with hash and signature please follow the + instructions in [Dasharo release signature verification](/guides/signature-verification) + using [this key](https://raw.githubusercontent.com/3mdeb/3mdeb-secpack/master/customer-keys/protectli/release-keys/protectli-dasharo-firewall-release-1.0-key.asc) + + ### SBOM (Software Bill of Materials) + + - [coreboot based on 4.16 revision dfaaf44d](https://github.com/Dasharo/coreboot/tree/dfaaf44d) + - [edk2 based on 7f90b9cd revision 5345a611](https://github.com/Dasharo/edk2/tree/5345a611) + - [iPXE for EFI revision 988d2](https://github.com/ipxe/ipxe/tree/988d2c13cdf0f0b4140685af35ced70ac5b3283c) + - [Cometlake2 FSP 9.2.7B.20](https://github.com/intel/FSP/tree/10eae55b8eb0febfa2dfabf4017701b072866170/CometLakeFspBinPkg/CometLake2) + - Intel i225 EFI driver version 0.10.4, + SHA256: 2d234ecf629fc10dc0c291a1390de3d27a05c6ecbd935628b6ff154f386d061e + - Management Engine: Custom image based on ME 14.0.47.1558, + SHA256: 7fa37e108176c9a2d0df60c93b10b3ad9c7725f1f82b87197a2991208c4cffec + - microcode: + + CPU signature: 0x0806EC, Date: 28.04.2021, Revision: 0xEC + + CPU signature: 0x0A0660, Date: 28.04.2021, Revision: 0xEA + + CPU signature: 0x0A0661, Date: 29.04.2021, Revision: 0xEC + + ## v1.0.13 - 2022-03-22 + + ### Added + + - UEFI boot support + - i225 network controller network boot support + - Customized boot menu keys + - Customized setup menu keys + - Configurable boot order + - Configurable boot options + + ### Changed + + - ME version to 14.0.47.1558 + + ### Known issues + + - [i225 network controller initialization takes too much time](https://github.com/Dasharo/dasharo-issues/issues/65) + + ### Binaries + + [protectli_vault_cml_v1.0.13.rom][v1.0.13_rom]{.md-button} + [sha256][v1.0.13_hash]{.md-button} + [sha256.sig][v1.0.13_sig]{.md-button} + + To verify binary integrity with hash and signature please follow the + instructions in [Dasharo release signature verification](/guides/signature-verification) + using [this key](https://raw.githubusercontent.com/3mdeb/3mdeb-secpack/master/customer-keys/protectli/release-keys/protectli-dasharo-firewall-release-1.0-key.asc) + + ### SBOM (Software Bill of Materials) + + - [coreboot based on 4.16 revision 546e1c86](https://github.com/Dasharo/coreboot/tree/546e1c86) + - [edk2 based on 7f90b9cd revision 7f90b9cd](https://github.com/Dasharo/edk2/tree/7f90b9cd) + - [iPXE for EFI revision 988d2](https://github.com/ipxe/ipxe/tree/988d2c13cdf0f0b4140685af35ced70ac5b3283c) + - [Cometlake1 FSP 9.0.7B.20](https://github.com/intel/FSP/tree/10eae55b8eb0febfa2dfabf4017701b072866170/CometLakeFspBinPkg/CometLake1) + - Intel i225 EFI driver version 0.9.03, + SHA256: 63e77b237dc9a8aacdd7465675ee88afc01dad3204156a91a0976a4ad1ed5b00 + - Management Engine: Custom image based on ME 14.0.47.1558, + SHA256: 7fa37e108176c9a2d0df60c93b10b3ad9c7725f1f82b87197a2991208c4cffec + - microcode: + + CPU signature: 0x0806EC, Date: 28.04.2021, Revision: 0xEC + + CPU signature: 0x0A0660, Date: 28.04.2021, Revision: 0xEA + + [newsletter]: https://newsletter.3mdeb.com/subscription/n2EpSxtqL + [protectli_vp4630_vp4650_v1.0.19.rom_file]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/v1.0.19/protectli_vp4630_vp4650_v1.0.19.rom + [protectli_vp4630_vp4650_v1.0.19.rom_hash]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/v1.0.19/protectli_vp4630_vp4650_v1.0.19.rom.sha256 + [protectli_vp4630_vp4650_v1.0.19.rom_sig]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/v1.0.19/protectli_vp4630_vp4650_v1.0.19.rom.sha256.sig + [protectli_vp4670_v1.0.19.rom_file]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/v1.0.19/protectli_vp4670_v1.0.19.rom + [protectli_vp4670_v1.0.19.rom_hash]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/v1.0.19/protectli_vp4670_v1.0.19.rom.sha256 + [protectli_vp4670_v1.0.19.rom_sig]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/v1.0.19/protectli_vp4670_v1.0.19.rom.sha256.sig + [protectli_vp4630_vp4650_v1.0.18.rom_file]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/v1.0.18/protectli_vp4630_vp4650_v1.0.18.rom + [protectli_vp4630_vp4650_v1.0.18.rom_hash]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/v1.0.18/protectli_vp4630_vp4650_v1.0.18.rom.sha256 + [protectli_vp4630_vp4650_v1.0.18.rom_sig]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/v1.0.18/protectli_vp4630_vp4650_v1.0.18.rom.sha256.sig + [protectli_vp4670_v1.0.18.rom_file]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/v1.0.18/protectli_vp4670_v1.0.18.rom + [protectli_vp4670_v1.0.18.rom_hash]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/v1.0.18/protectli_vp4670_v1.0.18.rom.sha256 + [protectli_vp4670_v1.0.18.rom_sig]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/v1.0.18/protectli_vp4670_v1.0.18.rom.sha256.sig + [protectli_vault_cml_v1.0.17.rom_file]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/v1.0.17/protectli_vault_cml_v1.0.17.rom + [protectli_vault_cml_v1.0.17.rom_hash]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/v1.0.17/protectli_vault_cml_v1.0.17.rom.sha256 + [protectli_vault_cml_v1.0.17.rom_sig]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/v1.0.17/protectli_vault_cml_v1.0.17.rom.sha256.sig + [v1.0.16_rom]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/v1.0.16/protectli_vault_cml_v1.0.16.rom + [v1.0.16_hash]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/v1.0.16/protectli_vault_cml_v1.0.16.rom.sha256 + [v1.0.16_sig]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/v1.0.16/protectli_vault_cml_v1.0.16.rom.sha256.sig + [v1.0.13_rom]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/protectli_vault_cml_v1.0.13.rom + [v1.0.13_hash]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/protectli_vault_cml_v1.0.13.rom.sha256 + [v1.0.13_sig]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/protectli_vault_cml_v1.0.13.rom.sha256.sig + +=== "vp66xx" + Following Release Notes describe status of Open Source Firmware development + for Protectli VP6630/VP6650/VP6670 + + For details about our release process please read + [Dasharo Standard Release Process](../../dev-proc/standard-release-process.md). + +
+ [Subscribe to Protectli VP6630/VP6650/VP6670 Dasharo Release Newsletter] + [newsletter]{.md-button .md-button--primary .center} +
+ + Test results for this platform can be found + [here](https://docs.google.com/spreadsheets/d/1wI0qBSLdaluayYsm_lIa9iJ9LnPnCOZ9eNOyrKSc-j4/edit#gid=1316498194). + + [newsletter]: https://newsletter.3mdeb.com/subscription/n2EpSxtqL + + + [![empty-pixel](../../images/empty_pixel.png)](overview.md) + +=== "vp2410" + Following Release Notes describe status of open-source firmware development for + Protectli VP2410 family. + + For details about our release process please read + [Dasharo Standard Release Process](../../dev-proc/standard-release-process.md). + +
+ [Subscribe to Protectli VP2410 Dasharo Release Newsletter] + [newsletter]{.md-button .md-button--primary .center} +
+ + Test results for this platform can be found + [here](https://docs.google.com/spreadsheets/d/1wSE6xA3K3nXewwLn5lV39_2wZL1kg5AkGb4mvmG3bwE/edit#gid=1033426620). + + ## v1.1.0 - 2024-05-16 + + ### Added + + - [SMM BIOS write protection](https://docs.dasharo.com/dasharo-menu-docs/dasharo-system-features/#dasharo-security-options) + - [Setup menu password configuration](https://docs.dasharo.com/dasharo-menu-docs/overview/#dasharo-menu-guides) + - [USB stack disable option in setup menu](https://docs.dasharo.com/dasharo-menu-docs/dasharo-system-features/#usb-configuration) + - [Serial port console redirection option in setup menu](https://docs.dasharo.com/dasharo-menu-docs/dasharo-system-features/#serial-port-configuration) + - [Customizable Serial Number and UUID via CBFS support](https://github.com/Dasharo/dcu) + - [Customizable boot logo support](https://github.com/Dasharo/dcu) + - [Support for taking screenshots in the firmware](https://docs.dasharo.com/dev-proc/screenshots/#taking-screenshots) + - [ESP partition scanning in look for grubx64.efi or shimx64.efi or Windows bootmgr](https://github.com/Dasharo/dasharo-issues/issues/94) + - Microsoft and Windows 2023 UEFI Secure Boot certificates + - UEFI 2.8 errata C compliance in EDKII fork + + ### Changed + + - Rebased to coreboot 4.21 + - Enroll default UEFI Secure Boot keys on the first boot + - [Improved UEFI Secure Boot menu user experience](https://docs.dasharo.com/dasharo-menu-docs/device-manager/#secure-boot-configuration) + - Scope of reset to defaults hotkey to global in firmware setup + - Updated microcode to the newer version; refer to SBOM section below + - Updated ME/TXE to the newer version; refer to SBOM section below + - Updated FSP to the newer version; refer to SBOM section below + + ### Fixed + + - [Auto Boot Time-out is reset to 0 when F9 is pressed](https://github.com/Dasharo/dasharo-issues/issues/513) + - [Reset to defaults with F9 causes the wrong settings to be restored](https://github.com/Dasharo/dasharo-issues/issues/355) + - RAM memory capacity not reported in firmware Setup Menu + - [RTC time and date resetting to the coreboot build date on 29th February](https://review.coreboot.org/c/coreboot/+/80790) + + ### Known issues + + - [VP2410 does not power on after shutting down with power button 4s override](https://github.com/Dasharo/dasharo-issues/issues/643) + - [USB 2.0 sticks not detected on VP2410](https://github.com/Dasharo/dasharo-issues/issues/99) + - [S3 resume does not work in Geminilake FSP](https://github.com/Dasharo/dasharo-issues/issues/27) + + ### Binaries + + [protectli_vp2410_v1.1.0.rom][protectli_vp2410_v1.1.0.rom_file]{.md-button} + [sha256][protectli_vp2410_v1.1.0.rom_hash]{.md-button} + [sha256.sig][protectli_vp2410_v1.1.0.rom_sig]{.md-button} + + To verify binary integrity with hash and signature please follow the + instructions in [Dasharo release signature verification](/guides/signature-verification) + using [this key](https://raw.githubusercontent.com/3mdeb/3mdeb-secpack/master/customer-keys/protectli/release-keys/dasharo-release-1.1.x-for-protectli-signing-key.asc) + + ### SBOM (Software Bill of Materials) + + - [Dasharo coreboot fork based on 4.21 revision 2d96eeb7](https://github.com/Dasharo/coreboot/tree/2d96eeb7) + - [Dasharo EDKII fork based on edk2-stable202002 revision ae0ce3e2](https://github.com/Dasharo/edk2/tree/ae0ce3e2) + - [iPXE based on 2023.12 revision 838611b3](https://github.com/Dasharo/ipxe/tree/838611b3) + - [vboot based on 0c11187c75 revision 0c11187c](https://chromium.googlesource.com/chromiumos/platform/vboot_reference/+/0c11187c/) + - [Intel Management Engine/Trusted Execution Engine based on v4.0.50.2083 revision 06bbd2a0](https://github.com/Dasharo/dasharo-blobs/blob/06bbd2a0/protectli/vault_glk/ifwi.bin) + - [Intel Flash Descriptor based on v1.0 revision 06bbd2a0](https://github.com/Dasharo/dasharo-blobs/blob/06bbd2a0/protectli/vault_glk/descriptor.bin) + - [Intel Firmware Support Package based on GLK v2.2.1.3.2 revision 06bbd2a0](https://github.com/Dasharo/dasharo-blobs/blob/06bbd2a0/protectli/vault_glk/GeminilakeFspBinPkg) + - [Intel microcode based on GLK B0 0x0000003e revision microcode-20230808](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/tree/microcode-20230808/intel-ucode/06-7a-01) + - [Intel microcode based on GLK R0 0x00000022 revision microcode-20230808](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/tree/microcode-20230808/intel-ucode/06-7a-08) + + [newsletter]: https://newsletter.3mdeb.com/subscription/n2EpSxtqL + [protectli_vp2410_v1.1.0.rom_file]: https://dl.3mdeb.com/open-source-firmware/Dasharo/protectli_vault_glk/v1.1.0/protectli_vp2410_v1.1.0.rom + [protectli_vp2410_v1.1.0.rom_hash]: https://dl.3mdeb.com/open-source-firmware/Dasharo/protectli_vault_glk/v1.1.0/protectli_vp2410_v1.1.0.rom.sha256 + [protectli_vp2410_v1.1.0.rom_sig]: https://dl.3mdeb.com/open-source-firmware/Dasharo/protectli_vault_glk/v1.1.0/protectli_vp2410_v1.1.0.rom.sha256.sig + + ## v1.0.15 - 2022-05-31 + + ### Changed + + - Customized Network boot menu and strings + + ### Fixed + + - SMBIOS memory information showing 0 MB DRAM in setup + + ### Known issues + + - [USB 2.0 sticks not detected on VP2410](https://github.com/Dasharo/dasharo-issues/issues/99) + - [S3 resume does not work in Geminilake FSP](https://github.com/Dasharo/dasharo-issues/issues/27) + + ### Binaries + + [protectli_VP2410_DF_v1.0.15.rom][v1.0.15_rom]{.md-button} + [sha256][v1.0.15_hash]{.md-button} + [sha256.sig][v1.0.15_sig]{.md-button} + + To verify binary integrity with hash and signature please follow the + instructions in [Dasharo release signature verification](/guides/signature-verification) + using [this key](https://raw.githubusercontent.com/3mdeb/3mdeb-secpack/master/customer-keys/protectli/release-keys/protectli-dasharo-firewall-release-1.0-key.asc) + + ### SBOM (Software Bill of Materials) + + - [coreboot based on b77cf229 revision f59b1ec9](https://github.com/Dasharo/coreboot/tree/f59b1ec9) + - [edk2 based on 7f90b9cd revision 90364638](https://github.com/Dasharo/edk2/tree/90364638) + - [iPXE for EFI revision 988d2](https://github.com/ipxe/ipxe/tree/988d2c13cdf0f0b4140685af35ced70ac5b3283c) + - FSP: Custom version based on Intel GeminiLake FSP 2.2.1.3 + - Management Engine: Custom image based on CSE 4.0.30.1392 + - microcode: + + CPU signature: 0x0706A8, Date: 09.06.2020, Revision: 0x18 + + CPU signature: 0x0706A0, Date: 12.07.2017, Revision: 0x26 + + CPU signature: 0x0706A1, Date: 09.06.2020, Revision: 0x34 + + [newsletter]: https://newsletter.3mdeb.com/subscription/n2EpSxtqL + [v1.0.15_rom]: https:/3mdeb.com/open-source-firmware/Dasharo/protectli_vault_glk/v1.0.15/protectli_vault_glk_v1.0.15.rom + [v1.0.15_hash]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_glk/v1.0.15/protectli_vault_glk_v1.0.15.rom.sha256 + [v1.0.15_sig]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_glk/v1.0.15/protectli_vault_glk_v1.0.15.rom.sha256.sig + +=== "vp2420" + Following Release Notes describe status of open-source firmware development for + Protectli VP2420 family. + + For details about our release process please read + [Dasharo Standard Release Process](../../dev-proc/standard-release-process.md). + +
+ [Subscribe to Protectli VP2420 Dasharo Release Newsletter] + [newsletter]{.md-button .md-button--primary .center} +
+ + Test results for this platform can be found + [here](https://docs.google.com/spreadsheets/d/1wSE6xA3K3nXewwLn5lV39_2wZL1kg5AkGb4mvmG3bwE/edit#gid=270990532). + + ## v1.2.0 - 2024-05-16 + + ### Added + + - [Setup menu password configuration](https://docs.dasharo.com/dasharo-menu-docs/overview/#dasharo-menu-guides) + - [Serial port console redirection option in setup menu](https://docs.dasharo.com/dasharo-menu-docs/dasharo-system-features/#serial-port-configuration) + - [Customizable Serial Number and UUID via CBFS support](https://github.com/Dasharo/dcu) + - [Customizable boot logo support](https://github.com/Dasharo/dcu) + - [Support for taking screenshots in the firmware](https://docs.dasharo.com/dev-proc/screenshots/#taking-screenshots) + - [ESP partition scanning in look for grubx64.efi or shimx64.efi or Windows bootmgr](https://github.com/Dasharo/dasharo-issues/issues/94) + - Microsoft and Windows 2023 UEFI Secure Boot certificates + - UEFI 2.8 errata C compliance in EDKII fork + + ### Changed + + - Rebased to coreboot 4.21 + - Enroll default UEFI Secure Boot keys on the first boot + - [Improved UEFI Secure Boot menu user experience](https://docs.dasharo.com/dasharo-menu-docs/device-manager/#secure-boot-configuration) + - Scope of reset to defaults hotkey to global in firmware setup + - Updated microcode to the newer version; refer to SBOM section below + - Updated ME to the newer version; refer to SBOM section below + + ### Fixed + + - [Auto Boot Time-out is reset to 0 when F9 is pressed](https://github.com/Dasharo/dasharo-issues/issues/513) + - [Reset to defaults with F9 causes the wrong settings to be restored](https://github.com/Dasharo/dasharo-issues/issues/355) + - [RTC time and date resetting to the coreboot build date on 29th February](https://review.coreboot.org/c/coreboot/+/80790) + - [Cannot set custom bootsplash in firmware via DCU nor cbfstool](https://github.com/Dasharo/dasharo-issues/issues/759) + + ### Binaries + + [protectli_vp2420_v1.2.0.rom][protectli_vp2420_v1.2.0.rom_file]{.md-button} + [sha256][protectli_vp2420_v1.2.0.rom_hash]{.md-button} + [sha256.sig][protectli_vp2420_v1.2.0.rom_sig]{.md-button} + + [protectli_vp2420_v1.2.0_dev_signed.rom][protectli_vp2420_v1.2.0_dev_signed.rom_file]{.md-button} + [sha256][protectli_vp2420_v1.2.0_dev_signed.rom_hash]{.md-button} + [sha256.sig][protectli_vp2420_v1.2.0_dev_signed.rom_sig]{.md-button} + + To verify binary integrity with hash and signature please follow the + instructions in [Dasharo release signature verification](/guides/signature-verification) + using [this key](https://raw.githubusercontent.com/3mdeb/3mdeb-secpack/master/customer-keys/protectli/release-keys/dasharo-release-1.2.x-for-protectli-signing-key.asc) + + ### SBOM (Software Bill of Materials) + + - [Dasharo coreboot fork based on 4.21 revision 7c2c79e8](https://github.com/Dasharo/coreboot/tree/7c2c79e8) + - [Dasharo EDKII fork based on edk2-stable202002 revision ae0ce3e2](https://github.com/Dasharo/edk2/tree/ae0ce3e2) + - [iPXE based on 2023.12 revision 838611b3](https://github.com/Dasharo/ipxe/tree/838611b3) + - [vboot based on 0c11187c75 revision 0c11187c](https://chromium.googlesource.com/chromiumos/platform/vboot_reference/+/0c11187c/) + - [Intel Management Engine based on v15.40.32.2910 revision d0b63476](https://github.com/Dasharo/dasharo-blobs/blob/d0b63476/protectli/vault_ehl/me.bin) + - [Intel Flash Descriptor based on v1.0 revision d0b63476](https://github.com/Dasharo/dasharo-blobs/blob/d0b63476/protectli/vault_ehl/descriptor.bin) + - [Intel Firmware Support Package based on Elkhart Lake MR6 revision 481ea7cf](https://github.com/intel/FSP/tree/481ea7cf/ElkhartLakeFspBinPkg/) + - [Intel microcode based on EHL B1 0x00000016 revision microcode-20230808](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/tree/microcode-20230808/intel-ucode/06-96-01) + + [protectli_vp2420_v1.2.0.rom_file]: https://dl.3mdeb.com/open-source-firmware/Dasharo/protectli_vault_ehl/v1.2.0/protectli_vp2420_v1.2.0.rom + [protectli_vp2420_v1.2.0.rom_hash]: https://dl.3mdeb.com/open-source-firmware/Dasharo/protectli_vault_ehl/v1.2.0/protectli_vp2420_v1.2.0.rom.sha256 + [protectli_vp2420_v1.2.0.rom_sig]: https://dl.3mdeb.com/open-source-firmware/Dasharo/protectli_vault_ehl/v1.2.0/protectli_vp2420_v1.2.0.rom.sha256.sig + [protectli_vp2420_v1.2.0_dev_signed.rom_file]: https://dl.3mdeb.com/open-source-firmware/Dasharo/protectli_vault_ehl/v1.2.0/protectli_vp2420_v1.2.0_dev_signed.rom + [protectli_vp2420_v1.2.0_dev_signed.rom_hash]: https://dl.3mdeb.com/open-source-firmware/Dasharo/protectli_vault_ehl/v1.2.0/protectli_vp2420_v1.2.0_dev_signed.rom.sha256 + [protectli_vp2420_v1.2.0_dev_signed.rom_sig]: https://dl.3mdeb.com/open-source-firmware/Dasharo/protectli_vault_ehl/v1.2.0/protectli_vp2420_v1.2.0_dev_signed.rom.sha256.sig + + ## v1.1.0 - 2023-04-20 + + ### Added + + - [USB stack and mass storage enable/disable option](https://docs.dasharo.com/dasharo-menu-docs/dasharo-system-features/#usb-configuration) + - [SMM BIOS write protection enable/disable option](https://docs.dasharo.com/dasharo-menu-docs/dasharo-system-features/#dasharo-security-options) + + ### Changed + + - [Updating from v1.0.x requires flashing the WP_RO recovery partition](../protectli_vp2420/firmware-update.md#updating-minor-versions-v1xy) + - [Firmware version v1.1.x are signed with a new key](https://raw.githubusercontent.com/3mdeb/3mdeb-secpack/master/customer-keys/protectli/release-keys/dasharo-release-1.1.x-for-protectli-signing-key.asc) + - [Keys must be provisioned prior enabling Secure Boot](https://docs.dasharo.com/dasharo-menu-docs/device-manager/#secure-boot-configuration) + + ### Fixed + + - [VP2420 memory issues and incorrectly reported memory capacity](https://github.com/Dasharo/dasharo-issues/issues/397) + - [Popup with information about recovery mode is still displayed after flashing with a valid binary](https://github.com/Dasharo/dasharo-issues/issues/320) + + ### Known issues + + - [pfSense boot time](https://github.com/Dasharo/dasharo-issues/issues/318) + - [Double characters in pfSense initial boot phase](https://github.com/Dasharo/dasharo-issues/issues/319) + + ### Binaries + + [protectli_vp2420_v1.1.0.rom][protectli_vp2420_v1.1.0.rom_file]{.md-button} + [sha256][protectli_vp2420_v1.1.0.rom_hash]{.md-button} + [sha256.sig][protectli_vp2420_v1.1.0.rom_sig]{.md-button} + + To verify binary integrity with hash and signature please follow the + instructions in [Dasharo release signature verification](/guides/signature-verification) + using [this key](https://raw.githubusercontent.com/3mdeb/3mdeb-secpack/master/customer-keys/protectli/release-keys/dasharo-release-1.1.x-for-protectli-signing-key.asc) + + ### SBOM (Software Bill of Materials) + + - [coreboot based on c86c926 revision e36a117d](https://github.com/Dasharo/coreboot/tree/e36a117d) + - [edk2 based on 7f90b9cd revision 19bf14b4](https://github.com/Dasharo/edk2/tree/19bf14b4) + + [newsletter]: https://newsletter.3mdeb.com/subscription/n2EpSxtqL + [protectli_vp2420_v1.1.0.rom_file]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_ehl/v1.1.0/protectli_vp2420_v1.1.0.rom + [protectli_vp2420_v1.1.0.rom_hash]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_ehl/v1.1.0/protectli_vp2420_v1.1.0.rom.sha256 + [protectli_vp2420_v1.1.0.rom_sig]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_ehl/v1.1.0/protectli_vp2420_v1.1.0.rom.sha256.sig + + ## v1.0.1 - 2023-02-02 + + ### Added + + - [TPM 2.0 support over SPI interface](https://docs.dasharo.com/unified-test-documentation/dasharo-security/200-tpm-support/#test-cases-common-documentation) + - [TPM Measured Boot](https://docs.dasharo.com/unified-test-documentation/dasharo-security/203-measured-boot/) + + ### Changed + + - Downgrade edk2 Secure Boot driver to achieve consistent user experience as on + the VP46XX v1.0.19 release + + ### Fixed + + - [Dasharo BIOS lock menu is missing](https://github.com/Dasharo/dasharo-issues/issues/291) + - [iPXE entry doesn't occur in setup menu](https://github.com/Dasharo/dasharo-issues/issues/289) + - [Impossibility of pfSense/OPNsense console versions installation](https://github.com/Dasharo/dasharo-issues/issues/289) + + ### Known issues + + - [Popup with information about recovery mode is still displayed after flashing with a valid binary](https://github.com/Dasharo/dasharo-issues/issues/320) + - [pfSense boot time](https://github.com/Dasharo/dasharo-issues/issues/318) + - [Double characters in pfSense initial boot phase](https://github.com/Dasharo/dasharo-issues/issues/319) + + ### Binaries + + [protectli_vp2420_v1.0.1.rom][protectli_vp2420_v1.0.1.rom_file]{.md-button} + [sha256][protectli_vp2420_v1.0.1.rom_hash]{.md-button} + [sha256.sig][protectli_vp2420_v1.0.1.rom_sig]{.md-button} + + To verify binary integrity with hash and signature please follow the + instructions in [Dasharo release signature verification](/guides/signature-verification) + using [this key](https://raw.githubusercontent.com/3mdeb/3mdeb-secpack/master/customer-keys/protectli/release-keys/protectli-dasharo-firewall-release-1.0-key.asc) + + ### SBOM (Software Bill of Materials) + + - [coreboot based on c86c926 revision 54cbbc5b](https://github.com/Dasharo/coreboot/tree/54cbbc5b) + - [edk2 based on 7f90b9cd revision e31b7a71](https://github.com/Dasharo/edk2/tree/e31b7a71) + + [newsletter]: https://newsletter.3mdeb.com/subscription/n2EpSxtqL + [protectli_vp2420_v1.0.1.rom_file]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_ehl/v1.0.1/protectli_vp2420_v1.0.1.rom + [protectli_vp2420_v1.0.1.rom_hash]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_ehl/v1.0.1/protectli_vp2420_v1.0.1.rom.sha256 + [protectli_vp2420_v1.0.1.rom_sig]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_ehl/v1.0.1/protectli_vp2420_v1.0.1.rom.sha256.sig + + ## v1.0.0 - 2022-12-22 + + ### Added + + - Support for VP2420 platform + - [Vboot Verified Boot](https://docs.dasharo.com/guides/vboot-signing/) + - [TPM Measured Boot](https://docs.dasharo.com/unified-test-documentation/dasharo-security/203-measured-boot/) + - [Vboot recovery notification in UEFI Payload](https://docs.dasharo.com/unified-test-documentation/dasharo-security/201-verified-boot/) + - [UEFI Shell](https://docs.dasharo.com/unified-test-documentation/dasharo-compatibility/30P-uefi-shell/) + - [UEFI Secure Boot](https://docs.dasharo.com/unified-test-documentation/dasharo-security/206-secure-boot/) + - [BIOS flash protection for Vboot recovery region](https://docs.dasharo.com/unified-test-documentation/dasharo-security/20J-bios-lock-support/) + - UEFI boot support + - Intel i225 controller network boot support + - Customized boot menu keys + - Customized setup menu keys + - Configurable boot order + - Configurable boot options + + ### Binaries + + [protectli_VP2420_v1.0.0.rom][v1.0.0_rom]{.md-button} + [sha256][v1.0.0_hash]{.md-button} + [sha256.sig][v1.0.0_sig]{.md-button} + + How to verify signatures: + + ```bash + wget https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_ehl/v1.0.0/protectli_vp2420_v1.0.0.rom + wget https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_ehl/v1.0.0/protectli_vp2420_v1.0.0.rom.sha256 + wget https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_ehl/v1.0.0/protectli_vp2420_v1.0.0.rom.sha256.sig + gpg --fetch-keys https://raw.githubusercontent.com/3mdeb/3mdeb-secpack/master/keys/master-key/3mdeb-master-key.asc + gpg --fetch-keys https://raw.githubusercontent.com/3mdeb/3mdeb-secpack/master/dasharo/3mdeb-dasharo-master-key.asc + gpg --fetch-keys https://raw.githubusercontent.com/3mdeb/3mdeb-secpack/master/customer-keys/protectli/release-keys/protectli-dasharo-firewall-release-1.0-key.asc + gpg --list-sigs "3mdeb Master Key" "3mdeb Dasharo Master Key" "Protectli Dasharo Firewall Release 1.0 Signing Key" + sha256sum -c protectli_vp2420_v1.0.0.rom.sha256 + gpg -v --verify protectli_vp2420_v1.0.0.rom.sha256.sig protectli_vp2420_v1.0.0.rom.sha256 + ``` + + ### SBOM (Software Bill of Materials) + + - [coreboot based on c492b427 revision c86c9266](https://github.com/Dasharo/coreboot/tree/c86c9266) + - [edk2 based on e461f08 revision 7948a20](https://github.com/Dasharo/edk2/tree/7948a20) + - [iPXE for EFI revision 988d2](https://github.com/ipxe/ipxe/tree/988d2c13cdf0f0b4140685af35ced70ac5b3283c) + + [newsletter]: https://newsletter.3mdeb.com/subscription/n2EpSxtqL + [v1.0.0_rom]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_ehl/v1.0.0/protectli_vp2420_v1.0.0.rom + [v1.0.0_hash]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_ehl/v1.0.0/protectli_vp2420_v1.0.0.rom.sha256 + [v1.0.0_sig]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_ehl/v1.0.0/protectli_vp2420_v1.0.0.rom.sha256.sig diff --git a/docs/unified/protectli/test-matrix.md b/docs/unified/protectli/test-matrix.md new file mode 100644 index 0000000000..a9ea8bf084 --- /dev/null +++ b/docs/unified/protectli/test-matrix.md @@ -0,0 +1,559 @@ +# Test matrix + +## About + +The test matrix is used to determine the scope of tests which the DUT is +subjected from before the release of the new binary. + +=== "fw6" + + ## Module: Dasharo compatibility + + | No. | Supported test suite | Test suite ID | Supported test cases | + |:-----|:--------------------------------------------------|:-------------:|:-------------------------------------| + | 1. | [Memory HCL][HCL] | HCL | All | + | 2. | [Display ports and LCD support][DSP] | DSP | DSP002.001, DSP002.003 | + | 3. | [USB HID and MSC Support][USB] | USB | USB001.001, USB001.002, USB002.001, USB002.002 | + | 4. | [SMBIOS][DMI] | DMI | DMI002.001, DMI003.001, DMI004.001, DMI005.001, DMI006.001 | + | 5. | [Custom boot logo][CLG] | CLG | DMI002.001, DMI003.001, DMI004.001, DMI005.001, DMI006.001 | + | 6. | [M.2 WiFi/Bluetooth][WLE] | WLE | WLE001.001, WLE002.001, WLE003.001 | + | 7. | [Network boot][PXE] | PXE | PXE007.001 | + | 8. | [Debian Stable and Ubuntu LTS support][LBT] | LBT | LBT003.001, LBT003.002, LBT004.001, LBT004.002| + | 9. | [Custom boot menu key][CBK] | CBK | All | + | 10. | [FreeBSD support][BSD] | BSD | All | + | 11. | [miniPCIe LTE/WiFi/Bluetooth][MWL] | MWL | MWL004.001 | + | 12. | [Custom network boot entries][CNB] | CNB | CNB001.002 | + + [HCL]: ../../unified-test-documentation/dasharo-compatibility/301-memory-hcl.md + [DSP]: ../../unified-test-documentation/dasharo-compatibility/31E-display-ports-and-lcd.md + [USB]: ../../unified-test-documentation/dasharo-compatibility/306-usb-hid-and-msc-support.md + [DMI]: ../../unified-test-documentation/dasharo-compatibility/31L-smbios.md + [CLG]: ../../unified-test-documentation/dasharo-compatibility/304-custom-logo.md + [MWL]: ../../unified-test-documentation/dasharo-compatibility/31K-minipcie-verification.md + [WLE]: ../../unified-test-documentation/dasharo-compatibility/318-m2-wifi-bluetooth.md + [PXE]: ../../unified-test-documentation/dasharo-compatibility/315-network-boot.md + [LBT]: ../../unified-test-documentation/dasharo-compatibility/308-debian-stable-and-ubuntu-lts-support.md + [CBK]: ../../unified-test-documentation/dasharo-compatibility/303-custom-boot-menu-key.md + [BSD]: ../../unified-test-documentation/dasharo-compatibility/307-freebsd-support.md + [CNB]: ../../unified-test-documentation/dasharo-compatibility/30A-custom-network-boot-entries.md + + ## Module: Dasharo performance + + | No. | Supported test suite | Test suite ID | Supported test cases | + |:-----|:--------------------------------------------------|:-------------:|:-------------------------------------| + | 1. | [CPU temperature][CPT] | CPT | All | + + [CPT]: ../../unified-test-documentation/dasharo-performance/401-cpu-temperature.md + +=== "v1x1x" + + The test scope is the same + for all platforms of the V1210/V1410/V1610 family. + + ## Module: Dasharo compatibility + + | No. | Supported test suite | Test suite ID | Supported test cases | + |:----:|:--------------------------------------|:-------------:|:-------------------------------------| + | 1. | [UEFI compatible interface][EFI] | EFI | All | + | 2. | [Display ports][DSP] | DSP | DSP002.001, DSP002.002, DSP002.003 | + | 3. | [Network boot utilities][NBT] | NBT | All | + | 4. | [NVMe support][NVM] | NVM | All | + | 5. | [Custom logo][CLG] | CLG | All | + | 6. | [Custom Boot Keys][CBK] | CBK | All | + | 7. | [USB HID and MSC Support][USB] | USB | USB001.xxx and USB002.xxx | + | 8. | [Debian Stable and Ubuntu LTS support][LBT] | LBT | LBT003.001, LBT003.002, LBT004.001, LBT004.002| + | 9. | [miniPCIe LTE/WiFi/Bluetooth][MWL] | MWL | MWL004.001 | + | 10. | [M.2 WiFi/Bluetooth][WLE] | WLE | All | + | 11. | [eMMC support][MMC] | MMC | All | + | 12. | [SMBIOS][DMI] | DMI | DMI002.001, DMI003.001, DMI004.001, DMI005.001, DMI006.001 | + | 13. | [Custom network boot entries][CNB] | CNB | CNB001.002 | + | 14. | [Audio subsystem][AUD] | AUD | AUD007.xxx, AUD008.xxx | + | 15. | [UEFI Shell][USH] | USH | All | + | 16. | [USB detection][UDT] | UDT | All | + | 17. | [USB booting][UBT] | UBT | All | + | 18. | [Windows booting][WBT] | WBT | WBT001.001 | + + [EFI]: ../../unified-test-documentation/dasharo-compatibility/30M-uefi-compatible-interface.md + [DSP]: ../../unified-test-documentation/dasharo-compatibility/31E-display-ports-and-lcd.md + [NBT]: ../../unified-test-documentation/dasharo-compatibility/315b-netboot-utilities.md + [NVM]: ../../unified-test-documentation/dasharo-compatibility/312-nvme-support.md + [CLG]: ../../unified-test-documentation/dasharo-compatibility/304-custom-logo.md + [CBK]: ../../unified-test-documentation/dasharo-compatibility/303-custom-boot-menu-key.md + [USB]: ../../unified-test-documentation/dasharo-compatibility/306-usb-hid-and-msc-support.md + [BSD]: ../../unified-test-documentation/dasharo-compatibility/307-freebsd-support.md + [LBT]: ../../unified-test-documentation/dasharo-compatibility/308-debian-stable-and-ubuntu-lts-support.md + [UTC]: ../../unified-test-documentation/dasharo-compatibility/31H-usb-type-c.md + [WLE]: ../../unified-test-documentation/dasharo-compatibility/318-m2-wifi-bluetooth.md + [MWL]: ../../unified-test-documentation/dasharo-compatibility/31K-minipcie-verification.md + [MMC]: ../../unified-test-documentation/dasharo-compatibility/31M-emmc-support.md + [DMI]: ../../unified-test-documentation/dasharo-compatibility/31L-smbios.md + [CNB]: ../../unified-test-documentation/dasharo-compatibility/30A-custom-network-boot-entries.md + [MSS]: ../../unified-test-documentation/dasharo-compatibility/31I-nvme-switching.md + [WBT]: ../../unified-test-documentation/dasharo-compatibility/31A-windows-booting.md + [AUD]: ../../unified-test-documentation/dasharo-compatibility/31F-audio-subsystem.md + [USH]: ../../unified-test-documentation/dasharo-compatibility/30P-uefi-shell.md + [UDT]: ../../unified-test-documentation/dasharo-compatibility/31O-usb-detect.md + [UBT]: ../../unified-test-documentation/dasharo-compatibility/31N-usb-boot.md + [PFS]: ../../unified-test-documentation/dasharo-compatibility/341-pfSense-support.md + [OPN]: ../../unified-test-documentation/dasharo-compatibility/342-OPNsense-support.md + [PVE]: ../../unified-test-documentation/dasharo-compatibility/348-proxmox-support.md + [USS]: ../../unified-test-documentation/dasharo-compatibility/349-ubuntu-server-support.md + + ## Module: Dasharo security + + | No. | Supported test suite | Test suite ID | Supported test cases | + |:-----|:--------------------------------------|:-------------:|:-------------------------------------| + | 1. | [TPM Support][TPM] | TPM | TPM001.002, TPM001.003, TPM002.002, TPM002.003, TPM003.002, TPM003.003 | + | 2. | [Secure Boot support][SBO] | SBO | All | + + [TPM]: ../../unified-test-documentation/dasharo-security/200-tpm-support.md + [SBO]: ../../unified-test-documentation/dasharo-security/206-secure-boot.md + + ## Module: Dasharo performance + + | No. | Supported test suite | Test suite ID | Supported test cases | + |:-----|:--------------------------------------|:-------------:|:-------------------------------------| + | 1. | [coreboot bring up time measurement][CBMEM] | CBMEM | All | + | 2. | [CPU temperature measure][CPT] | CPT | All | + | 3. | [CPU frequency measure][CPF] | CPF | Without CPU003.XXX and CPU005.XXX | + | 4. | [Platform stability][STB] | STB | All | + + [CBMEM]: ../../unified-test-documentation/dasharo-performance/400-coreboot-boot-measure.md + [CPT]: ../../unified-test-documentation/dasharo-performance/401-cpu-temperature.md + [CPF]: ../../unified-test-documentation/dasharo-performance/402-cpu-frequency.md + [STB]: ../../unified-test-documentation/dasharo-performance/404-platform-stability.md + [BUB]: ../../unified-test-documentation/dasharo-performance/407-ubuntu-booting-performance-test.md + [BDE]: ../../unified-test-documentation/dasharo-performance/408-debian-booting-performance-test.md + [BFB]: ../../unified-test-documentation/dasharo-performance/409-freebsd-booting-performance-test.md + [BPM]: ../../unified-test-documentation/dasharo-performance/410-proxmox-booting-performance-test.md + [BUS]: ../../unified-test-documentation/dasharo-performance/411-ubuntu-server-booting-performance-test.md + [BOS]: ../../unified-test-documentation/dasharo-performance/412-opnsense-serial-booting-performance-test.md + [BOV]: ../../unified-test-documentation/dasharo-performance/413-opnsense-vga-booting-performance-test.md + [BPS]: ../../unified-test-documentation/dasharo-performance/414-pfsense-serial-booting-performance-test.md + [BPV]: ../../unified-test-documentation/dasharo-performance/415-pfsense-vga-booting-performance-test.md + +=== "vp46xx" + + The test scope is the same + for all platforms of the VP46XX family. + + ## Module: Dasharo compatibility + + | No. | Supported test suite | Test suite ID | Supported test cases | + |:----:|:--------------------------------------|:-------------:|:-------------------------------------| + | 1. | [Memory HCL][HCL] | HCL | All | + | 2. | [UEFI compatible interface][EFI] | EFI | All | + | 3. | [Display ports][DSP] | DSP | DSP002.001, DSP002.002, DSP002.003, DSP003.001, DSP003.002, DSP003.003 | + | 4. | [Network boot utilities][NBT] | NBT | All | + | 5. | [NVMe support][NVM] | NVM | All | + | 6. | [Custom logo][CLG] | CLG | All | + | 7. | [Custom boot menu key][CBK] | CBK | All | + | 8. | [USB HID and MSC Support][USB] | USB | USB001.XXX and USB002.XXX | + | 9. | [FreeBSD support][BSD] | BSD | All | + | 10. | [Debian Stable and Ubuntu LTS support][LBT] | LBT | LBT003.001, LBT003.002, LBT004.001, LBT004.002| + | 11. | [USB-C support][UTC] | UTC | UTC004.001, UTC004.002 | + | 12. | [M.2 WiFi/Bluetooth][WLE] | WLE | ALL | + | 13. | [eMMC support][MMC] | MMC | MMC001.001 | + | 14. | [SMBIOS][DMI] | DMI | DMI002.001, DMI003.001, DMI004.001, DMI005.001, DMI006.001 | + | 15. | [Custom network boot entries][CNB] | CNB | CNB001.002 | + | 16. | [M.2 automatic SATA/NVMe switching support][MSS] | MSS | MSS001.001 | + | 17. | [Windows booting][WBT] | WBT | WBT001.001 | + | 18. | [Audio subsystem][AUD] | AUD | AUD001.001, AUD001.002, AUD002.001, AUD002.002, AUD003.001, AUD003.002, AUD004.001, AUD004.002, AUD005.001, AUD005.002, AUD006.001, AUD006.002 | + | 19. | [UEFI Shell][USH] | USH | All | + | 20. | [USB detection][UDT] | UDT | All | + | 21. | [USB booting][UBT] | UBT | All | + | 22. | [pfSense support][PFS] | PFS | All | + | 23. | [OPNsense support][OPN] | OPN | All | + | 24. | [Proxmox support][PVE] | PVE | All | + | 25. | [Ubuntu Server support][USS] | USS | All | + + [HCL]: ../../unified-test-documentation/dasharo-compatibility/301-memory-hcl.md + [EFI]: ../../unified-test-documentation/dasharo-compatibility/30M-uefi-compatible-interface.md + [DSP]: ../../unified-test-documentation/dasharo-compatibility/31E-display-ports-and-lcd.md + [NBT]: ../../unified-test-documentation/dasharo-compatibility/315b-netboot-utilities.md + [NVM]: ../../unified-test-documentation/dasharo-compatibility/312-nvme-support.md + [CLG]: ../../unified-test-documentation/dasharo-compatibility/304-custom-logo.md + [CBK]: ../../unified-test-documentation/dasharo-compatibility/303-custom-boot-menu-key.md + [USB]: ../../unified-test-documentation/dasharo-compatibility/306-usb-hid-and-msc-support.md + [BSD]: ../../unified-test-documentation/dasharo-compatibility/307-freebsd-support.md + [LBT]: ../../unified-test-documentation/dasharo-compatibility/308-debian-stable-and-ubuntu-lts-support.md + [UTC]: ../../unified-test-documentation/dasharo-compatibility/31H-usb-type-c.md + [WLE]: ../../unified-test-documentation/dasharo-compatibility/318-m2-wifi-bluetooth.md + [MWL]: ../../unified-test-documentation/dasharo-compatibility/31K-minipcie-verification.md + [MMC]: ../../unified-test-documentation/dasharo-compatibility/31M-emmc-support.md + [DMI]: ../../unified-test-documentation/dasharo-compatibility/31L-smbios.md + [CNB]: ../../unified-test-documentation/dasharo-compatibility/30A-custom-network-boot-entries.md + [MSS]: ../../unified-test-documentation/dasharo-compatibility/31I-nvme-switching.md + [WBT]: ../../unified-test-documentation/dasharo-compatibility/31A-windows-booting.md + [AUD]: ../../unified-test-documentation/dasharo-compatibility/31F-audio-subsystem.md + [USH]: ../../unified-test-documentation/dasharo-compatibility/30P-uefi-shell.md + [UDT]: ../../unified-test-documentation/dasharo-compatibility/31O-usb-detect.md + [UBT]: ../../unified-test-documentation/dasharo-compatibility/31N-usb-boot.md + [PFS]: ../../unified-test-documentation/dasharo-compatibility/341-pfSense-support.md + [OPN]: ../../unified-test-documentation/dasharo-compatibility/342-OPNsense-support.md + [PVE]: ../../unified-test-documentation/dasharo-compatibility/348-proxmox-support.md + [USS]: ../../unified-test-documentation/dasharo-compatibility/349-ubuntu-server-support.md + + ## Module: Dasharo security + + | No. | Supported test suite | Test suite ID | Supported test cases | + |:-----|:--------------------------------------|:-------------:|:-------------------------------------| + | 1. | [TPM Support][TPM] | TPM | Without TPM001.001,TPM002.001 and TPM003.001 | + | 2. | [Verified Boot support][VBO] | VBO | Without VBO006.001 and VBO007.001 | + | 3. | [Measured Boot support][MBO] | MBO | All | + | 4. | [Secure Boot support][SBO] | SBO | All | + | 5. | [ME disable/neuter support][MNE] | MNE | MNE004.001 | + | 6. | [BIOS lock support][BLS] | BLS | All | + | 7. | [USB stack enable/disable][USS] | USS | All | + | 8. | [SMM BIOS write protection][SMM] | SMM | All | + + > Note: in Dasharo compatible with Protectli VP46xx ME is soft-disabled by + > default - no additional option for ME disabling is available in the Setup + > Menu. + + [TPM]: ../../unified-test-documentation/dasharo-security/200-tpm-support.md + [VBO]: ../../unified-test-documentation/dasharo-security/201-verified-boot.md + [MBO]: ../../unified-test-documentation/dasharo-security/203-measured-boot.md + [SBO]: ../../unified-test-documentation/dasharo-security/206-secure-boot.md + [MNE]: ../../unified-test-documentation/dasharo-security/20F-me-neuter.md + [BLS]: ../../unified-test-documentation/dasharo-security/20J-bios-lock-support.md + [USS]: ../../unified-test-documentation/dasharo-security/20S-usb-stack.md + [SMM]: ../../unified-test-documentation/dasharo-security/20O-SMM-bios-write-protection.md + + ## Module: Dasharo performance + + | No. | Supported test suite | Test suite ID | Supported test cases | + |:-----|:--------------------------------------|:-------------:|:-------------------------------------| + | 1. | [coreboot bring up time measurement][CBMEM] | CBMEM | All | + | 2. | [CPU temperature measure][CPT] | CPT | All | + | 3. | [CPU frequency measure][CPF] | CPF | Without CPU003.XXX and CPU005.XXX | + | 4. | [Platform stability][STB] | STB | All | + | 5. | [Ubuntu booting performance test][BUB] | BUB | All | + | 6. | [Debian booting performance test][BDE] | BDE | All | + | 7. | [FreeBSD booting performance test][BFB] | BFB | All | + | 8. | [Proxmox booting performance test][BPM] | BPM | All | + | 9. | [Ubuntu Server booting performance test][BUS] | BUS | All | + | 10. | [OPNsense (serial output) booting performance test][BOS] | BOS | All | + | 11. | [OPNsense (VGA output) booting performance test][BOV] | BOV | All | + | 12. | [pfSense (serial output) booting performance test][BPS] | BPS | All | + | 13. | [pfSense (VGA output) booting performance test][BPV] | BPV | All | + + [CBMEM]: ../../unified-test-documentation/dasharo-performance/400-coreboot-boot-measure.md + [CPT]: ../../unified-test-documentation/dasharo-performance/401-cpu-temperature.md + [CPF]: ../../unified-test-documentation/dasharo-performance/402-cpu-frequency.md + [STB]: ../../unified-test-documentation/dasharo-performance/404-platform-stability.md + [BUB]: ../../unified-test-documentation/dasharo-performance/407-ubuntu-booting-performance-test.md + [BDE]: ../../unified-test-documentation/dasharo-performance/408-debian-booting-performance-test.md + [BFB]: ../../unified-test-documentation/dasharo-performance/409-freebsd-booting-performance-test.md + [BPM]: ../../unified-test-documentation/dasharo-performance/410-proxmox-booting-performance-test.md + [BUS]: ../../unified-test-documentation/dasharo-performance/411-ubuntu-server-booting-performance-test.md + [BOS]: ../../unified-test-documentation/dasharo-performance/412-opnsense-serial-booting-performance-test.md + [BOV]: ../../unified-test-documentation/dasharo-performance/413-opnsense-vga-booting-performance-test.md + [BPS]: ../../unified-test-documentation/dasharo-performance/414-pfsense-serial-booting-performance-test.md + [BPV]: ../../unified-test-documentation/dasharo-performance/415-pfsense-vga-booting-performance-test.md + +=== "vp66xx" + + The test scope is the same + for all platforms of the VP66XX family. + + ## Module: Dasharo compatibility + + | No. | Supported test suite | Test suite ID | Supported test cases | + |:----:|:--------------------------------------|:-------------:|:-------------------------------------| + | 1. | [Memory HCL][HCL] | HCL | All | + | 2. | [UEFI compatible interface][EFI] | EFI | All | + | 3. | [Display ports][DSP] | DSP | DSP002.001, DSP002.002, DSP002.003, DSP003.001, DSP003.002, DSP003.003 | + | 4. | [Network boot utilities][NBT] | NBT | All | + | 5. | [NVMe support][NVM] | NVM | All | + | 6. | [Custom logo][CLG] | CLG | All | + | 7. | [Custom boot menu key][CBK] | CBK | All | + | 8. | [USB HID and MSC Support][USB] | USB | USB001.XXX and USB002.XXX | + | 9. | [FreeBSD support][BSD] | BSD | All | + | 10. | [Debian Stable and Ubuntu LTS support][LBT] | LBT | LBT003.001, LBT003.002, LBT004.001, LBT004.002| + | 11. | [USB-C support][UTC] | UTC | UTC004.001, UTC004.002 | + | 12. | [M.2 WiFi/Bluetooth][WLE] | WLE | ALL | + | 14. | [SMBIOS][DMI] | DMI | DMI002.001, DMI003.001, DMI004.001, DMI005.001, DMI006.001 | + | 15. | [Custom network boot entries][CNB] | CNB | CNB001.002 | + | 17. | [Windows booting][WBT] | WBT | WBT001.001 | + | 18. | [Audio subsystem][AUD] | AUD | AUD001.001, AUD001.002, AUD002.001, AUD002.002, AUD003.001, AUD003.002, AUD004.001, AUD004.002, AUD005.001, AUD005.002, AUD006.001, AUD006.002 | + | 19. | [UEFI Shell][USH] | USH | All | + | 20. | [USB detection][UDT] | UDT | All | + | 21. | [USB booting][UBT] | UBT | All | + | 22. | [pfSense support][PFS] | PFS | All | + | 23. | [OPNsense support][OPN] | OPN | All | + | 24. | [Proxmox support][PVE] | PVE | All | + | 25. | [Ubuntu Server support][USS] | USS | All | + + [HCL]: ../../unified-test-documentation/dasharo-compatibility/301-memory-hcl.md + [EFI]: ../../unified-test-documentation/dasharo-compatibility/30M-uefi-compatible-interface.md + [DSP]: ../../unified-test-documentation/dasharo-compatibility/31E-display-ports-and-lcd.md + [NBT]: ../../unified-test-documentation/dasharo-compatibility/315b-netboot-utilities.md + [NVM]: ../../unified-test-documentation/dasharo-compatibility/312-nvme-support.md + [CLG]: ../../unified-test-documentation/dasharo-compatibility/304-custom-logo.md + [CBK]: ../../unified-test-documentation/dasharo-compatibility/303-custom-boot-menu-key.md + [USB]: ../../unified-test-documentation/dasharo-compatibility/306-usb-hid-and-msc-support.md + [BSD]: ../../unified-test-documentation/dasharo-compatibility/307-freebsd-support.md + [LBT]: ../../unified-test-documentation/dasharo-compatibility/308-debian-stable-and-ubuntu-lts-support.md + [UTC]: ../../unified-test-documentation/dasharo-compatibility/31H-usb-type-c.md + [WLE]: ../../unified-test-documentation/dasharo-compatibility/318-m2-wifi-bluetooth.md + [MWL]: ../../unified-test-documentation/dasharo-compatibility/31K-minipcie-verification.md + [DMI]: ../../unified-test-documentation/dasharo-compatibility/31L-smbios.md + [CNB]: ../../unified-test-documentation/dasharo-compatibility/30A-custom-network-boot-entries.md + [WBT]: ../../unified-test-documentation/dasharo-compatibility/31A-windows-booting.md + [AUD]: ../../unified-test-documentation/dasharo-compatibility/31F-audio-subsystem.md + [USH]: ../../unified-test-documentation/dasharo-compatibility/30P-uefi-shell.md + [UDT]: ../../unified-test-documentation/dasharo-compatibility/31O-usb-detect.md + [UBT]: ../../unified-test-documentation/dasharo-compatibility/31N-usb-boot.md + [PFS]: ../../unified-test-documentation/dasharo-compatibility/341-pfSense-support.md + [OPN]: ../../unified-test-documentation/dasharo-compatibility/342-OPNsense-support.md + [PVE]: ../../unified-test-documentation/dasharo-compatibility/348-proxmox-support.md + [USS]: ../../unified-test-documentation/dasharo-compatibility/349-ubuntu-server-support.md + + ## Module: Dasharo security + + | No. | Supported test suite | Test suite ID | Supported test cases | + |:-----|:--------------------------------------|:-------------:|:-------------------------------------| + | 1. | [TPM Support][TPM] | TPM | Without TPM001.001,TPM002.001 and TPM003.001 | + | 2. | [Verified Boot support][VBO] | VBO | Without VBO006.001 and VBO007.001 | + | 3. | [Measured Boot support][MBO] | MBO | All | + | 4. | [Secure Boot support][SBO] | SBO | All | + | 5. | [ME disable/neuter support][MNE] | MNE | MNE004.001 | + | 6. | [BIOS lock support][BLS] | BLS | All | + | 7. | [USB stack enable/disable][USS] | USS | All | + | 8. | [SMM BIOS write protection][SMM] | SMM | All | + + > Note: in Dasharo compatible with Protectli VP66xx ME is soft-disabled by + > default - no additional option for ME disabling is available in the Setup + > Menu. + + [TPM]: ../../unified-test-documentation/dasharo-security/200-tpm-support.md + [VBO]: ../../unified-test-documentation/dasharo-security/201-verified-boot.md + [MBO]: ../../unified-test-documentation/dasharo-security/203-measured-boot.md + [SBO]: ../../unified-test-documentation/dasharo-security/206-secure-boot.md + [MNE]: ../../unified-test-documentation/dasharo-security/20F-me-neuter.md + [BLS]: ../../unified-test-documentation/dasharo-security/20J-bios-lock-support.md + [USS]: ../../unified-test-documentation/dasharo-security/20S-usb-stack.md + [SMM]: ../../unified-test-documentation/dasharo-security/20O-SMM-bios-write-protection.md + + ## Module: Dasharo performance + + | No. | Supported test suite | Test suite ID | Supported test cases | + |:-----|:--------------------------------------|:-------------:|:-------------------------------------| + | 1. | [coreboot bring up time measurement][CBMEM] | CBMEM | All | + | 2. | [CPU temperature measure][CPT] | CPT | All | + | 3. | [CPU frequency measure][CPF] | CPF | Without CPU003.XXX and CPU005.XXX | + | 4. | [Platform stability][STB] | STB | All | + | 5. | [Ubuntu booting performance test][BUB] | BUB | All | + | 6. | [Debian booting performance test][BDE] | BDE | All | + | 7. | [FreeBSD booting performance test][BFB] | BFB | All | + | 8. | [Proxmox booting performance test][BPM] | BPM | All | + | 9. | [Ubuntu Server booting performance test][BUS] | BUS | All | + | 10. | [OPNsense (serial output) booting performance test][BOS] | BOS | All | + | 11. | [OPNsense (VGA output) booting performance test][BOV] | BOV | All | + | 12. | [pfSense (serial output) booting performance test][BPS] | BPS | All | + | 13. | [pfSense (VGA output) booting performance test][BPV] | BPV | All | + + [CBMEM]: ../../unified-test-documentation/dasharo-performance/400-coreboot-boot-measure.md + [CPT]: ../../unified-test-documentation/dasharo-performance/401-cpu-temperature.md + [CPF]: ../../unified-test-documentation/dasharo-performance/402-cpu-frequency.md + [STB]: ../../unified-test-documentation/dasharo-performance/404-platform-stability.md + [BUB]: ../../unified-test-documentation/dasharo-performance/407-ubuntu-booting-performance-test.md + [BDE]: ../../unified-test-documentation/dasharo-performance/408-debian-booting-performance-test.md + [BFB]: ../../unified-test-documentation/dasharo-performance/409-freebsd-booting-performance-test.md + [BPM]: ../../unified-test-documentation/dasharo-performance/410-proxmox-booting-performance-test.md + [BUS]: ../../unified-test-documentation/dasharo-performance/411-ubuntu-server-booting-performance-test.md + [BOS]: ../../unified-test-documentation/dasharo-performance/412-opnsense-serial-booting-performance-test.md + [BOV]: ../../unified-test-documentation/dasharo-performance/413-opnsense-vga-booting-performance-test.md + [BPS]: ../../unified-test-documentation/dasharo-performance/414-pfsense-serial-booting-performance-test.md + [BPV]: ../../unified-test-documentation/dasharo-performance/415-pfsense-vga-booting-performance-test.md + +=== "vp2410" + + ## Module: Dasharo compatibility + + | No. | Supported test suite | Test suite ID | Supported test cases | + |:----:|:--------------------------------------------------|:-------------:|:-------------------------------------| + | 1. | [Memory HCL][HCL] | HCL | All | + | 2. | [UEFI compatible interface][EFI] | EFI | All | + | 3. | [Display ports][DSP] | DSP | DSP002.001, DSP002.002, DSP002.003, DSP003.001, DSP003.002, DSP003.003 | + | 4. | [Network boot utilities][NBT] | NBT | All | + | 5. | [NVMe support][NVM] | NVM | All | + | 6. | [Custom logo][CLG] | CLG | All | + | 7. | [Custom boot menu key][CBK] | CBK | All | + | 8. | [USB HID and MSC Support][USB] | USB | All | + | 9. | [FreeBSD support][BSD] | BSD | All | + | 10. | [Debian Stable and Ubuntu LTS support][LBT] | LBT | LBT003.001, LBT003.002, LBT004.001, LBT004.002| + | 11. | [USB-C support][UTC] | UTC | UTC004.001, UTC004.001 | + | 12. | [M.2 WiFi/Bluetooth][WLE] | WLE | ALL | + | 13. | [eMMC support][MMC] | MMC | MMC001.001 | + | 14. | [SMBIOS][DMI] | DMI | DMI002.001, DMI003.001, DMI004.001, DMI005.001, DMI006.001 | + | 15. | [Custom network boot entries][CNB] | CNB | CNB001.002 | + | 16. | [M.2 automatic SATA/NVMe switching support][MSS] | MSS | MSS001.001 | + | 17. | [Windows booting][WBT] | WBT | WBT001.001 | + | 18. | [Audio subsystem][AUD] | AUD | AUD001.001, AUD001.002, AUD002.001, AUD002.002, AUD003.001, AUD003.002, AUD004.001, AUD004.002, AUD005.001, AUD005.002, AUD006.001, AUD006.002 | + | 19. | [UEFI Shell][USH] | USH | All | + | 20. | [USB detection][UDT] | UDT | All | + | 21. | [USB booting][UBT] | UBT | All | + + [HCL]: ../../unified-test-documentation/dasharo-compatibility/301-memory-hcl.md + [EFI]: ../../unified-test-documentation/dasharo-compatibility/30M-uefi-compatible-interface.md + [DSP]: ../../unified-test-documentation/dasharo-compatibility/31E-display-ports-and-lcd.md + [NBT]: ../../unified-test-documentation/dasharo-compatibility/315b-netboot-utilities.md + [NVM]: ../../unified-test-documentation/dasharo-compatibility/312-nvme-support.md + [CLG]: ../../unified-test-documentation/dasharo-compatibility/304-custom-logo.md + [CBK]: ../../unified-test-documentation/dasharo-compatibility/303-custom-boot-menu-key.md + [USB]: ../../unified-test-documentation/dasharo-compatibility/306-usb-hid-and-msc-support.md + [BSD]: ../../unified-test-documentation/dasharo-compatibility/307-freebsd-support.md + [LBT]: ../../unified-test-documentation/dasharo-compatibility/308-debian-stable-and-ubuntu-lts-support.md + [UTC]: ../../unified-test-documentation/dasharo-compatibility/31H-usb-type-c.md + [WLE]: ../../unified-test-documentation/dasharo-compatibility/318-m2-wifi-bluetooth.md + [MWL]: ../../unified-test-documentation/dasharo-compatibility/31K-minipcie-verification.md + [MMC]: ../../unified-test-documentation/dasharo-compatibility/31M-emmc-support.md + [DMI]: ../../unified-test-documentation/dasharo-compatibility/31L-smbios.md + [CNB]: ../../unified-test-documentation/dasharo-compatibility/30A-custom-network-boot-entries.md + [MSS]: ../../unified-test-documentation/dasharo-compatibility/31I-nvme-switching.md + [WBT]: ../../unified-test-documentation/dasharo-compatibility/31A-windows-booting.md + [AUD]: ../../unified-test-documentation/dasharo-compatibility/31F-audio-subsystem.md + [USH]: ../../unified-test-documentation/dasharo-compatibility/30P-uefi-shell.md + [UDT]: ../../unified-test-documentation/dasharo-compatibility/31O-usb-detect.md + [UBT]: ../../unified-test-documentation/dasharo-compatibility/31N-usb-boot.md + + ## Module: Dasharo security + + | No. | Supported test suite | Test suite ID | Supported test cases | + |:-----|:--------------------------------------------------|:-------------:|:-------------------------------------| + | 1. | [TPM Support][TPM] | TPM | Without TPM001.001 and TPM002.001 | + | 2. | [Verified Boot support][VBO] | VBO | VBO006.002, VBO007.002, VBO008.001 | + | 3. | [Measured Boot support][MBO] | MBO | All | + | 4. | [Secure Boot support][SBO] | SBO | All | + | 5. | [BIOS lock support][BLS] | BLS | All | + + [TPM]: ../../unified-test-documentation/dasharo-security/200-tpm-support.md + [VBO]: ../../unified-test-documentation/dasharo-security/201-verified-boot.md + [MBO]: ../../unified-test-documentation/dasharo-security/203-measured-boot.md + [SBO]: ../../unified-test-documentation/dasharo-security/206-secure-boot.md + [MNE]: ../../unified-test-documentation/dasharo-security/20F-me-neuter.md + [BLS]: ../../unified-test-documentation/dasharo-security/20J-bios-lock-support.md + + ## Module: Dasharo performance + + | No. | Supported test suite | Test suite ID | Supported test cases | + |:-----|:--------------------------------------------------|:-------------:|:-------------------------------------| + | 1. | [coreboot bring up time measurement][CBMEM] | CBMEM | All | + | 2. | [CPU temperature measure][CPT] | CPT | All | + | 3. | [CPU frequency measure][CPF] | CPF | All | + | 4. | [Platform stability][STB] | STB | All | + + [CBMEM]: ../../unified-test-documentation/dasharo-performance/400-coreboot-boot-measure.md + [CPT]: ../../unified-test-documentation/dasharo-performance/401-cpu-temperature.md + [CPF]: ../../unified-test-documentation/dasharo-performance/402-cpu-frequency.md + [STB]: ../../unified-test-documentation/dasharo-performance/404-platform-stability.md + +=== "vp2420" + + ## Module: Dasharo compatibility + + | No. | Supported test suite | Test suite ID | Supported test cases | + |:----:|:--------------------------------------------------|:-------------:|:-------------------------------------| + | 1. | [Memory HCL][HCL] | HCL | All | + | 2. | [UEFI compatible interface][EFI] | EFI | All | + | 3. | [Display ports][DSP] | DSP | DSP002.001, DSP002.002, DSP002.003, DSP003.001, DSP003.002, DSP003.003 | + | 4. | [Network boot utilities][NBT] | NBT | All | + | 6. | [Custom logo][CLG] | CLG | All | + | 7. | [Custom boot menu key][CBK] | CBK | All | + | 8. | [USB HID and MSC Support][USB] | USB | USB001.XXX and USB002.XXX | + | 9. | [FreeBSD support][BSD] | BSD | All | + | 10. | [Debian Stable and Ubuntu LTS support][LBT] | LBT | LBT003.001, LBT003.002, LBT004.001, LBT004.002| + | 11. | [USB-C support][UTC] | UTC | UTC004.001, UTC004.002 | + | 12. | [M.2 WiFi/Bluetooth][WLE] | WLE | ALL | + | 13. | [eMMC support][MMC] | MMC | MMC001.001 | + | 14. | [SMBIOS][DMI] | DMI | DMI002.001, DMI003.001, DMI004.001, DMI005.001, DMI006.001 | + | 15. | [Custom network boot entries][CNB] | CNB | CNB001.002 | + | 17. | [Windows booting][WBT] | WBT | WBT001.001 | + | 18. | [UEFI Shell][USH] | USH | All | + | 19. | [USB detection][UDT] | UDT | All | + | 20. | [USB booting][UBT] | UBT | All | + | 21. | [pfSense support][PFS] | PFS | All | + | 22. | [OPNsense support][OPN] | OPN | All | + | 23. | [Proxmox support][PVE] | PVE | All | + | 24. | [Ubuntu Server support][USS] | USS | All | + + [HCL]: ../../unified-test-documentation/dasharo-compatibility/301-memory-hcl.md + [EFI]: ../../unified-test-documentation/dasharo-compatibility/30M-uefi-compatible-interface.md + [DSP]: ../../unified-test-documentation/dasharo-compatibility/31E-display-ports-and-lcd.md + [NBT]: ../../unified-test-documentation/dasharo-compatibility/315b-netboot-utilities.md + [NVM]: ../../unified-test-documentation/dasharo-compatibility/312-nvme-support.md + [CLG]: ../../unified-test-documentation/dasharo-compatibility/304-custom-logo.md + [CBK]: ../../unified-test-documentation/dasharo-compatibility/303-custom-boot-menu-key.md + [USB]: ../../unified-test-documentation/dasharo-compatibility/306-usb-hid-and-msc-support.md + [BSD]: ../../unified-test-documentation/dasharo-compatibility/307-freebsd-support.md + [LBT]: ../../unified-test-documentation/dasharo-compatibility/308-debian-stable-and-ubuntu-lts-support.md + [UTC]: ../../unified-test-documentation/dasharo-compatibility/31H-usb-type-c.md + [WLE]: ../../unified-test-documentation/dasharo-compatibility/318-m2-wifi-bluetooth.md + [MWL]: ../../unified-test-documentation/dasharo-compatibility/31K-minipcie-verification.md + [MMC]: ../../unified-test-documentation/dasharo-compatibility/31M-emmc-support.md + [DMI]: ../../unified-test-documentation/dasharo-compatibility/31L-smbios.md + [CNB]: ../../unified-test-documentation/dasharo-compatibility/30A-custom-network-boot-entries.md + [MSS]: ../../unified-test-documentation/dasharo-compatibility/31I-nvme-switching.md + [WBT]: ../../unified-test-documentation/dasharo-compatibility/31A-windows-booting.md + [AUD]: ../../unified-test-documentation/dasharo-compatibility/31F-audio-subsystem.md + [USH]: ../../unified-test-documentation/dasharo-compatibility/30P-uefi-shell.md + [UDT]: ../../unified-test-documentation/dasharo-compatibility/31O-usb-detect.md + [UBT]: ../../unified-test-documentation/dasharo-compatibility/31N-usb-boot.md + [PFS]: ../../unified-test-documentation/dasharo-compatibility/341-pfSense-support.md + [OPN]: ../../unified-test-documentation/dasharo-compatibility/342-OPNsense-support.md + [PVE]: ../../unified-test-documentation/dasharo-compatibility/348-proxmox-support.md + [USS]: ../../unified-test-documentation/dasharo-compatibility/349-ubuntu-server-support.md + + ## Module: Dasharo security + + | No. | Supported test suite | Test suite ID | Supported test cases | + |:-----|:--------------------------------------------------|:-------------:|:-------------------------------------| + | 1. | [TPM Support][TPM] | TPM | TPM001.002 and TPM001.003 | + | 2. | [Verified Boot support][VBO] | VBO | Without VBO006.001 and VBO007.001 | + | 3. | [Measured Boot support][MBO] | MBO | All | + | 4. | [Secure Boot support][SBO] | SBO | All | + | 5. | [BIOS lock support][BLS] | BLS | All | + | 6. | [USB stack enable/disable][USS] | USS | All | + | 7. | [SMM BIOS write protection][SMM] | SMM | All | + + [TPM]: ../../unified-test-documentation/dasharo-security/200-tpm-support.md + [VBO]: ../../unified-test-documentation/dasharo-security/201-verified-boot.md + [MBO]: ../../unified-test-documentation/dasharo-security/203-measured-boot.md + [SBO]: ../../unified-test-documentation/dasharo-security/206-secure-boot.md + [BLS]: ../../unified-test-documentation/dasharo-security/20J-bios-lock-support.md + [USS]: ../../unified-test-documentation/dasharo-security/20S-usb-stack.md + [SMM]: ../../unified-test-documentation/dasharo-security/20O-SMM-bios-write-protection.md + + ## Module: Dasharo performance + + | No. | Supported test suite | Test suite ID | Supported test cases | + |:-----|:---------------------------------------------------------|:-------------:|:-------------------------------------| + | 1. | [coreboot bring up time measurement][CBMEM] | CBMEM | All | + | 2. | [CPU temperature measure][CPT] | CPT | All | + | 3. | [CPU frequency measure][CPF] | CPF | Without CPU003.XXX and CPU005.XXX | + | 4. | [Platform stability][STB] | STB | All | + | 5. | [Ubuntu booting performance test][BUB] | BUB | All | + | 6. | [Debian booting performance test][BDE] | BDE | All | + | 7. | [FreeBSD booting performance test][BFB] | BFB | All | + | 8. | [Proxmox booting performance test][BPM] | BPM | All | + | 9. | [Ubuntu Server booting performance test][BUS] | BUS | All | + | 10. | [OPNsense (serial output) booting performance test][BOS] | BOS | All | + | 11. | [OPNsense (VGA output) booting performance test][BOV] | BOV | All | + | 12. | [pfSense (serial output) booting performance test][BPS] | BPS | All | + | 13. | [pfSense (VGA output) booting performance test][BPV] | BPV | All | + + [CBMEM]: ../../unified-test-documentation/dasharo-performance/400-coreboot-boot-measure.md + [CPT]: ../../unified-test-documentation/dasharo-performance/401-cpu-temperature.md + [CPF]: ../../unified-test-documentation/dasharo-performance/402-cpu-frequency.md + [STB]: ../../unified-test-documentation/dasharo-performance/404-platform-stability.md + [BUB]: ../../unified-test-documentation/dasharo-performance/407-ubuntu-booting-performance-test.md + [BDE]: ../../unified-test-documentation/dasharo-performance/408-debian-booting-performance-test.md + [BFB]: ../../unified-test-documentation/dasharo-performance/409-freebsd-booting-performance-test.md + [BPM]: ../../unified-test-documentation/dasharo-performance/410-proxmox-booting-performance-test.md + [BUS]: ../../unified-test-documentation/dasharo-performance/411-ubuntu-server-booting-performance-test.md + [BOS]: ../../unified-test-documentation/dasharo-performance/412-opnsense-serial-booting-performance-test.md + [BOV]: ../../unified-test-documentation/dasharo-performance/413-opnsense-vga-booting-performance-test.md + [BPS]: ../../unified-test-documentation/dasharo-performance/414-pfsense-serial-booting-performance-test.md + [BPV]: ../../unified-test-documentation/dasharo-performance/415-pfsense-vga-booting-performance-test.md diff --git a/docs/variants/overview.md b/docs/variants/overview.md index bcd6479a44..de3fd8af59 100644 --- a/docs/variants/overview.md +++ b/docs/variants/overview.md @@ -14,6 +14,7 @@ open-source firmware distribution. * Following network appliances are supported under Dasharo Support Package: - [Protectli FW6](protectli_fw6/overview.md) + - [Protectli V1x10](protectli_v1x10/overview.md) - [Protectli VP2410](protectli_vp2410/overview.md) - [Protectli VP2420](protectli_vp2420/overview.md) - [Protectli VP46xx](protectli_vp46xx/overview.md) diff --git a/docs/variants/protectli_fw6/building-manual.md b/docs/variants/protectli_fw6/building-manual.md deleted file mode 100644 index aef103f1f0..0000000000 --- a/docs/variants/protectli_fw6/building-manual.md +++ /dev/null @@ -1,32 +0,0 @@ -# Building manual - -## Requirements - -- Docker - + follow [Install Docker Engine on Ubuntu](https://docs.docker.com/engine/install/ubuntu/) - + follow [Post-installation steps for Linux](https://docs.docker.com/engine/install/linux-postinstall/) -- Git - + `sudo apt-get install git` - -## Building - -To build Dasharo firmware image, follow the steps below: - -1. Clone the coreboot repository: - - ```bash - git clone https://github.com/Dasharo/coreboot.git -b protectli_vault_kbl/release - ``` - - To build a specific version replace `protectli_vault_kbl/release` to - `protectli_vault_kbl_v1.0.x` where `x` is the version number. - -2. Start build process (note it requires certain blobs to proceed): - - ```bash - cd coreboot - git submodule update --init --checkout - # you will need to obtain the ZIP with blobs at this point - unzip protectli_blobs.zip -d 3rdparty/blobs/mainboard - ./build.sh fw6 - ``` diff --git a/docs/variants/protectli_fw6/hardware-matrix.md b/docs/variants/protectli_fw6/hardware-matrix.md deleted file mode 100644 index 9c34b66bb2..0000000000 --- a/docs/variants/protectli_fw6/hardware-matrix.md +++ /dev/null @@ -1,106 +0,0 @@ -# Hardware configuration matrix - -## Introduction - -This document describes the hardware configuration used for validation of the -coreboot port on the Protectli FW6 firewall. - -## Protectli FW6E Dasharo - -| Component | Description | -|------------------------|----------------------------------------------------------| -| **CPU** | IIntel(R) Celeron(TM) 3865U | -| **SSD** | M.2 SSD SATA: Hoodisk SSL032GTTC7-S9A-2S | -| | external SATA 2.5 inch: Goodram SSDPR-CL100-240-G2 240GB | -| **RAM** | CRUCIAL CT4G4SFS824A | -| | CRUCIAL CT4G4SFS824A | -| **Wireless card** | Qualcomm Atheros QCA9377 | -| **LTE miniPCIe card** | Quectel EC-20   | -| **Display** | HDMI 1920x1080p | -| **Ethernet** | 6x Intel i211 (on-board) | -| **Attached devices** | 1. SanDisk USB 3.2Gen1 16 GB | -| | 2. SanDisk USB 3.2Gen1 16 GB | -| | 3. SanDisk USB 3.2Gen1 16 GB | -| | 4. USB Type-C Hub Pro UCN3286 | -| **USB Keyboard** | DELL KB216 | -| **Power supply** | Channel Well Technology 12V, 7.5A 90W | - -## Protectli FW6B Dasharo - -| Component | Description | -|------------------------|----------------------------------------------------------| -| **CPU** | Intel(R) Core(TM) i3-7100U | -| **SSD** | M.2 SSD SATA: Hoodisk SSL032GTTC7-S9A-2S | -| | external SATA 2.5 inch: Goodram SSDPR-CL100-240-G2 240GB | -| **RAM** | CRUCIAL CT4G4SFS824A | -| | CRUCIAL CT4G4SFS824A | -| **Wireless card** | Qualcomm Atheros QCA9377 | -| **LTE miniPCIe card** | Quectel EC-20   | -| **Display** | HDMI 1920x1080p | -| **Ethernet** | 6x Intel i211 (on-board) | -| **Attached devices** | 1. SanDisk USB 3.2Gen1 16 GB | -| | 2. SanDisk USB 3.2Gen1 16 GB | -| | 3. SanDisk USB 3.2Gen1 16 GB | -| | 4. USB Type-C Hub Pro UCN3286 | -| **USB Keyboard** | DELL KB216 | -| **Power supply** | Channel Well Technology 12V, 7.5A 90W | - -## Protectli FW6C Dasharo - -| Component | Description | -|------------------------|----------------------------------------------------------| -| **CPU** | Intel(R) Core(TM) i5-7200U | -| **SSD** | M.2 SSD SATA: Hoodisk SSL032GTTC7-S9A-2S | -| | external SATA 2.5 inch: Goodram SSDPR-CL100-240-G2 240GB | -| **RAM** | CRUCIAL CT4G4SFS824A | -| | CRUCIAL CT4G4SFS824A | -| **Wireless card** | Qualcomm Atheros QCA9377 | -| **LTE miniPCIe card** | Quectel EC-20   | -| **Display** | HDMI 1920x1080p | -| **Ethernet** | 6x Intel i210 (on-board) | -| **Attached devices** | 1. SanDisk USB 3.2Gen1 16 GB | -| | 2. SanDisk USB 3.2Gen1 16 GB | -| | 3. SanDisk USB 3.2Gen1 16 GB | -| | 4. USB Type-C Hub Pro UCN3286 | -| **USB Keyboard** | DELL KB216 | -| **Power supply** | Channel Well Technology 12V, 7.5A 90W | - -## Protectli FW6D Dasharo - -| Component | Description | -|------------------------|----------------------------------------------------------| -| **CPU** | Intel(R) Core(TM) i5-8250U | -| **SSD** | M.2 SSD SATA: Hoodisk SSL032GTTC7-S9A-2S | -| | external SATA 2.5 inch: Goodram SSDPR-CL100-240-G2 240GB | -| **RAM** | CRUCIAL CT4G4SFS824A | -| | CRUCIAL CT4G4SFS824A | -| **Wireless card** | Qualcomm Atheros QCA9377 | -| **LTE miniPCIe card** | Quectel EC-20   | -| **Display** | HDMI 1920x1080p | -| **Ethernet** | 6x Intel i210 (on-board) | -| **Attached devices** | 1. SanDisk USB 3.2Gen1 16 GB | -| | 2. SanDisk USB 3.2Gen1 16 GB | -| | 3. SanDisk USB 3.2Gen1 16 GB | -| | 4. USB Type-C Hub Pro UCN3286 | -| **USB Keyboard** | DELL KB216 | -| **Power supply** | Channel Well Technology 12V, 7.5A 90W | - -## Protectli FW6E Dasharo - -| Component | Description | -|------------------------|----------------------------------------------------------| -| **CPU** | Intel(R) Core(TM) i5-8250U | -| **SSD** | M.2 SSD SATA: Hoodisk SSL032GTTC7-S9A-2S | -| | external SATA 2.5 inch: Goodram SSDPR-CL100-240-G2 240GB | -| **RAM** | CRUCIAL CT4G4SFS824A | -| | CRUCIAL CT4G4SFS824A | -| **Wireless card** | Qualcomm Atheros QCA9377 | -| **LTE miniPCIe card** | Quectel EC-20   | -| **Display** | HDMI 1920x1080p | -| **Ethernet** | 6x Intel i210 (on-board) | -| **Attached devices** | 1. SanDisk USB 3.2Gen1 16 GB | -| | 2. SanDisk USB 3.2Gen1 16 GB | -| | 3. SanDisk USB 3.2Gen1 16 GB | -| | 4. USB Type-C Hub Pro UCN3286 | -| **USB Keyboard** | DELL KB216 | -| **Power supply** | Channel Well Technology 12V, 7.5A 90W | diff --git a/docs/variants/protectli_fw6/installation-manual.md b/docs/variants/protectli_fw6/installation-manual.md deleted file mode 100644 index 42978ae375..0000000000 --- a/docs/variants/protectli_fw6/installation-manual.md +++ /dev/null @@ -1,37 +0,0 @@ -# Installation manual - -Flashing coreboot can be done from Linux using flashrom with the internal -programmer. This document describes the process of building, installing and -running flashrom on Ubuntu 22.04. - -## Installing flashrom - -Your distribution will need at least flashrom v1.0. - -```bash -sudo apt install flashrom -``` - -## Reading flash contents - -Always prepare a backup of the current firmware image. To read from the flash -and save them to a file (`dump.rom`), execute the following command: - -```bash -sudo flashrom -p internal -r dump.rom -``` - -## Flashing Dasharo - -```bash -flashrom -p internal -w [path] --ifd -i bios -``` - -To flash Dasharo on the platform, execute the following command - replace `[path]` -with the path to the Dasharo image you want to flash, e.g. `protectli_fw6_DF_v1.0.14.rom`. - -```bash -sudo flashrom -p internal -w protectli_fw6_DF_v1.0.14.rom --ifd -i bios -``` - -After successful operation reboot the platform. diff --git a/docs/variants/protectli_fw6/overview.md b/docs/variants/protectli_fw6/overview.md deleted file mode 100644 index 1454b465b6..0000000000 --- a/docs/variants/protectli_fw6/overview.md +++ /dev/null @@ -1,9 +0,0 @@ -# Overview - -* [Releases](releases.md) - list of all releases -* [Building manual](building-manual.md) - how to build Dasharo for Protectli FW6 -* [Installation manual](installation-manual.md) - how to install Dasharo - for Protectli FW6 -* [Hardware configuration matrix](hardware-matrix.md) - definition of hardware - configuration used during validation -* [Test matrix](test-matrix.md) - validation scope for the Protectli FW6 diff --git a/docs/variants/protectli_fw6/releases.md b/docs/variants/protectli_fw6/releases.md deleted file mode 100644 index 832f2bf453..0000000000 --- a/docs/variants/protectli_fw6/releases.md +++ /dev/null @@ -1,59 +0,0 @@ -# Release Notes - -Following Release Notes describe status of Open Source Firmware development for -Protectli FW6. - -For details about our release process please read -[Dasharo Standard Release Process](../../dev-proc/standard-release-process.md). - -
-[Subscribe to Protectli FW6 Dasharo Release Newsletter] -[newsletter]{.md-button .md-button--primary .center} -
- -Test results for this platform can be found -[here](https://docs.google.com/spreadsheets/d/1wI0qBSLdaluayYsm_lIa9iJ9LnPnCOZ9eNOyrKSc-j4/edit?usp=sharing). - -## v1.0.14 - 2022-05-13 - -### Changed - -- Throttling temperature to 75 Celsius degrees - -### Known issues - -- Samsung memory modules do not work properly on older FW6A/B/C (SKU6LAV20) - -### Binaries - -[protectli_vault_kbl_v1.0.14.rom][v1.0.14_rom]{.md-button} -[sha256][v1.0.14_hash]{.md-button} -[sha256.sig][v1.0.14_sig]{.md-button} - -To verify binary integrity with hash and signature please follow the -instructions in [Dasharo release signature verification](/guides/signature-verification) -using [this key](https://raw.githubusercontent.com/3mdeb/3mdeb-secpack/master/customer-keys/protectli/release-keys/protectli-dasharo-firewall-release-1.0-key.asc) - -### SBOM (Software Bill of Materials) - -- [coreboot based on 87f9fc85 revision e04b0ac8](https://github.com/Dasharo/coreboot/commits/e04b0ac8) -- [seabios based on v1.0.6 revision 03bcdcaf](https://github.com/Dasharo/SeaBIOS/commits/03bcdcaf) -- [ipxe based on 2019.3 stable revision ebf2eaf5](https://github.com/ipxe/ipxe/commits/ebf2eaf5) -- [memtest based on v002 revision dd5b4ff2](https://review.coreboot.org/admin/repos/memtest86plus,general) -- Management Engine: ME 11.8.50.3399, - SHA256: e1ce735139b6d9ebb81d7f6db288b0a896c39e4b1e606324b915bec949b6aca6 -- microcode: - + CPU signature: 0x0406E3, Date: 03.10.2019, Revision: 0xD6 - + CPU signature: 0x0806E9, Date: 27.04.2020, Revision: 0xD6 - + CPU signature: 0x0806E9, Date: 27.04.2020, Revision: 0xD6 - + CPU signature: 0x0806EA, Date: 27.04.2020, Revision: 0xD6 -- VBIOS: - + VBIOS blob for FW6A/B/C, - SHA256: 470d3faefb09432bea00d637ec6b3ff51854e6cff0ee56627c0773acaffa4830 - + VBIOS blob for FW6D/E, - SHA256: d1c746127e5288942efae65907739e18ff395fab70925b44dbafafd9e7b30cd7 - -[newsletter]: https://newsletter.3mdeb.com/subscription/n2EpSxtqL -[v1.0.14_rom]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_kbl/v1.0.14/protectli_vault_kbl_v1.0.14.rom -[v1.0.14_hash]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_kbl/v1.0.14/protectli_vault_kbl_v1.0.14.rom.sha256 -[v1.0.14_sig]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_kbl/v1.0.14/protectli_vault_kbl_v1.0.14.rom.sha256.sig diff --git a/docs/variants/protectli_fw6/test-matrix.md b/docs/variants/protectli_fw6/test-matrix.md deleted file mode 100644 index 3bf17dbafc..0000000000 --- a/docs/variants/protectli_fw6/test-matrix.md +++ /dev/null @@ -1,44 +0,0 @@ -# Test matrix - -## About - -The test matrix is used to determine the scope of tests which the DUT is -subjected from before the release of the new binary. - -## Module: Dasharo compatibility - -| No. | Supported test suite | Test suite ID | Supported test cases | -|:-----|:--------------------------------------------------|:-------------:|:-------------------------------------| -| 1. | [Memory HCL][HCL] | HCL | All | -| 2. | [Display ports and LCD support][DSP] | DSP | DSP002.001, DSP002.003 | -| 3. | [USB HID and MSC Support][USB] | USB | USB001.001, USB001.002, USB002.001, USB002.002 | -| 4. | [SMBIOS][DMI] | DMI | DMI002.001, DMI003.001, DMI004.001, DMI005.001, DMI006.001 | -| 5. | [Custom boot logo][CLG] | CLG | DMI002.001, DMI003.001, DMI004.001, DMI005.001, DMI006.001 | -| 6. | [M.2 WiFi/Bluetooth][WLE] | WLE | WLE001.001, WLE002.001, WLE003.001 | -| 7. | [Network boot][PXE] | PXE | PXE007.001 | -| 8. | [Debian Stable and Ubuntu LTS support][LBT] | LBT | LBT003.001, LBT003.002, LBT004.001, LBT004.002| -| 9. | [Custom boot menu key][CBK] | CBK | All | -| 10. | [FreeBSD support][BSD] | BSD | All | -| 11. | [miniPCIe LTE/WiFi/Bluetooth][MWL] | MWL | MWL004.001 | -| 12. | [Custom network boot entries][CNB] | CNB | CNB001.002 | - -[HCL]: ../../unified-test-documentation/dasharo-compatibility/301-memory-hcl.md -[DSP]: ../../unified-test-documentation/dasharo-compatibility/31E-display-ports-and-lcd.md -[USB]: ../../unified-test-documentation/dasharo-compatibility/306-usb-hid-and-msc-support.md -[DMI]: ../../unified-test-documentation/dasharo-compatibility/31L-smbios.md -[CLG]: ../../unified-test-documentation/dasharo-compatibility/304-custom-logo.md -[MWL]: ../../unified-test-documentation/dasharo-compatibility/31K-minipcie-verification.md -[WLE]: ../../unified-test-documentation/dasharo-compatibility/318-m2-wifi-bluetooth.md -[PXE]: ../../unified-test-documentation/dasharo-compatibility/315-network-boot.md -[LBT]: ../../unified-test-documentation/dasharo-compatibility/308-debian-stable-and-ubuntu-lts-support.md -[CBK]: ../../unified-test-documentation/dasharo-compatibility/303-custom-boot-menu-key.md -[BSD]: ../../unified-test-documentation/dasharo-compatibility/307-freebsd-support.md -[CNB]: ../../unified-test-documentation/dasharo-compatibility/30A-custom-network-boot-entries.md - -## Module: Dasharo performance - -| No. | Supported test suite | Test suite ID | Supported test cases | -|:-----|:--------------------------------------------------|:-------------:|:-------------------------------------| -| 1. | [CPU temperature][CPT] | CPT | All | - -[CPT]: ../../unified-test-documentation/dasharo-performance/401-cpu-temperature.md diff --git a/docs/variants/protectli_v1x10/building-manual.md b/docs/variants/protectli_v1x10/building-manual.md deleted file mode 100644 index bfefd88bb7..0000000000 --- a/docs/variants/protectli_v1x10/building-manual.md +++ /dev/null @@ -1,76 +0,0 @@ -# Building manual - -## Intro - -This document describes the procedure for compiling coreboot for Protectli -V1210, V1410 and V1610. - -## Requirements - -- Docker - + follow [Install Docker Engine on Ubuntu](https://docs.docker.com/engine/install/ubuntu/) - + follow [Post-installation steps for Linux](https://docs.docker.com/engine/install/linux-postinstall/) -- Git - -## Build Dasharo BIOS firmware - -> This build procedure produces full firmware binary including blobs such as -> FSP, and ME. Currently, access to them is restricted to the OEM (Protectli) via -> a private repository. - -1. Clone the coreboot repository: - - ```bash - git clone https://github.com/Dasharo/coreboot - ``` - -2. Checkout the desired version, e.g. `v0.9.2`: - - ```bash - cd coreboot - git checkout protectli_vault_jsl_v0.9.2 - ``` - -3. Checkout submodules: - - ```bash - git submodule update --init --checkout - ``` - -4. Obtain the Protectli blobs package (only for versions v0.9.0 and v0.9.1): - - > Replace `` with a a proper path to the repository - > in a form of: `git@repo-path.git`. You should checkout to the same tag as - > in case of the coreboot repository. - - ```bash - cd 3rdparty/blobs/mainboard/ - git init - git remote add origin - git fetch origin && git checkout protectli_vault_jsl_v0.9.0 - cd - - ``` - -5. Build the firmware: - - + for V1210 - - ```bash - ./build.sh V1210 - ``` - - + for V1410 - - ```bash - ./build.sh V1410 - ``` - - + for V1610 - - ```bash - ./build.sh V1610 - ``` - -The resulting coreboot image will be placed in the coreboot directory as -`protectli_V1210.rom`, `protectli_V1410.rom` or `protectli_V1610.rom` -respectvely. diff --git a/docs/variants/protectli_v1x10/firmware-update.md b/docs/variants/protectli_v1x10/firmware-update.md deleted file mode 100644 index d6b73910a7..0000000000 --- a/docs/variants/protectli_v1x10/firmware-update.md +++ /dev/null @@ -1,33 +0,0 @@ -# Firmware update - -The following documentation describes the process of Dasharo open-source -firmware update. If your device is currently flashed with the proprietary -firmware please refer to the [Initial deployment](initial-deployment.md) -documentation. - -The update process may be different, depending on the currently installed -Dasharo firmware version. - -For simplicity of the update process, we recommend using -[Dasharo Tools Suite](../../dasharo-tools-suite/overview.md). - -Before starting the update procedure be sure to disable Secure Boot: - -1. Power on the device. -2. While the device is booting, hold the `DELETE` key to enter the UEFI Setup - Menu. -3. Enter the `Device Manager` menu. -4. Enter the [Secure Boot Configuration](../../dasharo-menu-docs/device-manager.md#secure-boot-configuration) - submenu. -5. Verify that the `Current Secure Boot State` field says Disabled - if not, - unselect the `Attempt Secure Boot` option below then press `F10` to save - the changes. -6. Reboot the device to properly apply the changes. - -The settings of all the above options can be restored after a firmware update. - -## Updating Dasharo - -```bash -flashrom -p internal -w protectli__v.rom --fmap -i COREBOOT -``` diff --git a/docs/variants/protectli_v1x10/hardware-matrix.md b/docs/variants/protectli_v1x10/hardware-matrix.md deleted file mode 100644 index d482102946..0000000000 --- a/docs/variants/protectli_v1x10/hardware-matrix.md +++ /dev/null @@ -1,63 +0,0 @@ -# Hardware configuration matrix - -## Introduction - -This document describes the hardware configuration used for validation of the -coreboot port on the Protectli V1210/V1410/V1610 firewall. - -## Protectli V1210 - -| Component | Description | -|--------------------------------|---------------------------------------------| -| **CPU** | Intel(R) Celeron(R) N5105 @ 2.00GHz | -| **RAM** | Micron MT53D512M64D4RQ-046 | -| **Flash memory** | Winbond 25Q128JVSIQ | -| **USB Keyboard** | DELL KB216 | -| **USB Mouse** | DELL MS116p | -| **USB pendrives** | 1. SanDisk Ultra Flair USB 3.0 16 GB | -| **Display** | HDMI 1920x1080p | -| **Ethernet controller** | 2x intel i226 (on-board) | -| **Internal devices** | Audio subsystem | -| **4G Modem** | AMIT MDG200-0T001 | -| **Network** | Local network wired connection | -| **Remote Testing Environment** | RTE v1.1.0 | -| **Power Control** | RTE v1.1.0 | -| **Power supply** | Power Adapter GA-0481204000V | - -## Protectli V1410 - -| Component | Description | -|--------------------------------|---------------------------------------------| -| **CPU** | Intel(R) Celeron(R) N5105 @ 2.00GHz | -| **RAM** | Micron MT53D512M64D4RQ-046 | -| **Flash memory** | Winbond 25Q128JVSIQ | -| **USB Keyboard** | DELL KB216 | -| **USB Mouse** | DELL MS116p | -| **USB pendrives** | 1. SanDisk Ultra Flair USB 3.0 16 GB | -| **Display** | HDMI 1920x1080p | -| **Ethernet controller** | 4x intel i226 (on-board) | -| **Internal devices** | Audio subsystem | -| **4G Modem** | AMIT MDG200-0T001 | -| **Network** | Local network wired connection | -| **Remote Testing Environment** | RTE v1.1.0 | -| **Power Control** | RTE v1.1.0 | -| **Power supply** | Power Adapter GA-0481204000V | - -## Protectli V1610 - -| Component | Description | -|--------------------------------|---------------------------------------------| -| **CPU** | Intel(R) Pentium(R) Silver N6005 @ 2.00GHz | -| **RAM** | Micron MT53E512M32D4NQ-053 | -| **Flash memory** | Winbond 25Q128JVSIQ | -| **USB Keyboard** | DELL KB216 | -| **USB Mouse** | DELL MS116p | -| **USB pendrives** | 1. SanDisk Ultra Flair USB 3.0 16 GB | -| **Display** | HDMI 1920x1080p | -| **Ethernet controller** | 6x intel i226 (on-board) | -| **Internal devices** | Audio subsystem | -| **4G Modem** | AMIT MDG200-0T001 | -| **Network** | Local network wired connection | -| **Remote Testing Environment** | RTE v1.1.0 | -| **Power Control** | RTE v1.1.0 | -| **Power supply** | Power Adapter GA-0481204000V | diff --git a/docs/variants/protectli_v1x10/initial-deployment.md b/docs/variants/protectli_v1x10/initial-deployment.md deleted file mode 100644 index f7ca2d96a5..0000000000 --- a/docs/variants/protectli_v1x10/initial-deployment.md +++ /dev/null @@ -1,45 +0,0 @@ -# Initial deployment - -Initial flashing of Dasharo firmware can be done from Linux using flashrom with -the internal programmer. This document describes the process of building, -installing and running flashrom on Ubuntu 22.04. - -## Deploy using Dasharo Tools Suite - -For simplicity we recommend using -[Dasharo Tools Suite](../../dasharo-tools-suite/overview.md) to -omit all compilation steps and deploy the Dasharo firmware seamlessly. - -1. Boot Dasharo Tools Suite. -2. Perform Dasharo installation. - -This will flash the BIOS region only. After the successful operation, DTS will -reboot the platform. - -This concludes Dasharo deployment process using DTS. - -## Build flashrom - -Please follow generic guide for [Dasharo flashrom fork](../../osf-trivia-list/deployment.md#how-to-install-dasharo-flashrom-fork). - -## Reading flash contents - -Always prepare a backup of the current firmware image. To read from the flash -and save it to a file (`dump.rom`), execute the following command: - -```bash -flashrom -p internal -r dump.rom -``` - -## Flashing Dasharo - -To flash Dasharo on the platform, execute the following command - replace -`[path]` with the path to the Dasharo image you want to flash, e.g. -`protectli_vault_V1210_v0.9.0.rom`. - -```bash -flashrom -p internal -w protectli_vault_V1210_v0.9.0.rom --ifd -i bios -``` - -This will flash the BIOS region only. After the operation is successful, -reboot the platform. diff --git a/docs/variants/protectli_v1x10/overview.md b/docs/variants/protectli_v1x10/overview.md deleted file mode 100644 index bc61338fc7..0000000000 --- a/docs/variants/protectli_v1x10/overview.md +++ /dev/null @@ -1,30 +0,0 @@ -# Overview - -The Vault is a small form network appliance built for use as a firewall / -router, virtualization platform, a daily-driven personal computer, and more. -The V1210/V1410/V1610 feature an Intel Jasper Lake CPU, soldered down LPDDR4X -memory, Intel i225-V/i226-V 2.5G Ethernet ports, 4x USB-A 3.x ports, eMMC, -PCIe NVMe storage, M.2 WIFI and WWAN slots, serial console over USB-C and -a firmware TPM. - -* V1210 - Intel® Celeron® N5105, 2x i225/i226, 4GB LPDDR4X -* V1410 - Intel® Celeron® N5105, 4x i225/i226, 8GB LPDDR4X -* V1610 - Intel® Pentium® Silver N6005, 6x i225/i226, 16GB LPDDR4X - -## Documentation sections - -* [Releases](releases.md) - groups information about all releases. -* [Building manual](building-manual.md) - describes how to build Dasharo for - Protectli V1210/V1410/V1610. -* [Initial deployment](initial-deployment.md) - describes initial Dasharo - deployment methods (i. e. flashing new firmware) for Protectli - V1210/V1410/V1610. -* [Firmware update](firmware-update.md) - explains supported Dasharo - open-source firmware update methods. -* [Recovery](recovery.md) - gathers information on how to recover the platform - from potential failure. -* [Hardware configuration matrix](hardware-matrix.md) - describes the - platform's hardware configuration used during the Dasharo firmware - validation procedure. -* [Test matrix](test-matrix.md) - describes validation scope used during - Dasharo firmware validation procedure. diff --git a/docs/variants/protectli_v1x10/recovery.md b/docs/variants/protectli_v1x10/recovery.md deleted file mode 100644 index ee13862fbc..0000000000 --- a/docs/variants/protectli_v1x10/recovery.md +++ /dev/null @@ -1,84 +0,0 @@ -# Recovery - -## Intro - -The following documentation describes the process of recovering hardware from -the brick state with [RTE](../../transparent-validation/rte/introduction.md) and -Dasharo open-source firmware. - -## Prerequisites - -* [Prepared RTE](../../transparent-validation/rte/v1.1.0/quick-start-guide.md) -* 6x female-female wire cables - -## Connections - -To prepare the stand for flashing follow the steps described below: - -1. Open the platform cover. -2. Connect the 6-pin flash header to the - [SPI header](../../transparent-validation/rte/v1.1.0/specification.md) - on RTE. - - | SPI header | 6 pin header | - |:----------:|:------------:| - | Vcc | pin 1 (Vcc) | - | GND | pin 2 (GND) | - | CS | pin 4 (CS) | - | SCLK | pin 6 (CLK) | - | MISO | pin 5 (MISO) | - | MOSI | pin 3 (MOSI) | - - ```txt - ______ - > | | - Vcc 3.3V ----1 2---- GND - | | - MOSI ----3 4---- CS - | | - MISO ----5 6---- CLK - |______| - ``` - -## Firmware flashing - -To flash firmware follow the steps described below: - -1. Login to RTE via `ssh` or `minicom`. -1. Turn on the platform by connecting the power supply. -1. Wait at least 5 seconds. -1. Turn off the platform by using the power button. -1. Wait at least 3 seconds. -1. Set the proper state of the SPI by using the following commands on RTE: - - ```bash - # set SPI Vcc to 3.3V - echo 1 > /sys/class/gpio/gpio405/value - # SPI Vcc on - echo 1 > /sys/class/gpio/gpio406/value - # SPI lines ON - echo 1 > /sys/class/gpio/gpio404/value - ``` - -1. Wait at least 2 seconds. -1. Disconnect the power supply from the platform. -1. Wait at least 2 seconds. -1. Flash the platform by using the following command: - - ```bash - flashrom -p linux_spi:dev=/dev/spidev1.0,spispeed=16000 -w [path_to_binary] - ``` - - > Flashing with flashrom takes about 1 minute. - -1. Change back the state of the SPI by using the following commands: - - ```bash - echo 0 > /sys/class/gpio/gpio404/value - echo 0 > /sys/class/gpio/gpio406/value - ``` - -1. Turn on the platform by connecting the power supply. - -The first boot of the platform after proceeding with the above procedure can -take much longer than standard. diff --git a/docs/variants/protectli_v1x10/releases.md b/docs/variants/protectli_v1x10/releases.md deleted file mode 100644 index b392f0f7f9..0000000000 --- a/docs/variants/protectli_v1x10/releases.md +++ /dev/null @@ -1,20 +0,0 @@ -# Release Notes - -Following Release Notes describe status of Open Source Firmware development -for Protectli V1210/V1410/V1610 - -For details about our release process please read -[Dasharo Standard Release Process](../../dev-proc/standard-release-process.md). - -
-[Subscribe to Protectli V1210/V1410/V1610 Dasharo Release Newsletter] -[newsletter]{.md-button .md-button--primary .center} -
- -Test results for this platform can be found -[here](https://docs.google.com/spreadsheets/d/1wI0qBSLdaluayYsm_lIa9iJ9LnPnCOZ9eNOyrKSc-j4/edit#gid=1316498194). - -[newsletter]: https://newsletter.3mdeb.com/subscription/n2EpSxtqL - - -[![empty-pixel](../../images/empty_pixel.png)](overview.md) diff --git a/docs/variants/protectli_v1x10/test-matrix.md b/docs/variants/protectli_v1x10/test-matrix.md deleted file mode 100644 index 4fc87ab015..0000000000 --- a/docs/variants/protectli_v1x10/test-matrix.md +++ /dev/null @@ -1,89 +0,0 @@ -# Test matrix - -## About - -The test matrix is used to determine the scope of tests which the DUT is -subjected from before the release of the new binary. The test scope is the same -for all platforms of the V1210/V1410/V1610 family. - -## Module: Dasharo compatibility - -| No. | Supported test suite | Test suite ID | Supported test cases | -|:----:|:--------------------------------------|:-------------:|:-------------------------------------| -| 1. | [UEFI compatible interface][EFI] | EFI | All | -| 2. | [Display ports][DSP] | DSP | DSP002.001, DSP002.002, DSP002.003 | -| 3. | [Network boot utilities][NBT] | NBT | All | -| 4. | [NVMe support][NVM] | NVM | All | -| 5. | [Custom logo][CLG] | CLG | All | -| 6. | [Custom Boot Keys][CBK] | CBK | All | -| 7. | [USB HID and MSC Support][USB] | USB | USB001.xxx and USB002.xxx | -| 8. | [Debian Stable and Ubuntu LTS support][LBT] | LBT | LBT003.001, LBT003.002, LBT004.001, LBT004.002| -| 9. | [miniPCIe LTE/WiFi/Bluetooth][MWL] | MWL | MWL004.001 | -| 10. | [M.2 WiFi/Bluetooth][WLE] | WLE | All | -| 11. | [eMMC support][MMC] | MMC | All | -| 12. | [SMBIOS][DMI] | DMI | DMI002.001, DMI003.001, DMI004.001, DMI005.001, DMI006.001 | -| 13. | [Custom network boot entries][CNB] | CNB | CNB001.002 | -| 14. | [Audio subsystem][AUD] | AUD | AUD007.xxx, AUD008.xxx | -| 15. | [UEFI Shell][USH] | USH | All | -| 16. | [USB detection][UDT] | UDT | All | -| 17. | [USB booting][UBT] | UBT | All | -| 18. | [Windows booting][WBT] | WBT | WBT001.001 | - -[EFI]: ../../unified-test-documentation/dasharo-compatibility/30M-uefi-compatible-interface.md -[DSP]: ../../unified-test-documentation/dasharo-compatibility/31E-display-ports-and-lcd.md -[NBT]: ../../unified-test-documentation/dasharo-compatibility/315b-netboot-utilities.md -[NVM]: ../../unified-test-documentation/dasharo-compatibility/312-nvme-support.md -[CLG]: ../../unified-test-documentation/dasharo-compatibility/304-custom-logo.md -[CBK]: ../../unified-test-documentation/dasharo-compatibility/303-custom-boot-menu-key.md -[USB]: ../../unified-test-documentation/dasharo-compatibility/306-usb-hid-and-msc-support.md -[BSD]: ../../unified-test-documentation/dasharo-compatibility/307-freebsd-support.md -[LBT]: ../../unified-test-documentation/dasharo-compatibility/308-debian-stable-and-ubuntu-lts-support.md -[UTC]: ../../unified-test-documentation/dasharo-compatibility/31H-usb-type-c.md -[WLE]: ../../unified-test-documentation/dasharo-compatibility/318-m2-wifi-bluetooth.md -[MWL]: ../../unified-test-documentation/dasharo-compatibility/31K-minipcie-verification.md -[MMC]: ../../unified-test-documentation/dasharo-compatibility/31M-emmc-support.md -[DMI]: ../../unified-test-documentation/dasharo-compatibility/31L-smbios.md -[CNB]: ../../unified-test-documentation/dasharo-compatibility/30A-custom-network-boot-entries.md -[MSS]: ../../unified-test-documentation/dasharo-compatibility/31I-nvme-switching.md -[WBT]: ../../unified-test-documentation/dasharo-compatibility/31A-windows-booting.md -[AUD]: ../../unified-test-documentation/dasharo-compatibility/31F-audio-subsystem.md -[USH]: ../../unified-test-documentation/dasharo-compatibility/30P-uefi-shell.md -[UDT]: ../../unified-test-documentation/dasharo-compatibility/31O-usb-detect.md -[UBT]: ../../unified-test-documentation/dasharo-compatibility/31N-usb-boot.md -[PFS]: ../../unified-test-documentation/dasharo-compatibility/341-pfSense-support.md -[OPN]: ../../unified-test-documentation/dasharo-compatibility/342-OPNsense-support.md -[PVE]: ../../unified-test-documentation/dasharo-compatibility/348-proxmox-support.md -[USS]: ../../unified-test-documentation/dasharo-compatibility/349-ubuntu-server-support.md - -## Module: Dasharo security - -| No. | Supported test suite | Test suite ID | Supported test cases | -|:-----|:--------------------------------------|:-------------:|:-------------------------------------| -| 1. | [TPM Support][TPM] | TPM | TPM001.002, TPM001.003, TPM002.002, TPM002.003, TPM003.002, TPM003.003 | -| 2. | [Secure Boot support][SBO] | SBO | All | - -[TPM]: ../../unified-test-documentation/dasharo-security/200-tpm-support.md -[SBO]: ../../unified-test-documentation/dasharo-security/206-secure-boot.md - -## Module: Dasharo performance - -| No. | Supported test suite | Test suite ID | Supported test cases | -|:-----|:--------------------------------------|:-------------:|:-------------------------------------| -| 1. | [coreboot bring up time measurement][CBMEM] | CBMEM | All | -| 2. | [CPU temperature measure][CPT] | CPT | All | -| 3. | [CPU frequency measure][CPF] | CPF | Without CPU003.XXX and CPU005.XXX | -| 4. | [Platform stability][STB] | STB | All | - -[CBMEM]: ../../unified-test-documentation/dasharo-performance/400-coreboot-boot-measure.md -[CPT]: ../../unified-test-documentation/dasharo-performance/401-cpu-temperature.md -[CPF]: ../../unified-test-documentation/dasharo-performance/402-cpu-frequency.md -[STB]: ../../unified-test-documentation/dasharo-performance/404-platform-stability.md -[BUB]: ../../unified-test-documentation/dasharo-performance/407-ubuntu-booting-performance-test.md -[BDE]: ../../unified-test-documentation/dasharo-performance/408-debian-booting-performance-test.md -[BFB]: ../../unified-test-documentation/dasharo-performance/409-freebsd-booting-performance-test.md -[BPM]: ../../unified-test-documentation/dasharo-performance/410-proxmox-booting-performance-test.md -[BUS]: ../../unified-test-documentation/dasharo-performance/411-ubuntu-server-booting-performance-test.md -[BOS]: ../../unified-test-documentation/dasharo-performance/412-opnsense-serial-booting-performance-test.md -[BOV]: ../../unified-test-documentation/dasharo-performance/413-opnsense-vga-booting-performance-test.md -[BPS]: ../../unified-test-documentation/dasharo-performance/414-pfsense-serial-booting-performance-test.md -[BPV]: ../../unified-test-documentation/dasharo-performance/415-pfsense-vga-booting-performance-test.md diff --git a/docs/variants/protectli_vp2410/building-manual.md b/docs/variants/protectli_vp2410/building-manual.md deleted file mode 100644 index f7b23b5ffe..0000000000 --- a/docs/variants/protectli_vp2410/building-manual.md +++ /dev/null @@ -1,62 +0,0 @@ -# Building manual - -## Intro - -This document describes the procedure for compiling coreboot for Protectli -VP2410. - -## Requirements - -- Docker - + follow [Install Docker Engine on Ubuntu](https://docs.docker.com/engine/install/ubuntu/) - + follow [Post-installation steps for Linux](https://docs.docker.com/engine/install/linux-postinstall/) -- Git - -## Build Dasharo BIOS firmware - -> This build procedure produces full firmware binary including blobs such as -> FSP, and ME. Currently, access to them is restricted to the OEM (Protectli) via -> a private repository. - -1. Clone the coreboot repository: - - ```bash - git clone https://github.com/Dasharo/coreboot - ``` - -1. Checkout the desired version, e.g. `v1.0.15`: - - ```bash - cd coreboot - git checkout protectli_vault_glk_v1.0.15 - ``` - -1. Checkout submodules: - - ```bash - git submodule update --init --checkout - ``` - -1. Obtain the Protectli blobs package (only for v1.0.15 or older): - - > Replace `` with a a proper path to the repository - > in a form of: `git@repo-path.git`. You should checkout to the same tag as - > in case of the coreboot repository. - - ```bash - cd 3rdparty/blobs/mainboard/ - git init - git remote add origin - git fetch origin && git checkout protectli_vault_glk_v1.0.15 - cd - - ln -s ../blobs/mainboard/protectli/vault_glk/GeminilakeFspBinPkg/ 3rdparty/fsp/GeminilakeFspBinPkg - ``` - -1. Build the firmware: - - ```bash - ./build.sh vp2410 - ``` - -The resulting coreboot image will be placed in the coreboot directory as -`protectli_vp2410_.rom`. diff --git a/docs/variants/protectli_vp2410/firmware-update.md b/docs/variants/protectli_vp2410/firmware-update.md deleted file mode 100644 index 95583e2ae3..0000000000 --- a/docs/variants/protectli_vp2410/firmware-update.md +++ /dev/null @@ -1,51 +0,0 @@ -# Firmware update - -The following documentation describes the process of Dasharo open-source -firmware update. If your device is currently flashed with the proprietary -firmware please refer to the [Initial deployment](initial-deployment.md) -documentation. - -For simplicity of the update process, we recommend using -[Dasharo Tools Suite](https://docs.dasharo.com/dasharo-tools-suite/overview). - -Before starting the update procedure be sure to disable Dasharo BIOS Boot medium -lock, SMM BIOS Write Protection and Secure boot: - -1. Power on the device. -1. While the device is booting, hold the `DELETE` key to enter the UEFI Setup - Menu. -1. Enter the `Dasharo System Features` menu using the arrow keys and Enter. -1. Enter the [Dasharo Security Options](https://docs.dasharo.com/dasharo-menu-docs/dasharo-system-features/#dasharo-security-options) - submenu. -1. Verify the state of the `Lock the BIOS boot medium` and - `Enable SMM BIOS write protection` options - if any of those are set, press - `Space` to unselect them and then `F10` to save the changes. -1. Go back to the main menu using the `ESC` key. -1. Enter the `Device Manager` menu. -1. Enter the [Secure Boot Configuration](https://docs.dasharo.com/dasharo-menu-docs/device-manager/#secure-boot-configuration) - submenu. -1. Verify that the `Current Secure Boot State` field says Disabled - if not, - unselect the `Attempt Secure Boot` option below then press `F10` to save the - changes. -1. Reboot the device to properly apply the changes. - -The settings of all the above options can be restored after a firmware update. - -## Updating minor versions v1.x.y (e.g. from v1.0.x to v1.1.0) - -Full binary should be flashed: - -```bash -flashrom -p internal -w [path] -``` - -## Updating patch version v1.0.x/v1.1.x - -Only the `COREBOOT` and `IFWI` partition of the flash needs to be updated. -Flash it using the following command: - -```bash -flashrom -p internal -w [path] --fmap -i COREBOOT -i IFWI -``` - -This command also preserves Dasharo UEFI settings and the boot order. diff --git a/docs/variants/protectli_vp2410/hardware-matrix.md b/docs/variants/protectli_vp2410/hardware-matrix.md deleted file mode 100644 index 0f2631ed4d..0000000000 --- a/docs/variants/protectli_vp2410/hardware-matrix.md +++ /dev/null @@ -1,37 +0,0 @@ -# Hardware configuration matrix - -## Introduction - -This document describes the hardware configuration used for validation of the -coreboot port on the Protectli VP2410 firewall. - -## Protectli VP2410 - -| Component | Description | -|------------------------|----------------------------------------------------------| -| **CPU** | Intel Celeron J4125 @ 2.70GHz | -| **RAM** | CRUCIAL CT4G4SFS824A | -| | SAMSUNG M471A4G43MB1-CTD | -| | SAMSUNG M471A1K43CB1-CTD | -| | SAMSUNG M471A5244BB0-CRC | -| | KINGSTON KVR24S17S8/8 | -| | KINGSTON KVR26S19S8/16 | -| | KINGSTON KVR26S21S6/8 | -| **Flash memory** | Macronix MX25U6473F | -| **SSD** | CRUCIAL CT500MX500SSD1 | -| **MMC drive** | SAMSUNG 8GTF4R (on-board) | -| **USB pendrives** | 1. SanDisk USB 3.2Gen1 16 GB | -| | 2. SanDisk USB 3.2Gen1 16 GB | -| | 3. USB Type-C Hub Pro UCN3286 | -| **Attached devices** | 1. Logitech, Inc. Keyboard K120 | -| | 2. Dell Mouse MS116p | -| | 3. USB Type-C Hub Pro UCN3286 | -| **LTE miniPCIe card** | Quectel EC-20 | -| **Wireless card** | Intel Wi-Fi 6 AX200 | -| **Display** | HDMI 1920x1080p, DP 1920x1080p | -| **Ethernet** | 4x intel i211 (on-board) | -| **TPM** | PC Engines TPM1A LPC TPM | -| **Power supply** | Channel Well Technology 12V, 5.0A 60W | - -> Note, that in **RAM** section all used during verification procedure modules -> have been listed. Device has only one RAM mounting slot. diff --git a/docs/variants/protectli_vp2410/initial-deployment.md b/docs/variants/protectli_vp2410/initial-deployment.md deleted file mode 100644 index ac1da9f3aa..0000000000 --- a/docs/variants/protectli_vp2410/initial-deployment.md +++ /dev/null @@ -1,72 +0,0 @@ -# Initial deployment - -Initial flashing of Dasharo firmware can be done from Linux using flashrom with -the internal programmer. This document describes the process of building, -installing and running flashrom on Ubuntu 22.04. - -## Deploy using Dasharo Tools Suite - -For simplicity we recommend using -[Dasharo Tools Suite](https://docs.dasharo.com/dasharo-tools-suite/overview) to -omit all compilation steps and deploy the Dasharo firmware seamlessly. -Be sure to disable the BIOS lock in the AMI firmware setup utility: - -1. Go to `Chipset` tab -2. Enter `PCH IO Configuration` -3. Disable `BIOS Lock`. -4. Save changes and reset. - -Now you are ready to use Dasharo Tools Suite (DTS): - -1. Boot Dasharo Tools Suite. -2. Perform Dasharo installation. - -This will flash the full image, including the Intel ME. The operation requires -a hard reset of the platform. To perform a hard reset: - -1. Power off the platform. Note, it may not power off completely due to flashed - ME. -2. Disconnect power supply from the board when OS finishes all tasks after - power off (the screen goes dark or black). -3. Disconnect the RTC/CMOS battery OR clear the CMOS using the pin header - located near memory slots. Wait about 10 seconds and unshort the pins. -4. Connect the power supply back. -5. The platform should power on normally now. You can connect the battery back - if it was disconnected. - -This concludes Dasharo deployment process using DTS. - -## Build flashrom - -Please follow generic guide for [Dasharo flashrom fork](../../osf-trivia-list/deployment.md#how-to-install-dasharo-flashrom-fork). - -## Reading flash contents - -Always prepare a backup of the current firmware image. To read from the flash -and save them to a file (`dump.rom`), execute the following command: - -```bash -flashrom -p internal -r dump.rom -``` - -Keep the backup for later recovery if needed. - -## Flashing Dasharo - -To flash Dasharo on the platform, execute the following command - replace `[path]` -with the path to the Dasharo image you want to flash, e.g. `protectli_vault_glk_v1.0.15.rom`. - -If stock firmware is currently installed: - -```bash -flashrom -p internal -w [path] -``` - -If Dasharo is currently installed, only the COREBOOT and IFWI partitions of the -flash needs to be updated. Flash it using the following command: - -```bash -flashrom -p internal -w protectli_vault_glk_v1.0.15.rom --fmap -i COREBOOT -i IFWI -``` - -This command also preserves Dasharo UEFI settings and the boot order. diff --git a/docs/variants/protectli_vp2410/openness-score.md b/docs/variants/protectli_vp2410/openness-score.md deleted file mode 100644 index db9b8f0a70..0000000000 --- a/docs/variants/protectli_vp2410/openness-score.md +++ /dev/null @@ -1,89 +0,0 @@ -# Dasharo Openness Score - -This page contains the [Dasharo Openness -Score](../../glossary.md#dasharo-openness-score) for Protectli VP2410 Dasharo -releases. The content of the page is generated with [Dasharo Openness Score -utility](https://github.com/Dasharo/Openness-Score). - -## v1.1.0 - -Openness Score for protectli_vp2410_v1.1.0.rom - -Open-source code percentage: **31.7%** -Closed-source code percentage: **68.3%** - -* Image size: 8388608 (0x800000) -* Number of regions: 17 -* Number of CBFSes: 2 -* Total open-source code size: 2313343 (0x234c7f) -* Total closed-source code size: 4983646 (0x4c0b5e) -* Total data size: 409627 (0x6401b) -* Total empty size: 681992 (0xa6808) - -![](protectli_vp2410_v1.1.0.rom_openness_chart.png) - -![](protectli_vp2410_v1.1.0.rom_openness_chart_full_image.png) - -> Numbers given above already include the calculations from CBFS regions -> presented below - -### FMAP regions - -| FMAP region | Offset | Size | Category | -| ----------- | ------ | ---- | -------- | -| IFWI | 0x1000 | 0x2ff000 | closed-source | -| SI_DESC | 0x0 | 0x1000 | data | -| RECOVERY_MRC_CACHE | 0x300000 | 0x10000 | data | -| RW_MRC_CACHE | 0x310000 | 0x10000 | data | -| FMAP | 0x3a1000 | 0x1000 | data | -| SMMSTORE | 0x67f000 | 0x40000 | data | - -### CBFS BOOTSPLASH - -* CBFS size: 524288 -* Number of files: 1 -* Open-source files size: 0 (0x0) -* Closed-source files size: 0 (0x0) -* Data size: 28 (0x1c) -* Empty size: 524260 (0x7ffe4) - -> Numbers given above are already normalized (i.e. they already include size -> of metadata and possible closed-source LAN drivers included in the payload - > which are not visible in the table below) - -| CBFS filename | CBFS filetype | Size | Compression | Category | -| ------------- | ------------- | ---- | ----------- | -------- | -| (empty) | null | 524260 | none | empty | - -### CBFS COREBOOT - -* CBFS size: 3002368 -* Number of files: 17 -* Open-source files size: 2313343 (0x234c7f) -* Closed-source files size: 523102 (0x7fb5e) -* Data size: 8191 (0x1fff) -* Empty size: 157732 (0x26824) - -> Numbers given above are already normalized (i.e. they already include size -> of metadata and possible closed-source LAN drivers included in the payload - > which are not visible in the table below) - -| CBFS filename | CBFS filetype | Size | Compression | Category | -| ------------- | ------------- | ---- | ----------- | -------- | -| fallback/payload | simple elf | 2080815 | none | open-source | -| fallback/romstage | stage | 47192 | LZ4 | open-source | -| fallback/ramstage | stage | 125678 | LZMA | open-source | -| fallback/dsdt.aml | raw | 7126 | none | open-source | -| pt | raw | 20480 | none | open-source | -| pdpt | raw | 32 | none | open-source | -| fallback/postcar | stage | 32020 | none | open-source | -| cpu_microcode_blob.bin | microcode | 152576 | none | closed-source | -| fspm.bin | fsp | 178014 | LZ4 | closed-source | -| fsps.bin | fsp | 192512 | none | closed-source | -| cbfs_master_header | cbfs header | 28 | none | data | -| config | raw | 4505 | LZMA | data | -| revision | raw | 859 | none | data | -| build_info | raw | 103 | none | data | -| vbt.bin | raw | 1271 | LZMA | data | -| header_pointer | cbfs header | 4 | none | data | -| (empty) | null | 157732 | none | empty | diff --git a/docs/variants/protectli_vp2410/overview.md b/docs/variants/protectli_vp2410/overview.md deleted file mode 100644 index 8aa4134709..0000000000 --- a/docs/variants/protectli_vp2410/overview.md +++ /dev/null @@ -1,44 +0,0 @@ -# Overview - -The Vault Pro is a small form network appliance built for use as a firewall -/ router, virtualization platform, a daily-driven personal computer, -and more. The VP2410 is based on a 4 network port design that leverages -a low power, but versatile Intel Celeron J4125 CPU. - -![](/images/VP2410.png) - -The VP2410 can accommodate up to 16GB DDR4 RAM and 2TB m.2 SATA SSD -storage drive. The built-in 8GB eMMC module can be used for booting a -light-weight OS for example, or for use as optional storage. - -VP2410 specification: - -* Intel Celeron® J4125 Quad Core at 2 GHz (Burst up to 2.7 GHz) -* 4 Intel® Gigabit Ethernet NIC ports -* 8GB eMMC module on board -* Intel® AES-NI support -* Fanless and Silent -* Included 12v Power Supply, VESA mount kit, Serial Console Cable, -SATA data and power cables for internal SSD, Quick Start Guide - -For more information please refer to the references below. - -## References - -* [Protectli knowledge base](https://kb.protectli.com/) -* [Buy VP2410 in Protectli shop](https://eu.protectli.com/product/vp2410) - -## Documentation sections - -* [Releases](releases.md) - groups information about all releases. -* [Building manual](building-manual.md) - describes how to build Dasharo for - Protecli 2410. -* [Initial deployment](initial-deployment.md) - describes initial Dasharo - deployment methods (i. e. flashing new firmware) for Protectli VP2410. -* [Recovery](recovery.md) - gathers information on how to recover the platform - from potential failure. -* [Hardware configuration matrix](hardware-matrix.md) - describes the - platform's hardware configuration used during the Dasharo firmware - validation procedure. -* [Test matrix](test-matrix.md) - describes validation scope used during - Dasharo firmware validation procedure. diff --git a/docs/variants/protectli_vp2410/recovery.md b/docs/variants/protectli_vp2410/recovery.md deleted file mode 100644 index ac50f6e81a..0000000000 --- a/docs/variants/protectli_vp2410/recovery.md +++ /dev/null @@ -1,40 +0,0 @@ -# Recovery - -## Intro - -The following documentation describes the process of recovering hardware from -the brick state with [RTE](../../transparent-validation/rte/introduction.md) and -Dasharo open-source firmware. - -## Connections - -Set up the connections required for external flashing as described in -[Generic Testing Stand Setup](../../unified-test-documentation/generic-testing-stand-setup.md) -Protectli VP2410 are flashed using the Pomona clip connection variant. Use -the pictures below to easily locate essential components on the mainboard. - -### SPI flash chip location - -Completely remove the motherboard from the platform cover. - -![](../../images/protectli_recovery/vp2410_disassembly.jpg) -![](../../images/protectli_recovery/vp2410_location_of_flash_chip.jpg) - -> If there is little thermal paste on the CPU, apply it before reassembling -> the motherboard to the platform cover. - -### CMOS header location - -![](../../images/protectli_recovery/vp2410_location_of_CMOS_header.jpg) - -## Firmware flashing - -To flash firmware, follow the steps described in -[Generic Testing Stand Setup](../../unified-test-documentation/generic-testing-stand-setup.md) -, noting that: -* The chip voltage for this platform is **1.8V** -* The proper flashrom parameters for this platform are: - - ```bash - flashrom -p linux_spi:dev=/dev/spidev1.0,spispeed=16000 -c "MX25U6435E/F" -w [path_to_binary] - ``` diff --git a/docs/variants/protectli_vp2410/releases.md b/docs/variants/protectli_vp2410/releases.md deleted file mode 100644 index 4310c4c830..0000000000 --- a/docs/variants/protectli_vp2410/releases.md +++ /dev/null @@ -1,122 +0,0 @@ -# Release Notes - -Following Release Notes describe status of open-source firmware development for -Protectli VP2410 family. - -For details about our release process please read -[Dasharo Standard Release Process](../../dev-proc/standard-release-process.md). - -
-[Subscribe to Protectli VP2410 Dasharo Release Newsletter] -[newsletter]{.md-button .md-button--primary .center} -
- -Test results for this platform can be found -[here](https://docs.google.com/spreadsheets/d/1wSE6xA3K3nXewwLn5lV39_2wZL1kg5AkGb4mvmG3bwE/edit#gid=1033426620). - -## v1.1.0 - 2024-05-16 - -### Added - -- [SMM BIOS write protection](https://docs.dasharo.com/dasharo-menu-docs/dasharo-system-features/#dasharo-security-options) -- [Setup menu password configuration](https://docs.dasharo.com/dasharo-menu-docs/overview/#dasharo-menu-guides) -- [USB stack disable option in setup menu](https://docs.dasharo.com/dasharo-menu-docs/dasharo-system-features/#usb-configuration) -- [Serial port console redirection option in setup menu](https://docs.dasharo.com/dasharo-menu-docs/dasharo-system-features/#serial-port-configuration) -- [Customizable Serial Number and UUID via CBFS support](https://github.com/Dasharo/dcu) -- [Customizable boot logo support](https://github.com/Dasharo/dcu) -- [Support for taking screenshots in the firmware](https://docs.dasharo.com/dev-proc/screenshots/#taking-screenshots) -- [ESP partition scanning in look for grubx64.efi or shimx64.efi or Windows bootmgr](https://github.com/Dasharo/dasharo-issues/issues/94) -- Microsoft and Windows 2023 UEFI Secure Boot certificates -- UEFI 2.8 errata C compliance in EDKII fork - -### Changed - -- Rebased to coreboot 4.21 -- Enroll default UEFI Secure Boot keys on the first boot -- [Improved UEFI Secure Boot menu user experience](https://docs.dasharo.com/dasharo-menu-docs/device-manager/#secure-boot-configuration) -- Scope of reset to defaults hotkey to global in firmware setup -- Updated microcode to the newer version; refer to SBOM section below -- Updated ME/TXE to the newer version; refer to SBOM section below -- Updated FSP to the newer version; refer to SBOM section below - -### Fixed - -- [Auto Boot Time-out is reset to 0 when F9 is pressed](https://github.com/Dasharo/dasharo-issues/issues/513) -- [Reset to defaults with F9 causes the wrong settings to be restored](https://github.com/Dasharo/dasharo-issues/issues/355) -- RAM memory capacity not reported in firmware Setup Menu -- [RTC time and date resetting to the coreboot build date on 29th February](https://review.coreboot.org/c/coreboot/+/80790) - -### Known issues - -- [VP2410 does not power on after shutting down with power button 4s override](https://github.com/Dasharo/dasharo-issues/issues/643) -- [USB 2.0 sticks not detected on VP2410](https://github.com/Dasharo/dasharo-issues/issues/99) -- [S3 resume does not work in Geminilake FSP](https://github.com/Dasharo/dasharo-issues/issues/27) - -### Binaries - -[protectli_vp2410_v1.1.0.rom][protectli_vp2410_v1.1.0.rom_file]{.md-button} -[sha256][protectli_vp2410_v1.1.0.rom_hash]{.md-button} -[sha256.sig][protectli_vp2410_v1.1.0.rom_sig]{.md-button} - -To verify binary integrity with hash and signature please follow the -instructions in [Dasharo release signature verification](/guides/signature-verification) -using [this key](https://raw.githubusercontent.com/3mdeb/3mdeb-secpack/master/customer-keys/protectli/release-keys/dasharo-release-1.1.x-for-protectli-signing-key.asc) - -### SBOM (Software Bill of Materials) - -- [Dasharo coreboot fork based on 4.21 revision 2d96eeb7](https://github.com/Dasharo/coreboot/tree/2d96eeb7) -- [Dasharo EDKII fork based on edk2-stable202002 revision ae0ce3e2](https://github.com/Dasharo/edk2/tree/ae0ce3e2) -- [iPXE based on 2023.12 revision 838611b3](https://github.com/Dasharo/ipxe/tree/838611b3) -- [vboot based on 0c11187c75 revision 0c11187c](https://chromium.googlesource.com/chromiumos/platform/vboot_reference/+/0c11187c/) -- [Intel Management Engine/Trusted Execution Engine based on v4.0.50.2083 revision 06bbd2a0](https://github.com/Dasharo/dasharo-blobs/blob/06bbd2a0/protectli/vault_glk/ifwi.bin) -- [Intel Flash Descriptor based on v1.0 revision 06bbd2a0](https://github.com/Dasharo/dasharo-blobs/blob/06bbd2a0/protectli/vault_glk/descriptor.bin) -- [Intel Firmware Support Package based on GLK v2.2.1.3.2 revision 06bbd2a0](https://github.com/Dasharo/dasharo-blobs/blob/06bbd2a0/protectli/vault_glk/GeminilakeFspBinPkg) -- [Intel microcode based on GLK B0 0x0000003e revision microcode-20230808](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/tree/microcode-20230808/intel-ucode/06-7a-01) -- [Intel microcode based on GLK R0 0x00000022 revision microcode-20230808](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/tree/microcode-20230808/intel-ucode/06-7a-08) - -[newsletter]: https://newsletter.3mdeb.com/subscription/n2EpSxtqL -[protectli_vp2410_v1.1.0.rom_file]: https://dl.3mdeb.com/open-source-firmware/Dasharo/protectli_vault_glk/v1.1.0/protectli_vp2410_v1.1.0.rom -[protectli_vp2410_v1.1.0.rom_hash]: https://dl.3mdeb.com/open-source-firmware/Dasharo/protectli_vault_glk/v1.1.0/protectli_vp2410_v1.1.0.rom.sha256 -[protectli_vp2410_v1.1.0.rom_sig]: https://dl.3mdeb.com/open-source-firmware/Dasharo/protectli_vault_glk/v1.1.0/protectli_vp2410_v1.1.0.rom.sha256.sig - -## v1.0.15 - 2022-05-31 - -### Changed - -- Customized Network boot menu and strings - -### Fixed - -- SMBIOS memory information showing 0 MB DRAM in setup - -### Known issues - -- [USB 2.0 sticks not detected on VP2410](https://github.com/Dasharo/dasharo-issues/issues/99) -- [S3 resume does not work in Geminilake FSP](https://github.com/Dasharo/dasharo-issues/issues/27) - -### Binaries - -[protectli_VP2410_DF_v1.0.15.rom][v1.0.15_rom]{.md-button} -[sha256][v1.0.15_hash]{.md-button} -[sha256.sig][v1.0.15_sig]{.md-button} - -To verify binary integrity with hash and signature please follow the -instructions in [Dasharo release signature verification](/guides/signature-verification) -using [this key](https://raw.githubusercontent.com/3mdeb/3mdeb-secpack/master/customer-keys/protectli/release-keys/protectli-dasharo-firewall-release-1.0-key.asc) - -### SBOM (Software Bill of Materials) - -- [coreboot based on b77cf229 revision f59b1ec9](https://github.com/Dasharo/coreboot/tree/f59b1ec9) -- [edk2 based on 7f90b9cd revision 90364638](https://github.com/Dasharo/edk2/tree/90364638) -- [iPXE for EFI revision 988d2](https://github.com/ipxe/ipxe/tree/988d2c13cdf0f0b4140685af35ced70ac5b3283c) -- FSP: Custom version based on Intel GeminiLake FSP 2.2.1.3 -- Management Engine: Custom image based on CSE 4.0.30.1392 -- microcode: - + CPU signature: 0x0706A8, Date: 09.06.2020, Revision: 0x18 - + CPU signature: 0x0706A0, Date: 12.07.2017, Revision: 0x26 - + CPU signature: 0x0706A1, Date: 09.06.2020, Revision: 0x34 - -[newsletter]: https://newsletter.3mdeb.com/subscription/n2EpSxtqL -[v1.0.15_rom]: https:/3mdeb.com/open-source-firmware/Dasharo/protectli_vault_glk/v1.0.15/protectli_vault_glk_v1.0.15.rom -[v1.0.15_hash]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_glk/v1.0.15/protectli_vault_glk_v1.0.15.rom.sha256 -[v1.0.15_sig]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_glk/v1.0.15/protectli_vault_glk_v1.0.15.rom.sha256.sig diff --git a/docs/variants/protectli_vp2410/test-matrix.md b/docs/variants/protectli_vp2410/test-matrix.md deleted file mode 100644 index 0c23172348..0000000000 --- a/docs/variants/protectli_vp2410/test-matrix.md +++ /dev/null @@ -1,86 +0,0 @@ -# Test matrix - -## About - -The test matrix is used to determine the scope of tests which the DUT is -subjected from before the release of the new binary. - -## Module: Dasharo compatibility - -| No. | Supported test suite | Test suite ID | Supported test cases | -|:----:|:--------------------------------------------------|:-------------:|:-------------------------------------| -| 1. | [Memory HCL][HCL] | HCL | All | -| 2. | [UEFI compatible interface][EFI] | EFI | All | -| 3. | [Display ports][DSP] | DSP | DSP002.001, DSP002.002, DSP002.003, DSP003.001, DSP003.002, DSP003.003 | -| 4. | [Network boot utilities][NBT] | NBT | All | -| 5. | [NVMe support][NVM] | NVM | All | -| 6. | [Custom logo][CLG] | CLG | All | -| 7. | [Custom boot menu key][CBK] | CBK | All | -| 8. | [USB HID and MSC Support][USB] | USB | All | -| 9. | [FreeBSD support][BSD] | BSD | All | -| 10. | [Debian Stable and Ubuntu LTS support][LBT] | LBT | LBT003.001, LBT003.002, LBT004.001, LBT004.002| -| 11. | [USB-C support][UTC] | UTC | UTC004.001, UTC004.001 | -| 12. | [M.2 WiFi/Bluetooth][WLE] | WLE | ALL | -| 13. | [eMMC support][MMC] | MMC | MMC001.001 | -| 14. | [SMBIOS][DMI] | DMI | DMI002.001, DMI003.001, DMI004.001, DMI005.001, DMI006.001 | -| 15. | [Custom network boot entries][CNB] | CNB | CNB001.002 | -| 16. | [M.2 automatic SATA/NVMe switching support][MSS] | MSS | MSS001.001 | -| 17. | [Windows booting][WBT] | WBT | WBT001.001 | -| 18. | [Audio subsystem][AUD] | AUD | AUD001.001, AUD001.002, AUD002.001, AUD002.002, AUD003.001, AUD003.002, AUD004.001, AUD004.002, AUD005.001, AUD005.002, AUD006.001, AUD006.002 | -| 19. | [UEFI Shell][USH] | USH | All | -| 20. | [USB detection][UDT] | UDT | All | -| 21. | [USB booting][UBT] | UBT | All | - -[HCL]: ../../unified-test-documentation/dasharo-compatibility/301-memory-hcl.md -[EFI]: ../../unified-test-documentation/dasharo-compatibility/30M-uefi-compatible-interface.md -[DSP]: ../../unified-test-documentation/dasharo-compatibility/31E-display-ports-and-lcd.md -[NBT]: ../../unified-test-documentation/dasharo-compatibility/315b-netboot-utilities.md -[NVM]: ../../unified-test-documentation/dasharo-compatibility/312-nvme-support.md -[CLG]: ../../unified-test-documentation/dasharo-compatibility/304-custom-logo.md -[CBK]: ../../unified-test-documentation/dasharo-compatibility/303-custom-boot-menu-key.md -[USB]: ../../unified-test-documentation/dasharo-compatibility/306-usb-hid-and-msc-support.md -[BSD]: ../../unified-test-documentation/dasharo-compatibility/307-freebsd-support.md -[LBT]: ../../unified-test-documentation/dasharo-compatibility/308-debian-stable-and-ubuntu-lts-support.md -[UTC]: ../../unified-test-documentation/dasharo-compatibility/31H-usb-type-c.md -[WLE]: ../../unified-test-documentation/dasharo-compatibility/318-m2-wifi-bluetooth.md -[MWL]: ../../unified-test-documentation/dasharo-compatibility/31K-minipcie-verification.md -[MMC]: ../../unified-test-documentation/dasharo-compatibility/31M-emmc-support.md -[DMI]: ../../unified-test-documentation/dasharo-compatibility/31L-smbios.md -[CNB]: ../../unified-test-documentation/dasharo-compatibility/30A-custom-network-boot-entries.md -[MSS]: ../../unified-test-documentation/dasharo-compatibility/31I-nvme-switching.md -[WBT]: ../../unified-test-documentation/dasharo-compatibility/31A-windows-booting.md -[AUD]: ../../unified-test-documentation/dasharo-compatibility/31F-audio-subsystem.md -[USH]: ../../unified-test-documentation/dasharo-compatibility/30P-uefi-shell.md -[UDT]: ../../unified-test-documentation/dasharo-compatibility/31O-usb-detect.md -[UBT]: ../../unified-test-documentation/dasharo-compatibility/31N-usb-boot.md - -## Module: Dasharo security - -| No. | Supported test suite | Test suite ID | Supported test cases | -|:-----|:--------------------------------------------------|:-------------:|:-------------------------------------| -| 1. | [TPM Support][TPM] | TPM | Without TPM001.001 and TPM002.001 | -| 2. | [Verified Boot support][VBO] | VBO | VBO006.002, VBO007.002, VBO008.001 | -| 3. | [Measured Boot support][MBO] | MBO | All | -| 4. | [Secure Boot support][SBO] | SBO | All | -| 5. | [BIOS lock support][BLS] | BLS | All | - -[TPM]: ../../unified-test-documentation/dasharo-security/200-tpm-support.md -[VBO]: ../../unified-test-documentation/dasharo-security/201-verified-boot.md -[MBO]: ../../unified-test-documentation/dasharo-security/203-measured-boot.md -[SBO]: ../../unified-test-documentation/dasharo-security/206-secure-boot.md -[MNE]: ../../unified-test-documentation/dasharo-security/20F-me-neuter.md -[BLS]: ../../unified-test-documentation/dasharo-security/20J-bios-lock-support.md - -## Module: Dasharo performance - -| No. | Supported test suite | Test suite ID | Supported test cases | -|:-----|:--------------------------------------------------|:-------------:|:-------------------------------------| -| 1. | [coreboot bring up time measurement][CBMEM] | CBMEM | All | -| 2. | [CPU temperature measure][CPT] | CPT | All | -| 3. | [CPU frequency measure][CPF] | CPF | All | -| 4. | [Platform stability][STB] | STB | All | - -[CBMEM]: ../../unified-test-documentation/dasharo-performance/400-coreboot-boot-measure.md -[CPT]: ../../unified-test-documentation/dasharo-performance/401-cpu-temperature.md -[CPF]: ../../unified-test-documentation/dasharo-performance/402-cpu-frequency.md -[STB]: ../../unified-test-documentation/dasharo-performance/404-platform-stability.md diff --git a/docs/variants/protectli_vp2420/building-manual.md b/docs/variants/protectli_vp2420/building-manual.md deleted file mode 100644 index 42802b3112..0000000000 --- a/docs/variants/protectli_vp2420/building-manual.md +++ /dev/null @@ -1,61 +0,0 @@ -# Building manual - -## Intro - -This document describes the procedure for compiling coreboot for Protectli -VP2420. - -## Requirements - -- Docker - + follow [Install Docker Engine on Ubuntu](https://docs.docker.com/engine/install/ubuntu/) - + follow [Post-installation steps for Linux](https://docs.docker.com/engine/install/linux-postinstall/) -- Git - -## Build Dasharo BIOS firmware - -> This build procedure produces full firmware binary including blobs such as -> FSP, and ME. Currently, access to them is restricted to the OEM (Protectli) via -> a private repository. - -1. Clone the coreboot repository: - - ```bash - git clone https://github.com/Dasharo/coreboot - ``` - -1. Checkout the desired version, e.g. `v1.1.0`: - - ```bash - cd coreboot - git checkout protectli_vault_ehl_v1.1.0 - ``` - -1. Checkout submodules: - - ```bash - git submodule update --init --checkout - ``` - -1. Obtain the Protectli blobs package (only v1.1.0 or older): - - > Replace `` with a a proper path to the repository - > in a form of: `git@repo-path.git`. You should checkout to the same tag as - > in case of the coreboot repository. - - ```bash - cd 3rdparty/blobs/mainboard/ - git init - git remote add origin - git fetch origin && git checkout protectli_vault_ehl_v1.1.0 - cd - - ``` - -1. Build the firmware: - - ```bash - ./build.sh vp2420 - ``` - -The resulting coreboot image will be placed in the coreboot directory as -`protectli_vp2420_.rom`. diff --git a/docs/variants/protectli_vp2420/firmware-update.md b/docs/variants/protectli_vp2420/firmware-update.md deleted file mode 100644 index 62daf2b657..0000000000 --- a/docs/variants/protectli_vp2420/firmware-update.md +++ /dev/null @@ -1,54 +0,0 @@ -# Firmware update - -The following documentation describes the process of Dasharo open-source -firmware update. If your device is currently flashed with the proprietary -firmware please refer to the [Initial deployment](initial-deployment.md) -documentation. - -For simplicity of the update process, we recommend using -[Dasharo Tools Suite](https://docs.dasharo.com/dasharo-tools-suite/overview). - -Before starting the update procedure be sure to disable Dasharo BIOS Boot medium -lock, SMM BIOS Write Protection and Secure boot: - -1. Power on the device. -1. While the device is booting, hold the `DELETE` key to enter the UEFI Setup - Menu. -1. Enter the `Dasharo System Features` menu using the arrow keys and Enter. -1. Enter the [Dasharo Security Options](https://docs.dasharo.com/dasharo-menu-docs/dasharo-system-features/#dasharo-security-options) - submenu. -1. Verify the state of the `Lock the BIOS boot medium` and - `Enable SMM BIOS write protection` options - if any of those are set, press - `Space` to unselect them and then `F10` to save the changes. -1. Go back to the main menu using the `ESC` key. -1. Enter the `Device Manager` menu. -1. Enter the [Secure Boot Configuration](https://docs.dasharo.com/dasharo-menu-docs/device-manager/#secure-boot-configuration) - submenu. -1. Verify that the `Current Secure Boot State` field says Disabled - if not, - unselect the `Attempt Secure Boot` option below then press `F10` to save the - changes. -1. Reboot the device to properly apply the changes. - -The settings of all the above options can be restored after a firmware update. - -## Updating minor versions v1.x.y - -Both `WP_RO` and `RW_SECTION_A` partitions of the flash needs to be updated. -Flash it using the following command: - -```bash -flashrom -p internal -w [path] --fmap -i RW_SECTION_A -i WP_RO -``` - -This command also preserves current Dasharo UEFI settings and the boot order. - -## Updating patch version v1.0.x - -Only the `RW_SECTION_A` partition of the flash needs to be updated. Flash it -using the following command: - -```bash -flashrom -p internal -w [path] --fmap -i RW_SECTION_A -``` - -This command also preserves Dasharo UEFI settings and the boot order. diff --git a/docs/variants/protectli_vp2420/hardware-matrix.md b/docs/variants/protectli_vp2420/hardware-matrix.md deleted file mode 100644 index 619722a581..0000000000 --- a/docs/variants/protectli_vp2420/hardware-matrix.md +++ /dev/null @@ -1,31 +0,0 @@ -# Hardware configuration matrix - -## Introduction - -This document describes the hardware configuration used for validation of the -coreboot port on the Protectli VP2420 firewall. - -## Protectli VP2420 - -| Component | Description | -|------------------------|----------------------------------------------------------| -| **CPU** | Intel(R) Celeron(R) J6412 @ 2.00GHz | -| **RAM** | KINGSTON KVR29S21S6/8 | -| **Flash memory** | Macronix MX25U6435E/F | -| **SSD** | 1. SSD Samsung 860 EVO M.2 NZ-N6E250 250GB | -| | 2. SSDPR-CL100-240-g2 | -| **MMC drive** | SAMSUNG 8GTF4R (on-board) | -| **USB pendrives** | 1. SanDisk USB 3.2Gen1 16 GB | -| | 2. SanDisk USB 3.2Gen1 16 GB | -| | 3. USB Type-C Hub Pro UCN3286 | -| **USB headers** | USB Expander | -| **Attached devices** | 1. Logitech, Inc. Keyboard K120 | -| | 2. Dell Mouse MS116p | -| | 3. USB Type-C Hub Pro UCN3286 | -| **Wireless card** | Intel Wi-Fi 6 AX200 | -| **Display** | HDMI 1920x1080p, DP 1920x1080p | -| **Ethernet** | 4x intel i225 (on-board) | -| **Power supply** | Channel Well Technology 12V, 5.0A 60W | - -> Note, that in **RAM** section all used during verification procedure modules -> have been listed. Device has only one RAM mounting slot. diff --git a/docs/variants/protectli_vp2420/initial-deployment.md b/docs/variants/protectli_vp2420/initial-deployment.md deleted file mode 100644 index 9930248865..0000000000 --- a/docs/variants/protectli_vp2420/initial-deployment.md +++ /dev/null @@ -1,58 +0,0 @@ -# Initial deployment - -Initial flashing of Dasharo firmware can be done from Linux using flashrom with -the internal programmer. This document describes the process of building, -installing and running flashrom on Ubuntu 22.04. - -## Deploy using Dasharo Tools Suite - -For simplicity we recommend using -[Dasharo Tools Suite](https://docs.dasharo.com/dasharo-tools-suite/overview) to -omit all compilation steps and deploy the Dasharo firmware seamlessly. -Be sure to disable the BIOS lock in the AMI firmware setup utility: - -1. Go to `Chipset` tab -2. Enter `PCH IO Configuration` -3. Disable `BIOS Lock`. -4. Save changes and reset. - -Now you are ready to use Dasharo Tools Suite (DTS): - -1. Boot Dasharo Tools Suite. -2. Perform Dasharo installation. - -## Build flashrom - -Please follow generic guide for [Dasharo flashrom fork](../../osf-trivia-list/deployment.md#how-to-install-dasharo-flashrom-fork). - -## Reading flash contents - -Always prepare a backup of the current firmware image. To read from the flash -and save them to a file (`backup.rom`), execute the following command: - -```bash -flashrom -p internal -r dump.rom -``` - -Keep the backup for later recovery if needed. - -## Flashing Dasharo - -To flash Dasharo on the platform, execute the following command - replace -`[path]` with the path to the Dasharo image you want to flash, e.g. -`protectli_vault_ehl_v1.0.0.rom`. - -If stock firmware is currently installed: - -```bash -flashrom -p internal -w [path] --ifd -i bios -``` - -If Dasharo is currently installed, only the `RW_SECTION_A` partition of the -flash needs to be updated. Flash it using the following command: - -```bash -flashrom -p internal -w protectli_vault_ehl_v1.x.y.rom --fmap -i RW_SECTION_A -``` - -This command also preserves Dasharo UEFI settings and the boot order. diff --git a/docs/variants/protectli_vp2420/openness-score.md b/docs/variants/protectli_vp2420/openness-score.md deleted file mode 100644 index b00ac2360a..0000000000 --- a/docs/variants/protectli_vp2420/openness-score.md +++ /dev/null @@ -1,128 +0,0 @@ -# Dasharo Openness Score - -This page contains the [Dasharo Openness -Score](../../glossary.md#dasharo-openness-score) for Protectli VP2420 Dasharo -releases. The content of the page is generated with [Dasharo Openness Score -utility](https://github.com/Dasharo/Openness-Score). - -## v1.2.0 - -Openness Score for protectli_vp2420_v1.2.0.rom - -Open-source code percentage: **35.3%** -Closed-source code percentage: **64.7%** - -* Image size: 16777216 (0x1000000) -* Number of regions: 26 -* Number of CBFSes: 3 -* Total open-source code size: 4806882 (0x4958e2) -* Total closed-source code size: 8800924 (0x864a9c) -* Total data size: 627958 (0x994f6) -* Total empty size: 2541452 (0x26c78c) - -![](protectli_vp2420_v1.2.0.rom_openness_chart.png) - -![](protectli_vp2420_v1.2.0.rom_openness_chart_full_image.png) - -> Numbers given above already include the calculations from CBFS regions -> presented below - -### FMAP regions - -| FMAP region | Offset | Size | Category | -| ----------- | ------ | ---- | -------- | -| SI_ME | 0x1000 | 0x6ff000 | closed-source | -| SI_DESC | 0x0 | 0x1000 | data | -| RECOVERY_MRC_CACHE | 0x700000 | 0x10000 | data | -| RW_MRC_CACHE | 0x710000 | 0x10000 | data | -| SMMSTORE | 0x720000 | 0x40000 | data | -| SHARED_DATA | 0x760000 | 0x2000 | data | -| VBLOCK_DEV | 0x762000 | 0x2000 | data | -| RW_NVRAM | 0x764000 | 0x6000 | data | -| CONSOLE | 0x76a000 | 0x20000 | data | -| VBLOCK_A | 0x88a000 | 0x2000 | data | -| RW_FWID_A | 0xbfff00 | 0x100 | data | -| RO_VPD | 0xc00000 | 0x4000 | data | -| FMAP | 0xc04000 | 0x800 | data | -| RO_FRID | 0xc04800 | 0x100 | data | -| RO_FRID_PAD | 0xc04900 | 0x700 | data | -| GBB | 0xc05000 | 0x3000 | data | - -### CBFS BOOTSPLASH - -* CBFS size: 1048576 -* Number of files: 1 -* Open-source files size: 0 (0x0) -* Closed-source files size: 0 (0x0) -* Data size: 28 (0x1c) -* Empty size: 1048548 (0xfffe4) - -> Numbers given above are already normalized (i.e. they already include size -> of metadata and possible closed-source LAN drivers included in the payload - > which are not visible in the table below) - -| CBFS filename | CBFS filetype | Size | Compression | Category | -| ------------- | ------------- | ---- | ----------- | -------- | -| (empty) | null | 1048548 | none | empty | - -### CBFS FW_MAIN_A - -* CBFS size: 3620608 -* Number of files: 13 -* Open-source files size: 2365521 (0x241851) -* Closed-source files size: 732494 (0xb2d4e) -* Data size: 8513 (0x2141) -* Empty size: 514080 (0x7d820) - -> Numbers given above are already normalized (i.e. they already include size -> of metadata and possible closed-source LAN drivers included in the payload - > which are not visible in the table below) - -| CBFS filename | CBFS filetype | Size | Compression | Category | -| ------------- | ------------- | ---- | ----------- | -------- | -| fallback/payload | simple elf | 2081638 | none | open-source | -| fallback/romstage | stage | 85520 | none | open-source | -| fallback/ramstage | stage | 129116 | LZMA | open-source | -| fallback/dsdt.aml | raw | 9759 | none | open-source | -| fallback/postcar | stage | 59488 | none | open-source | -| cpu_microcode_blob.bin | microcode | 20480 | none | closed-source | -| fspm.bin | fsp | 495616 | none | closed-source | -| fsps.bin | fsp | 216398 | LZ4 | closed-source | -| config | raw | 4815 | LZMA | data | -| revision | raw | 859 | none | data | -| build_info | raw | 103 | none | data | -| vbt.bin | raw | 1200 | LZMA | data | -| (empty) | null | 514080 | none | empty | - -### CBFS COREBOOT - -* CBFS size: 4161536 -* Number of files: 17 -* Open-source files size: 2441361 (0x254091) -* Closed-source files size: 732494 (0xb2d4e) -* Data size: 8857 (0x2299) -* Empty size: 978824 (0xeef88) - -> Numbers given above are already normalized (i.e. they already include size -> of metadata and possible closed-source LAN drivers included in the payload - > which are not visible in the table below) - -| CBFS filename | CBFS filetype | Size | Compression | Category | -| ------------- | ------------- | ---- | ----------- | -------- | -| fallback/payload | simple elf | 2081638 | none | open-source | -| fallback/romstage | stage | 85520 | none | open-source | -| fallback/ramstage | stage | 129116 | LZMA | open-source | -| fallback/dsdt.aml | raw | 9759 | none | open-source | -| fallback/postcar | stage | 59488 | none | open-source | -| bootblock | bootblock | 75840 | none | open-source | -| cpu_microcode_blob.bin | microcode | 20480 | none | closed-source | -| fspm.bin | fsp | 495616 | none | closed-source | -| fsps.bin | fsp | 216398 | LZ4 | closed-source | -| cbfs_master_header | cbfs header | 28 | none | data | -| intel_fit | intel_fit | 80 | none | data | -| config | raw | 4815 | LZMA | data | -| revision | raw | 859 | none | data | -| build_info | raw | 103 | none | data | -| vbt.bin | raw | 1200 | LZMA | data | -| (empty) | null | 1060 | none | empty | -| (empty) | null | 977764 | none | empty | diff --git a/docs/variants/protectli_vp2420/overview.md b/docs/variants/protectli_vp2420/overview.md deleted file mode 100644 index 3606bb8ce6..0000000000 --- a/docs/variants/protectli_vp2420/overview.md +++ /dev/null @@ -1,46 +0,0 @@ -# Overview - -The Vault Pro is a small form network appliance built for use as a firewall -/ router, virtualization platform, a daily-driven personal computer, -and more. The VP2420 is based on a 4 x 2.5 G network port design that leverages -a low power, but versatile Intel Celeron J6412 CPU. - -![](/images/VP2420.png) - -The VP2420 can accommodate up to 32 GB DDR4 RAM and 2 TB M.2 SATA SSD -storage drive (Note: The VP2420 supports M.2 SATA drives, not NVMe -drives). The built-in 8 GB eMMC module can be used for booting a -light-weight OS for example, or for use as optional storage. - -VP2410 specification: - -* Intel Celeron® J6412 Quad Core at 2 GHz (Burst up to 2.6 GHz) -* 4 Intel® 2.5 Gigabit Ethernet NIC ports -* M.2 SATA SSD Slot (Note: This device does not support NVMe drives) -* 8 GB eMMC module on board -* Intel® AES-NI support -* Fanless and Silent -* Included 12v Power Supply, VESA mount kit, Serial Console Cable, -SATA data and power cables for internal SSD, Quick Start Guide - -For more information please refer to the references below. - -## References - -* [Protectli knowledge base](https://kb.protectli.com/) -* [Buy VP2420 in Protectli shop](https://eu.protectli.com/product/vp2420/) - -## Documentation sections - -* [Releases](releases.md) - groups information about all releases. -* [Building manual](building-manual.md) - describes how to build Dasharo for - Protecli 2420. -* [Initial deployment](initial-deployment.md) - describes initial Dasharo - deployment methods (i. e. flashing new firmware) for Protectli VP2420. -* [Recovery](recovery.md) - gathers information on how to recover the platform - from potential failure. -* [Hardware configuration matrix](hardware-matrix.md) - describes the - platform's hardware configuration used during the Dasharo firmware - validation procedure. -* [Test matrix](test-matrix.md) - describes validation scope used during - Dasharo firmware validation procedure. diff --git a/docs/variants/protectli_vp2420/recovery.md b/docs/variants/protectli_vp2420/recovery.md deleted file mode 100644 index 77924dcfe8..0000000000 --- a/docs/variants/protectli_vp2420/recovery.md +++ /dev/null @@ -1,43 +0,0 @@ -# Recovery - -## Intro - -The following documentation describes describes platform-specific details of -setting up Protectli VP2420 for recovery from brick state with -[RTE](../../transparent-validation/rte/introduction.md) and Dasharo open-source -firmware. - -## Prerequisites - -* [Prepared RTE](../../transparent-validation/rte/v1.1.0/quick-start-guide.md) -* SOIC-8 Pomona clip -* 6x female-female wire cables - -## Connections - -Set up the connections required for external flashing as described in -[Generic Testing Stand Setup](../../unified-test-documentation/generic-testing-stand-setup.md). -Protectli VP2420 are flashed using the Pomona clip connection variant. Use -the pictures below to easily locate essential components on the mainboard. - -### SPI flash chip - -![](../../images/protectli_recovery/vp2420_location_of_flash_chip.jpg) -![](../../images/protectli_recovery/flash_chip.jpg) -![](../../images/protectli_recovery/pomona_clip_connected_to_flash_chip.jpg) - -### CMOS header - -![](../../images/protectli_recovery/vp2420_location_of_CMOS_header.jpg) - -## Firmware flashing - -To flash firmware, follow the steps described in -[Generic Testing Stand Setup](../../unified-test-documentation/generic-testing-stand-setup.md) -, noting that: -* The chip voltage for this platform is **3.3V** -* The proper flashrom parameters for this platform are: - - ```bash - flashrom -p linux_spi:dev=/dev/spidev1.0,spispeed=16000 -c "MX25L12835F/MX25L12845E/MX25L12865E" -w [path_to_binary] - ``` diff --git a/docs/variants/protectli_vp2420/releases.md b/docs/variants/protectli_vp2420/releases.md deleted file mode 100644 index 79f943fa0b..0000000000 --- a/docs/variants/protectli_vp2420/releases.md +++ /dev/null @@ -1,212 +0,0 @@ -# Release Notes - -Following Release Notes describe status of open-source firmware development for -Protectli VP2420 family. - -For details about our release process please read -[Dasharo Standard Release Process](../../dev-proc/standard-release-process.md). - -
-[Subscribe to Protectli VP2420 Dasharo Release Newsletter] -[newsletter]{.md-button .md-button--primary .center} -
- -Test results for this platform can be found -[here](https://docs.google.com/spreadsheets/d/1wSE6xA3K3nXewwLn5lV39_2wZL1kg5AkGb4mvmG3bwE/edit#gid=270990532). - -## v1.2.0 - 2024-05-16 - -### Added - -- [Setup menu password configuration](https://docs.dasharo.com/dasharo-menu-docs/overview/#dasharo-menu-guides) -- [Serial port console redirection option in setup menu](https://docs.dasharo.com/dasharo-menu-docs/dasharo-system-features/#serial-port-configuration) -- [Customizable Serial Number and UUID via CBFS support](https://github.com/Dasharo/dcu) -- [Customizable boot logo support](https://github.com/Dasharo/dcu) -- [Support for taking screenshots in the firmware](https://docs.dasharo.com/dev-proc/screenshots/#taking-screenshots) -- [ESP partition scanning in look for grubx64.efi or shimx64.efi or Windows bootmgr](https://github.com/Dasharo/dasharo-issues/issues/94) -- Microsoft and Windows 2023 UEFI Secure Boot certificates -- UEFI 2.8 errata C compliance in EDKII fork - -### Changed - -- Rebased to coreboot 4.21 -- Enroll default UEFI Secure Boot keys on the first boot -- [Improved UEFI Secure Boot menu user experience](https://docs.dasharo.com/dasharo-menu-docs/device-manager/#secure-boot-configuration) -- Scope of reset to defaults hotkey to global in firmware setup -- Updated microcode to the newer version; refer to SBOM section below -- Updated ME to the newer version; refer to SBOM section below - -### Fixed - -- [Auto Boot Time-out is reset to 0 when F9 is pressed](https://github.com/Dasharo/dasharo-issues/issues/513) -- [Reset to defaults with F9 causes the wrong settings to be restored](https://github.com/Dasharo/dasharo-issues/issues/355) -- [RTC time and date resetting to the coreboot build date on 29th February](https://review.coreboot.org/c/coreboot/+/80790) -- [Cannot set custom bootsplash in firmware via DCU nor cbfstool](https://github.com/Dasharo/dasharo-issues/issues/759) - -### Binaries - -[protectli_vp2420_v1.2.0.rom][protectli_vp2420_v1.2.0.rom_file]{.md-button} -[sha256][protectli_vp2420_v1.2.0.rom_hash]{.md-button} -[sha256.sig][protectli_vp2420_v1.2.0.rom_sig]{.md-button} - -[protectli_vp2420_v1.2.0_dev_signed.rom][protectli_vp2420_v1.2.0_dev_signed.rom_file]{.md-button} -[sha256][protectli_vp2420_v1.2.0_dev_signed.rom_hash]{.md-button} -[sha256.sig][protectli_vp2420_v1.2.0_dev_signed.rom_sig]{.md-button} - -To verify binary integrity with hash and signature please follow the -instructions in [Dasharo release signature verification](/guides/signature-verification) -using [this key](https://raw.githubusercontent.com/3mdeb/3mdeb-secpack/master/customer-keys/protectli/release-keys/dasharo-release-1.2.x-for-protectli-signing-key.asc) - -### SBOM (Software Bill of Materials) - -- [Dasharo coreboot fork based on 4.21 revision 7c2c79e8](https://github.com/Dasharo/coreboot/tree/7c2c79e8) -- [Dasharo EDKII fork based on edk2-stable202002 revision ae0ce3e2](https://github.com/Dasharo/edk2/tree/ae0ce3e2) -- [iPXE based on 2023.12 revision 838611b3](https://github.com/Dasharo/ipxe/tree/838611b3) -- [vboot based on 0c11187c75 revision 0c11187c](https://chromium.googlesource.com/chromiumos/platform/vboot_reference/+/0c11187c/) -- [Intel Management Engine based on v15.40.32.2910 revision d0b63476](https://github.com/Dasharo/dasharo-blobs/blob/d0b63476/protectli/vault_ehl/me.bin) -- [Intel Flash Descriptor based on v1.0 revision d0b63476](https://github.com/Dasharo/dasharo-blobs/blob/d0b63476/protectli/vault_ehl/descriptor.bin) -- [Intel Firmware Support Package based on Elkhart Lake MR6 revision 481ea7cf](https://github.com/intel/FSP/tree/481ea7cf/ElkhartLakeFspBinPkg/) -- [Intel microcode based on EHL B1 0x00000016 revision microcode-20230808](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/tree/microcode-20230808/intel-ucode/06-96-01) - -[protectli_vp2420_v1.2.0.rom_file]: https://dl.3mdeb.com/open-source-firmware/Dasharo/protectli_vault_ehl/v1.2.0/protectli_vp2420_v1.2.0.rom -[protectli_vp2420_v1.2.0.rom_hash]: https://dl.3mdeb.com/open-source-firmware/Dasharo/protectli_vault_ehl/v1.2.0/protectli_vp2420_v1.2.0.rom.sha256 -[protectli_vp2420_v1.2.0.rom_sig]: https://dl.3mdeb.com/open-source-firmware/Dasharo/protectli_vault_ehl/v1.2.0/protectli_vp2420_v1.2.0.rom.sha256.sig -[protectli_vp2420_v1.2.0_dev_signed.rom_file]: https://dl.3mdeb.com/open-source-firmware/Dasharo/protectli_vault_ehl/v1.2.0/protectli_vp2420_v1.2.0_dev_signed.rom -[protectli_vp2420_v1.2.0_dev_signed.rom_hash]: https://dl.3mdeb.com/open-source-firmware/Dasharo/protectli_vault_ehl/v1.2.0/protectli_vp2420_v1.2.0_dev_signed.rom.sha256 -[protectli_vp2420_v1.2.0_dev_signed.rom_sig]: https://dl.3mdeb.com/open-source-firmware/Dasharo/protectli_vault_ehl/v1.2.0/protectli_vp2420_v1.2.0_dev_signed.rom.sha256.sig - -## v1.1.0 - 2023-04-20 - -### Added - -- [USB stack and mass storage enable/disable option](https://docs.dasharo.com/dasharo-menu-docs/dasharo-system-features/#usb-configuration) -- [SMM BIOS write protection enable/disable option](https://docs.dasharo.com/dasharo-menu-docs/dasharo-system-features/#dasharo-security-options) - -### Changed - -- [Updating from v1.0.x requires flashing the WP_RO recovery partition](../protectli_vp2420/firmware-update.md#updating-minor-versions-v1xy) -- [Firmware version v1.1.x are signed with a new key](https://raw.githubusercontent.com/3mdeb/3mdeb-secpack/master/customer-keys/protectli/release-keys/dasharo-release-1.1.x-for-protectli-signing-key.asc) -- [Keys must be provisioned prior enabling Secure Boot](https://docs.dasharo.com/dasharo-menu-docs/device-manager/#secure-boot-configuration) - -### Fixed - -- [VP2420 memory issues and incorrectly reported memory capacity](https://github.com/Dasharo/dasharo-issues/issues/397) -- [Popup with information about recovery mode is still displayed after flashing with a valid binary](https://github.com/Dasharo/dasharo-issues/issues/320) - -### Known issues - -- [pfSense boot time](https://github.com/Dasharo/dasharo-issues/issues/318) -- [Double characters in pfSense initial boot phase](https://github.com/Dasharo/dasharo-issues/issues/319) - -### Binaries - -[protectli_vp2420_v1.1.0.rom][protectli_vp2420_v1.1.0.rom_file]{.md-button} -[sha256][protectli_vp2420_v1.1.0.rom_hash]{.md-button} -[sha256.sig][protectli_vp2420_v1.1.0.rom_sig]{.md-button} - -To verify binary integrity with hash and signature please follow the -instructions in [Dasharo release signature verification](/guides/signature-verification) -using [this key](https://raw.githubusercontent.com/3mdeb/3mdeb-secpack/master/customer-keys/protectli/release-keys/dasharo-release-1.1.x-for-protectli-signing-key.asc) - -### SBOM (Software Bill of Materials) - -- [coreboot based on c86c926 revision e36a117d](https://github.com/Dasharo/coreboot/tree/e36a117d) -- [edk2 based on 7f90b9cd revision 19bf14b4](https://github.com/Dasharo/edk2/tree/19bf14b4) - -[newsletter]: https://newsletter.3mdeb.com/subscription/n2EpSxtqL -[protectli_vp2420_v1.1.0.rom_file]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_ehl/v1.1.0/protectli_vp2420_v1.1.0.rom -[protectli_vp2420_v1.1.0.rom_hash]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_ehl/v1.1.0/protectli_vp2420_v1.1.0.rom.sha256 -[protectli_vp2420_v1.1.0.rom_sig]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_ehl/v1.1.0/protectli_vp2420_v1.1.0.rom.sha256.sig - -## v1.0.1 - 2023-02-02 - -### Added - -- [TPM 2.0 support over SPI interface](https://docs.dasharo.com/unified-test-documentation/dasharo-security/200-tpm-support/#test-cases-common-documentation) -- [TPM Measured Boot](https://docs.dasharo.com/unified-test-documentation/dasharo-security/203-measured-boot/) - -### Changed - -- Downgrade edk2 Secure Boot driver to achieve consistent user experience as on - the VP46XX v1.0.19 release - -### Fixed - -- [Dasharo BIOS lock menu is missing](https://github.com/Dasharo/dasharo-issues/issues/291) -- [iPXE entry doesn't occur in setup menu](https://github.com/Dasharo/dasharo-issues/issues/289) -- [Impossibility of pfSense/OPNsense console versions installation](https://github.com/Dasharo/dasharo-issues/issues/289) - -### Known issues - -- [Popup with information about recovery mode is still displayed after flashing with a valid binary](https://github.com/Dasharo/dasharo-issues/issues/320) -- [pfSense boot time](https://github.com/Dasharo/dasharo-issues/issues/318) -- [Double characters in pfSense initial boot phase](https://github.com/Dasharo/dasharo-issues/issues/319) - -### Binaries - -[protectli_vp2420_v1.0.1.rom][protectli_vp2420_v1.0.1.rom_file]{.md-button} -[sha256][protectli_vp2420_v1.0.1.rom_hash]{.md-button} -[sha256.sig][protectli_vp2420_v1.0.1.rom_sig]{.md-button} - -To verify binary integrity with hash and signature please follow the -instructions in [Dasharo release signature verification](/guides/signature-verification) -using [this key](https://raw.githubusercontent.com/3mdeb/3mdeb-secpack/master/customer-keys/protectli/release-keys/protectli-dasharo-firewall-release-1.0-key.asc) - -### SBOM (Software Bill of Materials) - -- [coreboot based on c86c926 revision 54cbbc5b](https://github.com/Dasharo/coreboot/tree/54cbbc5b) -- [edk2 based on 7f90b9cd revision e31b7a71](https://github.com/Dasharo/edk2/tree/e31b7a71) - -[newsletter]: https://newsletter.3mdeb.com/subscription/n2EpSxtqL -[protectli_vp2420_v1.0.1.rom_file]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_ehl/v1.0.1/protectli_vp2420_v1.0.1.rom -[protectli_vp2420_v1.0.1.rom_hash]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_ehl/v1.0.1/protectli_vp2420_v1.0.1.rom.sha256 -[protectli_vp2420_v1.0.1.rom_sig]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_ehl/v1.0.1/protectli_vp2420_v1.0.1.rom.sha256.sig - -## v1.0.0 - 2022-12-22 - -### Added - -- Support for VP2420 platform -- [Vboot Verified Boot](https://docs.dasharo.com/guides/vboot-signing/) -- [TPM Measured Boot](https://docs.dasharo.com/unified-test-documentation/dasharo-security/203-measured-boot/) -- [Vboot recovery notification in UEFI Payload](https://docs.dasharo.com/unified-test-documentation/dasharo-security/201-verified-boot/) -- [UEFI Shell](https://docs.dasharo.com/unified-test-documentation/dasharo-compatibility/30P-uefi-shell/) -- [UEFI Secure Boot](https://docs.dasharo.com/unified-test-documentation/dasharo-security/206-secure-boot/) -- [BIOS flash protection for Vboot recovery region](https://docs.dasharo.com/unified-test-documentation/dasharo-security/20J-bios-lock-support/) -- UEFI boot support -- Intel i225 controller network boot support -- Customized boot menu keys -- Customized setup menu keys -- Configurable boot order -- Configurable boot options - -### Binaries - -[protectli_VP2420_v1.0.0.rom][v1.0.0_rom]{.md-button} -[sha256][v1.0.0_hash]{.md-button} -[sha256.sig][v1.0.0_sig]{.md-button} - -How to verify signatures: - -```bash -wget https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_ehl/v1.0.0/protectli_vp2420_v1.0.0.rom -wget https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_ehl/v1.0.0/protectli_vp2420_v1.0.0.rom.sha256 -wget https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_ehl/v1.0.0/protectli_vp2420_v1.0.0.rom.sha256.sig -gpg --fetch-keys https://raw.githubusercontent.com/3mdeb/3mdeb-secpack/master/keys/master-key/3mdeb-master-key.asc -gpg --fetch-keys https://raw.githubusercontent.com/3mdeb/3mdeb-secpack/master/dasharo/3mdeb-dasharo-master-key.asc -gpg --fetch-keys https://raw.githubusercontent.com/3mdeb/3mdeb-secpack/master/customer-keys/protectli/release-keys/protectli-dasharo-firewall-release-1.0-key.asc -gpg --list-sigs "3mdeb Master Key" "3mdeb Dasharo Master Key" "Protectli Dasharo Firewall Release 1.0 Signing Key" -sha256sum -c protectli_vp2420_v1.0.0.rom.sha256 -gpg -v --verify protectli_vp2420_v1.0.0.rom.sha256.sig protectli_vp2420_v1.0.0.rom.sha256 -``` - -### SBOM (Software Bill of Materials) - -- [coreboot based on c492b427 revision c86c9266](https://github.com/Dasharo/coreboot/tree/c86c9266) -- [edk2 based on e461f08 revision 7948a20](https://github.com/Dasharo/edk2/tree/7948a20) -- [iPXE for EFI revision 988d2](https://github.com/ipxe/ipxe/tree/988d2c13cdf0f0b4140685af35ced70ac5b3283c) - -[newsletter]: https://newsletter.3mdeb.com/subscription/n2EpSxtqL -[v1.0.0_rom]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_ehl/v1.0.0/protectli_vp2420_v1.0.0.rom -[v1.0.0_hash]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_ehl/v1.0.0/protectli_vp2420_v1.0.0.rom.sha256 -[v1.0.0_sig]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_ehl/v1.0.0/protectli_vp2420_v1.0.0.rom.sha256.sig diff --git a/docs/variants/protectli_vp2420/test-matrix.md b/docs/variants/protectli_vp2420/test-matrix.md deleted file mode 100644 index 7549de47bb..0000000000 --- a/docs/variants/protectli_vp2420/test-matrix.md +++ /dev/null @@ -1,112 +0,0 @@ -# Test matrix - -## About - -The test matrix is used to determine the scope of tests which the DUT is -subjected from before the release of the new binary. - -## Module: Dasharo compatibility - -| No. | Supported test suite | Test suite ID | Supported test cases | -|:----:|:--------------------------------------------------|:-------------:|:-------------------------------------| -| 1. | [Memory HCL][HCL] | HCL | All | -| 2. | [UEFI compatible interface][EFI] | EFI | All | -| 3. | [Display ports][DSP] | DSP | DSP002.001, DSP002.002, DSP002.003, DSP003.001, DSP003.002, DSP003.003 | -| 4. | [Network boot utilities][NBT] | NBT | All | -| 6. | [Custom logo][CLG] | CLG | All | -| 7. | [Custom boot menu key][CBK] | CBK | All | -| 8. | [USB HID and MSC Support][USB] | USB | USB001.XXX and USB002.XXX | -| 9. | [FreeBSD support][BSD] | BSD | All | -| 10. | [Debian Stable and Ubuntu LTS support][LBT] | LBT | LBT003.001, LBT003.002, LBT004.001, LBT004.002| -| 11. | [USB-C support][UTC] | UTC | UTC004.001, UTC004.002 | -| 12. | [M.2 WiFi/Bluetooth][WLE] | WLE | ALL | -| 13. | [eMMC support][MMC] | MMC | MMC001.001 | -| 14. | [SMBIOS][DMI] | DMI | DMI002.001, DMI003.001, DMI004.001, DMI005.001, DMI006.001 | -| 15. | [Custom network boot entries][CNB] | CNB | CNB001.002 | -| 17. | [Windows booting][WBT] | WBT | WBT001.001 | -| 18. | [UEFI Shell][USH] | USH | All | -| 19. | [USB detection][UDT] | UDT | All | -| 20. | [USB booting][UBT] | UBT | All | -| 21. | [pfSense support][PFS] | PFS | All | -| 22. | [OPNsense support][OPN] | OPN | All | -| 23. | [Proxmox support][PVE] | PVE | All | -| 24. | [Ubuntu Server support][USS] | USS | All | - -[HCL]: ../../unified-test-documentation/dasharo-compatibility/301-memory-hcl.md -[EFI]: ../../unified-test-documentation/dasharo-compatibility/30M-uefi-compatible-interface.md -[DSP]: ../../unified-test-documentation/dasharo-compatibility/31E-display-ports-and-lcd.md -[NBT]: ../../unified-test-documentation/dasharo-compatibility/315b-netboot-utilities.md -[NVM]: ../../unified-test-documentation/dasharo-compatibility/312-nvme-support.md -[CLG]: ../../unified-test-documentation/dasharo-compatibility/304-custom-logo.md -[CBK]: ../../unified-test-documentation/dasharo-compatibility/303-custom-boot-menu-key.md -[USB]: ../../unified-test-documentation/dasharo-compatibility/306-usb-hid-and-msc-support.md -[BSD]: ../../unified-test-documentation/dasharo-compatibility/307-freebsd-support.md -[LBT]: ../../unified-test-documentation/dasharo-compatibility/308-debian-stable-and-ubuntu-lts-support.md -[UTC]: ../../unified-test-documentation/dasharo-compatibility/31H-usb-type-c.md -[WLE]: ../../unified-test-documentation/dasharo-compatibility/318-m2-wifi-bluetooth.md -[MWL]: ../../unified-test-documentation/dasharo-compatibility/31K-minipcie-verification.md -[MMC]: ../../unified-test-documentation/dasharo-compatibility/31M-emmc-support.md -[DMI]: ../../unified-test-documentation/dasharo-compatibility/31L-smbios.md -[CNB]: ../../unified-test-documentation/dasharo-compatibility/30A-custom-network-boot-entries.md -[MSS]: ../../unified-test-documentation/dasharo-compatibility/31I-nvme-switching.md -[WBT]: ../../unified-test-documentation/dasharo-compatibility/31A-windows-booting.md -[AUD]: ../../unified-test-documentation/dasharo-compatibility/31F-audio-subsystem.md -[USH]: ../../unified-test-documentation/dasharo-compatibility/30P-uefi-shell.md -[UDT]: ../../unified-test-documentation/dasharo-compatibility/31O-usb-detect.md -[UBT]: ../../unified-test-documentation/dasharo-compatibility/31N-usb-boot.md -[PFS]: ../../unified-test-documentation/dasharo-compatibility/341-pfSense-support.md -[OPN]: ../../unified-test-documentation/dasharo-compatibility/342-OPNsense-support.md -[PVE]: ../../unified-test-documentation/dasharo-compatibility/348-proxmox-support.md -[USS]: ../../unified-test-documentation/dasharo-compatibility/349-ubuntu-server-support.md - -## Module: Dasharo security - -| No. | Supported test suite | Test suite ID | Supported test cases | -|:-----|:--------------------------------------------------|:-------------:|:-------------------------------------| -| 1. | [TPM Support][TPM] | TPM | TPM001.002 and TPM001.003 | -| 2. | [Verified Boot support][VBO] | VBO | Without VBO006.001 and VBO007.001 | -| 3. | [Measured Boot support][MBO] | MBO | All | -| 4. | [Secure Boot support][SBO] | SBO | All | -| 5. | [BIOS lock support][BLS] | BLS | All | -| 6. | [USB stack enable/disable][USS] | USS | All | -| 7. | [SMM BIOS write protection][SMM] | SMM | All | - -[TPM]: ../../unified-test-documentation/dasharo-security/200-tpm-support.md -[VBO]: ../../unified-test-documentation/dasharo-security/201-verified-boot.md -[MBO]: ../../unified-test-documentation/dasharo-security/203-measured-boot.md -[SBO]: ../../unified-test-documentation/dasharo-security/206-secure-boot.md -[BLS]: ../../unified-test-documentation/dasharo-security/20J-bios-lock-support.md -[USS]: ../../unified-test-documentation/dasharo-security/20S-usb-stack.md -[SMM]: ../../unified-test-documentation/dasharo-security/20O-SMM-bios-write-protection.md - -## Module: Dasharo performance - -| No. | Supported test suite | Test suite ID | Supported test cases | -|:-----|:---------------------------------------------------------|:-------------:|:-------------------------------------| -| 1. | [coreboot bring up time measurement][CBMEM] | CBMEM | All | -| 2. | [CPU temperature measure][CPT] | CPT | All | -| 3. | [CPU frequency measure][CPF] | CPF | Without CPU003.XXX and CPU005.XXX | -| 4. | [Platform stability][STB] | STB | All | -| 5. | [Ubuntu booting performance test][BUB] | BUB | All | -| 6. | [Debian booting performance test][BDE] | BDE | All | -| 7. | [FreeBSD booting performance test][BFB] | BFB | All | -| 8. | [Proxmox booting performance test][BPM] | BPM | All | -| 9. | [Ubuntu Server booting performance test][BUS] | BUS | All | -| 10. | [OPNsense (serial output) booting performance test][BOS] | BOS | All | -| 11. | [OPNsense (VGA output) booting performance test][BOV] | BOV | All | -| 12. | [pfSense (serial output) booting performance test][BPS] | BPS | All | -| 13. | [pfSense (VGA output) booting performance test][BPV] | BPV | All | - -[CBMEM]: ../../unified-test-documentation/dasharo-performance/400-coreboot-boot-measure.md -[CPT]: ../../unified-test-documentation/dasharo-performance/401-cpu-temperature.md -[CPF]: ../../unified-test-documentation/dasharo-performance/402-cpu-frequency.md -[STB]: ../../unified-test-documentation/dasharo-performance/404-platform-stability.md -[BUB]: ../../unified-test-documentation/dasharo-performance/407-ubuntu-booting-performance-test.md -[BDE]: ../../unified-test-documentation/dasharo-performance/408-debian-booting-performance-test.md -[BFB]: ../../unified-test-documentation/dasharo-performance/409-freebsd-booting-performance-test.md -[BPM]: ../../unified-test-documentation/dasharo-performance/410-proxmox-booting-performance-test.md -[BUS]: ../../unified-test-documentation/dasharo-performance/411-ubuntu-server-booting-performance-test.md -[BOS]: ../../unified-test-documentation/dasharo-performance/412-opnsense-serial-booting-performance-test.md -[BOV]: ../../unified-test-documentation/dasharo-performance/413-opnsense-vga-booting-performance-test.md -[BPS]: ../../unified-test-documentation/dasharo-performance/414-pfsense-serial-booting-performance-test.md -[BPV]: ../../unified-test-documentation/dasharo-performance/415-pfsense-vga-booting-performance-test.md diff --git a/docs/variants/protectli_vp46xx/building-manual.md b/docs/variants/protectli_vp46xx/building-manual.md deleted file mode 100644 index 7f45629e45..0000000000 --- a/docs/variants/protectli_vp46xx/building-manual.md +++ /dev/null @@ -1,88 +0,0 @@ -# Building manual - -## Intro - -This document describes the procedure for compiling coreboot for Protectli -VP4630, VP4650 and VP4670. - -## Requirements - -- Docker - + follow [Install Docker Engine on Ubuntu](https://docs.docker.com/engine/install/ubuntu/) - + follow [Post-installation steps for Linux](https://docs.docker.com/engine/install/linux-postinstall/) -- Git - -## Build Dasharo BIOS firmware - -> This build procedure produces full firmware binary including blobs such as -> FSP, and ME. Currently, access to them is restricted to the OEM (Protectli) via -> a private repository. - -Since version v1.0.18 VP4630 and VP4650 use different configuration file than -VP4670. Versions v1.0.17 and older do not support VP4650 and VP4670 at all. - -Versions v1.1.1 and newer support all variants with a single binary. - -1. Clone the coreboot repository: - - ```bash - git clone https://github.com/Dasharo/coreboot - ``` - -1. Checkout the desired version, e.g. `v1.1.0`: - - ```bash - cd coreboot - git checkout protectli_vault_cml_v1.1.0 - ``` - -1. Checkout submodules: - - ```bash - git submodule update --init --checkout - ``` - -1. Obtain the Protectli blobs package (only for version v1.1.0 and older): - - > Replace `` with a a proper path to the repository - > in a form of: `git@repo-path.git`. You should checkout to the same tag as - > in case of the coreboot repository. - - ```bash - cd 3rdparty/blobs/mainboard/ - git init - git remote add origin - git fetch origin && git checkout protectli_vault_cml_v1.1.0 - cd - - ``` - -1. Build the firmware: - - === "v1.1.1 or newer" - - ```bash - ./build.sh vp46xx - ``` - - The resulting coreboot image will be placed in the coreboot directory as - `protectli_vault_cml__vp46xx.rom`. - - === "V1.1.0 or older" - - === "VP4630 and VP4650" - - ```bash - ./build.sh vp4630_vp4650 - ``` - - The resulting coreboot image will be placed in the coreboot - directory as `protectli_vault_cml__vp4630_vp4650.rom`. - - === "VP4670" - - ```bash - ./build.sh vp4670 - ``` - - The resulting coreboot image will be placed in the coreboot - directory as `protectli_vault_cml__vp4670.rom`. diff --git a/docs/variants/protectli_vp46xx/firmware-update.md b/docs/variants/protectli_vp46xx/firmware-update.md deleted file mode 100644 index 453c68b928..0000000000 --- a/docs/variants/protectli_vp46xx/firmware-update.md +++ /dev/null @@ -1,79 +0,0 @@ -# Firmware update - -The following documentation describes the process of Dasharo open-source -firmware update. If your device is currently flashed with the proprietary -firmware please refer to the [Initial deployment](initial-deployment.md) -documentation. - -The update process may be different, depending on the currently installed -Dasharo firmware version. - -For simplicity of the update process, we recommend using -[Dasharo Tools Suite](https://docs.dasharo.com/dasharo-tools-suite/overview). - -Before starting the update procedure be sure to disable Dasharo BIOS Boot medium -lock and Secure Boot: - -1. Power on the device. -1. While the device is booting, hold the `DELETE` key to enter the UEFI Setup - Menu. -1. Enter the `Dasharo System Features` menu using the arrow keys and Enter. -1. Enter the [Dasharo Security Options](https://docs.dasharo.com/dasharo-menu-docs/dasharo-system-features/#dasharo-security-options) - submenu. -1. Verify the state of the `Lock the BIOS boot medium` option - if the option - is chosen, press `Space` and then `F10` to save the changes. -1. Go back to the main menu using the `ESC` key. -1. Enter the `Device Manager` menu. -1. Enter the [Secure Boot Configuration](https://docs.dasharo.com/dasharo-menu-docs/device-manager/#secure-boot-configuration) - submenu. -1. Verify that the `Current Secure Boot State` field says Disabled - if not, - unselect the `Attempt Secure Boot` option below then press `F10` to save the - changes. -1. Reboot the device to properly apply the changes. - -The settings of all the above options can be restored after a firmware update. - -## Updating to Dasharo v1.2.0 - -Due to the major changes, such as ME update, and firmware layout adjustments -(to store the boot logo), flashing of the whole firmware is required: - -```shell -flashrom -p internal -w protectli_vp46xx_v1.2.0.rom -``` - -## Updating to Dasharo v1.0.18 or v1.0.19 or v1.1.0 - -From v1.0.18 Dasharo firmware is rebased on the more up-to-date revision of -coreboot. - -If the current version of the firmware on the device is older than v1.0.18 or -you are migrating from proprietary firmware the whole flash chip should be -flashed as described in [Initial Deployment](initial-deployment.md). - -If the current version of the firmware on the device is v1.0.18 and it should -be updated to v1.0.19 or v1.1.0, only the `WP_RO` and `RW_SECTION_A` should be -flashed. To do this the following command should be used: - -```bash -flashrom -p internal -w protectli_vault_cml_v1.0.19.rom --fmap -i WP_RO -i RW_SECTION_A -``` - -## Updating on Dasharo v1.0.16 or v1.0.17 - -Only the `RW_SECTION_A` partition of the flash needs to be updated. Flash it -using the following command: - -```bash -flashrom -p internal -w protectli_vault_cml_v1.0.16.rom --fmap -i RW_SECTION_A -``` - -This command also preserves Dasharo UEFI settings and the boot order. - -## Updating on older Dasharo versions - -In this case, the whole `bios` region must be updated. - -```bash -flashrom -p internal -w protectli_vault_cml_v1.0.13.rom --ifd -i bios -``` diff --git a/docs/variants/protectli_vp46xx/hardware-matrix.md b/docs/variants/protectli_vp46xx/hardware-matrix.md deleted file mode 100644 index 65c5b1f6e4..0000000000 --- a/docs/variants/protectli_vp46xx/hardware-matrix.md +++ /dev/null @@ -1,103 +0,0 @@ -# Hardware configuration matrix - -## Introduction - -This document describes the hardware configuration used for validation of the -coreboot port on the Protectli VP46XX firewall. - -## Protectli VP4630 - -| Component | Description | -|--------------------------------|---------------------------------------------| -| **CPU** | Intel Core i3-10110U | -| **RAM** | Slot 1: Empty | -| | Slot 2: SAMSUNG M471A4G43MB1-CTD | -| **Flash memory** | Macronix KH25L12835F | -| **SSD** | Kingston NV1 250GB SNVS/250G | -| **MMC drive** | SAMSUNG KLM8G1GETF-B041 (on-board) | -| **USB pendrives** | 1. SanDisk Ultra Flair USB 3.0 16 GB | -| **USB Keyboard** | DELL KB216 | -| **USB Mouse** | DELL MS116p | -| **Wireless card** | Intel Wi-Fi 6 AX200 | -| **4G Modem** | AMIT MDG200-0T001 | -| **Display** | Display 1: HDMI 1920x1080p | -| | Display 2: DP 1920x1080p | -| **Ethernet controller** | 6x intel i225 (on-board) | -| **Internal devices** | Audio subsystem | -| **TPM** | Protectli TPM | -| **Network** | Local network wired connection | -| **Remote Testing Environment** | RTE v1.1.0 | -| **Power Control** | RTE v1.1.0 | -| **Power supply** | Channel Well Technology 12V, 5.0A 60W | - -## Protectli VP4650 - -| Component | Description | -|--------------------------------|---------------------------------------------| -| **CPU** | Intel Core i5-10210U | -| **RAM** | Slot 1: Kingston KVR24S17S8/8 | -| | Slot 2: Kingston KVR26S19S8/16 | -| **Flash memory** | Macronix KH25L12835F | -| **SSD** | Samsung 980 PRO NVMe 250 GB | -| **MMC drive** | SAMSUNG KLM8G1GETF-B041 (on-board) | -| **USB Keyboard** | DELL KB216 | -| **USB Mouse** | DELL MS116p | -| **Wireless card** | JJPLUS JWW6051 | -| **4G Modem** | AMIT MDG200-0T001 | -| **Display** | Display 1: HDMI 1920x1080p | -| | Display 2: DP 1920x1080p | -| **Ethernet controller** | 6x intel i225 (on-board) | -| **Internal devices** | Audio subsystem | -| **TPM** | Protectli TPM | -| **Network** | Local network wired connection | -| **Remote Testing Environment** | RTE v1.1.0 | -| **Power Control** | RTE v1.1.0 | -| **Power supply** | Channel Well Technology 12V, 7.5A 90W | - -## Protectli VP4670 ver1 - -| Component | Description | -|--------------------------------|---------------------------------------------| -| **CPU** | Intel Core i7-10810U | -| **RAM** | Slot 1: CRUCIAL CT16G4SFRA32A | -| | Slot 2: CRUCIAL CT16G4SFRA32A | -| **Flash memory** | Macronix KH25L12835F | -| **SSD** | SAMSUNG 870 QVO SATA 2.5" SSD 1TB | -| **MMC drive** | SAMSUNG KLM8G1GETF-B041 (on-board) | -| **USB Keyboard** | DELL KB216 | -| **USB Mouse** | DELL MS116p | -| **Wireless card** | JJPLUS JWW6051 | -| **4G Modem** | AMIT MDG200-0T001 | -| **Display** | Display 1: HDMI 1920x1080p | -| | Display 2: DP 1920x1080p | -| **Ethernet controller** | 6x intel i225 (on-board) | -| **Internal devices** | Audio subsystem | -| **TPM** | Protectli TPM | -| **Network** | Local network wired connection | -| **Remote Testing Environment** | RTE v1.1.0 | -| **Power control** | Sonoff S26 | -| **Power supply** | Channel Well Technology 12V, 7.5A 90W | - -## Protectli VP4670 ver2 - -| Component | Description | -|--------------------------------|---------------------------------------------| -| **CPU** | Intel Core i7-10810U | -| **RAM** | Slot 1: CRUCIAL CT16G4SFRA32A | -| | Slot 2: CRUCIAL CT16G4SFRA32A | -| **Flash memory** | Macronix KH25L12835F | -| **SSD** | Kingston NV2 M.2 NVMe 500 GB SNV2S/500G | -| **MMC drive** | SAMSUNG KLM8G1GETF-B041 (on-board) | -| **USB Keyboard** | DELL KB216 | -| **USB Mouse** | DELL MS116p | -| **Wireless card** | JJPLUS JWW6051 | -| **4G Modem** | AMIT MDG200-0T001 | -| **Display** | Display 1: HDMI 1920x1080p | -| | Display 2: DP 1920x1080p | -| **Ethernet controller** | 6x intel i225 (on-board) | -| **Internal devices** | Audio subsystem | -| **TPM** | Protectli TPM | -| **Network** | Local network wired connection | -| **Remote Testing Environment** | RTE v1.1.0 | -| **Power control** | Sonoff S26 | -| **Power supply** | Channel Well Technology 12V, 7.5A 90W | diff --git a/docs/variants/protectli_vp46xx/initial-deployment.md b/docs/variants/protectli_vp46xx/initial-deployment.md deleted file mode 100644 index fe91cd413b..0000000000 --- a/docs/variants/protectli_vp46xx/initial-deployment.md +++ /dev/null @@ -1,73 +0,0 @@ -# Initial deployment - -Initial flashing of Dasharo firmware can be done from Linux using flashrom with -the internal programmer. This document describes the process of building, -installing and running flashrom on Ubuntu 22.04. - -## Deploy using Dasharo Tools Suite - -For simplicity we recommend using -[Dasharo Tools Suite](https://docs.dasharo.com/dasharo-tools-suite/overview) to -omit all compilation steps and deploy the Dasharo firmware seamlessly. -Be sure to disable the BIOS lock in the AMI firmware setup utility: - -1. Go to `Chipset` tab -2. Enter `PCH IO Configuration` -3. Disable `BIOS Lock`. -4. Save changes and reset. - -Now you are ready to use Dasharo Tools Suite (DTS): - -1. Boot Dasharo Tools Suite. -2. Perform Dasharo installation. - -This will flash the full image, including the Intel ME. The operation requires -a hard reset of the platform. To perform a hard reset: - -1. Power off the platform. Note, it may not power off completely due to flashed - ME. -2. Disconnect power supply from the board when OS finishes all tasks after - power off (the screen goes dark or black). -3. Disconnect the RTC/CMOS battery OR clear the CMOS using the pin header - located near memory slots. Wait about 10 seconds and unshort the pins. -4. Connect the power supply back. -5. The platform should power on normally now. You can connect the battery back - if it was disconnected. - -This concludes Dasharo deployment process using DTS. - -## Build flashrom - -Please follow generic guide for [Dasharo flashrom fork](../../osf-trivia-list/deployment.md#how-to-install-dasharo-flashrom-fork). - -## Reading flash contents - -Always prepare a backup of the current firmware image. To read from the flash -and save it to a file (`dump.rom`), execute the following command: - -```bash -flashrom -p internal -r dump.rom -``` - -## Flashing Dasharo - -To flash Dasharo on the platform, execute the following command - replace -`[path]` with the path to the Dasharo image you want to flash, e.g. -`protectli_vault_cml_v1.0.13.rom`. - -```bash -flashrom -p internal -w protectli_vault_cml_v1.0.13.rom -``` - -This will flash the full image, including the Intel ME. The operation requires -a hard reset of the platform. To perform a hard reset: - -1. Power off the platform. Note, it may not power off completely due to flashed - ME. -2. Disconnect power supply from the board when OS finishes all tasks after - power off (the screen goes dark or black). -3. Disconnect the RTC/CMOS battery OR clear the CMOS using the pin header - located near memory slots. Wait about half a minute (unshort the pins). -4. Connect the power supply back. -5. The platform should power on normally now. You can connect the battery back - if it was disconnected. diff --git a/docs/variants/protectli_vp46xx/openness_score.md b/docs/variants/protectli_vp46xx/openness_score.md deleted file mode 100644 index 8b470bc60a..0000000000 --- a/docs/variants/protectli_vp46xx/openness_score.md +++ /dev/null @@ -1,135 +0,0 @@ -# Dasharo Openness Score - -This page contains the [Dasharo Openness -Score](../../glossary.md#dasharo-openness-score) for Protectli VP46XX Dasharo -releases. The content of the page is generated with [Dasharo Openness Score -utility](https://github.com/Dasharo/Openness-Score). - -## v1.2.0 - -Openness Score for protectli_vp46xx_v1.2.0.rom - -Open-source code percentage: **32.3%** -Closed-source code percentage: **67.7%** - -* Image size: 16777216 (0x1000000) -* Number of regions: 25 -* Number of CBFSes: 3 -* Total open-source code size: 4751528 (0x4880a8) -* Total closed-source code size: 9978470 (0x984266) -* Total data size: 497394 (0x796f2) -* Total empty size: 1549824 (0x17a600) - -![](protectli_vp46xx_v1.2.0.rom_openness_chart.png) - -![](protectli_vp46xx_v1.2.0.rom_openness_chart_full_image.png) - -> Numbers given above already include the calculations from CBFS regions -> presented below - -### FMAP regions - -| FMAP region | Offset | Size | Category | -| ----------- | ------ | ---- | -------- | -| SI_ME | 0x1000 | 0x5ff000 | closed-source | -| SI_DESC | 0x0 | 0x1000 | data | -| RECOVERY_MRC_CACHE | 0x600000 | 0x10000 | data | -| RW_MRC_CACHE | 0x610000 | 0x10000 | data | -| SMMSTORE | 0x620000 | 0x40000 | data | -| SHARED_DATA | 0x660000 | 0x2000 | data | -| VBLOCK_DEV | 0x662000 | 0x2000 | data | -| RW_NVRAM | 0x664000 | 0x6000 | data | -| VBLOCK_A | 0x6ea000 | 0x2000 | data | -| RW_FWID_A | 0xb7ff00 | 0x100 | data | -| RO_VPD | 0xb80000 | 0x4000 | data | -| FMAP | 0xb84000 | 0x800 | data | -| RO_FRID | 0xb84800 | 0x100 | data | -| RO_FRID_PAD | 0xb84900 | 0x700 | data | -| GBB | 0xb85000 | 0x3000 | data | - -### CBFS BOOTSPLASH - -* CBFS size: 524288 -* Number of files: 1 -* Open-source files size: 0 (0x0) -* Closed-source files size: 0 (0x0) -* Data size: 28 (0x1c) -* Empty size: 524260 (0x7ffe4) - -> Numbers given above are already normalized (i.e. they already include size -> of metadata and possible closed-source LAN drivers included in the payload - > which are not visible in the table below) - -| CBFS filename | CBFS filetype | Size | Compression | Category | -| ------------- | ------------- | ---- | ----------- | -------- | -| (empty) | null | 524260 | none | empty | - -### CBFS FW_MAIN_A - -* CBFS size: 4800256 -* Number of files: 16 -* Open-source files size: 2325656 (0x237c98) -* Closed-source files size: 1845555 (0x1c2933) -* Data size: 8261 (0x2045) -* Empty size: 620784 (0x978f0) - -> Numbers given above are already normalized (i.e. they already include size -> of metadata and possible closed-source LAN drivers included in the payload - > which are not visible in the table below) - -| CBFS filename | CBFS filetype | Size | Compression | Category | -| ------------- | ------------- | ---- | ----------- | -------- | -| fallback/romstage | stage | 71104 | none | open-source | -| fallback/ramstage | stage | 132189 | LZMA | open-source | -| fallback/dsdt.aml | raw | 8831 | none | open-source | -| fallback/postcar | stage | 31588 | none | open-source | -| fallback/payload | simple elf | 2081944 | none | open-source | -| cpu_microcode_blob.bin | microcode | 300032 | none | closed-source | -| fspm.bin | fsp | 581632 | none | closed-source | -| fspm_2.bin | fsp | 581632 | none | closed-source | -| fsps.bin | fsp | 191132 | LZMA | closed-source | -| fsps_2.bin | fsp | 191127 | LZMA | closed-source | -| config | raw | 4993 | LZMA | data | -| revision | raw | 859 | none | data | -| build_info | raw | 103 | none | data | -| vbt.bin | raw | 1183 | LZMA | data | -| (empty) | null | 164 | none | empty | -| (empty) | null | 4004 | none | empty | - -### CBFS COREBOOT - -* CBFS size: 4685824 -* Number of files: 22 -* Open-source files size: 2425872 (0x250410) -* Closed-source files size: 1845555 (0x1c2933) -* Data size: 9617 (0x2591) -* Empty size: 404780 (0x62d2c) - -> Numbers given above are already normalized (i.e. they already include size -> of metadata and possible closed-source LAN drivers included in the payload - > which are not visible in the table below) - -| CBFS filename | CBFS filetype | Size | Compression | Category | -| ------------- | ------------- | ---- | ----------- | -------- | -| fallback/romstage | stage | 71104 | none | open-source | -| fallback/ramstage | stage | 132189 | LZMA | open-source | -| fallback/dsdt.aml | raw | 8831 | none | open-source | -| fallback/postcar | stage | 31588 | none | open-source | -| fallback/payload | simple elf | 2081944 | none | open-source | -| fallback/verstage | stage | 61752 | none | open-source | -| bootblock | bootblock | 38464 | none | open-source | -| cpu_microcode_blob.bin | microcode | 300032 | none | closed-source | -| fspm.bin | fsp | 581632 | none | closed-source | -| fspm_2.bin | fsp | 581632 | none | closed-source | -| fsps.bin | fsp | 191132 | LZMA | closed-source | -| fsps_2.bin | fsp | 191127 | LZMA | closed-source | -| cbfs_master_header | cbfs header | 28 | none | data | -| intel_fit | intel_fit | 80 | none | data | -| config | raw | 4993 | LZMA | data | -| revision | raw | 859 | none | data | -| build_info | raw | 103 | none | data | -| cmos_layout.bin | cmos_layout | 708 | none | data | -| vbt.bin | raw | 1183 | LZMA | data | -| (empty) | null | 420 | none | empty | -| (empty) | null | 2724 | none | empty | -| (empty) | null | 401636 | none | empty | diff --git a/docs/variants/protectli_vp46xx/overview.md b/docs/variants/protectli_vp46xx/overview.md deleted file mode 100644 index 6a6202f50b..0000000000 --- a/docs/variants/protectli_vp46xx/overview.md +++ /dev/null @@ -1,41 +0,0 @@ -# Overview - -The Vault is a small form network appliance built for use as a firewall / -router, virtualization platform, a daily-driven personal computer, and more. -The VP46XX is the second platform of the Vault Pro series with higher -performance and newer technology than the original FW6 series. - -![](/images/VP4630_banner-1.jpg) - -The VP46XX features an Intel 10th Generation CPU, 2x DDR4 DIMM modules, 6x -Intel i225-V 2.5G Ethernet ports, PCIe x4/SATA NVMe storage, LPC TPM, M.2 WIFI -and WWAN slots. - -* VP4630 - Intel Core i3-10110U -* VP4650 - Intel Core i5-10210U -* VP4670 - Intel Core i7-10810U (both v1 and v2 versions, see the - [Intel FSP repo for details](https://github.com/intel/FSP/tree/master/CometLakeFspBinPkg#differentiating-cometlake1-and-cometlake2))) - -For more information please refer to the references below. - -## References - -* [Buy VP4630 in Protectli shop](https://protectli.com/product/vp4630/) - -## Documentation sections - -* [Releases](releases.md) - groups information about all releases. -* [Building manual](building-manual.md) - describes how to build Dasharo for - NovaCustom NV4x. -* [Initial deployment](initial-deployment.md) - describes initial Dasharo - deployment methods (i. e. flashing new firmware) for Protectli VP46xx. -* [Firmware update](firmware-update.md) - explains supported Dasharo - open-source firmware update methods. -* [Recovery](recovery.md) - gathers information on how to recover the platform - from potential failure. -* [Hardware configuration matrix](hardware-matrix.md) - describes the - platform's hardware configuration used during the Dasharo firmware - validation procedure. -* [Test matrix](test-matrix.md) - describes validation scope used during - Dasharo firmware validation procedure. -* [Post-installation setup](post-install.md) diff --git a/docs/variants/protectli_vp46xx/post-install.md b/docs/variants/protectli_vp46xx/post-install.md deleted file mode 100644 index 233273751b..0000000000 --- a/docs/variants/protectli_vp46xx/post-install.md +++ /dev/null @@ -1,25 +0,0 @@ -# Post-installation setup - -This document contains extra steps to perform after installing Dasharo in order -to enable full functionality. - -## Linux - -This section covers Linux post-install steps tested on Ubuntu 22.04. It is -likely that similar procedures would for others Linux distributions as well. - -### Cards using ath10k_pci driver report a firmware failure at module load - -If you experience ath10k_pci failing to load with error in dmesg similar to: - -```text -[ 11.098547] ath10k_pci 0000:07:00.0: wmi unified ready event not received -[ 11.148567] ath10k_pci 0000:07:00.0: device has crashed during init -[ 11.176535] ath10k_pci 0000:07:00.0: device has crashed during init -[ 11.176539] ath10k_pci 0000:07:00.0: failed to wait for target init: -70 -[ 11.177684] ath10k_pci 0000:07:00.0: could not init core (-110) -[ 11.177711] ath10k_pci 0000:07:00.0: could not probe fw (-110) -``` - -follow https://kb.protectli.com/kb/wifi-on-the-vault/ (Firmware Fix section) -to fix the problem. diff --git a/docs/variants/protectli_vp46xx/recovery.md b/docs/variants/protectli_vp46xx/recovery.md deleted file mode 100644 index 01dfd8fd9f..0000000000 --- a/docs/variants/protectli_vp46xx/recovery.md +++ /dev/null @@ -1,35 +0,0 @@ -# Recovery - -## Intro - -The following documentation describes platform-specific details of setting up -Protectli VP46XX for recovery from brick state with -[RTE](../../transparent-validation/rte/introduction.md) -and Dasharo open-source firmware. - -## Connections - -Set up the connections required for external flashing as described in -[Generic Testing Stand Setup](../../unified-test-documentation/generic-testing-stand-setup.md). -Protectli VP46XX are flashed using the Pomona clip connection variant. Use -the pictures below to easily locate essential components on the mainboard. - -### SPI flash chip location - -![](../../images/protectli_recovery/vp46xx_location_of_flash_chip.jpg) - -### CMOS header location - -![](../../images/protectli_recovery/vp46xx_location_of_CMOS_header.jpg) - -## Firmware flashing - -To flash firmware, follow the steps described in -[Generic Testing Stand Setup](../../unified-test-documentation/generic-testing-stand-setup.md) -, noting that: -* The chip voltage for this platform is **3.3V** -* The proper flashrom parameters for this platform are: - - ```bash - flashrom -p linux_spi:dev=/dev/spidev1.0,spispeed=16000 -c "MX25L12835F/MX25L12845E/MX25L12865E" -w [path_to_binary] - ``` diff --git a/docs/variants/protectli_vp46xx/releases.md b/docs/variants/protectli_vp46xx/releases.md deleted file mode 100644 index 2980585804..0000000000 --- a/docs/variants/protectli_vp46xx/releases.md +++ /dev/null @@ -1,387 +0,0 @@ -# Release Notes - -Following Release Notes describe status of Open Source Firmware development for -Protectli VP46xx - -For details about our release process please read -[Dasharo Standard Release Process](../../dev-proc/standard-release-process.md). - -
-[Subscribe to Protectli VP46xx Dasharo Release Newsletter] -[newsletter]{.md-button .md-button--primary .center} -
- -Test results for this platform can be found -[here](https://docs.google.com/spreadsheets/d/1wI0qBSLdaluayYsm_lIa9iJ9LnPnCOZ9eNOyrKSc-j4/edit?usp=sharing). - -## v1.2.0 - 2024-03-25 - -Test results for this release can be found -[here](https://docs.google.com/spreadsheets/d/1wSE6xA3K3nXewwLn5lV39_2wZL1kg5AkGb4mvmG3bwE/edit#gid=2016830329). - -### Added - -- [Setup menu password configuration](https://docs.dasharo.com/dasharo-menu-docs/overview/#dasharo-menu-guides) -- [Serial port console redirection option in setup menu](https://docs.dasharo.com/dasharo-menu-docs/dasharo-system-features/#serial-port-configuration) -- [Customizable Serial Number and UUID via CBFS support](https://github.com/Dasharo/dcu) -- [Customizable boot logo support](https://github.com/Dasharo/dcu) -- [Support for taking screenshots in the firmware](https://docs.dasharo.com/dev-proc/screenshots/#taking-screenshots) -- [ESP partition scanning in look for grubx64.efi or shimx64.efi or Windows bootmgr](https://github.com/Dasharo/dasharo-issues/issues/94) -- Microsoft and Windows 2023 UEFI Secure Boot certificates -- UEFI 2.8 errata C compliance in EDKII fork - -### Changed - -- Rebased to coreboot 4.21 -- Enroll default UEFI Secure Boot keys on the first boot -- [Improved UEFI Secure Boot menu user experience](https://docs.dasharo.com/dasharo-menu-docs/device-manager/#secure-boot-configuration) -- Scope of reset to defaults hotkey to global in firmware setup -- Updated microcode to the newer version; refer to SBOM section below -- Updated ME to the newer version; refer to SBOM section below -- Prepared unified support for v1 and v2 CPUs resulting in a single binary for - all 3 board variants - -### Fixed - -- [Auto Boot Time-out is reset to 0 when F9 is pressed](https://github.com/Dasharo/dasharo-issues/issues/513) -- [Reset to defaults with F9 causes the wrong settings to be restored](https://github.com/Dasharo/dasharo-issues/issues/355) -- [RTC time and date resetting to the coreboot build date on 29th February](https://review.coreboot.org/c/coreboot/+/80790) - -### Known issues - -- [Unexpected errors in dmesg on VP4670 v2 with 1.2.0](https://github.com/Dasharo/dasharo-issues/issues/746) -- [Maximum reported frequency is base frequency, not turbo frequency (Windows 11)](https://github.com/Dasharo/dasharo-issues/issues/522) -- [No ability to change active PCR banks with TPM PPI in FW](https://github.com/Dasharo/dasharo-issues/issues/521) -- [DisplayPort output does not work with 16:10 (1920x1200) monitors](https://github.com/Dasharo/dasharo-issues/issues/531) - -### Binaries - -[protectli_vp46xx_v1.2.0.rom][protectli_vp46xx_v1.2.0.rom_file]{.md-button} -[sha256][protectli_vp46xx_v1.2.0.rom_hash]{.md-button} -[sha256.sig][protectli_vp46xx_v1.2.0.rom_sig]{.md-button} - -[protectli_vp46xx_v1.2.0_dev_signed.rom][protectli_vp46xx_v1.2.0_dev_signed.rom_file]{.md-button} -[sha256][protectli_vp46xx_v1.2.0_dev_signed.rom_hash]{.md-button} -[sha256.sig][protectli_vp46xx_v1.2.0_dev_signed.rom_sig]{.md-button} - -To verify binary integrity with hash and signature please follow the -instructions in [Dasharo release signature verification](/guides/signature-verification) -using [this key](https://raw.githubusercontent.com/3mdeb/3mdeb-secpack/master/customer-keys/protectli/release-keys/dasharo-release-1.2.x-for-protectli-signing-key.asc) - -### SBOM (Software Bill of Materials) - -- [Dasharo coreboot fork based on 4.21 revision add9d720](https://github.com/Dasharo/coreboot/tree/add9d720) -- [Dasharo EDKII fork based on edk2-stable202002 revision 2a15268b](https://github.com/Dasharo/edk2/tree/2a15268b) -- [iPXE based on 2023.12 revision 838611b3](https://github.com/Dasharo/ipxe/tree/838611b3) -- [vboot based on 0c11187c75 revision 0c11187c](https://chromium.googlesource.com/chromiumos/platform/vboot_reference/+/0c11187c/) -- [Intel Management Engine based on v14.0.47.1558 revision d0b63476](https://github.com/Dasharo/dasharo-blobs/blob/d0b63476/protectli/vault_cml/me.bin) -- [Intel Flash Descriptor based on v1.0 revision d0b63476](https://github.com/Dasharo/dasharo-blobs/blob/d0b63476/protectli/vault_cml/descriptor.bin) -- [Intel Firmware Support Package based on CometLake1 9.0.7B.20 revision 481ea7cf](https://github.com/intel/FSP/tree/481ea7cf/CometLakeFspBinPkg/CometLake1) -- [Intel Firmware Support Package based on CometLake2 9.2.7B.20 revision 481ea7cf](https://github.com/intel/FSP/tree/481ea7cf/CometLakeFspBinPkg/CometLake2) -- [Intel microcode based on CML-U42 V0 0x000000f8 revision microcode-20230808](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/tree/microcode-20230808/intel-ucode/06-8e-0c) -- [Intel microcode based on CML-U62 V1 A0 0x000000f8 revision microcode-20230808](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/tree/microcode-20230808/intel-ucode/06-a6-00) -- [Intel microcode based on CML-U62 V2 K1 0x000000f8 revision microcode-20230808](https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/tree/microcode-20230808/intel-ucode/06-a6-01) - -[protectli_vp46xx_v1.2.0.rom_file]: https://dl.3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/v1.2.0/protectli_vp46xx_v1.2.0.rom -[protectli_vp46xx_v1.2.0.rom_hash]: https://dl.3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/v1.2.0/protectli_vp46xx_v1.2.0.rom.sha256 -[protectli_vp46xx_v1.2.0.rom_sig]: https://dl.3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/v1.2.0/protectli_vp46xx_v1.2.0.rom.sha256.sig -[protectli_vp46xx_v1.2.0_dev_signed.rom_file]: https://dl.3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/v1.2.0/protectli_vp46xx_v1.2.0_dev_signed.rom -[protectli_vp46xx_v1.2.0_dev_signed.rom_hash]: https://dl.3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/v1.2.0/protectli_vp46xx_v1.2.0_dev_signed.rom.sha256 -[protectli_vp46xx_v1.2.0_dev_signed.rom_sig]: https://dl.3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/v1.2.0/protectli_vp46xx_v1.2.0_dev_signed.rom.sha256.sig - -## v1.1.0 - 2023-06-05 - -Release version v1.1.0 is currently only available for the VP4670 platform. - -### Added - -- [USB stack and mass storage enable/disable option](https://docs.dasharo.com/dasharo-menu-docs/dasharo-system-features/#usb-configuration) -- [SMM BIOS write protection enable/disable option](https://docs.dasharo.com/dasharo-menu-docs/dasharo-system-features/#dasharo-security-options) - -### Changed - -- Reverted to use FSP GOP for graphics initialization as it caused problems with - Windows 11 display on VP4670 -- Switched to use driver for IT8784E Super I/O, which is present on the boards -- CPU power limits increased from baseline to performance -- [Updating from v1.0.x requires flashing the WP_RO recovery partition](https://docs.dasharo.com/variants/protectli_vp46xx/firmware-update/#updating-to-dasharo-v1018-or-v1019-or-v110) -- [Firmware version v1.1.x are signed with a new key](https://raw.githubusercontent.com/3mdeb/3mdeb-secpack/master/customer-keys/protectli/release-keys/dasharo-release-1.1.x-for-protectli-signing-key.asc) - -### Fixed - -- [Booting problems with Ubuntu 22.04](https://github.com/Dasharo/dasharo-issues/issues/370) -- [Low CPU frequency values](https://github.com/Dasharo/dasharo-issues/issues/369) -- Disabled C states deeper than C1 on VP4670 to fix Proxmox booting issue -- [Protectli VP4670 - windows crashes after installing updates](https://github.com/Dasharo/dasharo-issues/issues/302) -- [The inconvenience of using external headsets VP46XX](https://github.com/Dasharo/dasharo-issues/issues/167) - -### Known issues - -- [Popup with information about recovery mode is still displayed after flashing with a valid binary](https://github.com/Dasharo/dasharo-issues/issues/320) - -### Binaries - -[protectli_vp4670_v1.1.0.rom][protectli_vp4670_v1.1.0.rom_file]{.md-button} -[sha256][protectli_vp4670_v1.1.0.rom_hash]{.md-button} -[sha256.sig][protectli_vp4670_v1.1.0.rom_sig]{.md-button} - -To verify binary integrity with hash and signature please follow the -instructions in [Dasharo release signature verification](/guides/signature-verification) -using [this key](https://raw.githubusercontent.com/3mdeb/3mdeb-secpack/master/customer-keys/protectli/release-keys/dasharo-release-1.1.x-for-protectli-signing-key.asc) - -### SBOM (Software Bill of Materials) - -- [coreboot based on c6ee1509da revision dcc5f2e2](https://github.com/Dasharo/coreboot/tree/dcc5f2e2) -- [edk2 based on 7f90b9cd revision 19bf14b4](https://github.com/Dasharo/edk2/tree/19bf14b4) -- [iPXE based on 6ba671ac revision 6ba671ac](https://github.com/ipxe/ipxe/tree/6ba671ac) - -[newsletter]: https://newsletter.3mdeb.com/subscription/n2EpSxtqL -[protectli_vp4670_v1.1.0.rom_file]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/v1.1.0/protectli_vp4670_v1.1.0.rom -[protectli_vp4670_v1.1.0.rom_hash]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/v1.1.0/protectli_vp4670_v1.1.0.rom.sha256 -[protectli_vp4670_v1.1.0.rom_sig]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/v1.1.0/protectli_vp4670_v1.1.0.rom.sha256.sig - -## v1.0.19 - 2022-12-08 - -### Changed - -- ME is now disabled by default (ME soft-disable) -- vboot is now run as separate verstage (previously was run inside bootblock) -- increased pre-RAM console buffer to fit more early cbmem logs - -### Binaries - -[protectli_vp4630_vp4650_v1.0.19.rom][protectli_vp4630_vp4650_v1.0.19.rom_file]{.md-button} -[sha256][protectli_vp4630_vp4650_v1.0.19.rom_hash]{.md-button} -[sha256.sig][protectli_vp4630_vp4650_v1.0.19.rom_sig]{.md-button} - -[protectli_vp4670_v1.0.19.rom][protectli_vp4670_v1.0.19.rom_file]{.md-button} -[sha256][protectli_vp4670_v1.0.19.rom_hash]{.md-button} -[sha256.sig][protectli_vp4670_v1.0.19.rom_sig]{.md-button} - -To verify binary integrity with hash and signature please follow the -instructions in [Dasharo release signature verification](/guides/signature-verification) -using [this key](https://raw.githubusercontent.com/3mdeb/3mdeb-secpack/master/customer-keys/protectli/release-keys/protectli-dasharo-firewall-release-1.0-key.asc) - -### SBOM (Software Bill of Materials) - -- [coreboot based on c6ee1509da revision 9034fb12](https://github.com/Dasharo/coreboot/tree/9034fb12) -- [edk2 based on 7f90b9cd revision e31b7a71](https://github.com/Dasharo/edk2/tree/e31b7a71) -- [iPXE for EFI revision 988d2](https://github.com/ipxe/ipxe/tree/988d2c13cdf0f0b4140685af35ced70ac5b3283c) -- VP4670: [Cometlake1 FSP 9.0.7B.20](https://github.com/intel/FSP/tree/12160fe64bc1caaba3c2d6be44da0cd8787a2561/CometLakeFspBinPkg/CometLake1) -- VP4630 and VP4650: [Cometlake2 FSP 9.2.7B.20](https://github.com/intel/FSP/tree/12160fe64bc1caaba3c2d6be44da0cd8787a2561/CometLakeFspBinPkg/CometLake2) -- Intel i225 EFI driver version 0.10.4, - SHA256: 2d234ecf629fc10dc0c291a1390de3d27a05c6ecbd935628b6ff154f386d061e -- Management Engine: Custom image based on ME 14.0.47.1558, - SHA256: 7fa37e108176c9a2d0df60c93b10b3ad9c7725f1f82b87197a2991208c4cffec -- microcode: - + CPU signature: 0x0806EC, Date: 17.11.2021, Revision: 0xF0 - + CPU signature: 0x0A0660, Date: 15.11.2021, Revision: 0xF0 - + CPU signature: 0x0A0661, Date: 16.11.2021, Revision: 0xF0 - -## v1.0.18 - 2022-11-16 - -Test results for this release can be found -[here](https://docs.google.com/spreadsheets/d/1wI0qBSLdaluayYsm_lIa9iJ9LnPnCOZ9eNOyrKSc-j4/edit#gid=1613384145). - -### Added - -- Support for VP4650 and VP4670 platforms -- Platform will beep 12 times and blink HDD led on critical firmware errors - -### Changed - -- Disabled Intel PTT (fTPM) -- [Removed workaround for graphics power management as the issue no longer reproduces on newer revision of the hardware](https://github.com/Dasharo/dasharo-issues/issues/26) -- Binaries are built with coreboot-sdk 2021-09-23_b0d87f753c (was 0ad5fbd48d) -- Open-source graphics initialization with libgfxinit instead of proprietary and - closed FSP GOP driver - -### Binaries - -[protectli_vp4630_vp4650_v1.0.18.rom][protectli_vp4630_vp4650_v1.0.18.rom_file]{.md-button} -[sha256][protectli_vp4630_vp4650_v1.0.18.rom_hash]{.md-button} -[sha256.sig][protectli_vp4630_vp4650_v1.0.18.rom_sig]{.md-button} - -[protectli_vp4670_v1.0.18.rom][protectli_vp4670_v1.0.18.rom_file]{.md-button} -[sha256][protectli_vp4670_v1.0.18.rom_hash]{.md-button} -[sha256.sig][protectli_vp4670_v1.0.18.rom_sig]{.md-button} - -To verify binary integrity with hash and signature please follow the -instructions in [Dasharo release signature verification](/guides/signature-verification) -using [this key](https://raw.githubusercontent.com/3mdeb/3mdeb-secpack/master/customer-keys/protectli/release-keys/protectli-dasharo-firewall-release-1.0-key.asc) - -### SBOM (Software Bill of Materials) - -- [coreboot based on c6ee1509da revision ed9f6fe0](https://github.com/Dasharo/coreboot/tree/ed9f6fe0) -- [edk2 based on 7f90b9cd revision e31b7a71](https://github.com/Dasharo/edk2/tree/e31b7a71) -- [iPXE for EFI revision 988d2](https://github.com/ipxe/ipxe/tree/988d2c13cdf0f0b4140685af35ced70ac5b3283c) -- VP4670: [Cometlake1 FSP 9.0.7B.20](https://github.com/intel/FSP/tree/12160fe64bc1caaba3c2d6be44da0cd8787a2561/CometLakeFspBinPkg/CometLake1) -- VP4630 and VP4650: [Cometlake2 FSP 9.2.7B.20](https://github.com/intel/FSP/tree/12160fe64bc1caaba3c2d6be44da0cd8787a2561/CometLakeFspBinPkg/CometLake2) -- Intel i225 EFI driver version 0.10.4, - SHA256: 2d234ecf629fc10dc0c291a1390de3d27a05c6ecbd935628b6ff154f386d061e -- Management Engine: Custom image based on ME 14.0.47.1558, - SHA256: 7fa37e108176c9a2d0df60c93b10b3ad9c7725f1f82b87197a2991208c4cffec -- microcode: - + CPU signature: 0x0806EC, Date: 17.11.2021, Revision: 0xF0 - + CPU signature: 0x0A0660, Date: 15.11.2021, Revision: 0xF0 - + CPU signature: 0x0A0661, Date: 16.11.2021, Revision: 0xF0 - -## v1.0.17 - 2022-08-17 - -Test results for this release can be found -[here](https://docs.google.com/spreadsheets/d/1wI0qBSLdaluayYsm_lIa9iJ9LnPnCOZ9eNOyrKSc-j4/edit#gid=1613384145). - -### Added - -- [Tools for resigning Vboot images with one RW partition](https://docs.dasharo.com/guides/vboot-signing/) - -### Changed - -- Set thermal throttling temperature to 80 degrees -- Disabled UEFI Secure Boot by default - -### Fixed - -- Platform rebooting every 56 minutes -- Incorrect menu labels displayed in network boot menu -- Built-in audio jack does not work - -### Binaries - -[protectli_vault_cml_v1.0.17.rom_file][protectli_vault_cml_v1.0.17.rom_file]{.md-button} -[protectli_vault_cml_v1.0.17.rom_hash][protectli_vault_cml_v1.0.17.rom_hash]{.md-button} -[protectli_vault_cml_v1.0.17.rom_sig][protectli_vault_cml_v1.0.17.rom_sig]{.md-button} - -To verify binary integrity with hash and signature please follow the -instructions in [Dasharo release signature verification](/guides/signature-verification) -using [this key](https://raw.githubusercontent.com/3mdeb/3mdeb-secpack/master/customer-keys/protectli/release-keys/protectli-dasharo-firewall-release-1.0-key.asc) - -### SBOM (Software Bill of Materials) - -- [coreboot based on 4.16 revision d662831d](https://github.com/Dasharo/coreboot/tree/d662831d) -- [edk2 based on 7f90b9cd revision 576aa6a4](https://github.com/Dasharo/edk2/tree/576aa6a4) -- [iPXE for EFI revision 988d2](https://github.com/ipxe/ipxe/tree/988d2c13cdf0f0b4140685af35ced70ac5b3283c) -- [Cometlake2 FSP 9.2.7B.20](https://github.com/intel/FSP/tree/10eae55b8eb0febfa2dfabf4017701b072866170/CometLakeFspBinPkg/CometLake2) -- Intel i225 EFI driver version 0.10.4, - SHA256: 2d234ecf629fc10dc0c291a1390de3d27a05c6ecbd935628b6ff154f386d061e -- Management Engine: Custom image based on ME 14.0.47.1558, - SHA256: 7fa37e108176c9a2d0df60c93b10b3ad9c7725f1f82b87197a2991208c4cffec -- microcode: - + CPU signature: 0x0806EC, Date: 28.04.2021, Revision: 0xEC - + CPU signature: 0x0A0660, Date: 28.04.2021, Revision: 0xEA - + CPU signature: 0x0A0661, Date: 29.04.2021, Revision: 0xEC - -## v1.0.16 - 2022-07-13 - -Test results for this release can be found -[here](https://docs.google.com/spreadsheets/d/1wI0qBSLdaluayYsm_lIa9iJ9LnPnCOZ9eNOyrKSc-j4/edit#gid=1613384145). - -### Added - -- [Vboot Verified Boot](https://docs.dasharo.com/guides/vboot-signing/) -- [TPM Measured Boot](https://docs.dasharo.com/unified-test-documentation/dasharo-security/203-measured-boot/) -- [Vboot recovery notification in UEFI Payload](https://docs.dasharo.com/unified-test-documentation/dasharo-security/201-verified-boot/) -- [UEFI Shell](https://docs.dasharo.com/unified-test-documentation/dasharo-compatibility/30P-uefi-shell/) -- [UEFI Secure Boot](https://docs.dasharo.com/unified-test-documentation/dasharo-security/206-secure-boot/) -- [Intel ME soft disable](https://docs.dasharo.com/unified-test-documentation/dasharo-security/20F-me-neuter/) -- [BIOS flash protection for Vboot recovery region](https://docs.dasharo.com/unified-test-documentation/dasharo-security/20J-bios-lock-support/) - -### Changed - -- [Changed supported CPUs to Comet Lake stepping 2](https://github.com/intel/FSP/tree/master/CometLakeFspBinPkg#comet-lake-binary-differences) - -### Fixed - -- [i225 network controller initialization takes too much time](https://github.com/Dasharo/dasharo-issues/issues/65) -- [CVE-2022-29264](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-29264) - -### Binaries - -[protectli_vault_cml_v1.0.16.rom][v1.0.16_rom]{.md-button} -[sha256][v1.0.16_hash]{.md-button} -[sha256.sig][v1.0.16_sig]{.md-button} - -To verify binary integrity with hash and signature please follow the -instructions in [Dasharo release signature verification](/guides/signature-verification) -using [this key](https://raw.githubusercontent.com/3mdeb/3mdeb-secpack/master/customer-keys/protectli/release-keys/protectli-dasharo-firewall-release-1.0-key.asc) - -### SBOM (Software Bill of Materials) - -- [coreboot based on 4.16 revision dfaaf44d](https://github.com/Dasharo/coreboot/tree/dfaaf44d) -- [edk2 based on 7f90b9cd revision 5345a611](https://github.com/Dasharo/edk2/tree/5345a611) -- [iPXE for EFI revision 988d2](https://github.com/ipxe/ipxe/tree/988d2c13cdf0f0b4140685af35ced70ac5b3283c) -- [Cometlake2 FSP 9.2.7B.20](https://github.com/intel/FSP/tree/10eae55b8eb0febfa2dfabf4017701b072866170/CometLakeFspBinPkg/CometLake2) -- Intel i225 EFI driver version 0.10.4, - SHA256: 2d234ecf629fc10dc0c291a1390de3d27a05c6ecbd935628b6ff154f386d061e -- Management Engine: Custom image based on ME 14.0.47.1558, - SHA256: 7fa37e108176c9a2d0df60c93b10b3ad9c7725f1f82b87197a2991208c4cffec -- microcode: - + CPU signature: 0x0806EC, Date: 28.04.2021, Revision: 0xEC - + CPU signature: 0x0A0660, Date: 28.04.2021, Revision: 0xEA - + CPU signature: 0x0A0661, Date: 29.04.2021, Revision: 0xEC - -## v1.0.13 - 2022-03-22 - -### Added - -- UEFI boot support -- i225 network controller network boot support -- Customized boot menu keys -- Customized setup menu keys -- Configurable boot order -- Configurable boot options - -### Changed - -- ME version to 14.0.47.1558 - -### Known issues - -- [i225 network controller initialization takes too much time](https://github.com/Dasharo/dasharo-issues/issues/65) - -### Binaries - -[protectli_vault_cml_v1.0.13.rom][v1.0.13_rom]{.md-button} -[sha256][v1.0.13_hash]{.md-button} -[sha256.sig][v1.0.13_sig]{.md-button} - -To verify binary integrity with hash and signature please follow the -instructions in [Dasharo release signature verification](/guides/signature-verification) -using [this key](https://raw.githubusercontent.com/3mdeb/3mdeb-secpack/master/customer-keys/protectli/release-keys/protectli-dasharo-firewall-release-1.0-key.asc) - -### SBOM (Software Bill of Materials) - -- [coreboot based on 4.16 revision 546e1c86](https://github.com/Dasharo/coreboot/tree/546e1c86) -- [edk2 based on 7f90b9cd revision 7f90b9cd](https://github.com/Dasharo/edk2/tree/7f90b9cd) -- [iPXE for EFI revision 988d2](https://github.com/ipxe/ipxe/tree/988d2c13cdf0f0b4140685af35ced70ac5b3283c) -- [Cometlake1 FSP 9.0.7B.20](https://github.com/intel/FSP/tree/10eae55b8eb0febfa2dfabf4017701b072866170/CometLakeFspBinPkg/CometLake1) -- Intel i225 EFI driver version 0.9.03, - SHA256: 63e77b237dc9a8aacdd7465675ee88afc01dad3204156a91a0976a4ad1ed5b00 -- Management Engine: Custom image based on ME 14.0.47.1558, - SHA256: 7fa37e108176c9a2d0df60c93b10b3ad9c7725f1f82b87197a2991208c4cffec -- microcode: - + CPU signature: 0x0806EC, Date: 28.04.2021, Revision: 0xEC - + CPU signature: 0x0A0660, Date: 28.04.2021, Revision: 0xEA - -[newsletter]: https://newsletter.3mdeb.com/subscription/n2EpSxtqL -[protectli_vp4630_vp4650_v1.0.19.rom_file]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/v1.0.19/protectli_vp4630_vp4650_v1.0.19.rom -[protectli_vp4630_vp4650_v1.0.19.rom_hash]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/v1.0.19/protectli_vp4630_vp4650_v1.0.19.rom.sha256 -[protectli_vp4630_vp4650_v1.0.19.rom_sig]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/v1.0.19/protectli_vp4630_vp4650_v1.0.19.rom.sha256.sig -[protectli_vp4670_v1.0.19.rom_file]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/v1.0.19/protectli_vp4670_v1.0.19.rom -[protectli_vp4670_v1.0.19.rom_hash]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/v1.0.19/protectli_vp4670_v1.0.19.rom.sha256 -[protectli_vp4670_v1.0.19.rom_sig]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/v1.0.19/protectli_vp4670_v1.0.19.rom.sha256.sig -[protectli_vp4630_vp4650_v1.0.18.rom_file]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/v1.0.18/protectli_vp4630_vp4650_v1.0.18.rom -[protectli_vp4630_vp4650_v1.0.18.rom_hash]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/v1.0.18/protectli_vp4630_vp4650_v1.0.18.rom.sha256 -[protectli_vp4630_vp4650_v1.0.18.rom_sig]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/v1.0.18/protectli_vp4630_vp4650_v1.0.18.rom.sha256.sig -[protectli_vp4670_v1.0.18.rom_file]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/v1.0.18/protectli_vp4670_v1.0.18.rom -[protectli_vp4670_v1.0.18.rom_hash]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/v1.0.18/protectli_vp4670_v1.0.18.rom.sha256 -[protectli_vp4670_v1.0.18.rom_sig]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/v1.0.18/protectli_vp4670_v1.0.18.rom.sha256.sig -[protectli_vault_cml_v1.0.17.rom_file]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/v1.0.17/protectli_vault_cml_v1.0.17.rom -[protectli_vault_cml_v1.0.17.rom_hash]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/v1.0.17/protectli_vault_cml_v1.0.17.rom.sha256 -[protectli_vault_cml_v1.0.17.rom_sig]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/v1.0.17/protectli_vault_cml_v1.0.17.rom.sha256.sig -[v1.0.16_rom]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/v1.0.16/protectli_vault_cml_v1.0.16.rom -[v1.0.16_hash]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/v1.0.16/protectli_vault_cml_v1.0.16.rom.sha256 -[v1.0.16_sig]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/v1.0.16/protectli_vault_cml_v1.0.16.rom.sha256.sig -[v1.0.13_rom]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/protectli_vault_cml_v1.0.13.rom -[v1.0.13_hash]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/protectli_vault_cml_v1.0.13.rom.sha256 -[v1.0.13_sig]: https://3mdeb.com/open-source-firmware/Dasharo/protectli_vault_cml/protectli_vault_cml_v1.0.13.rom.sha256.sig diff --git a/docs/variants/protectli_vp46xx/test-matrix.md b/docs/variants/protectli_vp46xx/test-matrix.md deleted file mode 100644 index af9ec665df..0000000000 --- a/docs/variants/protectli_vp46xx/test-matrix.md +++ /dev/null @@ -1,122 +0,0 @@ -# Test matrix - -## About - -The test matrix is used to determine the scope of tests which the DUT is -subjected from before the release of the new binary. The test scope is the same -for all platforms of the VP46XX family. - -## Module: Dasharo compatibility - -| No. | Supported test suite | Test suite ID | Supported test cases | -|:----:|:--------------------------------------|:-------------:|:-------------------------------------| -| 1. | [Memory HCL][HCL] | HCL | All | -| 2. | [UEFI compatible interface][EFI] | EFI | All | -| 3. | [Display ports][DSP] | DSP | DSP002.001, DSP002.002, DSP002.003, DSP003.001, DSP003.002, DSP003.003 | -| 4. | [Network boot utilities][NBT] | NBT | All | -| 5. | [NVMe support][NVM] | NVM | All | -| 6. | [Custom logo][CLG] | CLG | All | -| 7. | [Custom boot menu key][CBK] | CBK | All | -| 8. | [USB HID and MSC Support][USB] | USB | USB001.XXX and USB002.XXX | -| 9. | [FreeBSD support][BSD] | BSD | All | -| 10. | [Debian Stable and Ubuntu LTS support][LBT] | LBT | LBT003.001, LBT003.002, LBT004.001, LBT004.002| -| 11. | [USB-C support][UTC] | UTC | UTC004.001, UTC004.002 | -| 12. | [M.2 WiFi/Bluetooth][WLE] | WLE | ALL | -| 13. | [eMMC support][MMC] | MMC | MMC001.001 | -| 14. | [SMBIOS][DMI] | DMI | DMI002.001, DMI003.001, DMI004.001, DMI005.001, DMI006.001 | -| 15. | [Custom network boot entries][CNB] | CNB | CNB001.002 | -| 16. | [M.2 automatic SATA/NVMe switching support][MSS] | MSS | MSS001.001 | -| 17. | [Windows booting][WBT] | WBT | WBT001.001 | -| 18. | [Audio subsystem][AUD] | AUD | AUD001.001, AUD001.002, AUD002.001, AUD002.002, AUD003.001, AUD003.002, AUD004.001, AUD004.002, AUD005.001, AUD005.002, AUD006.001, AUD006.002 | -| 19. | [UEFI Shell][USH] | USH | All | -| 20. | [USB detection][UDT] | UDT | All | -| 21. | [USB booting][UBT] | UBT | All | -| 22. | [pfSense support][PFS] | PFS | All | -| 23. | [OPNsense support][OPN] | OPN | All | -| 24. | [Proxmox support][PVE] | PVE | All | -| 25. | [Ubuntu Server support][USS] | USS | All | - -[HCL]: ../../unified-test-documentation/dasharo-compatibility/301-memory-hcl.md -[EFI]: ../../unified-test-documentation/dasharo-compatibility/30M-uefi-compatible-interface.md -[DSP]: ../../unified-test-documentation/dasharo-compatibility/31E-display-ports-and-lcd.md -[NBT]: ../../unified-test-documentation/dasharo-compatibility/315b-netboot-utilities.md -[NVM]: ../../unified-test-documentation/dasharo-compatibility/312-nvme-support.md -[CLG]: ../../unified-test-documentation/dasharo-compatibility/304-custom-logo.md -[CBK]: ../../unified-test-documentation/dasharo-compatibility/303-custom-boot-menu-key.md -[USB]: ../../unified-test-documentation/dasharo-compatibility/306-usb-hid-and-msc-support.md -[BSD]: ../../unified-test-documentation/dasharo-compatibility/307-freebsd-support.md -[LBT]: ../../unified-test-documentation/dasharo-compatibility/308-debian-stable-and-ubuntu-lts-support.md -[UTC]: ../../unified-test-documentation/dasharo-compatibility/31H-usb-type-c.md -[WLE]: ../../unified-test-documentation/dasharo-compatibility/318-m2-wifi-bluetooth.md -[MWL]: ../../unified-test-documentation/dasharo-compatibility/31K-minipcie-verification.md -[MMC]: ../../unified-test-documentation/dasharo-compatibility/31M-emmc-support.md -[DMI]: ../../unified-test-documentation/dasharo-compatibility/31L-smbios.md -[CNB]: ../../unified-test-documentation/dasharo-compatibility/30A-custom-network-boot-entries.md -[MSS]: ../../unified-test-documentation/dasharo-compatibility/31I-nvme-switching.md -[WBT]: ../../unified-test-documentation/dasharo-compatibility/31A-windows-booting.md -[AUD]: ../../unified-test-documentation/dasharo-compatibility/31F-audio-subsystem.md -[USH]: ../../unified-test-documentation/dasharo-compatibility/30P-uefi-shell.md -[UDT]: ../../unified-test-documentation/dasharo-compatibility/31O-usb-detect.md -[UBT]: ../../unified-test-documentation/dasharo-compatibility/31N-usb-boot.md -[PFS]: ../../unified-test-documentation/dasharo-compatibility/341-pfSense-support.md -[OPN]: ../../unified-test-documentation/dasharo-compatibility/342-OPNsense-support.md -[PVE]: ../../unified-test-documentation/dasharo-compatibility/348-proxmox-support.md -[USS]: ../../unified-test-documentation/dasharo-compatibility/349-ubuntu-server-support.md - -## Module: Dasharo security - -| No. | Supported test suite | Test suite ID | Supported test cases | -|:-----|:--------------------------------------|:-------------:|:-------------------------------------| -| 1. | [TPM Support][TPM] | TPM | Without TPM001.001,TPM002.001 and TPM003.001 | -| 2. | [Verified Boot support][VBO] | VBO | Without VBO006.001 and VBO007.001 | -| 3. | [Measured Boot support][MBO] | MBO | All | -| 4. | [Secure Boot support][SBO] | SBO | All | -| 5. | [ME disable/neuter support][MNE] | MNE | MNE004.001 | -| 6. | [BIOS lock support][BLS] | BLS | All | -| 7. | [USB stack enable/disable][USS] | USS | All | -| 8. | [SMM BIOS write protection][SMM] | SMM | All | - -> Note: in Dasharo compatible with Protectli VP46xx ME is soft-disabled by -> default - no additional option for ME disabling is available in the Setup -> Menu. - -[TPM]: ../../unified-test-documentation/dasharo-security/200-tpm-support.md -[VBO]: ../../unified-test-documentation/dasharo-security/201-verified-boot.md -[MBO]: ../../unified-test-documentation/dasharo-security/203-measured-boot.md -[SBO]: ../../unified-test-documentation/dasharo-security/206-secure-boot.md -[MNE]: ../../unified-test-documentation/dasharo-security/20F-me-neuter.md -[BLS]: ../../unified-test-documentation/dasharo-security/20J-bios-lock-support.md -[USS]: ../../unified-test-documentation/dasharo-security/20S-usb-stack.md -[SMM]: ../../unified-test-documentation/dasharo-security/20O-SMM-bios-write-protection.md - -## Module: Dasharo performance - -| No. | Supported test suite | Test suite ID | Supported test cases | -|:-----|:--------------------------------------|:-------------:|:-------------------------------------| -| 1. | [coreboot bring up time measurement][CBMEM] | CBMEM | All | -| 2. | [CPU temperature measure][CPT] | CPT | All | -| 3. | [CPU frequency measure][CPF] | CPF | Without CPU003.XXX and CPU005.XXX | -| 4. | [Platform stability][STB] | STB | All | -| 5. | [Ubuntu booting performance test][BUB] | BUB | All | -| 6. | [Debian booting performance test][BDE] | BDE | All | -| 7. | [FreeBSD booting performance test][BFB] | BFB | All | -| 8. | [Proxmox booting performance test][BPM] | BPM | All | -| 9. | [Ubuntu Server booting performance test][BUS] | BUS | All | -| 10. | [OPNsense (serial output) booting performance test][BOS] | BOS | All | -| 11. | [OPNsense (VGA output) booting performance test][BOV] | BOV | All | -| 12. | [pfSense (serial output) booting performance test][BPS] | BPS | All | -| 13. | [pfSense (VGA output) booting performance test][BPV] | BPV | All | - -[CBMEM]: ../../unified-test-documentation/dasharo-performance/400-coreboot-boot-measure.md -[CPT]: ../../unified-test-documentation/dasharo-performance/401-cpu-temperature.md -[CPF]: ../../unified-test-documentation/dasharo-performance/402-cpu-frequency.md -[STB]: ../../unified-test-documentation/dasharo-performance/404-platform-stability.md -[BUB]: ../../unified-test-documentation/dasharo-performance/407-ubuntu-booting-performance-test.md -[BDE]: ../../unified-test-documentation/dasharo-performance/408-debian-booting-performance-test.md -[BFB]: ../../unified-test-documentation/dasharo-performance/409-freebsd-booting-performance-test.md -[BPM]: ../../unified-test-documentation/dasharo-performance/410-proxmox-booting-performance-test.md -[BUS]: ../../unified-test-documentation/dasharo-performance/411-ubuntu-server-booting-performance-test.md -[BOS]: ../../unified-test-documentation/dasharo-performance/412-opnsense-serial-booting-performance-test.md -[BOV]: ../../unified-test-documentation/dasharo-performance/413-opnsense-vga-booting-performance-test.md -[BPS]: ../../unified-test-documentation/dasharo-performance/414-pfsense-serial-booting-performance-test.md -[BPV]: ../../unified-test-documentation/dasharo-performance/415-pfsense-vga-booting-performance-test.md diff --git a/docs/variants/protectli_vp66xx/building-manual.md b/docs/variants/protectli_vp66xx/building-manual.md deleted file mode 100644 index 018645b5bf..0000000000 --- a/docs/variants/protectli_vp66xx/building-manual.md +++ /dev/null @@ -1,47 +0,0 @@ -# Building manual - -## Intro - -This document describes the procedure for compiling coreboot for Protectli -VP6630/VP6650/VP6670. - -## Requirements - -- Docker - + follow [Install Docker Engine on Ubuntu](https://docs.docker.com/engine/install/ubuntu/) - + follow [Post-installation steps for Linux](https://docs.docker.com/engine/install/linux-postinstall/) -- Git - -## Build Dasharo BIOS firmware - -> This build procedure produces full firmware binary including blobs such as -> FSP, and ME. Currently, access to them is restricted to the OEM (Protectli) via -> a private repository. - -1. Clone the coreboot repository: - - ```bash - git clone https://github.com/Dasharo/coreboot - ``` - -2. Checkout the desired version, e.g. `v0.9.0`: - - ```bash - cd coreboot - git checkout protectli_vault_adl_v0.9.0 - ``` - -3. Checkout submodules: - - ```bash - git submodule update --init --checkout - ``` - -4. Build the firmware: - - ```bash - ./build.sh vp66xx - ``` - -The resulting coreboot image will be placed in the coreboot directory as -`protectli_vp66xx.rom`. diff --git a/docs/variants/protectli_vp66xx/firmware-update.md b/docs/variants/protectli_vp66xx/firmware-update.md deleted file mode 100644 index 985546b83d..0000000000 --- a/docs/variants/protectli_vp66xx/firmware-update.md +++ /dev/null @@ -1,33 +0,0 @@ -# Firmware update - -The following documentation describes the process of Dasharo open-source -firmware update. If your device is currently flashed with the proprietary -firmware please refer to the [Initial deployment](initial-deployment.md) -documentation. - -The update process may be different, depending on the currently installed -Dasharo firmware version. - -For simplicity of the update process, we recommend using -[Dasharo Tools Suite](../../dasharo-tools-suite/overview.md). - -Before starting the update procedure be sure to disable Secure Boot: - -1. Power on the device. -2. While the device is booting, hold the `DELETE` key to enter the UEFI Setup - Menu. -3. Enter the `Device Manager` menu. -4. Enter the [Secure Boot Configuration](../../dasharo-menu-docs/device-manager.md#secure-boot-configuration) - submenu. -5. Verify that the `Current Secure Boot State` field says Disabled - if not, - unselect the `Attempt Secure Boot` option below then press `F10` to save - the changes. -6. Reboot the device to properly apply the changes. - -The settings of all the above options can be restored after a firmware update. - -## Updating Dasharo - -```bash -flashrom -p internal -w protectli_vp66xx_v.rom --fmap -i RW_SECTION_A -``` diff --git a/docs/variants/protectli_vp66xx/hardware-matrix.md b/docs/variants/protectli_vp66xx/hardware-matrix.md deleted file mode 100644 index 5b741dbc22..0000000000 --- a/docs/variants/protectli_vp66xx/hardware-matrix.md +++ /dev/null @@ -1,66 +0,0 @@ -# Hardware configuration matrix - -## Introduction - -This document describes the hardware configuration used for validation of the -coreboot port on the Protectli VP6630/VP6650/VP6670. - -## Protectli VP6630 - -| Component | Description | -|--------------------------------|---------------------------------------------| -| **CPU** | Intel(R) Core(TM) i3-1215U @ 1.20GHz | -| **RAM** | TBD | -| **Flash memory** | Macronix KH25L12835F | -| **USB Keyboard** | DELL KB216 | -| **USB Mouse** | DELL MS116p | -| **USB pendrives** | 1. SanDisk Ultra Flair USB 3.0 16 GB | -| **Display** | Display 1: HDMI 1920x1080p | -| | Display 2: DP 1920x1080p | -| **Ethernet controller** | 2x Intel i225/i226 (on-board) | -| **Internal devices** | TBD | -| **4G Modem** | TBD | -| **Network** | Local network wired connection | -| **Remote Testing Environment** | RTE v1.1.0 | -| **Power Control** | Sonoff | -| **Power supply** | TBD | - -## Protectli VP6650 - -| Component | Description | -|--------------------------------|---------------------------------------------| -| **CPU** | Intel(R) Core(TM) i5-1235U @ 1.30GHz | -| **RAM** | TBD | -| **Flash memory** | Macronix KH25L12835F | -| **USB Keyboard** | DELL KB216 | -| **USB Mouse** | DELL MS116p | -| **USB pendrives** | 1. SanDisk Ultra Flair USB 3.0 16 GB | -| **Display** | Display 1: HDMI 1920x1080p | -| | Display 2: DP 1920x1080p | -| **Ethernet controller** | 4x Intel i225/i226 (on-board) | -| **Internal devices** | TBD | -| **4G Modem** | TBD | -| **Network** | Local network wired connection | -| **Remote Testing Environment** | RTE v1.1.0 | -| **Power Control** | Sonoff | -| **Power supply** | TBD | - -## Protectli VP6670 - -| Component | Description | -|--------------------------------|---------------------------------------------| -| **CPU** | Intel(R) Core(TM) i7-1255U @ 1.70GHz | -| **RAM** | TBD | -| **Flash memory** | Macronix KH25L12835F | -| **USB Keyboard** | DELL KB216 | -| **USB Mouse** | DELL MS116p | -| **USB pendrives** | 1. SanDisk Ultra Flair USB 3.0 16 GB | -| **Display** | Display 1: HDMI 1920x1080p | -| | Display 2: DP 1920x1080p | -| **Ethernet controller** | 4x Intel i225/i226 (on-board) | -| **Internal devices** | TBD | -| **4G Modem** | TBD | -| **Network** | Local network wired connection | -| **Remote Testing Environment** | RTE v1.1.0 | -| **Power Control** | Sonoff | -| **Power supply** | TBD | diff --git a/docs/variants/protectli_vp66xx/initial-deployment.md b/docs/variants/protectli_vp66xx/initial-deployment.md deleted file mode 100644 index 8ba9a5a997..0000000000 --- a/docs/variants/protectli_vp66xx/initial-deployment.md +++ /dev/null @@ -1,45 +0,0 @@ -# Initial deployment - -Initial flashing of Dasharo firmware can be done from Linux using flashrom with -the internal programmer. This document describes the process of building, -installing and running flashrom on Ubuntu 22.04. - -## Deploy using Dasharo Tools Suite - -For simplicity we recommend using -[Dasharo Tools Suite](../../dasharo-tools-suite/overview.md) to -omit all compilation steps and deploy the Dasharo firmware seamlessly. - -1. Boot Dasharo Tools Suite. -2. Perform Dasharo installation. - -This will flash the BIOS region only. After the successful operation, DTS will -reboot the platform. - -This concludes Dasharo deployment process using DTS. - -## Build flashrom - -Please follow generic guide for [Dasharo flashrom fork](../../osf-trivia-list/deployment.md#how-to-install-dasharo-flashrom-fork). - -## Reading flash contents - -Always prepare a backup of the current firmware image. To read from the flash -and save it to a file (`dump.rom`), execute the following command: - -```bash -flashrom -p internal -r dump.rom -``` - -## Flashing Dasharo - -To flash Dasharo on the platform, execute the following command - replace -`[path]` with the path to the Dasharo image you want to flash, e.g. -`protectli_vp66xx_v0.9.0.rom`. - -```bash -flashrom -p internal -w protectli_vp66xx_v0.9.0.rom --ifd -i bios -``` - -This will flash the BIOS region only. After the operation is successful, -reboot the platform. diff --git a/docs/variants/protectli_vp66xx/overview.md b/docs/variants/protectli_vp66xx/overview.md deleted file mode 100644 index 5da3b3c9b6..0000000000 --- a/docs/variants/protectli_vp66xx/overview.md +++ /dev/null @@ -1,32 +0,0 @@ -# Overview - -The Vault is a small form network appliance built for use as a firewall / -router, virtualization platform, a daily-driven personal computer, and more. -The VP6630/VP6650/VP6670 feature an Intel Alder Lake-P CPU, 2x DDR5 SODIMM -memory, Intel i225-V/i226-V 2.5G Ethernet ports, 2x SFP Intel X710, 4x USB-A -ports (1x 3.1, 3x 2.0), one internal USB-A 3.1, 1x USB-C with PD, PCIe NVMe -storage, M.2 WIFI and WWAN slots, 2x serial console over USB-C and RJ45, SPI -TPM, 2 CPU fans. - -* VP6630 - Intel® Core™ i3 -1215U -* VP6650 - Intel® Core™ i5 -1235U -* VP6670 - Intel® Core™ i7 -1255U - -## Documentation sections - -* [Releases](releases.md) - groups information about all releases. -* [Building manual](building-manual.md) - describes how to build Dasharo for - Protectli VP6630/VP6650/VP6670. -* [Initial deployment](initial-deployment.md) - describes initial Dasharo - deployment methods (i. e. flashing new firmware) for Protectli - VP6630/VP6650/VP6670. -* [Firmware update](firmware-update.md) - explains supported Dasharo - open-source firmware update methods. -* [Recovery](recovery.md) - gathers information on how to recover the platform - from potential failure. -* [Hardware configuration matrix](hardware-matrix.md) - describes the - platform's hardware configuration used during the Dasharo firmware - validation procedure. -* [Test matrix](test-matrix.md) - describes validation scope used during - Dasharo firmware validation procedure. -* [Post-installation setup](post-install.md) diff --git a/docs/variants/protectli_vp66xx/post-install.md b/docs/variants/protectli_vp66xx/post-install.md deleted file mode 100644 index f45f96e479..0000000000 --- a/docs/variants/protectli_vp66xx/post-install.md +++ /dev/null @@ -1,17 +0,0 @@ -# Post-installation setup - -This document contains extra steps to perform after installing Dasharo in order -to enable full functionality. - -## Windows - -This section covers Windows post-install steps tested on Windows 11. - -### Qualcomm Atheros cards may be missing driver - -If you experience Windows to fail to recognize Qualcomm Atheros WiFi cards, -you may need to install the necessary driver manually. - -Download the Windows driver from [ath-drivers.eu](https://www.ath-drivers.eu/download-driver-nr-382-for-atheros-QCA6174A-and-Windows10.html) -Using `Device Manager`, select `Update Driver` for `Network Device` located in -`Other devices` and choose to install the downloaded driver. diff --git a/docs/variants/protectli_vp66xx/recovery.md b/docs/variants/protectli_vp66xx/recovery.md deleted file mode 100644 index 17b84d85ca..0000000000 --- a/docs/variants/protectli_vp66xx/recovery.md +++ /dev/null @@ -1,76 +0,0 @@ -# Recovery - -## Intro - -The following documentation describes the process of recovering hardware from -the brick state with [RTE](../../transparent-validation/rte/introduction.md) and -Dasharo open-source firmware. - -## Prerequisites - -* [Prepared RTE](../../transparent-validation/rte/v1.1.0/quick-start-guide.md) -* 6x female-female wire cables - -## Connections - -To prepare the stand for flashing follow the steps described below: - -1. Open the platform cover. -2. Connect the J1 and J2 flash headers to the [SPI - header](../../transparent-validation/rte/v1.1.0/specification.md) on RTE. - - | SPI header | VP66xx J2 | - |:----------:|:------------:| - | Vcc | pin 1 (Vcc) | - | SCLK | pin 3 (CLK) | - | MOSI | pin 4 (MOSI) | - - | SPI header | VP66xx J1 | - |:----------:|:------------:| - | GND | pin 4 (GND) | - | CS | pin 1 (CS) | - | MISO | pin 2 (MISO) | - -## Firmware flashing - -To flash firmware follow the steps described below: - -1. Login to RTE via `ssh` or `minicom`. -1. Turn on the platform by connecting the power supply. -1. Wait at least 5 seconds. -1. Turn off the platform by using the power button. -1. Wait at least 3 seconds. -1. Set the proper state of the SPI by using the following commands on RTE: - - ```bash - # set SPI Vcc to 3.3V - echo 1 > /sys/class/gpio/gpio405/value - # SPI Vcc on - echo 1 > /sys/class/gpio/gpio406/value - # SPI lines ON - echo 1 > /sys/class/gpio/gpio404/value - ``` - -1. Wait at least 2 seconds. -1. Disconnect the power supply from the platform. -1. Wait at least 2 seconds. -1. Flash the platform by using the following command: - - ```bash - flashrom -p linux_spi:dev=/dev/spidev1.0,spispeed=16000 -w [path_to_binary] - ``` - - > Flashing with flashrom takes about 1 minute. - -1. Change back the state of the SPI by using the following commands: - - ```bash - echo 0 > /sys/class/gpio/gpio404/value - echo 0 > /sys/class/gpio/gpio406/value - ``` - -1. Reset the CMOS battery (short JCMOS1 header for a couple of seconds). -1. Turn on the platform by connecting the power supply. - -The first boot of the platform after proceeding with the above procedure can -take much longer than standard. diff --git a/docs/variants/protectli_vp66xx/releases.md b/docs/variants/protectli_vp66xx/releases.md deleted file mode 100644 index 16e36b0119..0000000000 --- a/docs/variants/protectli_vp66xx/releases.md +++ /dev/null @@ -1,20 +0,0 @@ -# Release Notes - -Following Release Notes describe status of Open Source Firmware development -for Protectli VP6630/VP6650/VP6670 - -For details about our release process please read -[Dasharo Standard Release Process](../../dev-proc/standard-release-process.md). - -
-[Subscribe to Protectli VP6630/VP6650/VP6670 Dasharo Release Newsletter] -[newsletter]{.md-button .md-button--primary .center} -
- -Test results for this platform can be found -[here](https://docs.google.com/spreadsheets/d/1wI0qBSLdaluayYsm_lIa9iJ9LnPnCOZ9eNOyrKSc-j4/edit#gid=1316498194). - -[newsletter]: https://newsletter.3mdeb.com/subscription/n2EpSxtqL - - -[![empty-pixel](../../images/empty_pixel.png)](overview.md) diff --git a/docs/variants/protectli_vp66xx/test-matrix.md b/docs/variants/protectli_vp66xx/test-matrix.md deleted file mode 100644 index 10837deefe..0000000000 --- a/docs/variants/protectli_vp66xx/test-matrix.md +++ /dev/null @@ -1,118 +0,0 @@ -# Test matrix - -## About - -The test matrix is used to determine the scope of tests which the DUT is -subjected from before the release of the new binary. The test scope is the same -for all platforms of the VP66XX family. - -## Module: Dasharo compatibility - -| No. | Supported test suite | Test suite ID | Supported test cases | -|:----:|:--------------------------------------|:-------------:|:-------------------------------------| -| 1. | [Memory HCL][HCL] | HCL | All | -| 2. | [UEFI compatible interface][EFI] | EFI | All | -| 3. | [Display ports][DSP] | DSP | DSP002.001, DSP002.002, DSP002.003, DSP003.001, DSP003.002, DSP003.003 | -| 4. | [Network boot utilities][NBT] | NBT | All | -| 5. | [NVMe support][NVM] | NVM | All | -| 6. | [Custom logo][CLG] | CLG | All | -| 7. | [Custom boot menu key][CBK] | CBK | All | -| 8. | [USB HID and MSC Support][USB] | USB | USB001.XXX and USB002.XXX | -| 9. | [FreeBSD support][BSD] | BSD | All | -| 10. | [Debian Stable and Ubuntu LTS support][LBT] | LBT | LBT003.001, LBT003.002, LBT004.001, LBT004.002| -| 11. | [USB-C support][UTC] | UTC | UTC004.001, UTC004.002 | -| 12. | [M.2 WiFi/Bluetooth][WLE] | WLE | ALL | -| 14. | [SMBIOS][DMI] | DMI | DMI002.001, DMI003.001, DMI004.001, DMI005.001, DMI006.001 | -| 15. | [Custom network boot entries][CNB] | CNB | CNB001.002 | -| 17. | [Windows booting][WBT] | WBT | WBT001.001 | -| 18. | [Audio subsystem][AUD] | AUD | AUD001.001, AUD001.002, AUD002.001, AUD002.002, AUD003.001, AUD003.002, AUD004.001, AUD004.002, AUD005.001, AUD005.002, AUD006.001, AUD006.002 | -| 19. | [UEFI Shell][USH] | USH | All | -| 20. | [USB detection][UDT] | UDT | All | -| 21. | [USB booting][UBT] | UBT | All | -| 22. | [pfSense support][PFS] | PFS | All | -| 23. | [OPNsense support][OPN] | OPN | All | -| 24. | [Proxmox support][PVE] | PVE | All | -| 25. | [Ubuntu Server support][USS] | USS | All | - -[HCL]: ../../unified-test-documentation/dasharo-compatibility/301-memory-hcl.md -[EFI]: ../../unified-test-documentation/dasharo-compatibility/30M-uefi-compatible-interface.md -[DSP]: ../../unified-test-documentation/dasharo-compatibility/31E-display-ports-and-lcd.md -[NBT]: ../../unified-test-documentation/dasharo-compatibility/315b-netboot-utilities.md -[NVM]: ../../unified-test-documentation/dasharo-compatibility/312-nvme-support.md -[CLG]: ../../unified-test-documentation/dasharo-compatibility/304-custom-logo.md -[CBK]: ../../unified-test-documentation/dasharo-compatibility/303-custom-boot-menu-key.md -[USB]: ../../unified-test-documentation/dasharo-compatibility/306-usb-hid-and-msc-support.md -[BSD]: ../../unified-test-documentation/dasharo-compatibility/307-freebsd-support.md -[LBT]: ../../unified-test-documentation/dasharo-compatibility/308-debian-stable-and-ubuntu-lts-support.md -[UTC]: ../../unified-test-documentation/dasharo-compatibility/31H-usb-type-c.md -[WLE]: ../../unified-test-documentation/dasharo-compatibility/318-m2-wifi-bluetooth.md -[MWL]: ../../unified-test-documentation/dasharo-compatibility/31K-minipcie-verification.md -[DMI]: ../../unified-test-documentation/dasharo-compatibility/31L-smbios.md -[CNB]: ../../unified-test-documentation/dasharo-compatibility/30A-custom-network-boot-entries.md -[WBT]: ../../unified-test-documentation/dasharo-compatibility/31A-windows-booting.md -[AUD]: ../../unified-test-documentation/dasharo-compatibility/31F-audio-subsystem.md -[USH]: ../../unified-test-documentation/dasharo-compatibility/30P-uefi-shell.md -[UDT]: ../../unified-test-documentation/dasharo-compatibility/31O-usb-detect.md -[UBT]: ../../unified-test-documentation/dasharo-compatibility/31N-usb-boot.md -[PFS]: ../../unified-test-documentation/dasharo-compatibility/341-pfSense-support.md -[OPN]: ../../unified-test-documentation/dasharo-compatibility/342-OPNsense-support.md -[PVE]: ../../unified-test-documentation/dasharo-compatibility/348-proxmox-support.md -[USS]: ../../unified-test-documentation/dasharo-compatibility/349-ubuntu-server-support.md - -## Module: Dasharo security - -| No. | Supported test suite | Test suite ID | Supported test cases | -|:-----|:--------------------------------------|:-------------:|:-------------------------------------| -| 1. | [TPM Support][TPM] | TPM | Without TPM001.001,TPM002.001 and TPM003.001 | -| 2. | [Verified Boot support][VBO] | VBO | Without VBO006.001 and VBO007.001 | -| 3. | [Measured Boot support][MBO] | MBO | All | -| 4. | [Secure Boot support][SBO] | SBO | All | -| 5. | [ME disable/neuter support][MNE] | MNE | MNE004.001 | -| 6. | [BIOS lock support][BLS] | BLS | All | -| 7. | [USB stack enable/disable][USS] | USS | All | -| 8. | [SMM BIOS write protection][SMM] | SMM | All | - -> Note: in Dasharo compatible with Protectli VP66xx ME is soft-disabled by -> default - no additional option for ME disabling is available in the Setup -> Menu. - -[TPM]: ../../unified-test-documentation/dasharo-security/200-tpm-support.md -[VBO]: ../../unified-test-documentation/dasharo-security/201-verified-boot.md -[MBO]: ../../unified-test-documentation/dasharo-security/203-measured-boot.md -[SBO]: ../../unified-test-documentation/dasharo-security/206-secure-boot.md -[MNE]: ../../unified-test-documentation/dasharo-security/20F-me-neuter.md -[BLS]: ../../unified-test-documentation/dasharo-security/20J-bios-lock-support.md -[USS]: ../../unified-test-documentation/dasharo-security/20S-usb-stack.md -[SMM]: ../../unified-test-documentation/dasharo-security/20O-SMM-bios-write-protection.md - -## Module: Dasharo performance - -| No. | Supported test suite | Test suite ID | Supported test cases | -|:-----|:--------------------------------------|:-------------:|:-------------------------------------| -| 1. | [coreboot bring up time measurement][CBMEM] | CBMEM | All | -| 2. | [CPU temperature measure][CPT] | CPT | All | -| 3. | [CPU frequency measure][CPF] | CPF | Without CPU003.XXX and CPU005.XXX | -| 4. | [Platform stability][STB] | STB | All | -| 5. | [Ubuntu booting performance test][BUB] | BUB | All | -| 6. | [Debian booting performance test][BDE] | BDE | All | -| 7. | [FreeBSD booting performance test][BFB] | BFB | All | -| 8. | [Proxmox booting performance test][BPM] | BPM | All | -| 9. | [Ubuntu Server booting performance test][BUS] | BUS | All | -| 10. | [OPNsense (serial output) booting performance test][BOS] | BOS | All | -| 11. | [OPNsense (VGA output) booting performance test][BOV] | BOV | All | -| 12. | [pfSense (serial output) booting performance test][BPS] | BPS | All | -| 13. | [pfSense (VGA output) booting performance test][BPV] | BPV | All | - -[CBMEM]: ../../unified-test-documentation/dasharo-performance/400-coreboot-boot-measure.md -[CPT]: ../../unified-test-documentation/dasharo-performance/401-cpu-temperature.md -[CPF]: ../../unified-test-documentation/dasharo-performance/402-cpu-frequency.md -[STB]: ../../unified-test-documentation/dasharo-performance/404-platform-stability.md -[BUB]: ../../unified-test-documentation/dasharo-performance/407-ubuntu-booting-performance-test.md -[BDE]: ../../unified-test-documentation/dasharo-performance/408-debian-booting-performance-test.md -[BFB]: ../../unified-test-documentation/dasharo-performance/409-freebsd-booting-performance-test.md -[BPM]: ../../unified-test-documentation/dasharo-performance/410-proxmox-booting-performance-test.md -[BUS]: ../../unified-test-documentation/dasharo-performance/411-ubuntu-server-booting-performance-test.md -[BOS]: ../../unified-test-documentation/dasharo-performance/412-opnsense-serial-booting-performance-test.md -[BOV]: ../../unified-test-documentation/dasharo-performance/413-opnsense-vga-booting-performance-test.md -[BPS]: ../../unified-test-documentation/dasharo-performance/414-pfsense-serial-booting-performance-test.md -[BPV]: ../../unified-test-documentation/dasharo-performance/415-pfsense-vga-booting-performance-test.md diff --git a/mkdocs.yml b/mkdocs.yml index 3365d885f7..07f54c28f6 100644 --- a/mkdocs.yml +++ b/mkdocs.yml @@ -93,6 +93,64 @@ plugins: 'unified/novacustom/fan-profiles.md': 'unified/novacustom/features.md' 'unified/novacustom/fn-lock-hotkey.md': 'unified/novacustom/features.md' 'unified/novacustom/rgb-keyboard.md': 'unified/novacustom/features.md' + 'variants/protectli_fw6/overview.md': 'unified/protectli/overview.md#fw6' + + 'variants/protectli_vp1x1x/overview.md': 'unified/protectli/overview.md#v1x1x' + 'variants/protectli_vp46xx/overview.md': 'unified/protectli/overview.md#vp46xx' + 'variants/protectli_vp66xx/overview.md': 'unified/protectli/overview.md#vp66xx' + 'variants/protectli_vp2410/overview.md': 'unified/protectli/overview.md#vp2410' + 'variants/protectli_vp2420/overview.md': 'unified/protectli/overview.md#vp2420' + + 'variants/protectli_fw6/releases.md': 'unified/protectli/releases.md#fw6' + 'variants/protectli_vp1x1x/releases.md': 'unified/protectli/releases.md#v1x1x' + 'variants/protectli_vp46xx/releases.md': 'unified/protectli/releases.md#vp46xx' + 'variants/protectli_vp66xx/releases.md': 'unified/protectli/releases.md#vp66xx' + 'variants/protectli_vp2410/releases.md': 'unified/protectli/releases.md#vp2410' + 'variants/protectli_vp2420/releases.md': 'unified/protectli/releases.md#vp2420' + + 'variants/protectli_fw6/building_manual.md': 'unified/protectli/building_manual.md#fw6' + 'variants/protectli_vp1x1x/building_manual.md': 'unified/protectli/building_manual.md#v1x1x' + 'variants/protectli_vp46xx/building_manual.md': 'unified/protectli/building_manual.md#vp46xx' + 'variants/protectli_vp66xx/building_manual.md': 'unified/protectli/building_manual.md#vp66xx' + 'variants/protectli_vp2410/building_manual.md': 'unified/protectli/building_manual.md#vp2410' + 'variants/protectli_vp2420/building_manual.md': 'unified/protectli/building_manual.md#vp2420' + + 'variants/protectli_fw6/firmware_update.md': 'unified/protectli/firmware_update.md#fw6' + 'variants/protectli_vp1x1x/firmware_update.md': 'unified/protectli/firmware_update.md#v1x1x' + 'variants/protectli_vp46xx/firmware_update.md': 'unified/protectli/firmware_update.md#vp46xx' + 'variants/protectli_vp66xx/firmware_update.md': 'unified/protectli/firmware_update.md#vp66xx' + 'variants/protectli_vp2410/firmware_update.md': 'unified/protectli/firmware_update.md#vp2410' + 'variants/protectli_vp2420/firmware_update.md': 'unified/protectli/firmware_update.md#vp2420' + + 'variants/protectli_fw6/recovery.md': 'unified/protectli/recovery.md#fw6' + 'variants/protectli_vp1x1x/recovery.md': 'unified/protectli/recovery.md#v1x1x' + 'variants/protectli_vp46xx/recovery.md': 'unified/protectli/recovery.md#vp46xx' + 'variants/protectli_vp66xx/recovery.md': 'unified/protectli/recovery.md#vp66xx' + 'variants/protectli_vp2410/recovery.md': 'unified/protectli/recovery.md#vp2410' + 'variants/protectli_vp2420/recovery.md': 'unified/protectli/recovery.md#vp2420' + + 'variants/protectli_fw6/hardware-matrix.md': 'unified/protectli/hardware-matrix.md#fw6' + 'variants/protectli_vp1x1x/hardware-matrix.md': 'unified/protectli/hardware-matrix.md#v1x1x' + 'variants/protectli_vp46xx/hardware-matrix.md': 'unified/protectli/hardware-matrix.md#vp46xx' + 'variants/protectli_vp66xx/hardware-matrix.md': 'unified/protectli/hardware-matrix.md#vp66xx' + 'variants/protectli_vp2410/hardware-matrix.md': 'unified/protectli/hardware-matrix.md#vp2410' + 'variants/protectli_vp2420/hardware-matrix.md': 'unified/protectli/hardware-matrix.md#vp2420' + + 'variants/protectli_fw6/test-matrix.md': 'unified/protectli/test-matrix.md#fw6' + 'variants/protectli_vp1x1x/test-matrix.md': 'unified/protectli/test-matrix.md#v1x1x' + 'variants/protectli_vp46xx/test-matrix.md': 'unified/protectli/test-matrix.md#vp46xx' + 'variants/protectli_vp66xx/test-matrix.md': 'unified/protectli/test-matrix.md#vp66xx' + 'variants/protectli_vp2410/test-matrix.md': 'unified/protectli/test-matrix.md#vp2410' + 'variants/protectli_vp2420/test-matrix.md': 'unified/protectli/test-matrix.md#vp2420' + + 'variants/protectli_fw6/openness-score.md': 'unified/protectli/openness-score.md#fw6' + 'variants/protectli_vp1x1x/openness-score.md': 'unified/protectli/openness-score.md#v1x1x' + 'variants/protectli_vp46xx/openness-score.md': 'unified/protectli/openness-score.md#vp46xx' + 'variants/protectli_vp66xx/openness-score.md': 'unified/protectli/openness-score.md#vp66xx' + 'variants/protectli_vp2410/openness-score.md': 'unified/protectli/openness-score.md#vp2410' + 'variants/protectli_vp2420/openness-score.md': 'unified/protectli/openness-score.md#vp2420' + + # This parameter excludes the listed pages from being added to the sitemap. # This solves the problem of orphaned pages (pages that are in the site map, # but there are no internal links to them). @@ -218,61 +276,17 @@ nav: - 'Post-installation setup': variants/tuxedo_ibs15/post_install.md - 'Hardware Configuration Matrix': variants/tuxedo_ibs15/hardware-matrix.md - 'Test matrix': variants/tuxedo_ibs15/test-matrix.md - - 'Protectli FW6': - - 'Overview': variants/protectli_fw6/overview.md - - 'Releases': variants/protectli_fw6/releases.md - - 'Building manual': variants/protectli_fw6/building-manual.md - - 'Installation manual': variants/protectli_fw6/installation-manual.md - - 'Hardware Configuration Matrix': variants/protectli_fw6/hardware-matrix.md - - 'Test matrix': variants/protectli_fw6/test-matrix.md - - 'Protectli VP2410': - - 'Overview': variants/protectli_vp2410/overview.md - - 'Releases': variants/protectli_vp2410/releases.md - - 'Building manual': variants/protectli_vp2410/building-manual.md - - 'Initial deployment': variants/protectli_vp2410/initial-deployment.md - - 'Firmware update': variants/protectli_vp2410/firmware-update.md - - 'Recovery': variants/protectli_vp2410/recovery.md - - 'Hardware Configuration Matrix': variants/protectli_vp2410/hardware-matrix.md - - 'Test matrix': variants/protectli_vp2410/test-matrix.md - - 'Openness score': variants/protectli_vp2410/openness-score.md - - 'Protectli VP2420': - - 'Overview': variants/protectli_vp2420/overview.md - - 'Releases': variants/protectli_vp2420/releases.md - - 'Building manual': variants/protectli_vp2420/building-manual.md - - 'Initial deployment': variants/protectli_vp2420/initial-deployment.md - - 'Firmware update': variants/protectli_vp2420/firmware-update.md - - 'Recovery': variants/protectli_vp2420/recovery.md - - 'Hardware Configuration Matrix': variants/protectli_vp2420/hardware-matrix.md - - 'Test matrix': variants/protectli_vp2420/test-matrix.md - - 'Openness score': variants/protectli_vp2420/openness-score.md - - 'Protectli VP46xx': - - 'Overview': variants/protectli_vp46xx/overview.md - - 'Releases': variants/protectli_vp46xx/releases.md - - 'Building manual': variants/protectli_vp46xx/building-manual.md - - 'Initial deployment': variants/protectli_vp46xx/initial-deployment.md - - 'Firmware update': variants/protectli_vp46xx/firmware-update.md - - 'Recovery': variants/protectli_vp46xx/recovery.md - - 'Hardware Configuration Matrix': variants/protectli_vp46xx/hardware-matrix.md - - 'Test matrix': variants/protectli_vp46xx/test-matrix.md - - 'Openness score': variants/protectli_vp46xx/openness_score.md - # - 'Protectli VP66xx': - # - 'Overview': variants/protectli_vp66xx/overview.md - # - 'Releases': variants/protectli_vp66xx/releases.md - # - 'Building manual': variants/protectli_vp66xx/building-manual.md - # - 'Initial deployment': variants/protectli_vp66xx/initial-deployment.md - # - 'Firmware update': variants/protectli_vp66xx/firmware-update.md - # - 'Recovery': variants/protectli_vp66xx/recovery.md - # - 'Hardware Configuration Matrix': variants/protectli_vp66xx/hardware-matrix.md - # - 'Test matrix': variants/protectli_vp66xx/test-matrix.md - # - 'Protectli V1210/V1410/V1610': - # - 'Overview': variants/protectli_v1x10/overview.md - # - 'Releases': variants/protectli_v1x10/releases.md - # - 'Building manual': variants/protectli_v1x10/building-manual.md - # - 'Initial deployment': variants/protectli_v1x10/initial-deployment.md - # - 'Firmware update': variants/protectli_v1x10/firmware-update.md - # - 'Recovery': variants/protectli_v1x10/recovery.md - # - 'Hardware Configuration Matrix': variants/protectli_v1x10/hardware-matrix.md - # - 'Test matrix': variants/protectli_v1x10/test-matrix.md + - 'Protectli': + - 'Overview': unified/protectli/overview.md + - 'Releases': unified/protectli/releases.md + - 'Building manual': unified/protectli/building-manual.md + - 'Initial deployment': unified/protectli/initial-deployment.md + - 'Post installation': unified/protectli/post-install.md + - 'Firmware update': unified/protectli/firmware-update.md + - 'Recovery': unified/protectli/recovery.md + - 'Hardware Configuration Matrix': unified/protectli/hardware-matrix.md + - 'Test matrix': unified/protectli/test-matrix.md + - 'Openness score': unified/protectli/openness-score.md - 'QEMU Q35 Emulator': - 'Overview': variants/qemu_q35/overview.md - 'Releases': variants/qemu_q35/releases.md