Fact-checked by Grok 2 weeks ago

coreboot

Coreboot is an open-source firmware platform designed to replace proprietary BIOS and UEFI implementations on modern computers and systems by performing minimal initialization before handing off to a secondary , such as a or full firmware like or EDK2. Originally known as LinuxBIOS, the project emphasizes speed, security, and simplicity, achieving boot times in seconds while reducing the compared to traditional bloat. Coreboot supports multiple architectures, including x86, ARM, and RISC-V, making it suitable for a wide range of hardware from servers and laptops to devices. Key payloads integrated with coreboot include for legacy PC compatibility, EDK2 for support, GRUB2 as a , and Depthcharge specifically for OS devices. Its design philosophy prioritizes minimal code—ideally without resident services post-boot—to keep the lightweight and focused solely on hardware setup, avoiding imposed standards for greater flexibility and reusability. The project is community-driven, with development managed through and Gerrit for code reviews, adhering to principles like the kernel's coding style and Kconfig for configuration. Coreboot releases occur on a quarterly cycle to provide stable versions for OEMs and users, with the latest being 25.09 in September 2025; contributions require a Developer's Certificate of Origin and are licensed primarily under GPLv2. It has been adopted by vendors like for their devices and Protectli for secure networking hardware, highlighting its role in promoting open-source alternatives to vendor-locked .

History

Origins and Early Development

The coreboot project originated as LinuxBIOS in 1999 at (LANL), where Ron Minnich and colleagues initiated development to overcome the limitations of proprietary in high-performance computing (HPC) clusters. These limitations included slow boot times, dependency on local input devices like keyboards for halting or configuration, and inflexibility for remote management in large-scale scientific environments, such as those requiring rapid node initialization for parallel processing tasks. Minnich, working in LANL's Advanced Computing Laboratory, aimed to create an open-source alternative that enabled faster booting and greater customizability, ultimately supporting deployments across hundreds of thousands of HPC nodes. Early development centered on x86 platforms, with an initial emphasis on processors such as the and series for efficient hardware initialization in cluster-based scientific computing. LinuxBIOS version 1, developed between 1998 and 2000, provided a minimal boot solution by leveraging a stripped-down to handle core hardware setup without emulating a full BIOS, allowing direct loading of the from for sub-minute boot times. This approach supported up to 64 motherboard types through motherboard-specific code, primarily written in , and facilitated cluster node discovery and software loading in resource-constrained settings. A major early challenge was the scarcity of vendor-provided documentation for chipsets and peripherals, compelling developers to rely heavily on to achieve compatibility across diverse x86 hardware. In 2008, the project was renamed coreboot to better reflect its expanded scope beyond direct Linux kernel integration—such as support for various payloads—and to sidestep potential trademark conflicts associated with the "Linux" name.

Key Milestones and Recent Releases

The coreboot project transitioned to version 2 in 2000, marking a shift from the initial LinuxBIOS v1 to a more modular that facilitated easier and expanded chipset compatibility beyond early x86 platforms. This redesign emphasized integration for loading operating systems or other , laying groundwork for broader hardware support. By 2005, coreboot version 3 introduced robust mechanisms, allowing flexible loading of bootloaders like or direct execution, which significantly enhanced its utility for diverse systems. In 2010, coreboot expanded its architecture support to include ARM processors by incorporating elements from Das U-Boot, enabling initialization on embedded and mobile devices. Initial efforts toward RISC-V compatibility began in 2018, with ports to boards like the HiFive Unleashed, driven by the growing open-source hardware ecosystem. Vendor adoption accelerated during this period; Google integrated coreboot into Chromebooks starting in 2012 for faster boot times and verified boot security, while Protectli adopted it for their Vault series routers to provide open-source firmware emphasizing security and transparency. The project shifted to a quarterly release cycle in 2022 to enable more rapid feature integration and community contributions, aligning with increasing hardware complexity. In 2025, coreboot 25.03 was released in April, adding support for 22 new mainboards and enhancements like improved USB debugging for easier . The July release of 25.06 introduced support for processors and boot splash improvements for better visual feedback during initialization. Coreboot 25.09 followed in October, supporting 19 additional mainboards alongside a 30% speedup in LZMA decompression and new boot mode detection for enhanced compatibility.

Design and Architecture

Core Components and Stages

Coreboot employs a execution model to efficiently initialize while maintaining a lightweight footprint. The divides the process into distinct stages, each responsible for specific initialization tasks before handing off control to the next. This modular approach allows for targeted development and optimization, ensuring that only essential is configured early on. The three primary stages are bootblock, romstage, and ramstage. The bootblock is the initial stage executed immediately after CPU reset; written primarily in assembly language, it establishes a minimal C environment by setting up Cache-As-RAM (CAR) to provide temporary memory for heap and stack operations, initializes essential timers, switches the processor to 32-bit protected mode on x86 architectures, and loads the subsequent stage such as romstage or verstage. Romstage follows, operating from ROM with CAR still active; it focuses on initializing the chipset, memory controller, and early peripherals to bring DRAM online, enabling the transition to more complex operations. Ramstage, now running from initialized RAM, handles comprehensive device initialization—including PCI enumeration, Trusted Platform Module (TPM) setup, graphics—constructs necessary tables like ACPI and SMBIOS, prepares the payload for execution, and finally locks down hardware and firmware interfaces before handover. Key components underpin these stages to facilitate hardware description and debugging. The device tree serves as a hierarchical data structure that describes the system's hardware topology, including device configurations, buses (such as , I2C, and ), and relationships; it is defined in a mainboard-specific file (devicetree.cb) and used primarily in ramstage to generate tables for operating system enumeration and . CBMEM, or coreboot memory console, provides a dynamic allocation mechanism in high RAM regions to store persistent runtime data, such as boot logs in a , timestamps, and configuration tables; initialized in romstage and heavily utilized in ramstage, it ensures critical information survives across boot phases and warm reboots for and payload handoff. Chipset-specific drivers, integrated into the relevant stages, manage low-level hardware interactions; for instance, southbridge drivers in romstage or ramstage handle I/O controller initialization, interrupt routing, and GPIO configuration tailored to particular chipsets. Coreboot's design philosophy emphasizes minimalism to minimize boot time, code size, and the exposed to potential exploits. Unlike traditional or implementations, it omits built-in option ROMs, full device drivers, or a complete stack, performing only the bare essentials for hardware readiness before delegating further tasks to an external . This approach reduces code exposure and enhances by limiting the firmware's runtime presence. Where open-source alternatives are unavailable for complex proprietary hardware initialization—particularly for memory training and silicon-specific features—coreboot integrates external binaries. On Intel platforms, the Firmware Support Package (FSP) is incorporated as a pre-built to handle CPU, memory, and chipset setup in stages like romstage, following guidelines that align FSP updates with coreboot's device tree without direct configuration overlap. Similarly, for platforms such as Family 17h (Zen architecture), the is adapted using an FSP 2.0-like model to perform initialization and core logic configuration, often bypassing traditional early stages in favor of direct ramstage entry due to its UEFI-oriented design.

Boot Process

Upon , the CPU begins execution at a predetermined vector, fetching the bootblock stage from the read-only area of the . The bootblock, written primarily in , performs minimal initialization to establish a basic execution environment, including setting up Cache-As-RAM () for temporary heap and stack usage, clearing the section, and handling architecture-specific tasks such as updates and timer initialization on x86 platforms. This stage decompresses and loads the subsequent stage—typically romstage, or verstage if verified boot is enabled—into memory, marking the transition from storage to active execution. In romstage, coreboot detects the memory type and configuration, then trains the DRAM if necessary to enable reliable operation, followed by early hardware initialization for basic subsystems. Once DRAM is available, the process relocates subsequent code from CAR to system RAM via the postcar stage, which tears down the temporary cache-based memory setup to free resources. This handoff prepares the environment for ramstage, the core initialization phase where a device tree is constructed to represent the hardware topology, peripherals such as PCI buses and USB controllers are enumerated and configured, and handoff structures—including the memory map, boot timestamps, and coreboot tables—are populated for the operating system or payload. Ramstage concludes by verifying the integrity of the payload stored in the Coreboot Filesystem (CBFS) within the , then jumping to the 's to transfer control. CBFS serves as the in-flash filesystem housing compressed stages and payloads, accessed sequentially during to ensure efficient loading without external . For error handling, coreboot employs mechanisms like verified 's recovery mode to fallback to alternative images if fails, alongside serial logging to capture diagnostic output from each stage for .

Hardware Initialization

Coreboot's hardware initialization begins in the bootblock stage, where is configured to enable code execution prior to availability. CAR, also known as non-eviction mode, repurposes the CPU's cache as temporary RAM by enabling the cache, activating no-eviction mode to prevent cache line displacement, and switching the cache mode from write-through to write-back. This setup allows the bootblock to load subsequent stages like romstage without relying on system memory, minimizing boot time and avoiding proprietary dependencies early in the process. In the romstage, DRAM initialization occurs through a series of low-level operations focused on memory controller configuration and validation. The process starts with reading (SPD) data from modules via the SMBus to detect installed memory, determine timings, and validate population configurations such as single- or dual-channel setups. Memory training follows, involving signal timing adjustments to compensate for skew between data lines and (ECC) initialization where supported, ensuring reliable data transfer at target frequencies. Native RAM initialization in coreboot handles these steps for various architectures, though it may require platform-specific tweaks for optimal stability. Chipset initialization encompasses GPIO configuration, clock generation, and to prepare the platform for operation. GPIOs are programmed in relevant boot stages to control hardware signals, such as enabling peripherals or configuring board-specific features, with mainboard vendors defining pin assignments to ensure . Clock generation sets up reference clocks for buses like PCIe, while includes P-state setup for CPUs to define performance levels and voltage scaling, often integrated with silicon to balance speed and efficiency. These operations occur progressively across stages to avoid conflicts during early . For peripherals, coreboot performs basic PCI enumeration and USB controller enablement without loading full driver stacks, focusing on minimal functionality to support payload loading. During the BS_DEV_ENUMERATE boot state, the chipset scans PCI buses to identify and enable devices, assigning basic resources like memory apertures. USB controllers are initialized at a hardware level to allow debug access or simple enumeration, such as for EHCI debug dongles, but defer advanced features to the operating system or payload. This lightweight approach keeps the firmware footprint small while ensuring essential hardware readiness. A key challenge in hardware initialization is managing vendor-specific binaries, particularly mitigations for Intel Management Engine (ME) firmware, which can introduce proprietary blobs and security concerns. Coreboot aims to minimize such dependencies through policies like binary blob reduction, but on Intel platforms, partial ME neutralization—such as disabling post-boot execution—requires careful integration of vendor code during chipset init to maintain boot integrity without full replacement. This often involves platform-specific workarounds to handle ME's role in power management and clock setup while prioritizing open-source alternatives where possible.

Supported Hardware

Processor Architectures

Coreboot provides extensive support for x86 processor architectures, encompassing both Intel and AMD families. For Intel processors, compatibility spans from early Pentium models to contemporary generations, including the 12th-generation Alder Lake (2021), 13th-generation Raptor Lake (2022), Core Ultra (Meteor Lake) and 14th-generation Raptor Lake Refresh (2024), and server-oriented Xeon Scalable processors up to the 5th-generation Emerald Rapids (2023), with initial support for the upcoming Panther Lake (2025) added in recent releases. AMD x86 support begins with legacy Geode processors and extends to modern Ryzen series based on the Zen microarchitecture, including Family 15h (Bulldozer/Piledriver, 2011–2012) and Family 17h (Zen and successors like Picasso in 2019), with integration relying on AMD's AGESA reference code for initialization. Ongoing efforts, such as the 2025 porting work for Zen 5-based Turin server processors by 3mdeb, indicate expanding coverage for AMD's latest architectures. ARM architectures have been supported in coreboot since the early , with initial assimilation of code from to enable booting on -based systems. This includes the Cortex-A series for embedded devices and servers, with notable implementations for platforms using processors in Chromebooks and Ampere Altra for 64 server environments. Recent advancements, such as stable 64-bit support and EL1/EL2/EL3 exception level handling introduced in 2024, enhance reliability for modern ARMv8 and ARMv9 systems. Support for , an open , emerged in coreboot around 2018 with initial ports targeting development boards like the Unleashed. These efforts leverage RISC-V's modularity and lack of proprietary extensions, enabling coreboot stages to run in Machine mode while allowing payloads flexibility in privilege management. Ongoing development includes emulator support via and , facilitating testing and expansion to additional RISC-V hardware. Porting coreboot to a new processor requires architecture-specific adaptations, particularly in the bootblock stage, which is typically written in low-level to handle vectors and initial probing. This ensures minimal firmware intervention before transitioning to subsequent stages and payloads, aligning with coreboot's philosophy of lightweight initialization across diverse instruction sets. Coreboot's architecture support remains limited for PowerPC, with no comprehensive hardware implementations beyond early experimental ports and QEMU-based emulation for testing purposes.

Mainboards and Devices

Coreboot supports a wide array of mainboards and devices across laptops, desktops, servers, and embedded systems, with ongoing expansions driven by community and vendor contributions. Notable laptop support includes various Lenovo ThinkPad models, such as the T440p, X220, T400, T500, R400, R500, W500, and T410, which benefit from verified boot integration for enhanced security. System76 incorporates coreboot into its open firmware for models like the Adder WS and Bonobo WS series, enabling faster boot times and greater hardware control on Intel-powered laptops. Framework Laptops, particularly the AMD Ryzen 7040-based models, have seen experimental coreboot ports, though full upstream integration remains in progress as of 2025. For desktops and servers, coreboot compatibility extends to boards from major vendors including ASUS (e.g., P5Q, A88XM-E, P8Z77-V), MSI (e.g., Z690-A and Z790-P for 12th-14th generation Intel CPUs), and Gigabyte (e.g., GA-H61M-DS2 and MZ33-AR1 for AMD Turin processors). Intel NUC-style mini PCs, such as the NovaCustom NUC Box with Meteor Lake processors (up to Core Ultra 7 155H), ship with coreboot-based Dasharo firmware, supporting up to 96 GB DDR5 and quad-display outputs. Protectli Vault series (e.g., FW2B and FW4B) are popular for networking appliances, providing coreboot-enabled firewalls with pfSense and OPNsense compatibility. Supermicro X9SAE boards also receive support for server environments. Embedded platforms highlight coreboot's versatility, with historical backing for Geode-based systems like the ALIX series and MSM800 boards, which enable blob-free operation on legacy x86 embedded hardware. For ARM servers, Cavium's CN81xx SoCs and their evaluation boards (e.g., SFF EVB) are upstreamed, facilitating on ThunderX2-compatible systems. In 2025, coreboot releases have significantly broadened hardware coverage, with version 25.09 adding support for 19 new mainboards from vendors including , , , and , including enhancements for /5 server platforms such as 's and 's . Vendor partnerships underscore adoption: deploys coreboot across Chrome OS devices (e.g., Asurada, Hayato, and over 50 models since 2013), while System76's integration promotes open hardware ecosystems. These efforts ensure coreboot's relevance for secure, performant on diverse platforms.

Payloads

Types of Payloads

Coreboot payloads are modular software components that execute after the firmware completes hardware initialization, providing diverse boot environments tailored to specific needs such as compatibility, modern standards, or debugging. These payloads extend coreboot's functionality by handling operating system loading, user interfaces, or specialized tasks, with options ranging from BIOS emulators to direct boots. One primary category is legacy BIOS emulation, exemplified by , an open-source implementation of the PCBIOS that enables compatibility with traditional applications and option ROMs for peripherals like cards or storage controllers. supports multiboot specifications, allowing it to chainload other bootloaders or kernels while emulating the interrupt-based services expected by older x86 software. For modern systems requiring UEFI support, the EDK2 implementation from Tianocore serves as a feature-rich , adhering to the and Platform Initialization (PI) specifications for cross-platform development. It provides essential services like boot manager capabilities, table generation, and driver models, facilitating the transition to UEFI-based operating systems without proprietary dependencies. Bootloader payloads, such as GRUB2, offer flexible chainloading of multiple operating systems and support for advanced features like multiboot protocols. GRUB2, when compiled as a coreboot payload, enables users to select boot options interactively and handles complex scenarios including encrypted volumes, making it a popular choice for multi-OS environments. Another bootloader payload is Depthcharge, developed for devices, which implements verified boot to ensure firmware and integrity while loading the operating system. Direct kernel payloads utilize a minimal , often paired with an initramfs, to boot directly into a lightweight environment suitable for embedded systems. This approach leverages the kernel's mature drivers for immediate hardware access and can invoke kexec to load a full-featured kernel from disk or network, prioritizing simplicity and policy flexibility through scripting.

Integration with Coreboot

Payloads are integrated into coreboot by compiling them using the coreboot , which packages the resulting binaries into the Coreboot Filesystem (CBFS) for inclusion in the ROM image. The build system, based on GNU Make with extensions, automates this process by selecting a payload via options and embedding it into CBFS during ROM generation. For instance, when building for a target board, the toolchain compiles the alongside coreboot stages and adds it as a CBFS file, ensuring it is positioned for execution after initialization. Upon completing hardware initialization, coreboot hands off control to the using a standardized that passes critical data such as the , device tree, and console information. This handoff preserves data in Coreboot Memory (CBMEM), a dynamic memory manager that stores tables accessible via fixed addresses or coreboot tables, allowing payloads like or to retrieve and utilize this information without reinitializing hardware. The ensures a seamless transition by jumping to the while maintaining compatibility across architectures. Payload selection and configuration occur through coreboot's Kconfig system, which provides options to choose a primary payload and supports embedding multiple payloads in the for fallback or specialized scenarios. Users configure these via the menu-driven interface, enabling options like CONFIG_PAYLOAD_FILE to specify custom binaries or CONFIG_PAYLOAD_ELF for executable formats, with the build system handling their integration into CBFS. This flexibility allows for runtime-agnostic payload choices defined at . To ensure integrity during integration, coreboot employs verification mechanisms including (CRC) computations on CBFS files and measured boot processes that hash components for secure boot validation. Measured boot, often in conjunction with Verified Boot extensions, measures the payload and coreboot stages into Platform Configuration Registers (PCRs) to detect tampering, providing a from the initial boot block. These checks are performed during the build and boot phases to maintain reliability. Representative examples illustrate practical integrations: the EDK2 payload leverages coreboot's handoff to incorporate a Graphics Output Protocol (GOP) driver, enabling UEFI-compatible graphics initialization on supported hardware without additional reconfiguration. Similarly, serves as a to enable full (FDE) by directly loading an encrypted and initramfs from CBFS, streamlining secure boot flows.

Development and Debugging

Tools and Processes

The coreboot build system is based on GNU Make and utilizes Kconfig for configuration, enabling users to select hardware targets, payloads, and options through an interactive interface. This setup supports cross-compilation for multiple architectures, such as x86, , and , by first building a custom (e.g., via make crossgcc-i386) to ensure reproducibility and avoid dependencies on the host system's . The process involves cloning the source repository, configuring with make [menuconfig](/page/Menuconfig), and invoking make to generate the final in the build . Emulation plays a crucial role in virtual testing of coreboot components, particularly the bootblock and subsequent stages, without requiring physical hardware. serves as the primary , supporting various machine models like the QEMU Q35 chipset for x86_64 testing, where developers build a coreboot ROM and run it using commands such as qemu-system-x86_64 -drive file=build/coreboot.rom,if=pflash,format=raw. This allows verification of initialization sequences, loading, and basic in a controlled environment, with options for architectures including and via corresponding variants. Debugging coreboot involves multiple interfaces and tools to capture output and inspect behavior. Serial console output provides real-time logging during , configured via Kconfig options for UART ports on supported hardware. For platforms, USB Direct Connect Interface () enables kernel-level debugging over USB, allowing connection to tools like for tracing execution, including (). JTAG interfaces offer low-level hardware access for halting and stepping through code, commonly used with debug probes on development boards. Additionally, cbfstool facilitates ROM inspection by extracting and analyzing Coreboot File System () components, such as payloads and configuration files, from built images via commands like cbfstool coreboot.rom print. Testing in coreboot encompasses both and hardware procedures. Unit tests for drivers and libraries, implemented using a framework in libpayload and coreboot's test infrastructure, isolate components like device drivers for automated validation during builds, with examples covering console and modules. Flashrom, an open-source tool for programming flash chips, is integral for testing by writing coreboot ROMs to hardware, supporting external programmers or internal access on compatible mainboards to verify reliability. Porting coreboot to new boards typically begins with reviewing vendor documentation for and details, such as datasheets for initialization requirements, to implement necessary drivers and configurations. When documentation is insufficient, techniques are employed, including analyzing existing proprietary dumps, tracing hardware signals with logic analyzers, or leveraging tools like ifdtool for Flash Descriptor parsing. This process involves creating a new mainboard directory in the source tree, defining Kconfig options, and iteratively testing via or until boot stability is achieved.

Community Contributions

Coreboot is governed by a board responsible for guiding the project's direction, implementation, budget, and daily operations, with broader discussions and decisions facilitated through the coreboot and IRC channels. Contributions to coreboot encompass a range of activities, including support for new boards, enhancing drivers, and improving documentation. For instance, in 2025, developers added support for the company's 5th Generation Scalable Processors () in coreboot release 25.06. Vendor teams from organizations such as and a prominent role, providing expertise for platforms like Chromebooks and server systems. Key individual contributors include Ron Minnich, the project's founder, and Patrick Georgi, a long-standing maintainer focused on infrastructure and stability. To be accepted, contributions undergo rigorous via the Gerrit system, must demonstrate functionality through testing on actual , and adhere to the project's emphasis on minimizing proprietary binary blobs where possible. These combined efforts from volunteers and corporate participants have enabled coreboot to support hundreds of mainboards and devices by 2025, with ongoing releases like 25.09 adding 19 additional platforms.

Community and Events

Conferences and Meetings

The European Coreboot Conference (ECC) series provides a dedicated for coreboot developers to collaborate on advancements. The inaugural event occurred from October 9 to 11, 2015, in , , immediately following the Embedded Linux Conference Europe, featuring discussions on coreboot development and hardware integration. The 2017 edition, held October 26 to 29 in , , expanded to include two days of talks and two days of hands-on workshops, with sessions focused on ports, such as running upstream coreboot on Chromebooks. Coreboot has maintained a regular presence at broader open-source gatherings, including regular talks at since 2010, covering topics like x86 initialization and payload integration. The project also participates in the Open Source Firmware Conference (OSFC), which originated from coreboot hackathons between 2014 and 2017 and now hosts dedicated coreboot sessions on topics like firmware security and support. At the Chaos Communication Congress (CCC), coreboot features through booths, assemblies, and presentations, such as the 2010 talk on coreboot beyond traditional platforms at 25C3 and ongoing Firmware assemblies in recent years. These conferences yield tangible outcomes, including code sprints and hardware demonstrations that drive collaborations, such as enhancements to architecture support in coreboot. Following the 2020 pandemic, coreboot events adapted to virtual formats, with online sessions streamed via and documented on project blogs, enabling broader participation in workshops and talks. In 2025, coreboot continued engagement through the OSFC held October 7 to 10 in , focusing on open firmware innovations, with affiliates like 9elements participating in related events such as 2025.

Online Resources

The official website for coreboot, coreboot.org, serves as the primary hub for users and developers, offering downloads of the latest releases, end-user guides for and configuration, and an overview of supported . Coreboot's comprehensive documentation is hosted at doc.coreboot.org, which includes detailed tutorials such as building coreboot from source, board-specific porting guides, and an extensive FAQ section addressing common issues like payload integration and debugging. The project's source code is primarily maintained in the Gerrit repository at review.coreboot.org, with a read-only mirror on GitHub at github.com/coreboot/coreboot, where developers can access the codebase, contribute patches via Gerrit, and track issues; additionally, the mailing list at [email protected] facilitates discussions on development, support, and announcements. For insights into project updates, the official at blogs.coreboot.org publishes articles on release announcements, deep dives into internal components like initialization, and developer spotlights. Community resources extend to wikis and real-time channels, including the page on coreboot for guidance on integrating it with distributions, and the IRC channel #coreboot on for live discussions among contributors.

Major Forks

Libreboot is a of coreboot that prioritizes 100% by excluding all proprietary blobs, such as , which are permitted in the upstream coreboot project. Forked from coreboot in December 2013, it provides pre-built binaries and automated build scripts to simplify for end users, focusing on a limited set of for reliability. Supported devices include select laptops from the X200, T400, and later series, where full initialization is achieved without vendor-specific code. Canoeboot, initiated in October 2023 as a of , extends its predecessor's blob-free approach while incorporating additional bootloaders to broaden compatibility. It integrates as the primary payload for /Linux and BSD systems, for legacy compatibility on x86/x86_64 and platforms, and U-Boot for booting on ARM64 and select x86 boards. The project maintains parallel development with , with its 2025 release, version 25.06 ("Onerous Olive"), issued on June 30, adding support for updated motherboards like additional models and ARM-based systems while preserving strict policies. Oreboot represents a foundational rewrite of coreboot, begun in 2019, to enhance by replacing C code with , supplemented by only where essential for low-level operations. This fork targets embedded systems across x86, , and architectures, initially supporting LinuxBoot payloads to streamline booting without proprietary dependencies. By eliminating C's vulnerabilities, Oreboot aims for more robust suitable for resource-constrained environments, though it remains in active development with a narrower hardware scope than upstream coreboot. GNU Boot is a free software boot firmware distribution endorsed by the , forked from coreboot (initially drawing from ) to ensure full compliance with GNU Free System Distribution Guidelines by excluding all non-free components. Launched in 2023, it focuses on and ease of for a select range of hardware, primarily x86 laptops like older ThinkPads, with the latest release candidate (0.1 ) issued in March 2025 to address security issues and improve stability. These forks diverge from coreboot's upstream by enforcing stricter licensing—requiring all components to be fully libre under the Free System Distribution Guidelines—and prohibiting any microcode or blobs, which upstream accommodates for broader support. and Canoeboot prioritize user-friendly, deblobbed distributions for consumer laptops, Boot emphasizes FSF alignment, while Oreboot focuses on language-level innovations for embedded reliability.

Security-Focused Distributions

Security-focused distributions of coreboot emphasize tamper resistance, verified boot processes, and integration with modules to mitigate physical and supply-chain attacks. These variants often leverage coreboot's open-source nature to enable and chain-of-trust mechanisms, distinguishing them from general-purpose by prioritizing defenses against evil maid attacks and unauthorized modifications. Key examples include Heads and PureBoot, which extend coreboot's capabilities for high-assurance environments. Heads is a Linux-based payload for coreboot that integrates to create a minimal environment focused on anti-evil-maid protection, prompting users to verify via a USB key fob displaying a (TOTP) before proceeding. This setup can secure the into privacy-oriented distributions like , ensuring that full-disk encryption keys are only released after , thereby preventing tampering with the loader or . Additionally, Heads supports TPM for measured , where components are hashed and stored in the TPM's Platform Configuration Registers (PCRs) to establish a verifiable from to operating system. PureBoot, built on coreboot, prioritizes reproducible ROM builds to ensure firmware integrity across compilations, reducing risks from build-time compromises. It emphasizes full-disk by supporting detached headers and derivation during boot, allowing /boot partitions to remain encrypted without exposing to potential evil maid attackers. PureBoot's design facilitates tamper detection through sealed secrets in the TPM, releasing only upon successful measurement of the boot chain. The Anti-Evil-Maid (AEM) framework complements these distributions by providing a dedicated toolset for USB key-based verification during coreboot initialization, alerting users to discrepancies in or boot parameters via visual or audible indicators. This framework, often paired with coreboot payloads like Heads, enables proactive defense against physical access attacks by requiring manual confirmation before key unsealing. Core features across these distributions include tamper-evident mechanisms, such as PCR-bound seals that prevent operation if hardware modifications are detected, and support for remote attestation, where measured boot logs can be cryptographically signed and transmitted to verify system integrity to external parties. They are commonly deployed in high-security setups like Qubes OS, where coreboot variants isolate virtual machines and enforce strict boot policies to compartmentalize threats. In , updates to coreboot integrations in Protectli hardware appliances enhanced verified capabilities, incorporating dual-ROM partitioning for protection and streamlined TPM event logging to improve attestation efficiency in gateways. These advancements, released in early , allow for more robust recovery from failed verifications while maintaining compatibility with measured flows.

References

  1. [1]
    coreboot
    coreboot is an extended firmware platform that delivers a lightning fast and secure boot experience on modern computers and embedded systems.Coreboot Releases · Coreboot · The coreboot documentation · For End Users
  2. [2]
    Welcome to the coreboot documentation — coreboot 25.09-63 ...
    coreboot is a project to develop open source boot firmware for various architectures. Its design philosophy is to do the bare minimum necessary to ensure that ...Getting Started · Tutorial · Mainboard-specific... · Payloads
  3. [3]
    For Developers - coreboot
    coreboot (formerly known as LinuxBIOS) believes in the principles of Open Source software. It borrows many well known concepts from other Open Source ...
  4. [4]
    coreboot Releases
    coreboot releases are planned on a quarterly release cycle. Release archives Signatures The releases are signed with a PGP/GPG signature.
  5. [5]
    Coreboot Firmware on Purism Librem Devices
    Coreboot is the default firmware on all Purism Librem devices including Librem 14, Librem Mini, Librem Servers, it is a lightweight secure BIOS replacement.
  6. [6]
    coreboot Versions, Info, and Security Features for all Protectli Vaults
    Jan 31, 2025 · coreboot is a secure, purpose-built, open-source firmware solution that fortifies the Vault's role as a security-focused networking platform.
  7. [7]
    Coreboot at Your Service! | Linux Journal
    Oct 1, 2009 · One of the first people to try to fix these problems was Ron Minnich ... LANL, who in 1999 started the open-source BIOS project named LinuxBIOS.Missing: origins Los Alamos National
  8. [8]
    [PDF] Creating dedicated emulytics devices with Linux, u-root, and minimega
    coreboot. ○ Open source firmware project I started at. LANL in 1999 as LinuxBIOS. ○ Completely replaces legacy BIOS/firmware.Missing: origins Los Alamos National Laboratory
  9. [9]
    [PDF] Breaking the Chains—Using LinuxBIOS to Liberate Embedded x86 ...
    Jun 30, 2007 · This paper discusses the development and use of Lin-. uxBIOS for embedded x86 platforms based on AMD. Geode processors. The first section ...Missing: v1 1998-2000 scientific
  10. [10]
    [PDF] coreboot - the free firmware - Beijing GNU/Linux User Group
    Jun 13, 2017 · The coreboot project originally started as LinuxBIOS in 1999 at Los. Alamos National Labs (LANL) by Ron Minnich. Ron needed to boot a cluster ...Missing: Laboratory | Show results with:Laboratory
  11. [11]
    Coreboot 4.11 - Hacker News
    Nov 19, 2019 · He started the LinuxBIOS project in 1999, which was renamed to coreboot in 2008 and is now used in tens of millions of Chromebooks. His most ...
  12. [12]
    coreboot - Wikipedia
    coreboot (formerly LinuxBIOS) is an open‑source project that provides lightweight firmware to initialize hardware and then load an operating system.History · Supported platforms · Design · Developing and debugging...
  13. [13]
    coreboot on RISC-V — 2018 edition - OSFC
    In this talk, I will discuss the developments in and around coreboot on RISC-V, over the course of the last year. New hardware has been released, ...
  14. [14]
    Distributions — coreboot 25.09-63-gfba92daed3 documentation
    ChromeOS Devices . All ChromeOS devices (Chromebooks, Chromeboxes, Chromebit, etc) released from 2012 onward use coreboot for their main system firmware.Missing: adoption | Show results with:adoption
  15. [15]
    coreboot 25.03 has been released!
    Apr 3, 2025 · This release brings important improvements to display handling, USB debugging capabilities, and CPU topology management, along with various other enhancements.Missing: April | Show results with:April
  16. [16]
    Coreboot 25.06 Released With Xeon Emerald Rapids Support ...
    Coreboot 25.06 Released With Xeon Emerald Rapids Support, Better Panther Lake. Written by Michael Larabel in Coreboot on 4 July 2025 at 08:18 PM ...
  17. [17]
    Announcing coreboot 25.09 release
    Oct 10, 2025 · The next coreboot release, 25.12, is scheduled for the end of December. Significant or interesting changes. SPI flash and payload loading ...Missing: quarterly cycle
  18. [18]
    coreboot architecture
    The bootblock is the first stage executed after CPU reset. It is written in assembly language and its main task is to set up everything for a C-environment:.
  19. [19]
    Adding new devices to a device tree - the coreboot documentation
    This document discusses the way that coreboot uses the concept of a “device tree” to generate ACPI tables for usage by the operating system.
  20. [20]
    CBMEM high table memory manager - the coreboot documentation
    CBMEM (coreboot memory) is a dynamic memory infrastructure used in coreboot to store runtime data structures, logs, and other information that needs to persist ...
  21. [21]
    Intel Firmware Support Package (FSP)-specific documentation
    This section contains documentation about Intel-FSP in public domain. Integration Guidelines . Some guiding principles when working on the glue to integrate FSP ...Missing: AGESA | Show results with:AGESA
  22. [22]
    AMD Family 17h in coreboot
    This file discusses the new boot flow, and challenges, and the tradeoffs of the initial port into coreboot.
  23. [23]
    vboot - Verified Boot Support - the coreboot documentation
    ... bootblock entry point. The only copy of the bootblock exists in the read-only area of the SPI flash. Verstage may be part of the bootblock or a separate stage.
  24. [24]
    d0iasm - coreboot
    Aug 23, 2019 · CAR can be set up by 1. enable CPU cache 2. enable the 'no eviction' mode 3. change cache mode from write-through to write-back. 'No-eviction ...Author: D0iasm · (gsoc) How To Run C Code In... · ``payload Not Loaded''
  25. [25]
    Column 6: RAM Initialization.
    Aug 3, 2011 · The main task of the ROM stage of Coreboot is to initialize system RAM. This RAM initialization is part of the hard part of Coreboot.
  26. [26]
    Read training — coreboot 25.09-63-gfba92daed3 documentation
    This chapter explains the read training sequence done on Sandy Bridge and Ivy Bridge memory initialization. Read training is done to compensate the skew ...Missing: romstage | Show results with:romstage
  27. [27]
    RAM initialization feature matrix - the coreboot documentation
    Native Raminit is working for most frequencies on most boards. There might be errors to fix. Position in romstage doesn't matter. mrc.bin raminit.Missing: DRAM SPD
  28. [28]
    Configuring a mainboard's GPIOs in coreboot
    Every mainboard needs to appropriately configure its General Purpose Inputs / Outputs (GPIOs). There are many facets of this issue, including which boot stage a ...Missing: P- | Show results with:P-
  29. [29]
    Diff - chromiumos/third_party/coreboot - Google Git
    Feb 23, 2024 · ... Power button debounce configuration + Debounce time for PWRBTN in ... P State OS control + Enable or Disable Per Core P State OS control.
  30. [30]
    The chip_operations Structure in coreboot
    The chip_operations structure provides the hooks necessary for coreboot to discover, configure, and initialize these components during the boot process. The ...
  31. [31]
    Device Operations in coreboot Firmware
    Static Device Tree: The mainboard's devicetree.cb defines the initial device hierarchy. The build process converts this into C code ( static.c ) containing ...
  32. [32]
    EHCI Debug | Small Technical Blog
    Mar 13, 2019 · To get a USB debug console, enable both CONFIG_USBDEBUG and CONFIG_CONSOLE_USB (menu option USB 2.0 EHCI debug dongle support) in coreboot's ...<|separator|>
  33. [33]
    Binary Blob Reduction Policy - Libreboot
    Jan 4, 2022 · The coreboot firmware uses certain vendor code for some of these tasks, on some motherboards, but some motherboards from coreboot can be ...Missing: specific | Show results with:specific
  34. [34]
    System76's Coreboot Open Firmware Manages To Disable Intel ME ...
    Jun 2, 2023 · They resolved a bug with Coreboot that allowed System76 to go ahead and re-disable Intel ME on relevant devices. Intel ME is disabled for their ...
  35. [35]
    coreboot FAQ — coreboot 25.09-63-gfba92daed3 documentation
    This contains things such as the boot log, tables that get passed to the payload, SMBIOS, and ACPI tables for the OS. In addition to CBMEM, on X86 systems, ...
  36. [36]
    coreboot 25.06 — coreboot 25.09-63-gfba92daed3 documentation
    The next coreboot release, 25.09, is scheduled for the end of September 2025. Project Updates . In the past several months, the coreboot project has worked to ...
  37. [37]
    AMD Family 15h [SOC|Processors] - the coreboot documentation
    Support in coreboot for modern AMD products is based on AMD's reference code: AMD Generic Encapsulated Software Architecture (AGESA™). AGESA contains the ...
  38. [38]
  39. [39]
    coreboot 4.11 — coreboot 25.09-63-gfba92daed3 documentation
    Nov 19, 2019 · coreboot 4.11 was released on November 19th. This release cycle was a bit shorter to get closer to our regular schedule of releasing in spring ...
  40. [40]
    coreboot 24.05 release
    Coreboot 24.05 adds 25 new platforms, 2 new processors, stable 64-bit support, multiple TPM driver support, and EL1/EL2/EL3 support for arm64.
  41. [41]
    RISC-V architecture documentation
    Coreboot on RISC-V runs in M mode, with payloads using M or S mode. OpenSBI can be used if the payload doesn't install its own SBI. Traps are delegated to the ...Missing: 2018 | Show results with:2018
  42. [42]
    QEMU RISC-V emulator - the coreboot documentation
    QEMU RISC-V emulator . Building coreboot and running it in QEMU . Configure coreboot and run make as usual. Run QEMU. qemu-system-riscv64 -M virt -m 1G ...
  43. [43]
    x86_64 architecture documentation
    The whole 4GiB address space, including CAR, memory mapped SPI flash and PCI BARs, are accessible in x86_32. When the EFI specification was written ...
  44. [44]
    QEMU PPC64 emulator - the coreboot documentation
    You specify a suitable PowerPC CPU via -cpu power9 . By default Hostboot mode is off and needs to be turned on to run coreboot as a firmware rather than ...
  45. [45]
    Mainboard-specific documentation
    This section contains documentation about coreboot on specific mainboards. 51NB, Acer, AMD, ASRock, ASUS, Cavium, Clevo, Dell, Emulation.
  46. [46]
    vboot-enabled devices - the coreboot documentation
    Lulu (Dell Chromebook 13 7310). Samus (Google Chromebook Pixel (2015)) ... V560TU (16”, integrated graphics). OpenCellular . Elgon (GBCv2). Protectli . VP6630 ...
  47. [47]
    System76 Open Firmware Models
    Jul 3, 2025 · Open Firmware uses coreboot, EDK2, and System76 Firmware Apps. Some models like Adder WS (addw2) and Bonobo WS (bonw14 and newer) use it. Some ...
  48. [48]
    Framework 13 AMD Laptop Seeing Experimental Coreboot Port
    May 14, 2024 · There is experimental work being done on getting Coreboot up and running with the Framework 13 laptop powered by the AMD Ryzen 7040 series.
  49. [49]
    Coreboot 4.19 Released With AMD Mayan Motherboard, MSI Alder ...
    Jan 29, 2023 · My Coreboot experience using the MSI DDR4 motherboard has been going well. Other new motherboards now supproted include the AMD Mayan ...
  50. [50]
    Open Source Coreboot BIOS Ported to MSI Z690-A Motherboard
    Apr 13, 2022 · Coreboot is a replacement for factory UEFI's and BIOS' which promises to be a faster, more flexible, and more secure firmware for your motherboard or laptop.
  51. [51]
    NovaCustom Launching An Intel Meteor Lake NUC Box ... - Phoronix
    Jul 10, 2025 · Netherlands-based vendor NovaCustom is launching an Intel Meteor Lake powered NUC box running on the Dasharo downstream of Coreboot.
  52. [52]
    Cavium CN81xx SoCs Now Supported By Upstream Coreboot
    Jul 10, 2018 · As of this morning, the Cavium CN81xx SoC family is supported by upstream Coreboot along with its reference/evaluation board. This is enough for ...
  53. [53]
    CN81xx Evaluation-board SFF - the coreboot documentation
    The JTAG follows Cavium's own protocol. Support for it is missing in OpenOCD. You have to use ARMs official hardware and software. Technology . SoC. Cavium ...
  54. [54]
    Coreboot 25.09 Released With 19 More Motherboards Supported ...
    Coreboot 25.09 was released this evening as the latest feature update to this open-source solution common to Google Chromebooks and other select ...
  55. [55]
    Coreboot 25.09 speeds up boot times and expands support for new ...
    Oct 7, 2025 · Coreboot 25.09 arrives with 30% faster boot times, support for new motherboards from Intel, AMD, HP, and Lenovo, and improvements to the...
  56. [56]
    For End Users - coreboot
    Support includes Debian, Ubuntu, OPNsense, pfSense, ProxMox VE, VMware ESXi, Windows 10 and 11, and many more. Purism manufactures security focused laptops ...
  57. [57]
    Payloads — coreboot 25.09-63-gfba92daed3 documentation
    While originally written for emulators such as QEMU, it can be built as a coreboot payload. It supports executing Option ROMs in a more complete fashion than ...Missing: v3 2005
  58. [58]
  59. [59]
  60. [60]
    codelabs-ch/filo: Mirror of coreboot's FILO bootloader - GitHub
    This is FILO, a bootloader which loads boot images from local filesystem, without help from legacy BIOS services. Expected usage is to flash it into the BIOS ...
  61. [61]
    Tutorial, part 1: Starting from scratch - the coreboot documentation
    This tutorial guides you through setting up a coreboot toolchain, building it for an emulated system, and testing it with QEMU. Do not flash to a real board.
  62. [62]
    Kconfig in coreboot
    Kconfig in coreboot is a tool for selecting the platform and modifying features, generating values used by the source code and Makefiles.
  63. [63]
    Measured Boot — coreboot 25.09-63-gfba92daed3 documentation
    Measured boot, an extension of Google Verified Boot, uses the Initial Boot Block (IBB) as a 'Core Root of Trust' (CRTM) to measure itself before other code.Missing: building handoff protocol CRC EDK2 GRUB
  64. [64]
    qemu q35 mainboard - the coreboot documentation
    The qemu q35 mainboard is used to test coreboot code, especially x86_64, and is a reference platform. It supports both 32 and 64 bit OS.
  65. [65]
    QEMU AArch64 emulator - the coreboot documentation
    This page describes how to build and run coreboot for QEMU/AArch64. You can use LinuxBoot via make menuconfig or an arbitrary FIT image as a payload for QEMU/ ...
  66. [66]
    cbfstool — coreboot 25.09-63-gfba92daed3 documentation
    Getting Started · Tutorial · Contributing · Community · Payloads · Distributions · Technotes · Internal APIs & Configuration · ACPI · Native Graphics ...
  67. [67]
    Writing unit tests for coreboot
    This document aims to guide developers through the process of adding and writing unit tests for coreboot modules.Writing New Tests · Mocks · Overview
  68. [68]
    Unit testing coreboot
    coreboot benefits the most from testing common libraries (lib/, commonlib/, payloads/libpayload) and coreboot infrastructure (console/, device/, security/).Introduction · Evaluation Of Unit Testing... · Preface
  69. [69]
    On coreboot leadership…
    May 11, 2015 · Since 2010, we have added support for all new Intel mobile and AMD ... In the last year alone, we have added support for ARM/ARM64 SOCs ...
  70. [70]
    Our forums — coreboot 25.09-63-gfba92daed3 documentation
    Mailing list . The first address for coreboot related discussion is our mailing list. You can subscribe on its information page and read its archives. Real ...Missing: making | Show results with:making
  71. [71]
    Google Is One Of The Biggest Backers Of Coreboot - Phoronix
    Jan 25, 2013 · Aside from Google/Chromium developers, AMD and Sage Engineering are also big contributors to Coreboot. The now-defunct Coresystems, where Stefan ...<|control11|><|separator|>
  72. [72]
    FOSDEM 2020 - Status of AMD platforms in coreboot
    Soon after that AMD stopped supporting the coreboot community. Moreover, recent coreboot releases started to enforce certain requirements on the features ...
  73. [73]
    coreboot Gerrit Etiquette and Guidelines
    Each gerrit commit requires a sign-off line saying that the contributed code abides by the Developer's certificate of origin, below.
  74. [74]
  75. [75]
    European coreboot conference 2017
    Hello everyone, we are currently planning to host a coreboot conference in Germany with 2 days of talks and an additional 2 days of hacking.
  76. [76]
    European Coreboot Conference 2017 - Tito
    As an Open Source project it provides auditability and maximum control over technology. Be part of our conference change the way of firmware development!Missing: workshops ARM ports
  77. [77]
    European Coreboot Conference 2017 - YouTube
    European Coreboot Conference 2017 · ECC'17: Keynote · ECC'17: Run upstream coreboot on an ARM Chromebook · ECC'17: DDR3 memory initialization basics on Intel ...Missing: workshops ports
  78. [78]
    coreboot introduction - fosdem.org
    This talk introduces the open source BIOS replacement coreboot (formerly known as LinuxBIOS) and the projects that surround it, including many popular payloads ...
  79. [79]
    Coreboot: x86 system boot and initialization - Fosdem
    We would like to present a talk aimed to various stages of x86 hardware initialization. We start with hardware description of typical x86 system including ...
  80. [80]
    Open Source Firmware Conference
    OSFC 2025 is hosted in the Bay Area at our friends @ Google. ... We are already looking for the 2026 venue. Stay tuned and subscribe to our NEWSLETTER!<|control11|><|separator|>
  81. [81]
    OSFC is not just boot security at all! For an example of past talks that ...
    The OSFC is a direct outgrowth of the coreboot hackathons/conferences between 2014-2017, opening up to wider open source firmware topics. All the fun "how to ...
  82. [82]
    Introduction to Open Source Firmware with coreboot - pretalx
    Participants will gain hands-on experience with coreboot, learning to configure, build, and install it on real hardware. The session is ideal for developers and ...
  83. [83]
    Conferences — coreboot 25.09-63-gfba92daed3 documentation
    Feb 3, 2019 · The coreboot community is present at a number of conferences over the year, usually at FOSDEM, OSFC, and the Chaos Communication Congress.
  84. [84]
    Open Source Firmware Assembly @ Chaos Communication ...
    Hello everyone, 9elements is going to build up an Open Source Firmware Assembly at the Chaos Communication Congress in Leipzig from 27th to 30th Dec.
  85. [85]
    25c3: coreboot: Beyond The Final Frontier - YouTube
    Dec 19, 2010 · ... and some popular payloads that combine with coreboot to make up the firmware: FILO, EtherBoot, SeaBIOS, Memtest86, tint, Linux, coreinfo, bayou ...
  86. [86]
    OSFF Assembly at 38C3 - Open Source Firmware Foundation
    Jan 20, 2025 · We look forward to the 39th Chaos Communication Congress at the end of this year and the upcoming FOSDEM, where we will be hosting a stand ...
  87. [87]
    Thoughts around OSFC 2020 – day 1
    Dec 21, 2020 · This talk reminded us concept proposed by Ron at the European coreboot Conference 2017. Building an alternative ecosystem to UEFI. by John ...Missing: workshops | Show results with:workshops
  88. [88]
    Open-Source Firmware Conference 2022 Slides & Videos Online
    Oct 5, 2022 · The three-day event in Sweden was devoted to all things open-source firmware with a particular focus on the likes of Coreboot, OpenBMC, u-BMC, ...
  89. [89]
    Events - Open-Source Firmware Foundation
    The OSFC 2025 is heading back to California, from October 7th to 10th, hosted at Google's Sunnyvale campus. A vibrant tech hub in the San Francisco Bay Area ...
  90. [90]
    The event's logo - Open Source Firmware Conference 2025 :: pretalx
    These boot firmware solutions have been based on open-source projects such as coreboot and Slim Bootloader integrated with Intel's Firmware Support Package (FSP) ...
  91. [91]
    Frequently Asked Questions about Libreboot firmware
    Coreboot is nominally Free Software, but requires certain vendor code on some x86 targets that it supports, on both Intel and AMD. Intel Management Engine (ME).
  92. [92]
    Libreboot 10-year anniversary and history
    Dec 12, 2023 · ... LinuxBIOS, renaming to coreboot in the mid-2000s. However, coreboot wasn't (and still isn't) made for end users. Coreboot's infrastructure ...
  93. [93]
    Canoeboot – Free, Libre BIOS/UEFI boot firmware
    Canoeboot is a special fork of Libreboot, maintained in parallel to it by ... NEW RELEASE: The latest release is Canoeboot 25.06, released on 30 June 2025.
  94. [94]
    Canoeboot - Free Software Directory
    Canoeboot is a 100% Free/Libre BIOS/UEFI boot firmware distribution based on coreboot with GNU boot loader GRUB, SeaBIOS and U-Boot, for booting GNU/Linux/BSD.Missing: 2023 | Show results with:2023<|separator|>
  95. [95]
    Canoeboot 25.06 “Onerous Olive” released!
    Jun 30, 2025 · Canoeboot is a free/open source BIOS/UEFI replacement that initialises hardware to load an OS. It's a coreboot distribution with a build system.Missing: July | Show results with:July
  96. [96]
    oreboot is a fork of coreboot, with C removed, written in Rust. - GitHub
    oreboot is a downstream fork of coreboot, i.e. oreboot is coreboot without 'c'. oreboot is mostly written in Rust, with assembly where needed.Missing: rewrite | Show results with:rewrite
  97. [97]
    Trusted Boot (Anti-Evil-Maid, Heads, and PureBoot)
    Feb 16, 2023 · Fortunately, in 1999, a group of Linux hackers at LANL wanted to fix this; they published “Linux BIOS”. In 2008, the project was renamed to ...
  98. [98]
    Anti evil maid? coreboot? heads? - Qubes OS Forum
    Sep 26, 2023 · Coreboot is an open-source alternative to proprietary BIOS/UEFI firmware, focusing on speed and flexibility. Heads is a firmware framework that ...Missing: challenges vendor-
  99. [99]
    TrenchBoot Anti Evil Maid (current plan - v2) - Dasharo Universe
    We're excited to share our plans to integrate the TrenchBoot Project into Qubes OS's new Anti-Evil Maid (AEM) implementation.Missing: Tails BusyBox
  100. [100]