Dear coreboot Community,

Please note that we have an upcoming leadership meeting scheduled for 
Wednesday, March 5, 2025. [1]

Kindly review the agenda and share your thoughts or suggest additional items 
you would like to
discuss during the meeting. [2]
Thank you.



## Current Agenda Items


### [Benjamin] Add support for sharing SMM with the payload
  * To support UEFI secure boot effectively, we need to perform the verify and 
write steps of its
variables together, in SMM. Consequently, we propose a solution where coreboot 
‘owns’ SMM
(initialises and installs all its regular SMI handlers), and the payload is 
permitted to install
its own SMI handlers within a dedicated SMRAM region that coreboot will call 
into (and return from)
for payload-specific use-cases. While this was developed for EDK2, to support 
secure boot, note
that it’s not UEFI-specific, and contains nothing specific to secure boot. This 
is a superior
solution to one we proposed in 2023, called “Add support for calling SMM 
payloads.”



[1](https://coreboot.org/calendar.html)
[2](https://docs.google.com/document/d/1NRXqXcLBp5pFkHiJbrLdv3Spqh1Hu086HYkKrgKjeDQ/edit?pli=1&tab=t.0)
_______________________________________________
coreboot mailing list -- coreboot@coreboot.org
To unsubscribe send an email to coreboot-le...@coreboot.org

Reply via email to