# 2025-11-12 - coreboot Leadership Meetings 

## Open Action Items

  * 2025-11-12
    * [Open] Werner: Set up a call with Intel in early December
    * [Open] Martin: Will take care of patches older than a year.
  * 2024-11-27
    * [Open] Send out poll with regards to  LLM usage (requested by SFC)
  * 2024-10-30
    * [Open] Add clarification to docs: “Do not use gerrit change-id or CB: 
format in reference to already-merged patches.”
  * 2024-10-16
    * [Open] Matt: Set up a meeting to discuss board status alternatives and 
send out invites. 
      * Decouple data collection with uploading
      * Require gerrit credentials or other auth to push
      * Json format?
      * https://github.com/chrultrabook/linux-tools/blob/main/debugging.sh
  * 2024-09-18
    * [Open] Jon: Schedule a dedicated meeting to discuss the Coverity defects 
and action plan.
      * Werner: Send out an invite for the meeting. 
        Sent out a poll to find a time slot: 
https://rallly.co/invite/1c8J3azXAcje
  * 2024-05-01
    * [Open] Nick Van Der Harst volunteered for Dutch. "gogo gogo" would like 
to translate to Russian (?).
  * 2024-01-10
          * Nico: (https://review.coreboot.org/q/topic:enforce_region_api)
      *  [Open] Daniel: Look at how we want to localize (non-console) strings 
for coreboot. Long-term project.


## Announcements & Events



## Late GMT coreboot Leadership Meeting Minutes


## Attendees

Mina Asante, Jay Talbott, Werner Zeh, David Hendricks, Matt DeVillier, Julius 
Werner, Maximilian Brune, Alicja Michalska, Jon Murphy, Pono, Karthik R, Martin 
Roth.


## Minutes


### [Elyes] Can we remove OpenSBI from 3rdparty?
  * Currently, the 3rdparty/opensbi requires Position Independent Executables 
(PIEs), which coreboot does not support 
(https://qa.coreboot.org/job/coreboot-gerrit/285600/testReport/junit/(root)/clang/EMULATION_QEMU_RISCV_RV64/).
 
  * So far, coreboot has been using an old version of OpenSBI. However, this 
outdated version is now preventing us from updating Clang and GCC.
    * [Martin] What would this mean to the project? 
    - We’ve tried updating to the latest openSBI in the past, but that was 
difficult, though I don’t remember why. 
I know that there are a couple of patches that worked towards this in the past, 
but I don’t know if they ever got merged.
      * [Max] Here is a patch to update openSBI and make it dependent on clang: 
(https://review.coreboot.org/c/coreboot/+/80138/9)
      * [Max] SBI is standard on RISC-V; we need it for all RISC-V targets 
(maybe just two mainboards and one emulated mainboard). Therefore, it is better 
not to remove it. OpenSBI does not hold us back from updating Clang.
  * [Werner/Matt] We will keep OpenSBI as a submodule

### [Max] Can we auto-abandon gerrit patches after a certain period of time?
  * Sadly, people don’t abandon their patches even if they didn’t touch them 
for years. That has some downsides. For example, at some point someone (I don’t 
remember who) removed himself from hundreds of old patches, which caused them 
to go back to the top of the list in gerrit. It's also useful to have a more 
sane list of open patches for searching purposes. I also sometimes just forget 
about patches, so it would be nice to get a notification from gerrit.
    * [Martin] We used to do this, but when we moved to the main branch from 
master, it reset the dates for all changes. It’s probably been long enough that 
we can abandon anything older than a year again. I’ll take care of that. 
    - Another issue is that we’d like to get patches merged instead of just 
abandoning them. This involves people taking over old patches. We’ve addressed 
a lot of the outstanding core coverity issues, so maybe we can use every other 
review session (Wednesdays that we don’t have leadership meetings) to look at 
abandoned patches that could be revived and taken over. 
  * [Matt] Should we implement a linter test to throw a warning when no “TEST=” 
line is available in a patch commit message? We could encourage this even in 
the Gerrit guidelines to help others to reproduce tests when a patch is taken 
over by somebody else.
    * Matt will have a look and take care.
  * [Alicja] This is a simple chip ID patch: 
(https://review.coreboot.org/c/coreboot/+/89157). However, buildtest complains 
about chromebook bootblock builds (size of bootblock too big).
    * [Max] This happens every now and then; no clue what goes wrong.
    * [Julius] There are many reasons why this can happen, as the bootblock 
size is limited due to early memory size constraints. This is nothing 
chromebook specific.
    * [Max] Can the SRAM size be extended to make the bootblock fit?
    * [Julius] Not always; news to be treated case-by-case
    * [Alicja] What to do when this happens on an unrelated patch?
      * [Julius] Reach out to the maintainer (from the maintainers list) of the 
failed board and ask for help. If there is nobody there, reach out to me for 
Chromebooks
        * GOOGLE MEDIATEK-BASED MAINBOARDS
        * M:    Chen-Tsung Hsieh <[email protected]>
        * M:    Hung-Te Lin <[email protected]>
        * M:    Yu-Ping Wu <[email protected]>
        * M:    Yidi Lin <[email protected]>
        * S:    Supported
        * F:    src/mainboard/google/asurada/
        * F:    src/mainboard/google/cherry/
        * F:    src/mainboard/google/corsola/
        * F:    src/mainboard/google/geralt/
        * F:    src/mainboard/google/kukui/
        * F:    src/mainboard/google/oak/
        * F:    src/mainboard/google/rauru/
        * F:    src/mainboard/google/skywalker/
    * [David] Could we switch to SFDP for those boards? This would cut down the 
chip ID array and therefore save space in the bootblock
    * [Julius] SFDP has disadvantages, too, as you need to query the SPI chip 
for the information in every stage. 

### [Werner] How to deal with the signed FSP approach from Intel
  * As presented at the last OSFC 
(https://www.osfc.io/2025/talks/intel-r-signed-fsp-and-verified-boot/), Intel 
has plans to only execute signed FSP binaries. The current approach from Intel 
will heavily affect coreboot’s architecture. Can we start a discussion on how 
to deal with this?
    * [Jay] Ravi agrees that there need to be an exception for some users that 
are not able to use the new boot flow. It seems to be heavily pushed from the 
PC ecosystem
    * [Werner] We should start to work on this. Interested parties are Google, 
9elements, SysPro, Martin, and Matt. I will set up an initial call with Intel 
in early December to start the discussion between Intel and the community.
    * [Martin] We can set up a CBFS mechanism to verify a binary before it gets 
loaded against a signature provided.
    * [Jay] We need the ability to build our own FSP for reasons.
        * [Martin] You have a license; go and sign it with your key
        
### [Martin] Cisco Meraki ignoring the GPL
  * The issue with Cisco devices that used coreboot that didn’t get the source 
code released is still present. The SFC isn’t interested in a lawsuit, but Hal 
Martin would still be interested in pursuing something if he can. How do we 
want to address this? 
    Obviously it’d be better if Cisco just released their source code as they 
did once previously, but they haven’t responded to queries to release the 
source in several years
    * Do we want to help Hal with his legal campaign?
        * Help raise funds?
        * Donate money to his cause?
    * Do we want to just make this as public as possible and try to shame Cisco 
into releasing the source?
        * Publicize this widely on the blog, twitter, press releases, etc.
        * Add a webpage of companies that we know won’t comply with the GPL
        * Other ideas?
    * Or do we just want to ignore the issue?
        * [Matt] Public shaming (e.g. a blog post on phoronix) won’t hurt; 
maybe add a “hall of shame” on the coreboot webpage.
        * [Jon Murphy] Set up a letter on openletter.earth might help
            * [Werner] I do like this idea.
            * [Martin] Sure, let’s reach out to Hal and propose this.
            * [Werner] Will ask if FSFE has interest in this, too
        * [Pono] SFC does not want to have a lawsuit, but we can look into 
other opportunities we might have.
        * [David] Be careful - it might look bad if people wonder why 
(https://coreboot.org) isn't taking action financially, leaving it to some dude 
to do the dirty work.


## Early GMT coreboot Leadership Meeting Minutes


## Attendees
Mina Asante, Werner Zeh, Jon Murphy.


### No issues on the early GMT meeting agenda.



# Next Leadership Meetings Date
  * November 26, 2025.
  * [coreboot Calendar](https://coreboot.org/calendar.html).



# Notice
Decisions shown here are not necessarily final and are based
on the current information available. If there are questions or comments
about decisions made, or additional information to present, please put
it on the leadership meeting agenda and show up if possible to discuss
it.

Of course items may also be discussed on the mailing list, but as it's
difficult to interpret tone over email, controversial topics frequently
do not have good progress in those discussions. For particularly
difficult issues, it may be best to try to schedule another meeting.

We now host two leadership meetings, one in early GMT and one in late GMT, to 
better accommodate
participants from the Asian time zones. 
Kindly note that both sessions use the same meeting notes and Google Meet link.


# coreboot Leadership Meeting Notes
https://docs.google.com/document/d/1NRXqXcLBp5pFkHiJbrLdv3Spqh1Hu086HYkKrgKjeDQ.
_______________________________________________
coreboot mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to