shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

279
active users

#uefi

2 posts2 participants0 posts today
Replied in thread

@wolf480pl @cas I just assume they don't want to have to deal with a gazillion of undocumented SBCs that may only get 1 person to once push code that gets accepted, but then "orphaned" and break over time as they may not be willing to build & test every new kernel before release just to enshure it ain't broken!

It's absolute chaos and one of the reasons I didn't even try to build @OS1337 for the #Pi0W as of today...

Infosec.SpaceKevin Karhan :verified: (@kkarhan@infosec.space)@cas@treehouse.systems @wolf480pl@mstdn.io granted, the distain is mutual, given almost all #SBC & #SoC vendors refuse to do basic #documentation on how their shit works and barely release some dodgy images with custom kernel modules. - @olimex@mastodon.social and #RaspberryPi being an exception of the norm, but #Rockchip, #Allwinner and other SOCs are a real pain in the ass to support unless they are #ARMv8 with #UEFI to boot. #Apple's Hardware does have @AsahiLinux@treehouse.systems as project to care for *and* is popular enough to be *worth the hassle* for them, as it brings decent performance and battery runtime to the table...
Replied in thread

@cas @wolf480pl granted, the distain is mutual, given almost all #SBC & #SoC vendors refuse to do basic #documentation on how their shit works and barely release some dodgy images with custom kernel modules.

#Apple's Hardware does have @AsahiLinux as project to care for and is popular enough to be worth the hassle for them, as it brings decent performance and battery runtime to the table...

Replied to Simon Zerafa

@simonzerafa I mean obviously #reuse / #UseLonger is better and if your options are "corporate surplus" or nothing then I'd never judge.

To me it's just that #ThinkPad as a brand has really died as every single Device is a #downgrade in #repairability & #upgradeability compared to my #X230Tablet:

Personally, I wish I had €.€€€.€€€ so I could just develop the #NUCbook and be done with the #Enshittification of #Laptops / #Notebooks!

Continued thread

For the HP Prodesk G4 (and other HP models) if the Keyboard or Mouse isn't working in the UEFI Firmware or Grub menus the workaround in the JetKVM is to go to:

Hardware -> Settings -> USB Devices

and select Keyboard Only in Classes.

There is something wonky with HP devices USB HID support at Boot that means it won't detect JetKVM USB HID devices if the Classes option is set to more than one item in the Classes list.

Weird 🤔🤷‍♂️

Whenever I boot into my UEFI menu, the boot list (you know, the list of different media to boot from) just reads:

2.

That's it. No text, not even a number 1 above the 2 or something. Anyone else run into this or know what's up? (The Acer laptop itself works and boots fine, both into Windows and Arch Linux; I'm just curious.)

In the adventures of Bob's "Perfect" #Slackware install, I've been struggling to get Secure Boot working on my #Thinkpad x280.

Something seems to be preventing me from loading a custom Platform Key, while none appears loaded, and everything seems 'right' -- #SecureBoot is in Custom / Setup mode.

The unfortunate thing is ... using Secure Boot and signing kernel images and efi executables is not a common practice, and the documentation seems lacking explanations for people with my particular issue; method 1 of using `efi-updatevar` returns an error "Cannot write to PK, wrong filesystem permissions", method 2 -- updating from the #UEFI 'bios' -- is not an option on an x280, and method 3, using KeyTool.efi returns the error "Failed to update variable: (26) Security Violation".

I am wondering if there are some further setup settings that need to be adjusted to allow this operation, if perhaps my pk.auth file is incorrect in some way, if my machine was, from the factory, unable to allow custom Platform Keys, or if someone has modified it since then.

Rabbit holes are a pain in the dick, and now I'm in a position where I'm kinda 'forced' to learn a bit more about the mechanics of Secure Boot, under the hood.

Anyone got some good tips for where to start solving this puzzle?

I have been referencing:

- wiki.gentoo.org/wiki/User:Saka
- wiki.linuxquestions.org/wiki/H

wiki.gentoo.orgUser:Sakaki/Sakaki's EFI Install Guide/Configuring Secure Boot under OpenRC - Gentoo wiki

this older #dell #xps 13 is absolutely stumping me

can boot to #uefi USB devices and install operating systems to disk no problem

cannot get it to ever boot from said disk, secure boot on or off, legacy boot on or off, nada. just endless "no bootable devices found." frustration grr.

Replied in thread

This is the massive list of GRUB sub commands that I have to wade through

I have taken a Higher Grade Android to make this photograph and luckily this camera system knows how to capture the Light of the IPS LED panel in Total Darkness.

Compliments of Open Camera Android version

#bash#csh#ksh
Replied in thread

I'm going to include another photograph to give you an indication of how complex GRUB is in comparison to Legacy Lilo

When I press tab twice in Rapid Succession, the whole screen is filled with commands that I can execute within the GRUB sh {command environment}

I literally have to read all the man pages of those GRUB sub commands which give me an indication that they can do what I want, just so I can pass the parameters to the kernel

GRUB has made the distance between the command prompt and the kernel much bigger!

#bash#csh#ksh