Open Source Firmware Conference 2025

Ravi Rangarajan

Ravi Rangarajan is a Firmware Engineer working on implementing Edge requirements on Intel platforms. Additionally, Ravi is an evangelist for enabling open source firmware solutions for IA platforms.


Sessions

10-08
09:30
30min
Intel(R) signed FSP and verified Boot
Sai Chaganty, Ravi Rangarajan, Christian Albrecht

Intel® FSP (Firmware Support Package) is a critical component in the silicon bring-up processes, traditionally provided by Intel® as a binary to be integrated with a bootloader of customer’s choice (while source is provided for specific purposes).
As the demands of firmware development and enabling evolve, Intel recognizes the need for securing Intel assets like FSP, is more critical than ever. Intel is introducing “Signed FSP and Verified Boot Architecture” to provide integrity protection to Intel® FSP binary. This is the latest addition to the slew of capabilities that are already part of FSP, that will continue to expedite development cycles, enhance co-validation with customers, increase the velocity of deploying fixes in a secure manner and help customers launch products faster into the market.
This strategic shift involves significant architectural changes, such as simplifying bootloader – FSP interactions and implementing a robust signing and verification process through Intel's Root of Trust. These advancements not only harden silicon initialization but also enable standalone Intel® FSP updates in-field, offering a more streamlined approach to firmware development and management.
In this talk, we will explore the motivations behind Intel's Signed FSP approach and the benefits it provides to Intel’s customers. Attendees will gain insights into how these changes transform the boot flow, reduce integration efforts and help to reassign valuable engineering resources from FSP integration and validation to firmware development.

Main
10-08
16:45
30min
Debugging techniques using Slim Bootloader
Sachin Kamat, Ravi Rangarajan

Debugging is a crucial aspect of firmware development, particularly when bringing up a new platform or when developing a new feature. However, debugging firmware is challenging because of lack of rich debugging environments typically found in operating system-based systems. Effective debugging not only aids in identifying and rectifying errors but also enhances the overall quality, reliability, and performance of the system.

Slim Bootloader supports various debugging techniques and this presentation will delve into a suite of advanced debugging methodologies tailored for SBL, providing developers with a comprehensive toolkit to address and resolve issues during the development phase.

We will explore the following techniques:
1. Tracing/Debug Logging: Enabling detailed logging mechanisms to capture and analyze system behavior, facilitating the identification of anomalies and errors.
2. Post Code via Port 80 LED Display: Utilizing hardware indicators to convey system status and error codes, offering a straightforward method for real-time monitoring and diagnostics.
3. Bootloader Shell Interface Utilization: Leveraging command-line interfaces to interact with the system, enabling direct manipulation and examination of system registers, memory and configurations.
4. Source-Level Debugging with Hardware and Software Tools: Employing sophisticated debugging tools to inspect and modify source code, providing deep insights into system operations and facilitating precise error correction.
5. Python-Based Automated Debugging and Triage Tool: Introducing a Python-driven solution designed to automatically diagnose and identify the location in code causing specific issues, streamlining the debugging process and enhancing efficiency.

Depending on the complexity and nature of the encountered issue, developers can opt for one or a combination of these methods to effectively debug and resolve problems. This presentation aims to equip participants with the knowledge and skills necessary to leverage these techniques, ultimately fostering a more robust and reliable Slim Bootloader development environment.

Main