diff options
Diffstat (limited to 'Documentation')
-rw-r--r-- | Documentation/acpi/index.md | 10 | ||||
-rw-r--r-- | Documentation/acronyms.md | 6 | ||||
-rw-r--r-- | Documentation/drivers/smmstore.md | 5 | ||||
-rw-r--r-- | Documentation/drivers/smmstorev2.md | 5 | ||||
-rw-r--r-- | Documentation/external_docs.md | 100 | ||||
-rw-r--r-- | Documentation/getting_started/kconfig.md | 8 | ||||
-rw-r--r-- | Documentation/infrastructure/builders.md | 12 | ||||
-rw-r--r-- | Documentation/mainboard/lenovo/ivb_internal_flashing.md | 6 | ||||
-rw-r--r-- | Documentation/mainboard/protectli/vp2420.md | 14 | ||||
-rw-r--r-- | Documentation/mainboard/protectli/vp46xx.md | 10 | ||||
-rw-r--r-- | Documentation/releases/coreboot-4.17-relnotes.md | 6 | ||||
-rw-r--r-- | Documentation/soc/intel/fit.md | 8 | ||||
-rw-r--r-- | Documentation/soc/intel/fsp/index.md | 36 | ||||
-rw-r--r-- | Documentation/soc/intel/fsp/ppi/ppi.md | 12 | ||||
-rw-r--r-- | Documentation/technotes/console.md | 16 |
15 files changed, 60 insertions, 194 deletions
diff --git a/Documentation/acpi/index.md b/Documentation/acpi/index.md index 15d3dddc2b..4337611ca7 100644 --- a/Documentation/acpi/index.md +++ b/Documentation/acpi/index.md @@ -29,10 +29,6 @@ Windows-specific documentation <windows.md> ## ACPI specification - Useful links -```{toctree} -:maxdepth: 1 - -ACPI Specification 6.5 <https://uefi.org/specs/ACPI/6.5/index.html> -ASL 2.0 Syntax <https://uefi.org/specs/ACPI/6.5/19_ASL_Reference.html#asl-2-0-symbolic-operators-and-expressions> -Predefined ACPI Names <https://uefi.org/specs/ACPI/6.5/05_ACPI_Software_Programming_Model.html#predefined-acpi-names> -``` +- [ACPI Specification 6.5](https://uefi.org/specs/ACPI/6.5/index.html) +- [ASL 2.0 Syntax](https://uefi.org/specs/ACPI/6.5/19_ASL_Reference.html#asl-2-0-symbolic-operators-and-expressions) +- [Predefined ACPI Names](https://uefi.org/specs/ACPI/6.5/05_ACPI_Software_Programming_Model.html#predefined-acpi-names) diff --git a/Documentation/acronyms.md b/Documentation/acronyms.md index 8dbb067bbc..2f32b85222 100644 --- a/Documentation/acronyms.md +++ b/Documentation/acronyms.md @@ -1141,8 +1141,4 @@ Spec](https://uefi.org/specifications) for details, or run the tool ## References: -```{toctree} -:maxdepth: 1 - -AMD Glossary of terms <https://www.amd.com/system/files/documents/glossary-of-terms-20220505-for-web.pdf> -``` +* [AMD Glossary of terms](https://www.amd.com/system/files/documents/glossary-of-terms-20220505-for-web.pdf) diff --git a/Documentation/drivers/smmstore.md b/Documentation/drivers/smmstore.md index d68e51c43d..c9f0060c3d 100644 --- a/Documentation/drivers/smmstore.md +++ b/Documentation/drivers/smmstore.md @@ -128,11 +128,8 @@ data or modify the currently running kernel.* ## External links -```{toctree} -:maxdepth: 1 +* [A Tour Beyond BIOS Implementing UEFI Authenticated Variables in SMM with EDKI](https://software.intel.com/sites/default/files/managed/cf/ea/a_tour_beyond_bios_implementing_uefi_authenticated_variables_in_smm_with_edkii.pdf) -A Tour Beyond BIOS Implementing UEFI Authenticated Variables in SMM with EDKI <https://software.intel.com/sites/default/files/managed/cf/ea/a_tour_beyond_bios_implementing_uefi_authenticated_variables_in_smm_with_edkii.pdf> -``` Note, this differs significantly from coreboot's implementation. [SMM]: ../security/smm.md diff --git a/Documentation/drivers/smmstorev2.md b/Documentation/drivers/smmstorev2.md index 8e74c932f1..6956cd49e1 100644 --- a/Documentation/drivers/smmstorev2.md +++ b/Documentation/drivers/smmstorev2.md @@ -199,11 +199,8 @@ running kernel. ## External links -```{toctree} -:maxdepth: 1 +* [A Tour Beyond BIOS Implementing UEFI Authenticated Variables in SMM with EDKI](https://software.intel.com/sites/default/files/managed/cf/ea/a_tour_beyond_bios_implementing_uefi_authenticated_variables_in_smm_with_edkii.pdf) -A Tour Beyond BIOS Implementing UEFI Authenticated Variables in SMM with EDKI <https://software.intel.com/sites/default/files/managed/cf/ea/a_tour_beyond_bios_implementing_uefi_authenticated_variables_in_smm_with_edkii.pdf> -``` Note that this differs significantly from coreboot's implementation. [SMM]: ../security/smm.md diff --git a/Documentation/external_docs.md b/Documentation/external_docs.md index 47c760061e..b5ee908dda 100644 --- a/Documentation/external_docs.md +++ b/Documentation/external_docs.md @@ -17,21 +17,13 @@ Please add any helpful or informational links and sections as you see fit. * [Part 1: PCI-based systems](https://resources.infosecinstitute.com/topic/system-address-map-initialization-in-x86x64-architecture-part-1-pci-based-systems/) * [Part 2: PCI express-based systems](https://resources.infosecinstitute.com/topic/system-address-map-initialization-x86x64-architecture-part-2-pci-express-based-systems/) * [PCIe elastic buffer](https://www.mindshare.com/files/resources/mindshare_pcie_elastic_buffer.pdf) -```{toctree} -:maxdepth: 1 - -Boot Guard and PSB have user-hostile defaults <https://mjg59.dreamwidth.org/58424.html> -``` +* [Boot Guard and PSB have user-hostile defaults](https://mjg59.dreamwidth.org/58424.html) ## General Information -```{toctree} -:maxdepth: 1 - -OS Dev <https://wiki.osdev.org/Categorized_Main_Page> -Interface BUS <http://www.interfacebus.com/> -``` +* [OS Dev](https://wiki.osdev.org/Categorized_Main_Page) +* [Interface BUS](http://www.interfacebus.com/) ## OpenSecurityTraining2 @@ -51,14 +43,10 @@ modified works back to the community. Below is a list of currently available courses that can help understand the inner workings of coreboot and other firmware-related topics: -```{toctree} -:maxdepth: 1 - -coreboot design principles and boot process <https://ost2.fyi/Arch4031> -x86-64 Assembly <https://ost2.fyi/Arch1001> -x86-64 OS Internals <https://ost2.fyi/Arch2001> -x86-64 Intel Firmware Attack & Defense <https://ost2.fyi/Arch4001> -``` +* [coreboot design principles and boot process](https://ost2.fyi/Arch4031) +* [x86-64 Assembly](https://ost2.fyi/Arch1001) +* [x86-64 OS Internals](https://ost2.fyi/Arch2001) +* [x86-64 Intel Firmware Attack & Defense](https://ost2.fyi/Arch4001) There are [additional security courses](https://p.ost2.fyi/courses) at the site as well (such as @@ -66,79 +54,47 @@ as well (such as ## Firmware Specifications & Information -```{toctree} -:maxdepth: 1 - -System Management BIOS - SMBIOS <https://www.dmtf.org/standards/smbios> -Desktop and Mobile Architecture for System Hardware - DASH <https://www.dmtf.org/standards/dash> -PNP BIOS <https://www.intel.com/content/dam/support/us/en/documents/motherboards/desktop/sb/pnpbiosspecificationv10a.pdf> -``` +* [System Management BIOS - SMBIOS](https://www.dmtf.org/standards/smbios) +* [Desktop and Mobile Architecture for System Hardware - DASH](https://www.dmtf.org/standards/dash) +* [PNP BIOS](https://www.intel.com/content/dam/support/us/en/documents/motherboards/desktop/sb/pnpbiosspecificationv10a.pdf) ### ACPI -```{toctree} -:maxdepth: 1 - -ACPI Specs <https://uefi.org/acpi/specs> -ACPI in Linux <https://www.kernel.org/doc/ols/2005/ols2005v1-pages-59-76.pdf> -ACPI 5 Linux <https://blog.linuxplumbersconf.org/2012/wp-content/uploads/2012/09/LPC2012-ACPI5.pdf> -ACPI 6 Linux <https://events.static.linuxfound.org/sites/events/files/slides/ACPI_6_and_Linux_0.pdf> -``` +* [ACPI Specs](https://uefi.org/acpi/specs) +* [ACPI in Linux](https://www.kernel.org/doc/ols/2005/ols2005v1-pages-59-76.pdf) +* [ACPI 5 Linux](https://blog.linuxplumbersconf.org/2012/wp-content/uploads/2012/09/LPC2012-ACPI5.pdf) +* [ACPI 6 Linux](https://events.static.linuxfound.org/sites/events/files/slides/ACPI_6_and_Linux_0.pdf) ### Security -```{toctree} -:maxdepth: 1 - -Intel Boot Guard <https://edk2-docs.gitbook.io/understanding-the-uefi-secure-boot-chain/secure_boot_chain_in_uefi/intel_boot_guard> -``` +* [Intel Boot Guard](https://edk2-docs.gitbook.io/understanding-the-uefi-secure-boot-chain/secure_boot_chain_in_uefi/intel_boot_guard) ## Hardware information -```{toctree} -:maxdepth: 1 - -WikiChip <https://en.wikichip.org/wiki/WikiChip> -Sandpile <https://www.sandpile.org/> -CPU-World <https://www.cpu-world.com/index.html> -CPU-Upgrade <https://www.cpu-upgrade.com/index.html> -``` +* [WikiChip](https://en.wikichip.org/wiki/WikiChip) +* [Sandpile](https://www.sandpile.org/) +* [CPU-World](https://www.cpu-world.com/index.html) +* [CPU-Upgrade](https://www.cpu-upgrade.com/index.html) ### Hardware Specifications & Standards * [Bluetooth](https://www.bluetooth.com/specifications/specs/) - Bluetooth SIG -```{toctree} -:maxdepth: 1 - -eMMC <https://www.jedec.org/) - JEDEC - (LOGIN REQUIRED> -``` +* [eMMC](https://www.jedec.org/) - JEDEC - (LOGIN REQUIRED) * [eSPI](https://cdrdv2.intel.com/v1/dl/getContent/645987) - Intel * [I2c Spec](https://web.archive.org/web/20170704151406/https://www.nxp.com/docs/en/user-guide/UM10204.pdf), [Appnote](https://www.nxp.com/docs/en/application-note/AN10216.pdf) - NXP * [I2S](https://www.nxp.com/docs/en/user-manual/UM11732.pdf) - NXP -```{toctree} -:maxdepth: 1 - -I3C <https://www.mipi.org/specifications/i3c-sensor-specification) - MIPI Alliance (LOGIN REQUIRED> -Memory <https://www.jedec.org/) - JEDEC - (LOGIN REQUIRED> -``` +* [I3C](https://www.mipi.org/specifications/i3c-sensor-specification) - MIPI Alliance (LOGIN REQUIRED) +* [Memory](https://www.jedec.org/) - JEDEC - (LOGIN REQUIRED) * [NVMe](https://nvmexpress.org/developers/) - NVMe Specifications * [LPC](https://www.intel.com/content/dam/www/program/design/us/en/documents/low-pin-count-interface-specification.pdf) - Intel -```{toctree} -:maxdepth: 1 - -PCI / PCIe / M.2 <https://pcisig.com/specifications) - PCI-SIG - (LOGIN REQUIRED> -``` +* [PCI / PCIe / M.2](https://pcisig.com/specifications) - PCI-SIG - (LOGIN REQUIRED) * [Power Delivery](https://www.usb.org/documents) - USB Implementers Forum -```{toctree} -:maxdepth: 1 - -SATA <https://sata-io.org/developers/purchase-specification) - SATA-IO (LOGIN REQUIRED> -``` +* [SATA](https://sata-io.org/developers/purchase-specification) - SATA-IO (LOGIN REQUIRED) * [SMBus](http://www.smbus.org/specs/) - System Management Interface Forum * [Smart Battery](http://smartbattery.org/specs/) - Smart Battery System Implementers Forum * [USB](https://www.usb.org/documents) - USB Implementers Forum @@ -177,9 +133,5 @@ SATA <https://sata-io.org/developers/purchase-specification) - SATA-IO (LOGIN RE ## Infrastructure software -```{toctree} -:maxdepth: 1 - -Kconfig <https://www.kernel.org/doc/html/latest/kbuild/kconfig-language.html> -GNU Make <https://www.gnu.org/software/make/manual/> -``` +* [Kconfig](https://www.kernel.org/doc/html/latest/kbuild/kconfig-language.html) +* [GNU Make](https://www.gnu.org/software/make/manual/) diff --git a/Documentation/getting_started/kconfig.md b/Documentation/getting_started/kconfig.md index bff077c47f..89654582dc 100644 --- a/Documentation/getting_started/kconfig.md +++ b/Documentation/getting_started/kconfig.md @@ -11,12 +11,8 @@ configuration front end in coreboot today. The official Kconfig source and documentation is kept at kernel.org: -```{toctree} -:maxdepth: 1 - -Kconfig source <https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/tree/scripts/kconfig> -Kconfig Language Documentation <https://www.kernel.org/doc/Documentation/kbuild/kconfig-language.txt> -``` +- [Kconfig source](https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/tree/scripts/kconfig) +- [Kconfig Language Documentation](https://www.kernel.org/doc/Documentation/kbuild/kconfig-language.txt) The advantage to using Kconfig is that it allows users to easily select the high level features of the project to be enabled or disabled at build time. diff --git a/Documentation/infrastructure/builders.md b/Documentation/infrastructure/builders.md index dc4216d435..b200140ed5 100644 --- a/Documentation/infrastructure/builders.md +++ b/Documentation/infrastructure/builders.md @@ -93,19 +93,11 @@ You can see all the builds in the main jenkins interface: Most of the time on the builders is taken up by the coreboot main and coreboot gerrit builds. -```{toctree} -:maxdepth: 1 - -coreboot gerrit build <https://qa.coreboot.org/job/coreboot-gerrit/> -``` +* [coreboot gerrit build](https://qa.coreboot.org/job/coreboot-gerrit/) ([Time trend](https://qa.coreboot.org/job/coreboot-gerrit/buildTimeTrend)) -```{toctree} -:maxdepth: 1 - -coreboot main build <https://qa.coreboot.org/job/coreboot/> -``` +* [coreboot main build](https://qa.coreboot.org/job/coreboot/) ([Time trend](https://qa.coreboot.org/job/coreboot/buildTimeTrend)) diff --git a/Documentation/mainboard/lenovo/ivb_internal_flashing.md b/Documentation/mainboard/lenovo/ivb_internal_flashing.md index a6004a7558..3559481d87 100644 --- a/Documentation/mainboard/lenovo/ivb_internal_flashing.md +++ b/Documentation/mainboard/lenovo/ivb_internal_flashing.md @@ -19,11 +19,7 @@ that was discovered and fixed later. - USB drive (in case you need to downgrade BIOS) - Linux install that (can be) loaded in UEFI mode -```{toctree} -:maxdepth: 1 - -CHIPSEC <https://github.com/chipsec/chipsec> -``` +- [CHIPSEC](https://github.com/chipsec/chipsec) ## BIOS versions diff --git a/Documentation/mainboard/protectli/vp2420.md b/Documentation/mainboard/protectli/vp2420.md index b5a7ff67d0..b4ec5970c2 100644 --- a/Documentation/mainboard/protectli/vp2420.md +++ b/Documentation/mainboard/protectli/vp2420.md @@ -80,12 +80,8 @@ MX25L12835F - [datasheet][MX25L12835F]. ## Useful links -```{toctree} -:maxdepth: 1 - -VP2420 Hardware Overview <https://protectli.com/kb/vp2400-series-hardware-overview/> -VP2420 Product Page <https://protectli.com/product/vp2420/> -Protectli TPM module <https://protectli.com/product/tpm-module/> -MX25L12835F <https://www.mxic.com.tw/Lists/Datasheet/Attachments/8653/MX25L12835F,%203V,%20128Mb,%20v1.6.pdf> -flashrom <https://flashrom.org/Flashrom> -``` +- [VP2420 Hardware Overview](https://protectli.com/kb/vp2400-series-hardware-overview/) +- [VP2420 Product Page](https://protectli.com/product/vp2420/) +- [Protectli TPM module](https://protectli.com/product/tpm-module/) +- [MX25L12835F](https://www.mxic.com.tw/Lists/Datasheet/Attachments/8653/MX25L12835F,%203V,%20128Mb,%20v1.6.pdf) +- [flashrom](https://flashrom.org/Flashrom) diff --git a/Documentation/mainboard/protectli/vp46xx.md b/Documentation/mainboard/protectli/vp46xx.md index eada7ff0d7..f86f93159e 100644 --- a/Documentation/mainboard/protectli/vp46xx.md +++ b/Documentation/mainboard/protectli/vp46xx.md @@ -126,13 +126,9 @@ ITE IT8786E or IT8784E, but the configuration is the same on this platform. ## Useful links -```{toctree} -:maxdepth: 1 - -VP4600 Hardware Overview <https://protectli.com/kb/vp4600-hardware-overview/> -VP4630 Product Page <https://protectli.com/product/vp4630/> -Protectli TPM module <https://protectli.com/product/tpm-module/> -``` +- [VP4600 Hardware Overview](https://protectli.com/kb/vp4600-hardware-overview/) +- [VP4630 Product Page](https://protectli.com/product/vp4630/) +- [Protectli TPM module](https://protectli.com/product/tpm-module/) [Protectli VP46xx]: https://protectli.com/vault-6-port/ [MX25L12835F]: https://www.mxic.com.tw/Lists/Datasheet/Attachments/8653/MX25L12835F,%203V,%20128Mb,%20v1.6.pdf diff --git a/Documentation/releases/coreboot-4.17-relnotes.md b/Documentation/releases/coreboot-4.17-relnotes.md index 2ad45ca78c..eb136f42fc 100644 --- a/Documentation/releases/coreboot-4.17-relnotes.md +++ b/Documentation/releases/coreboot-4.17-relnotes.md @@ -12,11 +12,7 @@ work to make the coreboot project successful. Major Bugfixes in this release ------------------------------ -```{toctree} -:maxdepth: 1 - -CVE-2022-29264 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29264> -``` +* [CVE-2022-29264](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29264) New Mainboards diff --git a/Documentation/soc/intel/fit.md b/Documentation/soc/intel/fit.md index d2629b4614..b7dbc5f8bc 100644 --- a/Documentation/soc/intel/fit.md +++ b/Documentation/soc/intel/fit.md @@ -56,9 +56,5 @@ execution of the IA32 reset vector happens. ## References -```{toctree} -:maxdepth: 1 - -Intel TXT LAB handout <https://downloadmirror.intel.com/18931/eng/Intel%20TXT%20LAB%20Handout.pdf> -FIT BIOS specification <https://www.intel.com/content/dam/www/public/us/en/documents/guides/fit-bios-specification.pdf> -``` +* [Intel TXT LAB handout](https://downloadmirror.intel.com/18931/eng/Intel%20TXT%20LAB%20Handout.pdf) +* [FIT BIOS specification](https://www.intel.com/content/dam/www/public/us/en/documents/guides/fit-bios-specification.pdf) diff --git a/Documentation/soc/intel/fsp/index.md b/Documentation/soc/intel/fsp/index.md index 6d29aca63b..8359bcbac9 100644 --- a/Documentation/soc/intel/fsp/index.md +++ b/Documentation/soc/intel/fsp/index.md @@ -65,35 +65,15 @@ those are fixed. If possible a workaround is described here as well. ## Open Source Intel FSP specification -```{toctree} -:maxdepth: 1 - -About Intel FSP <https://firmware.intel.com/learn/fsp/about-intel-fsp> -``` - -```{toctree} -:maxdepth: 1 - -FSP Specification 1.0 <https://www.intel.in/content/dam/www/public/us/en/documents/technical-specifications/fsp-architecture-spec.pdf> -``` - -```{toctree} -:maxdepth: 1 +* [About Intel FSP](https://firmware.intel.com/learn/fsp/about-intel-fsp) -FSP Specification 1.1 <https://www.intel.com/content/dam/www/public/us/en/documents/technical-specifications/fsp-architecture-spec-v1-1.pdf> -``` - -```{toctree} -:maxdepth: 1 +* [FSP Specification 1.0](https://www.intel.in/content/dam/www/public/us/en/documents/technical-specifications/fsp-architecture-spec.pdf) -FSP Specification 2.0 <https://www.intel.com/content/dam/www/public/us/en/documents/technical-specifications/fsp-architecture-spec-v2.pdf> -``` +* [FSP Specification 1.1](https://www.intel.com/content/dam/www/public/us/en/documents/technical-specifications/fsp-architecture-spec-v1-1.pdf) -```{toctree} -:maxdepth: 1 +* [FSP Specification 2.0](https://www.intel.com/content/dam/www/public/us/en/documents/technical-specifications/fsp-architecture-spec-v2.pdf) -FSP Specification 2.1 <https://cdrdv2.intel.com/v1/dl/getContent/611786> -``` +* [FSP Specification 2.1](https://cdrdv2.intel.com/v1/dl/getContent/611786) ## Additional Features in FSP 2.1 specification @@ -105,11 +85,7 @@ PPI <ppi/ppi.md> ## Official bugtracker -```{toctree} -:maxdepth: 1 - -IntelFSP/FSP <https://github.com/IntelFsp/FSP/issues> -``` +- [IntelFSP/FSP](https://github.com/IntelFsp/FSP/issues) [Issue 10]: https://github.com/IntelFsp/FSP/issues/10 [Issue 13]: https://github.com/IntelFsp/FSP/issues/13 diff --git a/Documentation/soc/intel/fsp/ppi/ppi.md b/Documentation/soc/intel/fsp/ppi/ppi.md index bb14af04e6..6d7afb47d4 100644 --- a/Documentation/soc/intel/fsp/ppi/ppi.md +++ b/Documentation/soc/intel/fsp/ppi/ppi.md @@ -6,17 +6,9 @@ chipset using Intel FSP. This feature is added into FSP specification 2.1 where FSP should be able to locate PPI, published by boot firmware and able to execute the same in FSP's context. -```{toctree} -:maxdepth: 1 - -What is PPI <https://www.intel.com/content/dam/www/public/us/en/documents/reference-guides/efi-pei-cis-v09.pdf> -``` +* [What is PPI](https://www.intel.com/content/dam/www/public/us/en/documents/reference-guides/efi-pei-cis-v09.pdf) ## List of PPI service ### Publish MP Service PPI from boot firmware (coreboot) to initialize CPU -```{toctree} -:maxdepth: 1 - -MP Service PPI <mp_service_ppi.md> -``` +- [MP Service PPI](mp_service_ppi.md) diff --git a/Documentation/technotes/console.md b/Documentation/technotes/console.md index 1b022a2b42..a1257284fc 100644 --- a/Documentation/technotes/console.md +++ b/Documentation/technotes/console.md @@ -57,18 +57,10 @@ chip, you can enable the `SC16IS7XX_INIT` option to initialize the chip. If not we can use other I2C slave devices like an Arduino or a Beagleboard. -```{toctree} -:maxdepth: 1 - -Linux I2C Slave interface <https://web.archive.org/web/20220926173943/https://www.kernel.org/doc/html/latest/i2c/slave-interface.html> -BeagleBone Black I2C Slave <https://web.archive.org/web/20220926171211/https://forum.beagleboard.org/t/beaglebone-black-and-arduino-uno-i2c-communication-using-c/29990/8> -``` +* [Linux I2C Slave interface](https://web.archive.org/web/20220926173943/https://www.kernel.org/doc/html/latest/i2c/slave-interface.html) +* [BeagleBone Black I2C Slave](https://web.archive.org/web/20220926171211/https://forum.beagleboard.org/t/beaglebone-black-and-arduino-uno-i2c-communication-using-c/29990/8) This feature was added as part of a GSoC 2022 project. Checkout the following blog posts for more details. -```{toctree} -:maxdepth: 1 - -coreboot Console via SMBus — Part I <https://medium.com/@husnifaiz/coreboot-console-via-smbus-introduction-38273691a8ac> -coreboot Console via SMBus — Part II <https://medium.com/@husnifaiz/coreboot-console-via-smbus-part-ii-bc324fdd2f24> -``` +* [coreboot Console via SMBus — Part I](https://medium.com/@husnifaiz/coreboot-console-via-smbus-introduction-38273691a8ac) +* [coreboot Console via SMBus — Part II](https://medium.com/@husnifaiz/coreboot-console-via-smbus-part-ii-bc324fdd2f24) |