Legend: | |||||||
---|---|---|---|---|---|---|---|
Free | Proprietary | Mixed Free and Proprietary | Proprietary, but fully disableable | Proprietary, but partial info/RE work available | Unknown | Undefined | None or N/A - feature/system not present |
Property | Description |
---|---|
Manufacturer | ASUS |
Model | KGPE-D16 |
Image | KGPE-D16 image credit ASUS (https://www.asus.com/media/global/products/4AUqWniKqYByIAxw/P_setting_fff_1_90_end_500.png) |
Software: User-Facing Environment | Free |
Software: Operating System | Free |
Software: Bootloader/Recovery | Free |
Firmware: Persistent Privileged Code (e.g. x86 SMM) | Free (Coreboot) |
Firmware: Late Boot/Payload | Free (Coreboot) |
Firmware: Memory Initialization | Free (Coreboot) |
Firmware: Early Boot | Free (Coreboot) |
Firmware: Boot ROM | Proprietary |
Firmware Signing | None |
CPU Microcode | Proprietary, RE possible on fam10h CPUs On K10-microarchitecture CPUs (e.g. fam10h Opterons of the 4100- and
6100-series, microcode is neither signed nor encrypted, and has been succesfully modified (modifying the behaviour of instructions to insert and trigger
proof-of-concept backdoors) as part of RUB-Sysstat's "Microcode" project (paper,
GitHub). On later CPUs (e.g. 6200/6300-series Opterons), microcode is encrypted. |
Management Coprocessor: Firmware | Free (OpenBMC) |
Communications Coprocessor: Internal Firmware | None, unless you install one |
Communications Coprocessor: Host-Loaded Firmware | None, unless you install one |
Security Coprocessor: Firmware | None, but has TPM header (TPM can be added) |
Embedded Controller: Firmware | None, EC-like functions on BMC |
Hardware: Board Electrical Schematic | Proprietary |
Hardware: Board PCB Design | Proprietary |
Hardware: CPU Instruction Set | Proprietary (x86_64) |
Hardware: CPU/SoC Implementation | Proprietary (AMD K10/Bulldozer/Piledriver) |
Hardware: CPU/SoC Synthesis Toolchain | Proprietary |