AudioPkg VS lrmi

Compare AudioPkg vs lrmi and see what are their differences.

AudioPkg

Audio stack for UEFI. Currently supports HD audio controllers/codecs. WIP (by Goldfish64)

lrmi

Linux Real Mode Interface (by mqudsi)
InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
AudioPkg lrmi
3 1
53 4
- -
0.1 10.0
about 4 years ago over 11 years ago
C
- -
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

AudioPkg

Posts with mentions or reviews of AudioPkg. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2022-03-12.

lrmi

Posts with mentions or reviews of lrmi. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2022-03-12.
  • Twitter Client for UEFI
    4 projects | news.ycombinator.com | 12 Mar 2022
    A few thoughts: yes, UEFI is a large attack surface. Secure Boot mitigates a lot of that - if it's turned on, the vast majority of UEFI functionality is only accessible to signed binaries. If you're running untrustworthy code in your boot environment then it's already in a position to just overwrite the firmware, there's no memory protection here. But UEFI doesn't entirely go away after the OS boots, there's some number of runtime services left that the OS depends on. http://blog.frizk.net/2017/01/attacking-uefi-and-linux.html is a demonstration that if you're able to modify those then you can compromise the OS. There's also, of course, all the code in SMM which can just do whatever and may have been audited but possibly hasn't been.

    But honestly overall BIOS was a bigger concern than UEFI. It's easy to forget, but a lot of the BIOS hooks are still available at runtime - https://github.com/mqudsi/lrmi is an interface that lets you call them from Linux. It's reasonable to worry about the attack surface exposed by UEFI runtime services, but BIOS software interrupts are frankly even weirder. The reason we largely didn't worry about them is that you normally have to be root to call them, which is also the case for UEFI runtime services and most SMM interfaces. And SMM definitely predates UEFI, so getting away from UEFI complexity wouldn't save us there.

    And there's been plenty of meaningful security work done in the UEFI space lately. There's support for proper IOMMU setup so that you can boot off Thunderbolt without any Thunderbolt device just being able to DMA all over your firmware. The NX bit is supported. There's support for stack canaries. There are best practices for SMM behaviour. https://uefi.org/sites/default/files/resources/UEFI%20Firmwa... covers a bunch of this.

    If we were designing firmware for maximum security then I don't think anyone would argue we'd come up with UEFI. That doesn't mean that we should be nostalgic about BIOS, which was a smaller attack surface but provided no meaningful security.

What are some alternatives?

When comparing AudioPkg and lrmi you can also consider the following projects:

edk2-sdm845 - (Maybe) Generic edk2 port for sdm845

UEFI-Shell - UEFI Shell binary images, generated from EDK2 stable

playwav - Play PCM .wav file on PC speaker

uefidoom - Port of Doom to UEFI.