Skip to content

FW16 Intrusion detection no workie #34

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
2 of 8 tasks
tacsist opened this issue Dec 30, 2024 · 1 comment
Open
2 of 8 tasks

FW16 Intrusion detection no workie #34

tacsist opened this issue Dec 30, 2024 · 1 comment
Assignees
Labels
3.05 Laptop 16 AMD Ryzen 7040 Framework Laptop 16 (AMD Ryzen™ 7040 Series)

Comments

@tacsist
Copy link

tacsist commented Dec 30, 2024

Device Information

System Model or SKU

  • Framework Laptop 13 (11th Gen Intel® Core™)
  • Framework Laptop 13 (12th Gen Intel® Core™)
  • Framework Laptop 13 (13th Gen Intel® Core™)
  • Framework Laptop 13 (AMD Ryzen™ 7040 Series)
  • Framework Laptop 13 (Intel® Core™ Ultra Series 1)
  • Framework Laptop 16 (AMD Ryzen™ 7040 Series)

BIOS VERSION

3.05

DIY Edition information

Memory: FW 2x16gb
Storage: Samsung 970 EVO Plus

Standalone Operation

Are you running your mainboard as a standalone device. Is standalone mode enabled in the BIOS?

  • Yes
  • No

Describe the bug

The intrusion detection seems to not work/not be implemented. I have never gotten a password prompt and the EC is clueless as well. I have def enabled the detection before (it is still on) and have disassembled the laptop when I was applying the mail-in keyboard stand-offs/pads.

Steps To Reproduce

  1. Enable intrusion detection in UEFI (or don't, i think the EC should still pick it up)
  2. Open the laptop and remove the midplate
  3. Put everything back in its place
  4. Observe no reaction

Expected behavior

Intrusion switch gets triggered upon opening the laptop innards, prompting uefi password and showing it in EC output

Operating System (please complete the following information):

Linux tacsist-fw 6.12.7-arch1-1 #1 SMP PREEMPT_DYNAMIC Fri, 27 Dec 2024 14:24:37 +0000 x86_64 GNU/Linux

Logs

sudo framework_tool --driver cros-ec --intrusion
Chassis status:
  Coin cell ever removed:   false
  Chassis currently open:   false
  Chassis ever opened:      false
  Chassis opened:           0 times
  Chassis opened while off: 0 times

Additional context

None really, enabled the uefi setting way back, got surprised it did nothing, forgot about it until now when i was checking EC params/tools which report that either I am a master in physical hacking or that the sensor doesn't work. Would be funny if the switch actually doesn't exist on FW16

@JohnAZoidberg
Copy link
Member

Would be funny if the switch actually doesn't exist on FW16

The switch does exist on all our platforms.
On the Framework 16 it is triggered when you remove the midplate. And if you boot with the midplate remove it will show a warning during boot, regardless of intrusion setting.

If all power is removed from the system, the intrusion details are cleared.
But usually the battery is installed before the chassis is closed again.
If I do that, I see:

  Coin cell ever removed:   false
  Chassis currently open:   false
  Chassis ever opened:      true
  Chassis opened:           0 times
  Chassis opened while off: 1 times

You could try booting with the midplate removed to see if it tells you about it.
And then you could boot into Linux and run framework_tool again. You can toggle the switch with your finger and make sure that the "Chassis opened" number increases and "Chassis currently open" is accurate, to make sure that your switch is working correctly.

@JohnAZoidberg JohnAZoidberg added the Laptop 16 AMD Ryzen 7040 Framework Laptop 16 (AMD Ryzen™ 7040 Series) label Feb 5, 2025
@quinchou77 quinchou77 self-assigned this Mar 26, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
3.05 Laptop 16 AMD Ryzen 7040 Framework Laptop 16 (AMD Ryzen™ 7040 Series)
Projects
None yet
Development

No branches or pull requests

3 participants