PC Engines apu coreboot Open Source Firmware v4.10.0.1
PC Engines apu coreboot Open Source Firmware v4.10.0.1
Key changes
Mainline:
- Rebased with official coreboot repository commit 22d66ef.
- Fixed watchdog runtime option on apu3.
- Updated GPIOs documentation with known issue section and workaround.
Legacy:
- Fixed watchdog runtime option on apu3.
There are little changes in this release because the effort was closely focused on the runtime configuration reimplementation. The new runtime configuration implementation will be based on VPD and will bring tools for offline binary modification. It is planned to be introduced in v4.10.0.2.
coreboot community
Patches merged:
Patches sent for review:
Statistics
The chart shows the total files changed from release tag against the rebase point of given release specified in CHANGELOG (CHANGELOG.md and gitlab-ci.yml excluded from statistics). Check the statistics with:
git diff --stat 22d66ef ':(exclude).gitlab-ci.yml' ':(exclude)CHANGELOG.md'
90 files changed, 2793 insertions(+), 199 deletions(-)
The chart represents the total line added and deleted on the PC Engines coreboot fork against the rebase point for a given release. Check the statistics with:
git diff --stat 22d66ef ':(exclude).gitlab-ci.yml' ':(exclude)CHANGELOG.md'
90 files changed, 2793 insertions(+), 199 deletions(-)
Two files have not been included in the diff as mentioned above since they are not a part of coreboot tree.
Testing
-
PC Engines hardware configuration matrix - hardware configurations available for testing in 3mdeb laboratory.
-
PC Engines release validation results - please note there are separate sheets for each board-release.
Test changes in this release:
- added GPIO driver (LED control) tests (3 test-cases)
- added GPIO driver (S1 switch handler) tests (1 test-case)
- improved Voyage installation test with regexp matches
- improved apu5 platform heat dissipation in the 3mdeb lab (CPB problems)
- Mainline:
- PASSED: 425 (+19)
- FAILED: 12 (+1)
- PASSED [%]: 97.25% (-0.11%)
- Legacy:
- PASSED: 372 (+4)
- FAILED: 10 (+1)
- PASSED [%]: 97.38% (-0.23%)
The difference in the PASSED
/FAILED
aggregated statistics results from the
apu3 watchdog fix, new GPIO driver tests and the returning USB detection problem.
Binaries
The signature files are not available yet. We are undergoing a new key deployment for the new coreboot 4.10 release. Each release beginning with v4.10.0.0 and v4.0.28 will be signed with PC Engines Open Source Firmware Release 4.10 Signing Key instead of 4.9. A new key will be announced along with a fresh canary publicly available at 3mdeb-secpack. The signature files will be updated as soon as the new key will be deployed.
Mainline
Legacy
See how to verify the signatures on asciinema
What we planned
-
Improve the support of TPM2 in coreboot and SeaBIOS. Currently there is only the TCPA (TPM1.2) log support in coreboot. Additionally SeaBIOS overwrites existing entries in TPM2 log area.
cbmem
utility also lacks support for displaying TPM2 log area.WORK IN PROGRESS
-
Validate ESXi 6.7. We have got information that booting ESXi 6.7 U2 fails on apu2 and are investigating the issue.
WORK IN PROGRESS
-
Fix bugs related to Nuvoton NCT5104D reset and implement GPIO access improvements.
WORK IN PROGRESS
-
Reorganize runtime configuration by making it persistent across updates and accessible from user space. Also prepare a tool for offline binary modification.
WORK IN PROGRESS
Coming soon
Feature and improvements on the roadmap:
- Improve the support of TPM2 in coreboot and SeaBIOS. Currently there is only
the TCPA (TPM1.2) log support in coreboot. Additionally SeaBIOS overwrites
existing entries in TPM2 log area.
cbmem
utility also lacks support for displaying TPM2 log area. - Validate ESXi 6.7. We have got information that booting ESXi 6.7 U2 fails on apu2 and are investigating the issue.
- Fix bugs related to Nuvoton NCT5104D reset and implement GPIO access improvements.
- Reorganize runtime configuration by making it persistent across updates and accessible from user space. Also prepare a tool for offline binary modification.
- Vital Product Data (VPD) support. User will have possibility to store and change VPD configuration in Read-Write section of SPI flash. Moreover, default VPD keys and values will be stored in Read-Only region to protect data against corruption. Also, sortbootorder runtime configuration will be stored in VPD Read-Write section, so access to it will be possible in OS via dedicated util.