PC Engines apu coreboot Open Source Firmware v4.11.0.1
PC Engines apu coreboot Open Source Firmware v4.11.0.1
Key changes
Mainline:
- Rebased with official coreboot repository commit 9f56eed.
- Temperature is now being showed in pfSense dashboard.
coreboot community
Recent month was focused mainly on contribution to official coreboot repository in order to keep PC Engines boards in the tree. Recent coreboot release is enforcing certain features that board/silicon must support in order to be maintained on the master branch. Here is the list of patches sent for review and merged in order to achieve the goal.
Patches sent for review:
Patches merged by community:
-
sb/amd/{agesa,pi}/hudson: enable support for AMD common ACPIMMIO blocks
-
amd/pi/00730F01: Add support without BINARYPI_LEGACY_WRAPPER
-
vendorcode/amd/pi/Makefile.inc: remove -fno-zero-initialized-in-bss
-
sb/amd/{agesa,pi}/hudson: add southbridge C bootblock initialization
-
sb/amd/cimx/sb800: add C bootblock southbridge initialization
-
soc/amd/common/block/acpimmio: fix ACPIMMIO decode enable function
-
sb/amd/cimx: replace cimx_util with common ACPIMMIO AMD block
Statistics
The chart shows the total files changed from release tag against the rebase point of given release specified in CHANGELOG (CHANGELOG.md and gitlab-ci.yml excluded from statistics). Check the statistics with:
git diff --stat 9f56eed ':(exclude).gitlab-ci.yml' ':(exclude)CHANGELOG.md'
97 files changed, 3219 insertions(+), 413 deletions(-)
The chart represents the total line added and deleted on the PC Engines coreboot fork against the rebase point for a given release. Check the statistics with:
git diff --stat 9f56eed ':(exclude).gitlab-ci.yml' ':(exclude)CHANGELOG.md'
97 files changed, 3219 insertions(+), 413 deletions(-)
Two files have not been included in the diff as mentioned above since they are not a part of coreboot tree.
Testing
-
PC Engines hardware configuration matrix - hardware configurations available for testing in 3mdeb laboratory.
-
PC Engines release validation results - please note there are separate sheets for each board-release.
There are no test changes in this release.
- Mainline:
- PASSED: 427 (-1)
- FAILED: 10 (+1)
- PASSED [%]: 97.71% (-0.23%)
This release does not have tests changes, therefore there is slight difference
in the aggregated statistics. Slightly worse overall PASSED
tests percentage
results from the on-going random USB detection problem and TinyCore boot
stability, whether it will affect the current iteration or not.
Binaries
Mainline
See how to verify the signatures on asciinema
What we planned
-
Improve the support of TPM2 in coreboot and SeaBIOS. Currently there is only the TCPA (TPM1.2) log support in coreboot. Additionally SeaBIOS overwrites existing entries in TPM2 log area.
cbmem
utility also lacks support for displaying TPM2 log area.WORK IN PROGRESS
-
Validate ESXi 6.7. We have got information that booting ESXi 6.7 U2 fails on apu2 and are investigating the issue.
WORK IN PROGRESS
-
Reorganize runtime configuration by making it persistent across updates and accessible from user space. Also prepare a tool for offline binary modification.
WORK IN PROGRESS
-
Vital Product Data (VPD) support. User will have possibility to store and change VPD configuration in Read-Write section of SPI flash. Moreover, default VPD keys and values will be stored in Read-Only region to protect data against corruption. Also, sortbootorder runtime configuration will be stored in VPD Read-Write section, so access to it will be possible in OS via dedicated util.
WORK IN PROGRESS
Coming soon
Feature and improvements on the roadmap:
- Improve the support of TPM2 in coreboot and SeaBIOS. Currently there is only
the TCPA (TPM1.2) log support in coreboot. Additionally SeaBIOS overwrites
existing entries in TPM2 log area.
cbmem
utility also lacks support for displaying TPM2 log area. - Validate ESXi 6.7. We have got information that booting ESXi 6.7 U2 fails on apu2 and are investigating the issue.
- Reorganize runtime configuration by making it persistent across updates and accessible from user space. Also prepare a tool for offline binary modification.
- Vital Product Data (VPD) support. User will have possibility to store and change VPD configuration in Read-Write section of SPI flash. Moreover, default VPD keys and values will be stored in Read-Only region to protect data against corruption. Also, sortbootorder runtime configuration will be stored in VPD Read-Write section, so access to it will be possible in OS via dedicated util.