PC Engines apu coreboot Open Source Firmware v4.12.0.2
PC Engines apu coreboot Open Source Firmware v4.12.0.2
Key changes
Mainline:
- Rebased with official coreboot repository commit f183626.
- New revisions of apu3 and apu4 named apu3d and apu4d will come with TPM header. Thus v4.12.0.2 enables TPM 2.0 on those platforms.
- Fixed incorrect serial number in dmidecode for apu1.
- With the new release of coreboot 4.12 3mdeb has a new key used for signing release images: PC Engines Open Source Firmware Release 4.12 Signing Key. Remember to import it to your GPG (or other key management software) before signature verification.
- We are cleaning up the MP table and IRQ tables for apu2 from incorrect entries and non-existing devices (WIP): https://review.coreboot.org/c/coreboot/+/42097
- We have released a new canary which corrects an error with 3mdeb Master Key fingerprint. Previously the fingerprint was mistaken with PC Engines Open Source Firmware Release 4.9 key fingerprint.
Legacy:
- Fixed watchdog not causing reset after cold boot.
coreboot community
Patches merged by community:
Patches sent for review:
Total:
- 3 lines added,
- 3 lines removed,
in official coreboot repository.
Statistics
The chart shows the total files changed from release tag against the rebase point of given release specified in CHANGELOG (CHANGELOG.md and gitlab-ci.yml excluded from statistics). Check the statistics with:
git diff --stat f183626 ':(exclude).gitlab-ci.yml' ':(exclude)CHANGELOG.md'
103 files changed, 3829 insertions(+), 415 deletions(-)
The chart represents the total line added and deleted on the PC Engines coreboot fork against the rebase point for a given release.
Two files have not been included in the diff as mentioned above since they are not a part of coreboot tree.
The number of changes increased significantly, due to the TrenchBoot project development.
Testing
-
PC Engines hardware configuration matrix - hardware configurations available for testing in 3mdeb laboratory.
-
PC Engines release validation results - please note there are separate sheets for each board-release.
- Mainline:
- PASSED: 440 (-3)
- FAILED: 11 (+3)
- PASSED [%]: 97.56 (-0.67%)
- Legacy:
- PASSED: 385 (+6)
- FAILED: 4 (-7)
- PASSED [%]: 98.97 (+2.29%)
No particular changes in tests in this release. Regression didn’t detect new bugs. Decreased pass ratio for mainline has been caused by random Xen booting problems. Legacy has increased pass percentage due to fixed cold boot watchdog problem.
Binaries
Mainline
See how to verify the signatures on asciinema
What we planned
-
Improve the support of TPM2 in coreboot and SeaBIOS. Currently there is only the TCPA (TPM1.2) log support in coreboot. Additionally SeaBIOS overwrites existing entries in TPM2 log area.
cbmem
utility also lacks support for displaying TPM2 log area.WORK IN PROGRESS
-
Reorganize runtime configuration by making it persistent across updates and accessible from user space. Also prepare a tool for offline binary modification.
VERIFICATION
-
Vital Product Data (VPD) support. User will have possibility to store and change VPD configuration in Read-Write section of SPI flash. Moreover, default VPD keys and values will be stored in Read-Only region to protect data against corruption. Also, sortbootorder runtime configuration will be stored in VPD Read-Write section, so access to it will be possible in OS via dedicated util.
VERIFICATION
Coming soon
Feature and improvements on the roadmap:
- Improve the support of TPM2 in coreboot and SeaBIOS. Currently there is only
the TCPA (TPM1.2) log support in coreboot. Additionally SeaBIOS overwrites
existing entries in TPM2 log area.
cbmem
utility also lacks support for displaying TPM2 log area. - Reorganize runtime configuration by making it persistent across updates and accessible from user space. Also prepare a tool for offline binary modification.
- Vital Product Data (VPD) support. User will have possibility to store and change VPD configuration in Read-Write section of SPI flash. Moreover, default VPD keys and values will be stored in Read-Only region to protect data against corruption. Also, sortbootorder runtime configuration will be stored in VPD Read-Write section, so access to it will be possible in OS via dedicated util.