Did you try with the RP supply_apfs flag instead of efi file as well?
Assume the efi was from 0.11.2
no and yes, I just added the APFS Efi Driver file. It was loaded and working.
Did you try with the RP supply_apfs flag instead of efi file as well?
Assume the efi was from 0.11.2
It's not BootROM related in any way - you can make it worse with a corrupted/full NVRAM, but you can't make it better.So Alex when you built my boot rom you added the more up to date rom drivers from the 2012 era. Is it a possibility right now that those who are having these problems are all using the 2010 era? Just asking. I will not be trying any of this because I don’t have a spare machine that be offline from this kind of experimentation.
The 25L3205D is related for 100,000 P/E cycles - that's rewriting the entire chip 100,000 times. Assuming every reboot rewrites the entire chip (which it doesn't), a 2009 Mac Pro would have had to have been rebooted 23x every single day the past 12 years to exhaust that chip.the bootrom chip itself:
every reboot will write to the nvram section of the Firmware in that chip.
I dont recommend to let the box boot the whole night thru cause of the wear.
You understood it wrong, it's not the whole chip that can be rewritten 100k times, but the NAND cell/sector (it's a sectored chip) is certified to have endurance over 100K cycles of erase/rewrite (JEDEC A117).The 25L3205D is related for 100,000 P/E cycles - that's rewriting the entire chip 100,000 times. Assuming every reboot rewrites the entire chip (which it doesn't), a 2009 Mac Pro would have had to have been rebooted 23x every single day the past 12 years to exhaust that chip.
You can also buy a blank for $10 if you know someone with a SPI programmer, or buy one already flashed off eBay (with someone else's, likely blacklisted, serial number), solder it on, then flash your backup onto it.
But still, not a good idea to leave it in a reboot cycle all night.
The endurance specification of a flash device should be evaluated in terms of the projected in-system rate of erasure for any given sector. The sectors used for data logging may rapidly accumulate erase cycles depending on the frequency and size of the data being captured. Such use may ultimately lead to those sectors failing first. As such, the shorter the Program/Erase interval time between Program/Erase cycles, the worse the data retention. Longer interval times between Program/Erase cycles can de-trap the excess trapped electrons between Program/Erase cycles, resulting in better data retention. Figure 8 shows an example of the retention lifetime over a variety of interval times, assuming 20 years retention lifetime after 10k Program/Erase cycles at an average of 55 degree Celsius cycling, under JEDEC test conditions.
I wouldn't think so, as Syncretic discovered the issue to be Apple using entirely new bootstrap code in 11.3b3, which is the version that we started having issues with. Highly unlikely (but possible) that Apple would include that code in previous OS updates, and especially not Mojave, as our 5,1 Mac Pro's are still supported under Mojave. That would be GREAT if they did however.Some of the active ones would have noticed this obviously sooner or later, but could there be some kind of a correlation
Some of the active ones would have noticed this obviously sooner or later, but could there be some kind of a correlation here:
Yesterday at 22:08
That post is for a Catalina security update - I would highly doubt Apple would update the bootstrap code, in a security update, for the previous OS, but never know I suppose.I read that and thaught also: aha, another race condition.
if that bootstrap code is timing critical it could affect other supported Macs In special, untested configuration.
why not? So the ball goes back to the mothership to fix their code.
at least, hope so.
I think I still have one 2018 Mac mini that hasn't been upgraded at the shop yet. If it's a slow day today I can check it out, and give it a try although, the other 2 that are upgraded are not showing any signs of issues yet.Thinking backwards a bit, is there any way to make a supported machine exhibit this race condition? Then it would be an official bug report that Apple would need to fix. I don't have a supported machine, or I'd be hard at work trying every combination to make it fail right now.
The warning on the first post was written by me, please follow the link, read the instructions and check it.@VitaminK You mention NVRAM and bricking the Mac Pro in your post.
Yes.Out of curiosity, this is the same brick that requires one to then purchase a MATT card correct?
This is a lot more complicated than it appears. NVRAM with Intel Macs is not a battery backed SRAM like with PPCs that you just remove the power and it's fresh from factory.Does merely resetting the NVRAM too many times have the same effect?
Sorry it's a bit unrelated, but my biggest fear is accidentally bricking my Mac Pro.
The warning on the first post was written by me, please follow the link, read the instructions and check it.
Yes.
This is a lot more complicated than it appears. NVRAM with Intel Macs is not a battery backed SRAM like with PPCs that you just remove the power and it's fresh from factory.
What it's called "NVRAM reset" is a triggered/forced garbage collection that happens inside the NVRAM volume that is stored in the BootROM. The NVRAM is not really erased when you reset it.
A lot of info inside the NVRAM volume is permanent, while some are almost permanent and some are transient. The reset NVRAM procedure removes the transient (like default boot device/default sound volume/etc), the "deep NVRAM reset", when working, removes the transient and some of the almost permanent (like the MemoryConfig variables), but you never get a pristine NVRAM volume with a NVRAM reset - you never get it back factory fresh like it's possible with a PPC Mac (the exception is with BootROM reconstructions where a firmware engineer recreates the never booted image of your Mac Pro BootROM).
I've read that someone forced hundreds of NVRAM resets overnight using a Arduino, this is beyond crazy and doing it will kill the SPI flash memory (read post #755).
Maybe this helps a little to understand the early boot process for 11.3
even this is for M1 Macs it should have a lot in common:
Booting an M1 Mac: external disks and local boot policy
How an M1 Mac can start up from an external bootable disk, and how that can fail. All about boot security policy, and how that’s applied.eclecticlight.co
also the linked pdf is very informative
start reading at page 41
Intel-based Mac computers without a T2 chip An Intel-based Mac without a T2 chip doesn’t support secure boot. Therefore the UEFI firmware loads the macOS booter (boot.efi) from the file system without verification, and the booter loads the kernel (prelinkedkernel) from the file system without verification. To protect the integrity of the boot chain, users should enable all of the following security mechanisms:
• System Integrity Protection (SIP): Enabled by default, this protects the booter and kernel against malicious writes from within a running macOS.
• FileVault: This can be enabled in two ways: by the user or by a mobile device management (MDM) administrator. This protects against a physically present attacker using Target Disk Mode to overwrite the booter.Apple Platform Security 43
• Firmware Password: This can be enabled in two ways: by the user or by an MDM administrator. This protects a physically present attacker from launching alternate boot modes such as recoveryOS, Single User Mode, or Target Disk Mode from which the booter can be overwritten. This also prevents booting from alternate media, by which an attacker could run code to overwrite the booter
It looks like the prohibitory sign is probably due to the filevault not able to unlock the hard drive so the Apple suggestion is actually to disable it:FileVault. Has anyone tried booting ≥11.3 with it? I wonder if the booting issue would be any different.
So I was on the phone with Apple support today and my adviser said the error messages in my boot log are very similar to those you would see when FileVault is not able to unlock your hard drive while booting.