coreboot 4.13
coreboot 4.13 was released on November 20th, 2020.
Since 4.12 there were 4200 new commits by over 234 developers. Of these, about 72 contributed to coreboot for the first time.
Thank you to all developers who again helped made coreboot better than ever, and a big welcome to our new contributors!
New mainboards
Acer G43T-AM3
AMD Cereme
Asus A88XM-E FM2+
Biostar TH61-ITX
BostenTech GBYT4
Clevo L140CU/L141CU
Dell OptiPlex 9010
Example Min86 (fake board)
Google Ambassador
Google Asurada
Google Berknip
Google Boldar
Google Boten
Google Burnet
Google Cerise
Google Coachz
Google Dalboz
Google Dauntless
Google Delbin
Google Dirinboz
Google Dooly
Google Drawcia
Google Eldrid
Google Elemi
Google Esche
Google Ezkinil
Google Faffy
Google Fennel
Google Genesis
Google Hayato
Google Lantis
Google Lindar
Google Madoo
Google Magolor
Google Metaknight
Google Morphius
Google Noibat
Google Pompom
Google Shuboz
Google Stern
Google Terrador
Google Todor
Google Trembyle
Google Vilboz
Google Voema
Google Volteer2
Google Voxel
Google Willow
Google Woomax
Google Wyvern
HP EliteBook 2560p
HP EliteBook Folio 9480m
HP ProBook 6360b
Intel Alderlake-P RVP
Kontron COMe-bSL6
Lenovo ThinkPad X230s
Open Compute Project DeltaLake
Prodrive Hermes
Purism Librem Mini
Purism Librem Mini v2
Siemens Chili
Supermicro X11SSH-F
System76 lemp9
Removed mainboards
Google Cheza
Google DragonEgg
Google Ripto
Google Sushi
Open Compute Project SonoraPass
Significant changes
Native refcode implementation for Bay Trail
Bay Trail no longer needs a refcode binary to function properly. The refcode was reimplemented as coreboot code, which should be functionally equivalent. Thus, coreboot only needs to run the MRC.bin to successfully boot Bay Trail.
Unusual config files to build test more code
There’s some new highly-unusual config files, whose only purpose is to coerce Jenkins into build-testing several disabled-by-default coreboot config options. This prevents them from silently decaying over time because of build failures.
Initial support for Intel Trusted eXecution Technology
coreboot now supports enabling Intel TXT. Though it’s not feature-complete yet, the code allows successfully launching tboot, a Measured Launch Environment. It was tested on Haswell using an Asrock B85M Pro4 mainboard with TPM 2.0 on LPC. Though support for other platforms is still not ready, it is being worked on. The Haswell MRC.bin needs to be patched so as to enable DPR. Given that the MRC binary cannot be redistributed, the best long-term solution is to replace it.
Tools for generating SPDs for LP4x memory on TGL and JSL
A set of new tools gen_spd.go
and gen_part_id.go
are added to automate the
process of generating SPDs for LP4x memory and assigning hardware strap IDs for
memory parts used on TGL and JSL based boards. The SPD data obtained from memory
part vendors has to be massaged to format it correctly as per JEDEC and Intel MRC
expectations. These tools take a list of memory parts describing their physical
attributes as per their datasheet and convert those attributes into SPD files for
the platforms. More details about the tools are added in
README.md.
New version of SMM loader
A new version of the SMM loader which accommodates platforms with over 32 CPU threads. The existing version of SMM loader uses a 64K code/data segment and only a limited number of CPU threads can fit into one segment (because of save state, STM, other features, etc). This loader extends beyond the 64K segment to accommodate additional CPUs and in theory allows as many CPU threads as possible limited only by SMRAM space and not by 64K. By default this loader version is disabled. Please see cpu/x86/Kconfig for more info.
Address Sanitizer
coreboot now has an in-built Address Sanitizer, a runtime memory debugger designed to find out-of-bounds access and use-after-scope bugs. It is made available on all x86 platforms in ramstage and on QEMU i440fx, Intel Apollo Lake, and Haswell in romstage. Further, it can be enabled in romstage on other x86 platforms as well. Refer ASan documentation for more info.
Initial support for x86_64
The x86_64 code support has been revived and enabled for QEMU. While it started as PoC and the only supported platform is an emulator, there’s interest in enabling additional platforms. It would allow to access more than 4GiB of memory at runtime and possibly brings optimised code for faster execution times. It still needs changes in assembly, fixed integer to pointer conversions in C, wrappers for blobs, support for running Option ROMs, among other things.
Preparations to minimize enabling PCI bus mastering
For security reasons, bus mastering should be enabled as late as possible. In coreboot, it’s usually not necessary and payloads should only enable it for devices they use. Since not all payloads enable bus mastering properly yet, some Kconfig options were added as an intermediate step to give some sort of “backwards compatibility”, which allow enabling or disabling bus mastering by groups.
Currently available groups are:
PCI bridges
Any devices
For now, “Any devices” is enabled by default to keep the traditional behaviour, which also includes all other options. This is currently necessary, for instance, for libpayload-based payloads as the drivers don’t enable bus mastering for PCI bridges.
Exceptional cases, that may still need early bus master enabling in the future, should get their own per-reason Kconfig option. Ideally before the next release.
Early runtime configurability of the console log level
Traditionally, we didn’t allow the log level of the romstage
console
to be changed at runtime (e.g. via get_option()
). It turned out that
the technical constraints for this (no global variables in romstage
)
vanished long ago, though. The new behaviour is to query get_option()
now from the second stage that uses the console on. In other words, if
the bootblock
already enables the console, the romstage
log level
can be changed via get_option()
. Keeping the log level of the first
console static ensures that we can see console output even if there’s
a bug in the more involved code to query options.
Resource allocator v4
A new revision of resource allocator v4 is now added to coreboot that supports multiple ranges for allocating resources. Unlike the previous allocator (v3), it does not use the topmost available window for allocation. Instead, it uses the first window within the address space that is available and satisfies the resource request. This allows utilization of the entire available address space and also allows allocation above the 4G boundary. The old resource allocator v3 is still retained for some AMD platforms that do not conform to the requirements of the allocator.
Deprecations
PCI bus master configuration options
In order to minimize the usage of PCI bus mastering, the options we introduced in this release will be dropped in a future release again. For more details, please see Preparations to minimize enabling PCI bus mastering.
Resource allocator v3
Resource allocator v3 is retained in coreboot tree because the following platforms
do not conform to the requirements of the resource allocation i.e. not all the fixed
resources of the platform are provided during the read_resources()
operation:
northbridge/amd/pi/00630F01
northbridge/amd/pi/00730F01
northbridge/amd/pi/00660F01
northbridge/amd/agesa/family14
northbridge/amd/agesa/family15tn
northbridge/amd/agesa/family16kb
In order to have a single unified allocator in coreboot, this notice is being added to ensure that the platforms listed above are fixed before the next release. If there is interest in maintaining support for these platforms beyond the next release, please ensure that the platforms are fixed to conform to the expectations of resource allocation.
Notes
Intel microcode updates
Intel microcode updates tagged microcode-20200616 are still included in our builds. Note, [Intel released new microcode updates] (https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/blob/main/releasenote.md) tagged
microcode-20201110
microcode-20201112
microcode-20201118
with security updates for [INTEL-SA-00381] (https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html) and [INTEL-SA-00389] (https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389.html).
Due to too short time for rigorous testing and bad experience with botched microcode updates in the past, these new updates are not included. Users wanting to use those, can apply them in the operating system, or update the submodule pointer themselves.