2020-11-20 11:33:32 +01:00
|
|
|
coreboot 4.13
|
2020-05-11 23:46:35 +02:00
|
|
|
================================
|
|
|
|
|
2020-11-20 11:33:32 +01:00
|
|
|
coreboot 4.13 was released on November 20th, 2020.
|
|
|
|
|
|
|
|
Since 4.12 there were 4200 new commits by over 234 developers.
|
|
|
|
Of these, about 72 contributed to coreboot for the first time.
|
|
|
|
|
|
|
|
Thank you to all developers who again helped made coreboot better
|
|
|
|
than ever, and a big welcome to our new contributors!
|
|
|
|
|
|
|
|
New mainboards
|
|
|
|
--------------
|
|
|
|
|
|
|
|
- Acer G43T-AM3
|
|
|
|
- AMD Cereme
|
|
|
|
- Asus A88XM-E FM2+
|
|
|
|
- Biostar TH61-ITX
|
|
|
|
- BostenTech GBYT4
|
|
|
|
- Clevo L140CU/L141CU
|
|
|
|
- Dell OptiPlex 9010
|
|
|
|
- Example Min86 (fake board)
|
|
|
|
- Google Ambassador
|
|
|
|
- Google Asurada
|
|
|
|
- Google Berknip
|
|
|
|
- Google Boldar
|
|
|
|
- Google Boten
|
|
|
|
- Google Burnet
|
|
|
|
- Google Cerise
|
|
|
|
- Google Coachz
|
|
|
|
- Google Dalboz
|
|
|
|
- Google Dauntless
|
|
|
|
- Google Delbin
|
|
|
|
- Google Dirinboz
|
|
|
|
- Google Dooly
|
|
|
|
- Google Drawcia
|
|
|
|
- Google Eldrid
|
|
|
|
- Google Elemi
|
|
|
|
- Google Esche
|
|
|
|
- Google Ezkinil
|
|
|
|
- Google Faffy
|
|
|
|
- Google Fennel
|
|
|
|
- Google Genesis
|
|
|
|
- Google Hayato
|
|
|
|
- Google Lantis
|
|
|
|
- Google Lindar
|
|
|
|
- Google Madoo
|
|
|
|
- Google Magolor
|
|
|
|
- Google Metaknight
|
|
|
|
- Google Morphius
|
|
|
|
- Google Noibat
|
|
|
|
- Google Pompom
|
|
|
|
- Google Shuboz
|
|
|
|
- Google Stern
|
|
|
|
- Google Terrador
|
|
|
|
- Google Todor
|
|
|
|
- Google Trembyle
|
|
|
|
- Google Vilboz
|
|
|
|
- Google Voema
|
|
|
|
- Google Volteer2
|
|
|
|
- Google Voxel
|
|
|
|
- Google Willow
|
|
|
|
- Google Woomax
|
|
|
|
- Google Wyvern
|
|
|
|
- HP EliteBook 2560p
|
|
|
|
- HP EliteBook Folio 9480m
|
|
|
|
- HP ProBook 6360b
|
|
|
|
- Intel Alderlake-P RVP
|
|
|
|
- Kontron COMe-bSL6
|
|
|
|
- Lenovo ThinkPad X230s
|
|
|
|
- Open Compute Project DeltaLake
|
|
|
|
- Prodrive Hermes
|
|
|
|
- Purism Librem Mini
|
|
|
|
- Purism Librem Mini v2
|
|
|
|
- Siemens Chili
|
|
|
|
- Supermicro X11SSH-F
|
|
|
|
- System76 lemp9
|
|
|
|
|
|
|
|
Removed mainboards
|
|
|
|
------------------
|
|
|
|
|
|
|
|
- Google Cheza
|
|
|
|
- Google DragonEgg
|
|
|
|
- Google Ripto
|
|
|
|
- Google Sushi
|
|
|
|
- Open Compute Project SonoraPass
|
2020-05-11 23:46:35 +02:00
|
|
|
|
|
|
|
Significant changes
|
|
|
|
-------------------
|
|
|
|
|
2020-11-11 10:26:11 +01:00
|
|
|
### Native refcode implementation for Bay Trail
|
|
|
|
|
|
|
|
Bay Trail no longer needs a refcode binary to function properly. The refcode
|
|
|
|
was reimplemented as coreboot code, which should be functionally equivalent.
|
|
|
|
Thus, coreboot only needs to run the MRC.bin to successfully boot Bay Trail.
|
|
|
|
|
|
|
|
### Unusual config files to build test more code
|
|
|
|
|
|
|
|
There's some new highly-unusual config files, whose only purpose is to coerce
|
|
|
|
Jenkins into build-testing several disabled-by-default coreboot config options.
|
|
|
|
This prevents them from silently decaying over time because of build failures.
|
|
|
|
|
|
|
|
### Initial support for Intel Trusted eXecution Technology
|
|
|
|
|
|
|
|
coreboot now supports enabling Intel TXT. Though it's not feature-complete yet,
|
|
|
|
the code allows successfully launching tboot, a Measured Launch Environment. It
|
|
|
|
was tested on Haswell using an Asrock B85M Pro4 mainboard with TPM 2.0 on LPC.
|
|
|
|
Though support for other platforms is still not ready, it is being worked on.
|
|
|
|
The Haswell MRC.bin needs to be patched so as to enable DPR. Given that the MRC
|
|
|
|
binary cannot be redistributed, the best long-term solution is to replace it.
|
|
|
|
|
2020-05-20 18:05:08 +02:00
|
|
|
### Hidden PCI devices
|
|
|
|
|
|
|
|
This new functionality takes advantage of the existing 'hidden' keyword in the
|
|
|
|
devicetree. Since no existing boards were using the keyword, its usage was
|
|
|
|
repurposed to make dealing with some unique PCI devices easier. The particular
|
|
|
|
case here is Intel's PMC (Power Management Controller). During the FSP-S run,
|
|
|
|
the PMC device is made hidden, meaning that its config space looks as if there
|
|
|
|
is no device there (Vendor ID reads as 0xFFFF_FFFF). However, the device does
|
|
|
|
have fixed resources, both MMIO and I/O. These were previously recorded in
|
|
|
|
different places (MMIO was typically an SA fixed resource, and I/O was treated
|
|
|
|
as an LPC resource). With this change, when a device in the tree is marked as
|
|
|
|
'hidden', it is not probed (`pci_probe_dev()`) but rather assumed to exist so
|
|
|
|
that its resources can be placed in a more natural location. This also adds the
|
|
|
|
ability for the device to participate in SSDT generation.
|
|
|
|
|
2020-06-05 09:31:21 +02:00
|
|
|
### Tools for generating SPDs for LP4x memory on TGL and JSL
|
|
|
|
|
|
|
|
A set of new tools `gen_spd.go` and `gen_part_id.go` are added to automate the
|
|
|
|
process of generating SPDs for LP4x memory and assigning hardware strap IDs for
|
|
|
|
memory parts used on TGL and JSL based boards. The SPD data obtained from memory
|
|
|
|
part vendors has to be massaged to format it correctly as per JEDEC and Intel MRC
|
|
|
|
expectations. These tools take a list of memory parts describing their physical
|
|
|
|
attributes as per their datasheet and convert those attributes into SPD files for
|
|
|
|
the platforms. More details about the tools are added in
|
|
|
|
[README.md](https://review.coreboot.org/plugins/gitiles/coreboot/+/refs/heads/master/util/spd_tools/intel/lp4x/README.md).
|
|
|
|
|
2020-07-21 23:48:48 +02:00
|
|
|
### New version of SMM loader
|
|
|
|
|
2020-11-19 17:33:57 +01:00
|
|
|
A new version of the SMM loader which accommodates platforms with over 32
|
2020-07-21 23:48:48 +02:00
|
|
|
CPU threads. The existing version of SMM loader uses a 64K code/data
|
|
|
|
segment and only a limited number of CPU threads can fit into one segment
|
|
|
|
(because of save state, STM, other features, etc). This loader extends beyond
|
2020-11-17 15:56:21 +01:00
|
|
|
the 64K segment to accommodate additional CPUs and in theory allows as many
|
2020-07-21 23:48:48 +02:00
|
|
|
CPU threads as possible limited only by SMRAM space and not by 64K. By default
|
|
|
|
this loader version is disabled. Please see cpu/x86/Kconfig for more info.
|
|
|
|
|
2020-09-05 05:12:27 +02:00
|
|
|
### Address Sanitizer
|
|
|
|
|
|
|
|
coreboot now has an in-built Address Sanitizer, a runtime memory debugger
|
|
|
|
designed to find out-of-bounds access and use-after-scope bugs. It is made
|
|
|
|
available on all x86 platforms in ramstage and on QEMU i440fx, Intel Apollo
|
|
|
|
Lake, and Haswell in romstage. Further, it can be enabled in romstage on other
|
|
|
|
x86 platforms as well. Refer [ASan documentation](../technotes/asan.md) for
|
|
|
|
more info.
|
|
|
|
|
2020-08-25 20:59:59 +02:00
|
|
|
### Initial support for x86_64
|
|
|
|
|
2020-11-17 15:56:21 +01:00
|
|
|
The x86_64 code support has been revived and enabled for QEMU. While it started
|
2020-08-25 20:59:59 +02:00
|
|
|
as PoC and the only supported platform is an emulator, there's interest in
|
|
|
|
enabling additional platforms. It would allow to access more than 4GiB of memory
|
|
|
|
at runtime and possibly brings optimised code for faster execution times.
|
|
|
|
It still needs changes in assembly, fixed integer to pointer conversions in C,
|
|
|
|
wrappers for blobs, support for running Option ROMs, among other things.
|
|
|
|
|
2020-11-10 17:50:28 +01:00
|
|
|
### Preparations to minimize enabling PCI bus mastering
|
|
|
|
|
|
|
|
For security reasons, bus mastering should be enabled as late as possible. In
|
|
|
|
coreboot, it's usually not necessary and payloads should only enable it for
|
|
|
|
devices they use. Since not all payloads enable bus mastering properly yet,
|
|
|
|
some Kconfig options were added as an intermediate step to give some sort of
|
|
|
|
"backwards compatibility", which allow enabling or disabling bus mastering by
|
|
|
|
groups.
|
|
|
|
|
|
|
|
Currently available groups are:
|
|
|
|
|
|
|
|
* PCI bridges
|
|
|
|
* Any devices
|
|
|
|
|
|
|
|
For now, "Any devices" is enabled by default to keep the traditional behaviour,
|
|
|
|
which also includes all other options. This is currently necessary, for instance,
|
|
|
|
for libpayload-based payloads as the drivers don't enable bus mastering for PCI
|
|
|
|
bridges.
|
|
|
|
|
|
|
|
Exceptional cases, that may still need early bus master enabling in the future,
|
|
|
|
should get their own per-reason Kconfig option. Ideally before the next release.
|
|
|
|
|
2020-11-17 15:55:22 +01:00
|
|
|
### Early runtime configurability of the console log level
|
|
|
|
|
|
|
|
Traditionally, we didn't allow the log level of the `romstage` console
|
|
|
|
to be changed at runtime (e.g. via `get_option()`). It turned out that
|
|
|
|
the technical constraints for this (no global variables in `romstage`)
|
|
|
|
vanished long ago, though. The new behaviour is to query `get_option()`
|
|
|
|
now from the second stage that uses the console on. In other words, if
|
|
|
|
the `bootblock` already enables the console, the `romstage` log level
|
|
|
|
can be changed via `get_option()`. Keeping the log level of the first
|
|
|
|
console static ensures that we can see console output even if there's
|
|
|
|
a bug in the more involved code to query options.
|
|
|
|
|
2020-11-17 08:05:35 +01:00
|
|
|
### Resource allocator v4
|
|
|
|
|
|
|
|
A new revision of resource allocator v4 is now added to coreboot that supports
|
2021-10-01 22:10:19 +02:00
|
|
|
multiple ranges for allocating resources. Unlike the previous allocator (v3), it does
|
2020-11-17 08:05:35 +01:00
|
|
|
not use the topmost available window for allocation. Instead, it uses the first
|
|
|
|
window within the address space that is available and satisfies the resource request.
|
|
|
|
This allows utilization of the entire available address space and also allows
|
|
|
|
allocation above the 4G boundary. The old resource allocator v3 is still retained for
|
|
|
|
some AMD platforms that do not conform to the requirements of the allocator.
|
|
|
|
|
2020-11-10 17:50:28 +01:00
|
|
|
Deprecations
|
|
|
|
------------
|
|
|
|
|
|
|
|
### PCI bus master configuration options
|
|
|
|
|
|
|
|
In order to minimize the usage of PCI bus mastering, the options we introduced in
|
|
|
|
this release will be dropped in a future release again. For more details, please
|
|
|
|
see [Preparations to minimize enabling PCI bus mastering](#preparations-to-minimize-enabling-pci-bus-mastering-in-coreboot).
|
2020-11-17 08:05:35 +01:00
|
|
|
|
|
|
|
### Resource allocator v3
|
|
|
|
|
|
|
|
Resource allocator v3 is retained in coreboot tree because the following platforms
|
|
|
|
do not conform to the requirements of the resource allocation i.e. not all the fixed
|
|
|
|
resources of the platform are provided during the `read_resources()` operation:
|
|
|
|
|
|
|
|
* northbridge/amd/pi/00630F01
|
|
|
|
* northbridge/amd/pi/00730F01
|
|
|
|
* northbridge/amd/pi/00660F01
|
|
|
|
* northbridge/amd/agesa/family14
|
|
|
|
* northbridge/amd/agesa/family15tn
|
|
|
|
* northbridge/amd/agesa/family16kb
|
|
|
|
|
|
|
|
In order to have a single unified allocator in coreboot, this notice is being added
|
|
|
|
to ensure that the platforms listed above are fixed before the next release. If there
|
|
|
|
is interest in maintaining support for these platforms beyond the next release,
|
|
|
|
please ensure that the platforms are fixed to conform to the expectations of resource
|
|
|
|
allocation.
|
2020-11-19 17:04:20 +01:00
|
|
|
|
|
|
|
Notes
|
|
|
|
-----
|
|
|
|
|
|
|
|
### Intel microcode updates
|
|
|
|
|
|
|
|
Intel microcode updates tagged *microcode-20200616* are still included in our
|
|
|
|
builds. Note, [Intel released new microcode updates]
|
|
|
|
(https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/blob/main/releasenote.md)
|
|
|
|
tagged
|
|
|
|
|
|
|
|
1. *microcode-20201110*
|
|
|
|
2. *microcode-20201112*
|
|
|
|
3. *microcode-20201118*
|
|
|
|
|
|
|
|
with security updates for [INTEL-SA-00381]
|
|
|
|
(https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html)
|
|
|
|
and [INTEL-SA-00389]
|
|
|
|
(https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389.html).
|
|
|
|
|
|
|
|
Due to too short time for rigorous testing and bad experience with botched
|
|
|
|
microcode updates in the past, these new updates are not included. Users wanting
|
|
|
|
to use those, can apply them in the operating system, or update the submodule
|
|
|
|
pointer themselves.
|