User:GNUtoo: Difference between revisions

From coreboot
Jump to navigation Jump to search
(→‎fallback improvements: Even if the patch weren't merged, the functionality is now present in coreboot.)
(34 intermediate revisions by the same user not shown)
Line 1: Line 1:
== Contributions ==
== Wiki contributions ==
My contributions to this wiki are available under the following licenses:
* [https://creativecommons.org/licenses/by-sa/3.0/legalcode CC-BY-SA 3.0]
* [https://creativecommons.org/licenses/by-sa/4.0/legalcode CC-BY-SA 4.0] or later
* [https://www.gnu.org/licenses/fdl.txt GFDL 1.3] or later
 
== Code contributions ==
In the [https://review.coreboot.org/gitweb?p=coreboot.git;a=blob;f=Documentation/gerrit_guidelines.md;h=1833b0a8f0dc89001547c73457d113a4a56fbd31;hb=refs/heads/master#l31 gerrit guidelines] there the follwing line: "Don't modify other people's patches without their consent."
In the [https://review.coreboot.org/gitweb?p=coreboot.git;a=blob;f=Documentation/gerrit_guidelines.md;h=1833b0a8f0dc89001547c73457d113a4a56fbd31;hb=refs/heads/master#l31 gerrit guidelines] there the follwing line: "Don't modify other people's patches without their consent."
I consent to the modification of my patches by anybody. I work on specific things because no one wants to do what I want to do. Else I'd be happy to pick the next task in my huge TODO list.


I've contributed to the following ports:
I consent to the modification of my patches by anybody. I work on specific things because no one wants to do what I want to do. Else I'd be happy if someone else did the work, so I could pick the next task in my huge TODO list.
* M4A785T-M: I've been the main person working on it.
* Lenovo X60: I've been working on the native GPU init, and various other improvements.
* Lenovo T60: I've been working on some improvements.
* Alix 1.C: I've been working on some improvements.


Interests:
Interests:
Line 88: Line 89:
== Personal oppinions ==
== Personal oppinions ==
=== Microcode ===
=== Microcode ===
The issue about the CPU microcodes is that they are non-free, and under a license that is incompatible with coreboot's license.
* The CPU microcodes are under a non-free license that is incompatible with coreboot's license.
* They are now moved away in a separate repository.


Practically speaking, I guess that if the microcode is in the cbfs(coreboot filesystem) instead of beeing integrated directly in coreboot, that would count as agrgate work and should be safe, but I'm not a lawyer(so ask a good one instead).
Some people say that the microcode is the equivalent of having a more recent CPU, as a justification for using it.
The solution would then be to remove the microcodes from the coreboot repositories.
 
(I guess that it would then end up in the blob repository instead which is a separate repository, and would then be included in the coreboot filesytem).


Some people say that the microcode is the equivalent of having a more recent CPU, as a justification for using it.
However since Intel microcodes are encrypted and signed, so we cannot know what they really do.
Though since Intel microcodes are encrypted and signed, its meaning is not public, therefore we can't really know what's inside, so people usually trust what the CPU vendor say about it, such as that it fixes some bugs(erratas for such bugs are published).
* People usually trust what the CPU vendor say about it, such as that it fixes some bugs(erratas for such bugs are published), but we don't know much more.
* Speculating about what they really do or cannot do won't help much since we usually cannot verify that information.


My goal is to have a 100% free computer, and also to spread that code, so that other people can have a 100% free computer too.
My goal is to have a 100% free computer, and also to spread that code, so that other people can have a 100% free computer too.
According to the FSF, and the FSF criterias for differenciating software from hardware, that microcode is software.
According to the FSF, and the FSF criteria for differentiating software from hardware, that microcode is software.
So since they consider it as non-free, a coreboot image containing that microcode would not be considered free by the FSF.
So since they consider it as non-free, a coreboot image containing that microcode would not be considered free by the FSF.


On my Lenovo x60, the microcode was easy to remove, and it worked fine, beside printing a scary kernel message pointing to an Intel errata.
On my Lenovo x60, the microcode was easy to remove, and it worked fine, beside printing a scary kernel message pointing to an Intel errata.
Practically speaking, after resuming(so after suspend to ram), the temperatures reading will not be updated, and the temperature overheat will not be reported. The hardware issues you may encounter will depend on your specific CPU, not the model, but instead the date at which it was manufactured.


The result of it is that the FSF certified the gluglug's lenovo x60: gluglug removed the last microcodes(that were not used by the x60), sent that source code to the FSF, which certified it.
What the errata says is that, when resuming from suspend to ram, the temperatures reading will not be updated, and the temperature overheat will not be reported. The hardware issues you may encounter will depend on your specific CPU. Not the CPU model, but instead the date at which it was manufactured.
So instead of debating trough huge flames aobut the fact that we should use, or not use the microcode, it was more effective to remove it.
(To know if you are affected, under GNU/Linux, you can run the "dmesg" command and  look for "coretemp: Errata AE18 not fixed, update BIOS or microcode of the CPU!" in its output. If you found it, you are affected)
The benefit is the publicity arround that laptop that can be made 100% free software, which makes users aware of it and willing to switch to it.
 
Removing the microcode make it possible to have the gluglug (now minifree) Lenovo Thinkpad X60 ceritified "Respects your freedom" By the FSF.
 
So instead of debating trough huge flames about the fact that we should use, or not use the microcode, it was more effective to remove it and get the laptop certified.
 
The benefit of that is the publicity around the fact that this laptop can be made to run 100% free software. This makes users aware of it and willing to switch to it.


=== Yabel ===
=== Yabel ===
Yabel is great for tracing what the GPU does.
Yabel can be used for tracing what the GPU does, but it cannot really prevent a proprietary VGA option rom from doing nasty tricks:


But the GPUs in the Lenovo x60 and t60 have a bar that gives access to the whole memory:
The GPUs in the Lenovo x60 and t60 have a bar that gives access to the whole memory:
  Region 1: I/O ports at 50a0 [size=8]
  Region 1: I/O ports at 50a0 [size=8]
So using Yabel to prevent the VGA option rom from doing nasty tricks is probably not safe enough.


I was told that many other GPU also have that issue.
I was told that many other GPU also have that issue.
Line 134: Line 136:
** It probably applies to the Lenovo t60 that have an Intel GPU, with no or very minor modifications.
** It probably applies to the Lenovo t60 that have an Intel GPU, with no or very minor modifications.


== Hardware ==
== My hardware ==
=== Mainboard/Devices running coreboot ===
=== Mainboard/Devices running coreboot ===
{| class="wikitable"  border="1"
{| class="wikitable"  border="1"
Line 140: Line 142:
! Serial/output
! Serial/output
! flash recovery mecanism
! flash recovery mecanism
! My area of interest
! What I worked on
|-
|-
| Asrock E350M1
| Asrock E350M1
|  
|  
* cbmem -c
* Serial
* Serial
* Some other outputs may work but I didn't test them.
| rowspan="3" |
|  
* External programmer
* External programmer
* Swapping the flash chip
* Swapping the flash chip
|
|
* Powering off the GPU
* Low noise home server use case
|-
|-
| Asus F2A85-M PRO
| Asus F2A85-M PRO
|
|
* cbmem -c
* cbmem -c
|
| rowspan="2" |
* External programmer
* Swapping the flash chip
|
* I've been the main porter.
* I've been the main porter.
* Usability improvements
* Usability improvements
Line 165: Line 162:
| Asus M4A785T-M
| Asus M4A785T-M
|
|
* cbmem -c
* Serial
* Serial
|
* External programmer
* Swapping the flash chip
|
* I've been the main porter.
* Usability improvements
|-
|-
| Lenovo T60
| Lenovo X60
|
| rowspan="4" |
* cbmem -c
* Serial on the dock
* Serial on the dock
* spkmodem
* USB debug
* USB debug
* spkmodem(untried but should work)
| rowspan="5" |
| External programmer with pomona clip(untried but should work)
* External programmer with pomona clip
|
| rowspan="2" |
* Native GPU init
* Native GPU init
* Usability improvements.
* Usability improvements.
|-
|-
| Lenovo X200T
| Lenovo X60T
|-
| Lenovo T60
|
|
* None tried yet
* Usability improvements.
* I've no compatbile dock
| I didn't flash it yet.
|
* Making it easier to flash.
* Checking its security and freedom to see how it can compare to the Lenovo X60.
|-
|-
| Lenovo X60
| Lenovo T400
|
* Serial on the dock
* USB debug
* spkmodem
| External programmer with pomona clip
|
|
* Native GPU init
* Secure boot with grub.
* Usability improvements.
|-
|-
| Lenovo X60T
| Lenovo X200
|
|
* None tried yet
* cbmem -c
* I've no compatbile dock
| External programmer with pomona clip
|
|
* Native GPU init
* Touchscreen support
* Usability improvements.
|-
|-
| PC Engines Alix 1.C
| <s>PC Engines Alix 1.C</s>
|
|
* Serial
* Serial
| Hot swap with the LPC dongle
|  
* <s>Hot swap with the LPC dongle</s> Bricked by flashing the same non-bootable image on the internal flash and on the LPC dongle.
|
|
* Usability improvements.
* Usability improvements.
Line 223: Line 202:


=== Mainboard/Devices not running coreboot (yet?) ===
=== Mainboard/Devices not running coreboot (yet?) ===
* <s>HP nc6320</s> Not worth it. I don't have this laptop anymore. Less prone to dis disassembly and reassembly than the Lenvo X60,X60T,T60. So doing a port will probably break the laptop due to the high number of disassemblies and reassemblies.
If you need to have some tests done on the default boot firwmare, you should ask me as it is fast to do if I've the laptop nearby.
* <s>Asus N71JQ</s> Broken by messing with the 3.3V line while flashing.


Note that they will probably never run coreboot, as I don't think they're worth the time.
{| class="wikitable"  border="1"
! Device/Mainboard
! Reason
|-
| Lenovo Thinkpad X200T
| I need to find a way to be able to easily, robustly, and safely reflash it:
* If a SOIC8 SPI chips is soldered instead of the WSON8 one, the solder past must not affect the stability of the SOIC8 clip. That is probably the most adapted way for me.
* Wires aren't ideal if they break easily.
* Internal flashing can't be trusted for freedom/privacy/security: The hardware probably permits boot firmwares to  very easily mess up with the flash content while it's being read or written: The hardware can probably be programmed to emmit SMM interrupts when the flash chip is accessed, and once in SMM, modify the data. This is the case on i945 thinkpads, however I didn't check the X200T datasheet yet, hence the "probably".
|-
|}


=== Debugging tools ===
=== Debugging tools ===
Line 242: Line 230:
==  My TODO list ==
==  My TODO list ==
See also TODO of the respectives machines on their dedicated wiki page.
See also TODO of the respectives machines on their dedicated wiki page.
=== All machines ===
* Merge or abandon my old patches.
* I945, GM45, GS45 thinkpads: Have all hardware features working (feature parity with the default boot firmware):
** IRDA
** TPM
** Testing: write tests for
*** suspend/resume
*** power consumption
*** heat
* GM45: Merge ich9gen functionality in ifdtool or ifdfake
* GM45: Investigate internal flashing (Look if BIOS->Modded BIOS->Coreboot works and understand why)
* I945: SeaBIOS: allow booting on SD cards.
* Port a logging mecanism from chromebooks to all devices in order to be able to retrive the log of the failed boot at the next reboot.
* Port a logging mecanism from chromebooks to all devices in order to be able to retrive the log of the failed boot at the next reboot.
* Document flash protections and vboot.
* Verify if all the microcodes were moved away from coreboot git.
* (Alix 1.C: port the VSA to fasm)
* (GDB improvements: allow gdb earlier than ramstage)
* I945: Write a freedom/privacy/security review
* GM45: Write a freedom/privacy/security review
* More recent Intel with me_cleaner: Write a freedom/privacy/security review


=== Alix 1.C ===
= Work in progress documentation =
* port the VSA to fasm?
* [[/Blobs-rewrite]]
 
* [[/Golden Finger Connector]]
==== Patches that need more work ====
* [[/Hardware Comparison]]
* I use a deblob patch, instead the various microcode should be moved out of coreboot repository, they are inside headers.
 
==== Infrastructure ====
* "Add grub.cfg"
 
=== SerialICE ===
=== Flashrom ===
 
== Other ==
00:52 < phcoder-screen> GNUtoo-irssi: once you asked why upper 128bytes of cmos behave in strange way: you have to enable them in rcba
 
=== To verify ===
* I have bad memory on this, but I was probably told by someone who talked to peter stuge, or by peter stuge that if you blank the flash chip holding the BIOS, in an X61, power off the computer and power it on again, an IPV6 packet would come out of the (wired) NIC. This was due to AMT, which is on the NIC (X61 is old, and at that time AMT was on the intel ethernet NICs).
** Once verified, the goal would be to reproduce that on an x200:
*** blank the BIOS flash chip, power off the computer, boot it.
*** observe an ipv6 packet
*** blank the NIC flash chip that holds its fimrware
*** hopefully observe no ipv6 packet
*** reflash coreboot inisde the BIOS flash chip
=> That may be able to produce a test case for knowing if the AMT firmware of the NIC was gone or not, but it does requires external reflashing. Would that be enough to be sure about the intel NIC of the laptops with a similar chipset?
 
== Sandbox ==
[[/sandbox]]

Revision as of 19:48, 22 September 2017

Wiki contributions

My contributions to this wiki are available under the following licenses:

Code contributions

In the gerrit guidelines there the follwing line: "Don't modify other people's patches without their consent."

I consent to the modification of my patches by anybody. I work on specific things because no one wants to do what I want to do. Else I'd be happy if someone else did the work, so I could pick the next task in my huge TODO list.

Interests:

  • 100% Free computers(Laptops, Desktops, Home Servers, routers).
  • Security
    • Secure boot trough GRUB with full disk encryption (no /boot in clear)
    • Protect against DMA and other attacks that have access to the x86 cpu's RAM.
  • Making it possible for end user to be able to use coreboot/libreboot:
    • Making it easy or scalable to install coreboot/libreboot.
    • Making it usable.
  • Making less risky to reflash, permitting users without an external programmer to easily reflash, and developers to develop anywhere without a huge setup consisting of another computer and the coreboot computer beeing worked on. I'm also interested in getting the cbmem logs written to flash to make debugging easier when no other computer is available(for instance while the developer is traveling to a conference).

Howtos

make recent intel BIOS flash writable and/or extract its pieces

Coreboot has an uttility in util/ifdtool for that.

  • power off the laptop totally (remove the power, the battery etc...)
  • connect an external programmer to the BIOS flash chip.
  • dump the chip content with flashrom and that external programmer.
  • run ifdtool on the extracted chip content
  • reflash the modified content

AMD/ATI/Nvidia GPU with SeaBIOS without running the option rom

The idea is to keep the option rom in memory while making SeaBIOS not run it. This has the effect of permitting linux(-libre) to initalize the GPU on all AMD/ATI and Nvidia GPU I tried it with. The downside is the lack of graphics before that. That means no graphics in GRUB.

Patch

From 73aae33b7e70d15b595b3f127ffe98bd76f9a646 Mon Sep 17 00:00:00 2001
From: Denis 'GNUtoo' Carikli <GNUtoo@no-log.org>
Date: Sat, 7 Mar 2015 15:39:52 +0100
Subject: [PATCH] Kconfig: Add option not to run option roms

Signed-off-by: Denis 'GNUtoo' Carikli <GNUtoo@no-log.org>
---
 src/Kconfig      | 8 ++++++++
 src/optionroms.c | 2 ++
 2 files changed, 10 insertions(+)

diff --git a/src/Kconfig b/src/Kconfig
index 95bf087..1988f56 100644
--- a/src/Kconfig
+++ b/src/Kconfig
@@ -403,6 +403,14 @@ menu "BIOS interfaces"
         default y
         help
             Support Post Memory Manager (PMM) entry point.
+    config OPTIONROMS_NORUN
+        depends on OPTIONROMS
+        bool "Put the option roms in memory, but don't run them"
+        default n
+        help
+            Some GPU drivers are capable of initializing the display alone,
+            but they still require some data from the option rom.
+
     config BOOT
         bool "Boot interface"
         default y
diff --git a/src/optionroms.c b/src/optionroms.c
index c81eff2..c7c89da 100644
--- a/src/optionroms.c
+++ b/src/optionroms.c
@@ -53,7 +53,9 @@ __callrom(struct rom_header *rom, u16 offset, u16 bdf)
 void
 callrom(struct rom_header *rom, u16 bdf)
 {
+#if (!CONFIG_OPTIONROMS_NORUN)
     __callrom(rom, OPTION_ROM_INITVECTOR, bdf);
+#endif
 }
 
 // Execute a BCV option rom registered via add_bcv().
-- 
2.6.4

X60/I945 native GPU init History

The Lenovo X60 GPU init has been merged a long time ago. Since then it has been rewriten/improved a lot by other people (See git log for more details). Thanks to all that work it's now a proper driver.

So I've moved the X60 GPU init information in a subpage

Personal oppinions

Microcode

  • The CPU microcodes are under a non-free license that is incompatible with coreboot's license.
  • They are now moved away in a separate repository.

Some people say that the microcode is the equivalent of having a more recent CPU, as a justification for using it.

However since Intel microcodes are encrypted and signed, so we cannot know what they really do.

  • People usually trust what the CPU vendor say about it, such as that it fixes some bugs(erratas for such bugs are published), but we don't know much more.
  • Speculating about what they really do or cannot do won't help much since we usually cannot verify that information.

My goal is to have a 100% free computer, and also to spread that code, so that other people can have a 100% free computer too. According to the FSF, and the FSF criteria for differentiating software from hardware, that microcode is software. So since they consider it as non-free, a coreboot image containing that microcode would not be considered free by the FSF.

On my Lenovo x60, the microcode was easy to remove, and it worked fine, beside printing a scary kernel message pointing to an Intel errata.

What the errata says is that, when resuming from suspend to ram, the temperatures reading will not be updated, and the temperature overheat will not be reported. The hardware issues you may encounter will depend on your specific CPU. Not the CPU model, but instead the date at which it was manufactured. (To know if you are affected, under GNU/Linux, you can run the "dmesg" command and look for "coretemp: Errata AE18 not fixed, update BIOS or microcode of the CPU!" in its output. If you found it, you are affected)

Removing the microcode make it possible to have the gluglug (now minifree) Lenovo Thinkpad X60 ceritified "Respects your freedom" By the FSF.

So instead of debating trough huge flames about the fact that we should use, or not use the microcode, it was more effective to remove it and get the laptop certified.

The benefit of that is the publicity around the fact that this laptop can be made to run 100% free software. This makes users aware of it and willing to switch to it.

Yabel

Yabel can be used for tracing what the GPU does, but it cannot really prevent a proprietary VGA option rom from doing nasty tricks:

The GPUs in the Lenovo x60 and t60 have a bar that gives access to the whole memory:

Region 1: I/O ports at 50a0 [size=8]

I was told that many other GPU also have that issue.

The way to fix that is to get rid of the proprietary VGA option rom. On some boards it's possible and coreboot has a replacement for it. On some other boards, the kernel can initialize the GPU with or without tricks.

For coreboot developers

This section is mainly usefull for finding informations for:

  • Asking me to test some code (that's why I listed all my hardware).
  • Find my work in progress code.
  • Find legacy code.
  • Find what I'm interested in working on:
    • If you want to work on the same thing than me, you could contact me if you want so:
      • I could help if I have time.
      • I could test if I have time.
      • I may have some pointers.
  • HOWTO that documents how to do a native VGA init for the Lenovo x60:
    • It probably applies to the Lenovo t60 that have an Intel GPU, with no or very minor modifications.

My hardware

Mainboard/Devices running coreboot

Device/Mainboard Serial/output flash recovery mecanism What I worked on
Asrock E350M1
  • cbmem -c
  • Serial
  • External programmer
  • Swapping the flash chip
Asus F2A85-M PRO
  • cbmem -c
  • I've been the main porter.
  • Usability improvements
Asus M4A785T-M
  • cbmem -c
  • Serial
Lenovo X60
  • cbmem -c
  • Serial on the dock
  • spkmodem
  • USB debug
  • External programmer with pomona clip
  • Native GPU init
  • Usability improvements.
Lenovo X60T
Lenovo T60
  • Usability improvements.
Lenovo T400
Lenovo X200
  • cbmem -c
PC Engines Alix 1.C
  • Serial
  • Hot swap with the LPC dongle Bricked by flashing the same non-bootable image on the internal flash and on the LPC dongle.
  • Usability improvements.

Mainboard/Devices not running coreboot (yet?)

If you need to have some tests done on the default boot firwmare, you should ask me as it is fast to do if I've the laptop nearby.

Device/Mainboard Reason
Lenovo Thinkpad X200T I need to find a way to be able to easily, robustly, and safely reflash it:
  • If a SOIC8 SPI chips is soldered instead of the WSON8 one, the solder past must not affect the stability of the SOIC8 clip. That is probably the most adapted way for me.
  • Wires aren't ideal if they break easily.
  • Internal flashing can't be trusted for freedom/privacy/security: The hardware probably permits boot firmwares to very easily mess up with the flash content while it's being read or written: The hardware can probably be programmed to emmit SMM interrupts when the flash chip is accessed, and once in SMM, modify the data. This is the case on i945 thinkpads, however I didn't check the X200T datasheet yet, hence the "probably".

Debugging tools

  • External programmers :
    • Arduino duemillanove (serprog based)
    • Arduino uno (serprog based)
    • openmoko debug board (FTDI based)
    • bug20 (linux_spi)
  • A pomona clip
  • a null-modem serial cable and 2 USB<->Serial adapters
  • USB debug compatible devices:
    • a bug20 (omap3530)
    • a GTA04 A3 (DM370)

My TODO list

See also TODO of the respectives machines on their dedicated wiki page.

  • Merge or abandon my old patches.
  • I945, GM45, GS45 thinkpads: Have all hardware features working (feature parity with the default boot firmware):
    • IRDA
    • TPM
    • Testing: write tests for
      • suspend/resume
      • power consumption
      • heat
  • GM45: Merge ich9gen functionality in ifdtool or ifdfake
  • GM45: Investigate internal flashing (Look if BIOS->Modded BIOS->Coreboot works and understand why)
  • I945: SeaBIOS: allow booting on SD cards.
  • Port a logging mecanism from chromebooks to all devices in order to be able to retrive the log of the failed boot at the next reboot.
  • Document flash protections and vboot.
  • Verify if all the microcodes were moved away from coreboot git.
  • (Alix 1.C: port the VSA to fasm)
  • (GDB improvements: allow gdb earlier than ramstage)
  • I945: Write a freedom/privacy/security review
  • GM45: Write a freedom/privacy/security review
  • More recent Intel with me_cleaner: Write a freedom/privacy/security review

Work in progress documentation