Text to Search... About Author Email address... Submit Name Email Adress Message About Me page ##1## of ##2## Jan Feb Mar Apr May Jun Jul Aug Sept Oct Nov Dec



6/newsticker//recent

404

Sorry, this page is not avalable
Home

Latest Articles

MattDevo: ChromeOS Firmware Utility Script

The ChromeOS Firmware Utility Script simplifies the most common functions most users need when interacting with the firmware on their ChromeOS device. It can be run from any Linux which has a full Bash shell. Currently, it allows the user to:
  • Install/Update the RW_LEGACY firmware with a newer/working/customized version of the SeaBIOS firmware payload
  • Install/Update the BOOT_STUB firmware to enable booting directly Legacy Boot (using the same payload as RW_LEGACY)
  • Install/Update a full custom firmware image (Full ROM), built from the latest sources
  • Set the Boot Options (GBB Flags) (only for stock ChromeOS firmware)
  • Set the device's Hardware ID (only for stock ChromeOS firmware)
  • Restore the Stock BOOT_STUB
  • Restore the Stock Firmware
At startup, the Firmware Utility Script will automatically detect the device, OS, and current firmware type, and restrict the available menu options based on this information. An override is available for users who really know what they are doing (or really want to try and brick their device - though the script will do its best to try and prevent you from doing this). Because these operations are mostly being done to normally read-only parts of the firmware, the firmware write protect will need to be removed for most of the script's functions. This is documented for each function below, and the script will likewise check the write-protect state for each function that requires it to be disabled.

To download and run this script, from a terminal/shell type:
cd; curl -L -O http://dl.unixlegion.com/f/firmware-util.sh && sudo bash firmware-util.sh and press enter. (copy/paste to avoid typos - the 2nd curl parameter is a capital O, not a zero)
Firmware Utility Script with all options enabled
Firmware Utility Script with only relevant options enabled

Script Functions Explained
1.- Install/Update the RW_LEGACY Firmware
This option performs two simple tasks: it sets the crossystem boot flag necessary to enable Legacy Boot mode, and it installs an RW_LEGACY firmware update appropriate for the device. Users will have the option to set the default boot device (internal storage [default] or USB/SD); Haswell/Broadwell Chromebox users will also have the option to enable "headless" (no display attached) booting, which is really only useful if you're going to run the box without a display and connect remotely (eg, via ssh). Changing either of these options requires re-running this script function.

After updating the RW_LEGACY firmware, Legacy Boot Mode can be accessed via [CTRL+L] on the Developer Mode boot screen. It can also be set as the default by changing the GBB Flags via 'Set Boot Options' feature below.

Supported Devices: All Haswell, Broadwell, and Baytrail ChromeOS devices
Requires firmware write-protect disabled: NO

2.- Install/Update the BOOT_STUB Firmware
The BOOT_STUB update is slightly more complex under the hood, as it backs up the stock BOOT_STUB firmware to the unused RW_LEGACY region (as RW_LEGACY is ignored when using a modified BOOT_STUB), but is equally straightforward. As before, users will have the option to set the default boot device (internal storage [default] or USB/SD); changing this option requires re-running this script function.

After updating the BOOT_STUB firmware, your device will boot directly in Legacy Mode; ChromeOS will not boot (though it will try to do so and fail, until a new OS is installed).

Supported Devices: Baytrail ChromeOS devices without a Full ROM firmware available
Requires firmware write-protect disabled: YES

3.- Install/Update Custom coreboot Firmware (Full ROM)
As this is a full replacement firmware, the script will offer users the option to back up their stock firmware on USB. Users will have the option to set the default boot device (internal storage [default] or USB/SD); Haswell/Broadwell Chromebox users will also have the option to enable "headless" (no display attached) booting, as well as the option to enable PXE (Ethernet/network) booting via iPXE (the BayTrail-based AOpen Chromebox commerical supports this too). If PXE support is enabled, it can also be set to be the default boot device. As before, changing any of these boot options requires re-running this script function.

Since Haswell/Broadwell/Baytrail Chromeboxes store their Ethernet MAC address in the VPD (vital product data) region of the stock firmware, the script will extract that region from the stock firmware and inject it into the new firmware ensuring the unique MAC address isn't lost. It will also persist the VPD region across firmware updates, so this is all transparent to the user.

After installing the Custom coreboot / Full ROM Firmware, your device will boot directly in Legacy Mode; ChromeOS will not boot (though it will try to do so and fail, until a new OS is installed). Your ChromeOS device is now a "regular PC," and you can install the OS of your choice without any special instructions.

Supported Devices: All Haswell and Broadwell ChromeOS devices; select Baytrail devices, and the Samsung Series 3 Chromebox
Requires firmware write-protect disabled: YES

4.- Set Boot Options (GBB Flags)
This script function is just a wrapper around the gbb_utility application built into ChromeOS. It will read the GBB region from the stock firmware, set the GBB flags based on user input, and write it back to flash. The options presented to the user allow for setting the timeout for the Developer Mode boot screen (2s or 30s) and the default boot target (ChromeOS or Legacy Boot Mode). For all options except 'Factory Default,' the GBB flags will also be set to enable legacy booting (GBB_FLAG_FORCE_DEV_BOOT_LEGACY), which overrides the crosssytem dev_boot_legacy flag, and to force-enable Developer Mode (GBB_FLAG_FORCE_DEV_SWITCH_ON), which prevents exiting Developer Mode via the spacebar (either accidentially or intentionally).

Regardless of which default boot mode is selected, one can always override the default via keystroke: [CTRL+D] for ChromeOS Developer Mode, or [CTRL+L] for Legacy Boot Mode.

Note: Whenever the GBB Flags are set to anything besides the Factory Default, their current value will be displayed in a small black box in the upper-left corner of the Developer Mode boot screen, along with other some other firmware/OS-related info. This is normal and no cause for alarm, though you'll need to re-run the script and reset them to the Factory Default before exiting Developer Mode (should you want to do so).

After setting the Boot Options / GBB flags, the boot timeout and default OS will be whatever you selected, and can be changed at any time by re-running this script function.

Supported Devices: All ChromeOS devices running stock (or stock + RW_LEGACY) firmware
Requires firmware write-protect disabled: YES

5.- Set Hardware ID (HWID)
This script function is also just a wrapper around the gbb_utility application built into ChromeOS. It will read the GBB region from the stock firmware, set the HWID based on user input, and write it back to flash. The only time this function is needed is if one flashed a generic recovery image firmware (aka a shellball ROM) instead of restoring a backup of their own device firmware. The shellball ROM has a generic HWID embedded which ChromeOS does not recognize as valid for purposes of OS and firmware updates (among other things), so it's necessary to set a valid one. HWIDs aren't unique, so any valid one will do.

Note: If you restored your stock firmware using the option from this script, it is not necesary to set the HWID afterward.

After setting a valid HWID, simply reboot and ChromeOS updates should work normally.

Supported Devices: All ChromeOS devices running stock (or stock + RW_LEGACY) firmware
Requires firmware write-protect disabled: YES

6.- Restore Stock BOOT_STUB
This script function will restore the stock BOOT_STUB for any device running a modified BOOT_STUB firmware. It will first attempt to use the built-in backup created by this script, and failing that, will download the firmware from a recovery image (a shellball ROM) and extract the stock BOOT_STUB from that.

After restoring the stock BOOT_STUB, you will need to reboot and reinstall ChromeOS from the recovery media. You can also install the RW_LEGACY firmware if you're switching to it for some reason.

Supported Devices: All Haswell, Broadwell, and Baytrail ChromeOS devices running modified BOOT_STUB firmware (whether from this script or another)
Requires firmware write-protect disabled: YES

7.- Restore Stock Firmware
This script function will restore the stock firmware, preferably from a backed-up copy on USB. For Haswell/Broadwell/Baytrail devices, if a user-provided backup is not available, the script will download the firmware from a recovery image (a shellball ROM). For Chromeboxes, if the current fimware contains an embedded VPD region, it will be extracted and merged before flashing. These (device-specific) shellball ROMs have been modified to include a valid hardware ID (HWID), so ChromeOS updates will work normally. Support for flashing shellball ROMs for additional devices is planned for the near future.

After restoring the stock firmware, you will need to reboot and reinstall ChromeOS from the recovery media. After booting ChromeOS, you will need to re-run this script and reset the Boot Flags/GBB Flags in order to exit Developer Mode and fully return to stock.

Supported Devices: All ChromeOS devices running non-stock firmware (with a backup on USB)
Requires firmware write-protect disabled: YES

The Reboot and Power Off options are (hopefully) sufficiently self-explanitory :)

By default, the script only enables those menu options it deems valid for a given device/firmware/OS configuration. The Unlock option exists as a failsafe to override this lockout, but should be used with extreme caution. If, for instance, one flashed the RW_LEGACY update after the BOOT_STUB update on a Baytrail device, they would overwrite the backup of the stock BOOT_STUB. The script tries to prevent you from doing such things.

The source for the Firmware Utility Script (as well as all helper/accessory scripts) can be found on my 'scripts' github repository. Any issues, feature requests, and/or improvements can be reported via the issue tracker or a pull request.

unixlegion.com uses cookies to improve your experience. I agree