Flashmap
The wiki is being retired!
Documentation is now handled by the same processes we use for code: Add something to the Documentation/ directory in the coreboot repo, and it will be rendered to https://doc.coreboot.org/. Contributions welcome!
or...
Toward a unified representation for the layout of coreboot flash images
N.B. The changes described herein are being made as part of the Chromium OS project; as such, they will initially be committed to the project's own fork of the main coreboot repository, which is available at https://chromium.googlesource.com/chromiumos/third_party/coreboot. Unless otherwise noted, the paths and processes described throughout this page are as they exist(ed) in a checkout of the master branch of the Chromium OS sources as they appeared at the beginning of 2015. One of the guiding design principles is to keep the tools general enough that they will be helpful to others, and the resulting work will be upstreamed to the main repository once it has been regression-tested in the context of Chromium OS hardware.
How it's currently done (how the Chromium OS project presently constructs firmware images)
Most Intel-based Chromium OS devices currently use an 8 MB firmware image that includes---among other things---the Intel ME firmware, a copy of coreboot including the ramstage and depthcharge (bootloader) payload, two additional copies of the ramstage and bootloader payload, and a separate SeaBIOS payload. The primary description of this format exists in board-specific flattened device tree files, which are used by a script called cros_bundle_firmware to modify the image produced by the coreboot build system. For instance, the layout of the Panther board's firmware exists at https://chromium.googlesource.com/chromiumos/platform/depthcharge/+/master/board/panther/fmap.dts, and results in a final image that looks like this:
Section | Offset | Contents | Original source | cros_bundle_firmware flag(s) | Packaging procedure | Coreboot Kconfig entr[yi](es) |
---|---|---|---|---|---|---|
RO | ||||||
0x700000 | Bootstub (coreboot image) | coreboot.rom (coreboot build system) | --coreboot coreboot.rom
--coreboot-elf depthcharge.elf |
cros_bundle_firmware helper adds both depthcharge.elf as a payload (which---md5sums confirm---is exactly equivalent to just adding depthcharge.payload) and a compiled (then mod if ied) version of fmap.dts to the existing CBFS | CONFIG_CMOS_POST_OFFSET , CONFIG_CBFS_SIZE
| |
0x611000 | GBB (Google Binary Block) | /chromeos-config/ entries in fmap.dts | --dt fmap.dts
--bmpblk bmpblk.bin |
cros_bundle_firmware helper generates and inserts it | ||
0x610840 | (Reserved) | |||||
0x610800 | RO-FWID (Firmware ID) | /model entry in fmap.dts concatenated with build number | --dt fmap.dts | cros_bundle_firmware helper performs the concatenation | ||
0x610000 | FMAP (Flash MAP) | fmap.dts itself | --dt fmap.dts | cros_bundle_firmware helper generates it while assembling the ultimate image file | ||
0x604000 | (Reserved) | |||||
0x600000 | RO-VPD (Vital Product Data) | cros_bundle_firmware fills this section with 0xff s | ||||
0x400000 | Legacy (SeaBIOS image) | seabios.cbfs | --seabios seabios.cbfs | cros_bundle_firmware helper inserts the file verbatim, as confirmed by an md5sum on the final image | ||
0x3fa000 | (Reserved) | |||||
0x3f8000 | RW-VPD (Vital Product Data) | cros_bundle_firmware fills this section with 0xff s | ||||
RW-shared | ||||||
0x3f6000 | Vblock-dev (third-party kernel signing keys) | cros_bundle_firmware fills this section with 0xff s | ||||
0x3f4000 | Shared-data (RW firmware calibration data) | cros_bundle_firmware fills this section with 0x00 s | ||||
0x3f0000 | ELOG (Event LOG) | cros_bundle_firmware fills this section with 0xff s | ||||
0x3e0000 | MRC-cache (Memory Reference Code training data) | cros_bundle_firmware fills this section with 0xff s | ||||
RW-B | ||||||
0x3dffc0 | FWID-B | (Copy of RO-FWID above) | ||||
0x300000 | Main-B (copy of coreboot ramstage and payload) | (Same as main-A below) | ||||
0x2f0000 | Vblock-B (signing keys) | (Same as vblock-A below) | ||||
RW-A | ||||||
0x2effc0 | FWID-A | (Copy of RO-FWID above) | ||||
0x210000 | Main-A (copy of coreboot ramstage and payload) | depthcharge.payload and ramstage.stage | --uboot depthcharge.payload
--add-blob ramstage ramstage.stage |
Because fmap.dts lists its type as "blob boot,ramstage" , cros_bundle_firmware concatenates the blob called ramstage onto the end of coreboot | ||
0x200000 | Vblock-A (signing keys) | cros_bundle_firmware helper signs the main-A section and puts the signature here | ||||
FW-descriptor | ||||||
0x001000 | ME (Intel Management Engine firmware blob) | coreboot.rom | --coreboot coreboot.rom | Present in the original image generated by the coreboot build system (which simply inserted some Intel blob verbatim) | ||
0x000000 | FD (Intel Firmware Descriptor header) | coreboot.rom | --coreboot coreboot.rom | cros_bundle_firmware helper invokes ifdtool to create the final image, using the original coreboot.rom file's ME and "skeleton" (template) IFD, and concatenating on verbatim the rest of the pieces it assembled to form the (Intel-dubbed) "BIOS" section |