Using coreboot’s verified boot on Lenovo devices¶
By default a single instance of coreboot is present in the firmware flash, no verification is done and the flash is not write-protected, so as to allow firmware updates from the OS. The verified boot mechanism also called vboot allows secure firmware updates using an A/B partitioning scheme once enabled.
You can enable vboot in Kconfig’s Security section. Besides a verified
boot you can also enable a measured boot by setting
CONFIG_TPM_MEASURED_BOOT. Both options need a working TPM, which is
present on all recent Lenovo devices.
Updating and recovery¶
As the A/B partition is writeable you can still update them from the OS.
By using the vboot mechanism you store a copy of coreboot in the
partition that acts as failsafe in case the regular firmware update, that
goes to the
B partition fails.
RO partition isn’t write-protected by default, therefore you
have to enable the protection in the security Kconfig menu by yourself.
On Lenovo devices you can enable the Fn key as recovery mode switch, by
Holding the Fn at boot will then switch to the recovery image, allowing
to boot and flash a working image to the A/B partition.
8 MiB ROM limitation¶
Lenovo devices with 8 MiB ROM only have a
A partition enabled in the
default FMAP. They are missing the
B partition, due to size constraints.
You can still provide your own FMAP if you need