lbwww/site/docs/hardware/c201.md

7.6 KiB

title x-toc-enable
ASUS Chromebook C201 true

https://wiki.debian.org/InstallingDebianOn/Asus/C201 shows how to install Debian.

Devuan GNU+Linux

https://notabug.org/dimkr/devsus produces bootable and installable Devuan images.

Parabola GNU+Linux

See: https://lists.gnu.org/archive/html/libreboot/2015-12/msg00026.html

In this discussion thread (on the old GNU Libreboot mailing lists), there are instructions for installing Parabola on C201 and other rockchip chromebooks supported by Libreboot.

Caution: Video acceleration requires a non-free blob, software rendering can be used instead.

The C201 has a Mali T GPU, which requires a non-free blob. A driver, Tamil, was written, but its source code has not been released. The developer has so-far withheld it. Use software rendering to avoid the blob instead. Most tasks can still be performed without video acceleration, without any noticeable performance penalty.

In practise, this means that certain things like games, blender and GNOME shell (or other fancy desktops) won't work well. The libreboot project recommends a lightweight desktop which does not need video acceleration, such as XFCE or LXDE.

As it is unlikely that Tamil will be released, the chai project is writing a driver as well. Ask on IRC if you think you can contribute.

Caution: WiFi requires a non-free blob, a USB dongle can be used instead.

These laptops have non-removeable (soldered on) M.2 Type 1216 card with WiFi+Bluetooth, which requires non-free firmware to be loaded by the Linux kernel in order to work.

The libreboot project recommends using an external USB wifi dongle that works with free software. See #recommended_wifi.

There are 2 companies (endorsed by Free Software Foundation, under their Respects your Freedom guidelines), that sell USB WiFi dongles guaranteed to work with free software (i.e. linux-libre kernel):

These wifi dongles use the AR9271 (atheros) chipset, supported by the free ath9k_htc driver in the Linux kernel. They work in linux-libre too.

EC firmware is free software!

It's free software. Google provides the source. Build scripts will be added later, with EC sources provided in libreboot, and builds of the EC firmware.

This is unlike the other current libreboot laptops (Intel based). In practise, you can (if you do without the video/wifi blobs, and replace ChromeOS with a distribution that respects your freedom) be more free when using one of these laptops.

The libreboot FAQ briefly describes what an EC is: ../../faq.md#firmware-ec

No microcode!

Unlike x86 (e.g. Intel/AMD) CPUs, ARM CPUs do not use microcode, not even built in. On the Intel/AMD based libreboot systems, there is still microcode in the CPU (not considered problematic by the FSF, provided that it is reasonably trusted to not be malicious, since it's part of the hardware and read-only), but we exclude microcode updates (volatile updates which are uploaded at boot time by the boot firmware, if present), which are proprietary software.

On ARM CPUs, the instruction set is implemented in circuitry, without microcode.

Depthcharge payload

These systems do not use the GRUB payload. Instead, they use a payload called depthcharge, which is common on CrOS devices. This is free software, maintained by Google.

Flash chip write protection: the screw

It's next to the flash chip. Unscrew it, and the flash chip is read-write. Screw it back in, and the flash chip is read-only. It's called the screw.

The screw is accessible by removing other screws and gently prying off the upper shell, where the flash chip and the screw are then directly accessible. User flashing from software is possible, without having to externally re-flash, but the flash chip is SPI (SOIC-8 form factor) so you can also externally re-flash if you want to. In practise, you only need to externally re-flash if you brick the laptop; read ../install/spi.md for an example of how to set up an SPI programmer.

Write protection is useful, because it prevents the firmware from being re-flashed by any malicious software that might become executed on your GNU+Linux system, as root. In other words, it can prevent a firmware-level evil maid attack. It's possible to write protect on all current libreboot systems, but CrOS devices make it easy. The screw is such a stupidly simple idea, which all designs should implement.