When we talk about CBI, we use the following definitions:
It’s desired to make a single firmware image support different board versions and variants to simplify development and manufacturing. To do so, firmware needs to identify the hardware, first. ChromeOS devices historically encoded such information in resistor straps. Today we store such information in EEPROM and call it CrOS board info (a.k.a. CBI). This page describes CBI data format, implementation, advantages, and caveats.
One of the obvious advantages is that EEPROMs can store more data using fewer pins. As the EC is connected to more chips, its I/O pins are becoming more precious. I2C buses exist nearly in all boards. Thus, adding an I2C EEPROM virtually consumes no extra pins.
Second, resistor strapping is significantly harder to be altered. Though this provides protection against accidental loss of information, hardware information becomes too rigid. EEPROM contents can be altered if proper tools and instructions are provided. It allows vendors and RMA centers to stock generic boards and convert them to a specific model as demands are revealed. This flexibility is one of the biggest advantages of the CBI/EEPROM solution over resistor strapping.
Since EEPROMs are physically separated from other data storage, if we choose, they can be locked down. ChromeOS already has this ‘write-protect’ feature built in the design. Data stored in write-protected storage can be changed only through authorized access. We can simply hook an EEPROM’s WP pin to this wire to get the access control aligned to other firmware storage and provide the same level of tamper resistance.
|Offset||# bytes||data name||description|
|0||3||MAGIC||0x43, 0x42, 0x49 (‘CBI’)|
|3||1||CRC||8-bit CRC of everything after CRC through ITEM_n|
|4||1||FORMAT_VER_MINOR||The data format version. It’s 0.0 (0x00, 0x00) for the initial version.|
|6||2||TOTAL_SIZE||Total number of bytes in the entire data.|
|8||x||ITEM_0,..ITEM_n||List of data items. The format is explained below.|
It’s fixed and invariable across format versions. This allows ECs and tools to quickly identify CBI data before parsing it.
8-bit CRC of data through data[TOTAL_SIZE]. Invariable across format versions. It allows ECs and tools to detect data corruption.
Stores the data format version. Starts with 0.0 (0x00, 0x00). ECs and tools are expected to be able to parse all the future versions as long as the major version is equal to or smaller than the parser’s version. Stored in little endian (1st half: minor version. 2nd half: major version) so that it can be interpreted as a single 16-bit value on little endian machines (x86 & ARM).
The number of bytes in the entire data structure. This field helps older parsers compute proper CRC without knowledge on the new data items. The max is 0xFFFF.
Following after the header fields are data items. They are stored in an array where each element uses the following format:
|Offset||# bytes||data name||description|
|0||1||<tag>||A numeric value uniquely assigned to each item.|
|1||1||<size>||Total size of the item (i.e. <tag><size><data>)|
|2||x||<value>||Value can be a string, raw data, or an integer.|
Integer values are stored in the little endian format. They are written using the smallest size to fit the value and on read, padded with as many zeros as the reader expects.
Here are a list of standard data items. See
ec/include/cros_board_info.h for the latest information. Data sizes can vary project to project. Optional items are not listed but can be added as needed by the project.
|BOARD_VERSION||0||integer||yes||yes||Board version (0, 1, 2, ...)|
|SKU_ID||2||integer||no||yes||ID assigned to each SKU.|
|DRAM_PART_NUM||3||string||no||no||DRAM part name in ascii characters|
|OEM_NAME||4||string||yes||no||OEM name in ascii characters|
|FW_CONFIG||6||integer||no||yes||Bit-field that encodes information that the firmware needs to make decisions on.|
|PCB_SUPPLIER||7||integer||yes||no||ID assigned to each PCB manufacturer (per-board)|
|REWORK_ID||9||integer||no||no||Bit-field that encodes the reworks applied to the device.|
Sticky fields are those which are set before SMT and preflashed to EEPROMs. They're not expected to be changed after boards are manufactured. Non-sticky fields can be changed for example at RMA center if write protect is disabled.
Required fields are expected to exist on all devices.
The number assigned to each hardware version. This field ideally should be synchronously incremented as the project progresses and should not differ among models.
Assignment can be different from project to project but it’s recommended to be a single-byte field (instead of two-byte field where the upper half describes phases (EVT, DVT, PVT) and the lower half describes numeric versions in each phase).
A number assigned to each OEM. Software shared by multiple OEMs can use this field to select a customization common to a particular OEM. For example, it can be used to control LEDs, which tend to follow an OEM's preference.
The number used to describe hardware configuration or hardware features. Assignment varies family to family and usually is shared among all models in the same family.
In the past, some families use it as an index for a SKU table where hardware features are described for SKUs, or it has also been a bitmap where each bit or set of bits represents one hardware feature. For example, it can contain information such as CPU type, form factor, touch panel, camera, keyboard backlight, etc. Top 8 bits can be reserved for OEM specific features to allow OEMs to customize devices independently.
Now, the SKU_ID is not used by the firmware to make any decisions. The firmware code will use the FW_CONFIG field to make any branching decisions. This allows us to decouple the hardware identity (SKU_ID) from how the firmware needs to react (FW_CONFIG). A particular SKU_ID value implies one and only one value for FW_CONFIG. When HW identity is decoupled from firmware behavior, we can add new permutations of hardware (and thus new SKU values) without affecting the firmware code if the firmware code can treat the hardware the same (meaning two different SKU_IDs could have the same value for FW_CONFIG).
A string value that is used to identify a DRAM. This is different from RAM ID, which is an index to a table where RAM configuration parameters are stored. RAM ID is encoded in resistor strapping. This makes RAM ID visually validatable (as opposed to being a field in CBI). DRAM_PART_NUM is used to track the inventory.
OEM name in ascii string.
A bit field that tracks the different permutations of HW that the firmware needs to be able to handle. The FW_CONFIG only contains the information that the firmware strictly needs to make a branching decision. Any other information about a device should be captured and stored in the higher level configuration system. See SKU and FW Configuration Fields for more details.
Below are a few, non-exhaustive examples of how the firmware configuration bits could be portioned.
|1||Enabled sensors in EC (1b : yes)||EC enables sensor monitoring based on this bit. This should be set to 1b when the sensors are stuffed on a design (e.g. convertible) and 0b when the sensors are not stuffed (e.g. clamshell)|
|1||Has internal keypad (1b: yes)||Update keyscan_config based on presence of keypad on internal keyboard|
|1||Has AR camera (1b: yes)||Enables interrupts and updates drivers for AR based camera.|
|3||GPIO customization for SoC||8 unique GPIO configurations. Values are assigned on a per-firmware build basis.|
|2||SARs customization for SoC||4 unique SARs customization files. Values are assigned on a per-firmware build basis|
|2||VBT customization for SoC||4 unique VBT customization files. Values are assigned on a per-firmware build basis|
|1||Touchscreen enabled for SoC (1b: yes)||AP enables bus and configures GPIOs for touchscreen device|
This field identifies the printed-circuit-board manufacturer for a device. The ID assignment is specific to a board.
A 64-bit field that tracks the modifications applied to the device. What rework each bit represents can be independently defined by each project.
ChromeOS devices have the global write protect line,
WP_L, which is controlled by Cr50 and a servo, and used to protect various firmware images (AP, EC, FPMCU, etc.). The WP pin of an EEPROM should be connected to WP_L. CBI data will be protected as securely as other RO firmware images and can be changed at RMA center or by developers for special needs.
While AP SPI flash and EC SPI flash also combine the internal status registers to determine the WP state, WP of CBI EEPROMs will be controlled by the WP signal only. When write protect is enabled, the EEPROM must protect entirely or partially the region where CBI data is stored.
We'll make a change with Cr50 such that when AP SPI WP is deasserted, Cr50 accepts a special host command which disables
WP_L (only until the next reboot). This allows CBI to be modified in the factory before the board is finalized, that is, before the AP SPI WP is enabled.
It is recommended to select an I2C bus, which is quiet during power on after reset. An I2C device can wedge a bus. CrOS EC is capable of unwedging a bus but it doesn't always work.
WP should be connected to the same wire as the write-protect pin of the EC SPI flash.
The power well should be the same as the EC. When the WP is high, the data is write protected. If the WP pin of an EC SPI Flash has active low logic (low = protect), a MOSFET can be used to reverse the voltage:
The following EEPROM parts have been tested and deployed on the past projects:
They are pin-to-pin compatible. M34E02 has a capability to protect only the top half but this feature is not currently used.
You can evaluate implementation as follows:
ectool cbi setcommand fails or succeeds as expected.
CBI should be read up to two times (back-to-back) per boot per image. That is, on normal boot, EC RO should read it and EC RW should read it once. Once reads are attempted, the result is preserved even if both reads fail. This would prevent the system from running in an inconsistent state. b/80236608 explains why we don't let the EC keep reading CBI.
The earliest timing CBI can be read is at
A tool which runs on a build machine. It creates a EEPROM image file with given field values. Manufacturers use CBI image files to pre-flash EEPROMs in large volume. This tool also can print the contents of a CBI image file.
A tool which runs on a host (i.e. Chromebooks). It can fetch CBI data from the EEPROM (through the EC). Manufacturers can use this tool to validate the EEPROM contents. If the board is not write protected, ectool can change the CBI. Note that some fields are not expected to be changed after the board is manufactured. The data of existing fields can be changed and resized.
Mosys is a tool which runs on the host to provide various information of the host. One of its sub-command, platform, retrieves board information (e.g. SKU, OEM) from SMBIOS, which is populated by coreboot. We’ll update coreboot so that it’ll fetch board information from EEPROM (via EC) instead of resistor strapping.
This is a script used by debugd to include CBI dump in user feedback reports. Currently, it prints only BOARD_VERSION, OEM_ID, and SKU_ID.
It requires the EC to initialize an I2C controller and its driver. There may be rare cases where board info is needed before these are initialized. To handle such cases, we may need to add simplified I2C API. Simplified I2C API would have the following features: