CBI: CrOS Board Info


When we talk about CBI, we use the following definitions:

  • Device: A computer running ChromeOS.
  • Family: A set of devices which share the same reference design. (e.g. Fizz).
  • Model: Within a family, devices are distinguished by non-customizable hardware features (e.g. chassis, motherboard). They’re grouped as a model and usually given a code name (e.g. Teemo, Sion). Within a model, devices are distinguished by SKU.
  • SKU: Numeric value used to differentiate builds within same Model/Family. The SKU will change based on the build configuration of non-probable HW features (e.g. which daughter board is connected, convertible/clamshell, which audio codec HW is populated, etc.)
  • Project: Avoided in this doc for its (too) wide usage.


It’s desired to make a single firmware image support different board versions and variants to simplify development and manufacturing. To do so, firmware needs to identify the hardware, first. ChromeOS devices historically encoded such information in resistor straps. Today we store such information in EEPROM and call it CrOS board info (a.k.a. CBI). This page describes CBI data format, implementation, advantages, and caveats.

One of the obvious advantages is that EEPROMs can store more data using fewer pins. As the EC is connected to more chips, its I/O pins are becoming more precious. I2C buses exist nearly in all boards. Thus, adding an I2C EEPROM virtually consumes no extra pins.

Second, resistor strapping is significantly harder to be altered. Though this provides protection against accidental loss of information, hardware information becomes too rigid. EEPROM contents can be altered if proper tools and instructions are provided. It allows vendors and RMA centers to stock generic boards and convert them to a specific model as demands are revealed. This flexibility is one of the biggest advantages of the CBI/EEPROM solution over resistor strapping.

Since EEPROMs are physically separated from other data storage, if we choose, they can be locked down. ChromeOS already has this ‘write-protect’ feature built in the design. Data stored in write-protected storage can be changed only through authorized access. We can simply hook an EEPROM’s WP pin to this wire to get the access control aligned to other firmware storage and provide the same level of tamper resistance.

CBI Image Format

Offset# bytesdata namedescription
03MAGIC0x43, 0x42, 0x49 (‘CBI’)
31CRC8-bit CRC of everything after CRC through ITEM_n
41FORMAT_VER_MINORThe data format version. It’s 0.0 (0x00, 0x00) for the initial version.
62TOTAL_SIZETotal number of bytes in the entire data.
8xITEM_0,..ITEM_nList of data items. The format is explained below.


It’s fixed and invariable across format versions. This allows ECs and tools to quickly identify CBI data before parsing it.


8-bit CRC of data[4] through data[TOTAL_SIZE]. Invariable across format versions. It allows ECs and tools to detect data corruption.


Stores the data format version. Starts with 0.0 (0x00, 0x00). ECs and tools are expected to be able to parse all the future versions as long as the major version is equal to or smaller than the parser’s version. Stored in little endian (1st half: minor version. 2nd half: major version) so that it can be interpreted as a single 16-bit value on little endian machines (x86 & ARM).


The number of bytes in the entire data structure. This field helps older parsers compute proper CRC without knowledge on the new data items. The max is 0xFFFF.

Data Fields

Following after the header fields are data items. They are stored in an array where each element uses the following format:

Offset# bytesdata namedescription
01<tag>A numeric value uniquely assigned to each item.
11<size>Total size of the item (i.e. <tag><size><data>)
2x<value>Value can be a string, raw data, or an integer.

Integer values are stored in the little endian format. They are written using the smallest size to fit the value and on read, padded with as many zeros as the reader expects.

Here are a list of standard data items. See ec/include/cros_board_info.h for the latest information. Data sizes can vary project to project. Optional items are not listed but can be added as needed by the project.

BOARD_VERSION0integeryesyesBoard version (0, 1, 2, ...)
OEM_ID1integeryesnoOEM ID
SKU_ID2integernoyesID assigned to each SKU.
DRAM_PART_NUM3stringnonoDRAM part name in ascii characters
OEM_NAME4stringyesnoOEM name in ascii characters
FW_CONFIG6integernoyesBit-field that encodes information that the firmware needs to make decisions on.
PCB_SUPPLIER7integeryesnoID assigned to each PCB manufacturer (per-board)
REWORK_ID9integernonoBit-field that encodes the reworks applied to the device.
FACTORY_CALIBRATION_DATA10integernonoBit-field that encodes factory calibration data

Sticky fields are those which are set before SMT and preflashed to EEPROMs. They're not expected to be changed after boards are manufactured. Non-sticky fields can be changed for example at RMA center if write protect is disabled.

Required fields are expected to exist on all devices.


The number assigned to each hardware version. This field ideally should be synchronously incremented as the project progresses and should not differ among models.

Assignment can be different from project to project but it’s recommended to be a single-byte field (instead of two-byte field where the upper half describes phases (EVT, DVT, PVT) and the lower half describes numeric versions in each phase).


A number assigned to each OEM. Software shared by multiple OEMs can use this field to select a customization common to a particular OEM. For example, it can be used to control LEDs, which tend to follow an OEM's preference.


The number used to describe hardware configuration or hardware features. Assignment varies family to family and usually is shared among all models in the same family.

In the past, some families use it as an index for a SKU table where hardware features are described for SKUs, or it has also been a bitmap where each bit or set of bits represents one hardware feature. For example, it can contain information such as CPU type, form factor, touch panel, camera, keyboard backlight, etc. Top 8 bits can be reserved for OEM specific features to allow OEMs to customize devices independently.

Now, the SKU_ID is not used by the firmware to make any decisions. The firmware code will use the FW_CONFIG field to make any branching decisions. This allows us to decouple the hardware identity (SKU_ID) from how the firmware needs to react (FW_CONFIG). A particular SKU_ID value implies one and only one value for FW_CONFIG. When HW identity is decoupled from firmware behavior, we can add new permutations of hardware (and thus new SKU values) without affecting the firmware code if the firmware code can treat the hardware the same (meaning two different SKU_IDs could have the same value for FW_CONFIG).

DRAM_PART_NUM (go/octopus-dram-part-number-retrieval)

A string value that is used to identify a DRAM. This is different from RAM ID, which is an index to a table where RAM configuration parameters are stored. RAM ID is encoded in resistor strapping. This makes RAM ID visually validatable (as opposed to being a field in CBI). DRAM_PART_NUM is used to track the inventory.


OEM name in ascii string.


A bit field that tracks the different permutations of HW that the firmware needs to be able to handle. The FW_CONFIG only contains the information that the firmware strictly needs to make a branching decision. Any other information about a device should be captured and stored in the higher level configuration system. See SKU and FW Configuration Fields for more details.

Below are a few, non-exhaustive examples of how the firmware configuration bits could be portioned.

1Enabled sensors in EC (1b : yes)EC enables sensor monitoring based on this bit. This should be set to 1b when the sensors are stuffed on a design (e.g. convertible) and 0b when the sensors are not stuffed (e.g. clamshell)
1Has internal keypad (1b: yes)Update keyscan_config based on presence of keypad on internal keyboard
1Has AR camera (1b: yes)Enables interrupts and updates drivers for AR based camera.
3GPIO customization for SoC8 unique GPIO configurations. Values are assigned on a per-firmware build basis.
2SARs customization for SoC4 unique SARs customization files. Values are assigned on a per-firmware build basis
2VBT customization for SoC4 unique VBT customization files. Values are assigned on a per-firmware build basis
1Touchscreen enabled for SoC (1b: yes)AP enables bus and configures GPIOs for touchscreen device


This field identifies the printed-circuit-board manufacturer for a device. The ID assignment is specific to a board.


A 64-bit field that tracks the modifications applied to the device. What rework each bit represents can be independently defined by each project.


A 32-bit field that encloses the data from factory calibration such as LED or other components.

This field should only be used for calibration data required by the EC. Calibration data required by the OS should be placed in VPD instead.


Firmware Write Protection

ChromeOS devices have the global write protect line, WP_L, which is controlled by Cr50 and a servo, and used to protect various firmware images (AP, EC, FPMCU, etc.). The WP pin of an EEPROM should be connected to WP_L. CBI data will be protected as securely as other RO firmware images and can be changed at RMA center or by developers for special needs.

While AP SPI flash and EC SPI flash also combine the internal status registers to determine the WP state, WP of CBI EEPROMs will be controlled by the WP signal only. When write protect is enabled, the EEPROM must protect entirely or partially the region where CBI data is stored.

We'll make a change with Cr50 such that when AP SPI WP is deasserted, Cr50 accepts a special host command which disables WP_L (only until the next reboot). This allows CBI to be modified in the factory before the board is finalized, that is, before the AP SPI WP is enabled.

I2C bus

It is recommended to select an I2C bus, which is quiet during power on after reset. An I2C device can wedge a bus. CrOS EC is capable of unwedging a bus but it doesn't always work.


WP should be connected to the same wire as the write-protect pin of the EC SPI flash.


The power well should be the same as the EC. When the WP is high, the data is write protected. If the WP pin of an EC SPI Flash has active low logic (low = protect), a MOSFET can be used to reverse the voltage:


The following EEPROM parts have been tested and deployed on the past projects:

  • M24C02-WMN6TP
  • M34E02-FMC6TG

They are pin-to-pin compatible. M34E02 has a capability to protect only the top half but this feature is not currently used.


You can evaluate implementation as follows:

  • Boot the device multiple times. Verify the data is consistently printed every time.
  • Try cbi command on EC console multiple times. It reads the whole EEPROM data and dumps it. If I2C bus has a low quality signal, you may observe failed reads.
  • Try enable and disable hardware write protection. Verify ectool cbi set command fails or succeeds as expected.
  • Verify default values and errors are handled. If CBI is for some reason broken, the software stack should choose the default values which have the least impact on the system stability.


EC firmware

CBI should be read up to two times (back-to-back) per boot per image. That is, on normal boot, EC RO should read it and EC RW should read it once. Once reads are attempted, the result is preserved even if both reads fail. This would prevent the system from running in an inconsistent state. b/80236608 explains why we don't let the EC keep reading CBI.

The earliest timing CBI can be read is at HOOK_INIT with HOOK_PRIO_POST_I2C.


A tool which runs on a build machine. It creates a EEPROM image file with given field values. Manufacturers use CBI image files to pre-flash EEPROMs in large volume. This tool also can print the contents of a CBI image file.


A tool which runs on a host (i.e. Chromebooks). It can fetch CBI data from the EEPROM (through the EC). Manufacturers can use this tool to validate the EEPROM contents. If the board is not write protected, ectool can change the CBI. Note that some fields are not expected to be changed after the board is manufactured. The data of existing fields can be changed and resized.


Mosys is a tool which runs on the host to provide various information of the host. One of its sub-command, platform, retrieves board information (e.g. SKU, OEM) from SMBIOS, which is populated by coreboot. We’ll update coreboot so that it’ll fetch board information from EEPROM (via EC) instead of resistor strapping.


This is a script used by debugd to include CBI dump in user feedback reports. Currently, it prints only BOARD_VERSION, OEM_ID, and SKU_ID.


It requires the EC to initialize an I2C controller and its driver. There may be rare cases where board info is needed before these are initialized. To handle such cases, we may need to add simplified I2C API. Simplified I2C API would have the following features:

  • Does not do write
  • May only read a single byte at a time
  • May run at lower frequency
  • May assume no multitasking (thus implement no concurrency control)
  • Exist only in RO copy