blob: 219bbed59462d4579b726a0a5cde05412a43a5a6 [file] [log] [blame]
# Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
"""Probing routines for hardware and firmware identification.
There are three types of probe functions: hardware components, hash
values, and initial_config.
Probe functions must return the target identification string if the
probe was successful or None if no appropriate data was available.
Probe functions may also raise the Error exception to indicate that a
survivable error occurred, in which case the error will be reported
and a None probe result assumed.
from __future__ import print_function
import collections
import hashlib
import logging
import os
import re
import string # pylint: disable=W0402
import struct
import subprocess
import sys
import time
from array import array
from glob import glob
from fcntl import ioctl
from tempfile import NamedTemporaryFile
import factory_common # pylint: disable=W0611
from cros.factory.gooftool import edid
from cros.factory.gooftool import crosfw
from cros.factory.gooftool import vblock
from cros.factory.gooftool.common import Shell
# pylint: disable=E0611
from cros.factory.hwid.v2.hwid_tool import ProbeResults, COMPACT_PROBE_STR
from cros.factory.test.l10n import regions
from cros.factory.utils import process_utils
from cros.factory.utils.type_utils import Error
from cros.factory.utils.type_utils import Obj
import flimflam # pylint: disable=F0401
except: # pylint: disable=W0702
# TODO(tammo): Some tests look for multiple components, some tests
# throw away all but the first, and some just look for one. All tests
# should return a list of results, with the empty list indicating no
# components were found.
# TODO(tammo): Get rid of trial-and-error detection. If there are
# multiple different ways to perform detection, we should run them all
# and collate the results. Different code paths on different systems
# leads to bitrot and fragility.
# Load-time decorator-populated dicts (arch of None implies generality):
# { arch : { class : probe function } }
# Load-time decorator-populated set of probably component classes.
# If this file is present, we'll return its probe results rather than
# actually probing.
FAKE_PROBE_RESULTS_FILE = '/tmp/fake_probe_results.yaml'
def CompactStr(data):
"""Converts data to string with compressed white space.
data: Single string or a list/tuple of strings.
If data is a string, compress all contained contiguous spaces to
single spaces. If data is a list or tuple, space-join and then
treat like string input.
if isinstance(data, list) or isinstance(data, tuple):
data = ' '.join(x for x in data if x)
return re.sub(r'\s+', ' ', data).strip()
def DictCompactProbeStr(content):
return {COMPACT_PROBE_STR: CompactStr(content)}
def ParseKeyValueData(pattern, data):
"""Converts structured text into a {(key, value)} dict.
pattern: A regex pattern to decode key/value pairs
data: The text to be parsed.
A { key: value, ... } dict.
ValueError: When the input is invalid.
parsed_list = {}
for line in data.splitlines():
matched = re.match(pattern, line.strip())
if not matched:
raise ValueError('Invalid data: %s' % line)
(name, value) = (,
if name in parsed_list:
raise ValueError('Duplicate key: %s' % name)
parsed_list[name] = value
return parsed_list
def _LoadKernelModule(name, error_on_fail=True):
"""Ensure kernel module is loaded. If not already loaded, do the load."""
# TODO(tammo): Maybe lift into shared data for performance reasons.
loaded = Shell('lsmod | grep -q %s' % name).success
if not loaded:
loaded = Shell('modprobe %s' % name).success
if (not loaded) and error_on_fail:
raise Error('Cannot load kernel module: %s' % name)
return loaded
def _ReadSysfsFields(base_path, field_list, optional_field_list=None):
"""Return dict of {field_name: field_value} corresponding to sysfs contents.
base_path: sysfs directory which each field should be a file within.
field_list: Required fields ; function returns None if fields are missing.
optional_field_list: Fields that are included if the corresponding
files exist.
Dict of field names and values, or None if required fields are not
all present.
all_fields_list = field_list + (optional_field_list or [])
path_list = [os.path.join(base_path, field) for field in all_fields_list]
data = dict((field, open(path).read().strip())
for field, path in zip(all_fields_list, path_list)
if os.path.exists(path) and not os.path.isdir(path))
if not set(data) >= set(field_list):
return None
[data[field] for field in all_fields_list if field in data]))
return data
def _ReadSysfsPciFields(path):
"""Returns string containing PCI 'vendor:device' tuple."""
# TODO(hungte): Maybe add PCI 'rev' field.
field_data = _ReadSysfsFields(path, ['vendor', 'device'])
if field_data is None:
return None
'%s:%s' % (field_data['vendor'].replace('0x', ''),
field_data['device'].replace('0x', ''))]))
return field_data
def _ReadSysfsUsbFields(path):
"""Returns dict containing at least the values of USB 'idVendor' and
path: Path used to search for USB sysfs data. First all symlinks
are resolved, to the the 'real' path. Then path terms are
iteratively removed from the right hand side until the remaining
path looks to contain the relevent data fields.
A dict with the USB 'idVendor' and 'idProduct' values if a sutable
directory containing the field data can be found. This dict will also
contain other optional field data if those are available. If no directory
with the required fields are found, returns None.
path = os.path.realpath(path)
while path.find('/usb') > 0:
if os.path.exists(os.path.join(path, 'idProduct')):
path = os.path.split(path)[0]
field_data = _ReadSysfsFields(path, ['idVendor', 'idProduct'],
['manufacturer', 'product', 'bcdDevice'])
if field_data is None:
return None
compact_str_list = ['%s:%s' % (field_data['idVendor'].replace('0x', ''),
field_data['idProduct'].replace('0x', ''))]
for key in ['manufacturer', 'product', 'bcdDevice']:
if field_data.get(key):
return field_data
def _ReadSysfsDeviceId(path, ignore_usb=False):
"""Returns sysfs PCI or USB device identification string."""
return (_ReadSysfsPciFields(path) or
(_ReadSysfsUsbFields(path) if not ignore_usb else None) or
def _ReadSysfsNodeId(path):
"""Returns sysfs node identification string.
A more generic wrapper around _ReadSysfsDeviceId which supports
cases where only a 'name' file exists. Basically it tries to read
the DeviceID data if present, but otherwise falls back to just
reading the name file data.
device_id = _ReadSysfsDeviceId(os.path.join(path, 'device'))
if device_id:
return device_id
name_path = os.path.join(path, 'name')
if os.path.exists(name_path):
with open(name_path) as f:
device_id =
if device_id:
return DictCompactProbeStr(device_id.strip(chr(0)).split(chr(0)))
return None
def _RecursiveProbe(path, read_method):
"""Recursively probes in path and all the subdirectory using read_method.
path: Root path of the recursive probing.
read_method: The method used to probe device information.
This method accepts an input path and returns a string.
e.g. _ReadSysfsUsbFields, _ReadSysfsPciFields, or _ReadSysfsDeviceId.
A list of strings which contains probed results under path and
all the subdirectory of path. Duplicated data will be omitted.
def _InternalRecursiveProbe(path, visited_path, data_list, read_method):
"""Recursively probes in path and all the subdirectory using read_method.
path: Root path of the recursive probing.
visited_path: A set containing visited paths. These paths will not
be visited again.
data_list: A list of string which contains probed results.
This list will be appended through the recursive probing.
read_method: The method used to probe device information.
This method accepts an input path and returns a string.
No return value. data_list in the input will be appended with probed
information. Duplicated data will be omitted.
path = os.path.realpath(path)
if path in visited_path:
if os.path.isdir(path):
data = read_method(path)
# Only append new data
if data not in data_list:
entries_list = os.listdir(path)
for filename in entries_list:
# Do not search directory upward
if filename == 'subsystem':
sub_path = os.path.join(path, filename)
_InternalRecursiveProbe(sub_path, visited_path, data_list, read_method)
visited_path = set()
data_list = []
_InternalRecursiveProbe(path, visited_path, data_list, read_method)
return data_list
class _FlimflamDevices(object):
"""Wrapper around flimflam (connection manager) information.
This object is a wrapper around the data from the flimflam module,
providing dbus format post processing.
Wrapped data is a list of Objs corresponding to devices detected by
flimflam. Each has devtype (flimflam type classification) and path
(location of related data in sysfs) fields. For cellular devices,
there is also an attributes field which contains a dict of
attribute:value items.
cached_dev_list = None
def GetDevices(cls, devtype):
"""Return device Obj list for devices with the specified type."""
def ProcessDevice(device):
properties = device.GetProperties()
get_prop = lambda p: flimflam.convert_dbus_value(properties[p])
result = Obj(
path='/sys/class/net/%s/device' % get_prop('Interface'))
if result.devtype == 'cellular':
result.attributes = dict(
(key, get_prop('Cellular.%s' % key))
for key in ['Carrier', 'FirmwareRevision', 'HardwareRevision',
'ModelID', 'Manufacturer']
if 'Cellular.%s' % key in properties)
return result
if cls.cached_dev_list is None:
cls.cached_dev_list = [ProcessDevice(device) for device in
# On some Brillo (AP-type) devices, WiFi interfaces are blacklisted by
# shill and needs to be discovered manually.
wifi_devs = [dev for dev in cls.cached_dev_list if dev.devtype == 'wifi']
if not wifi_devs:'No WiFi components found by shill. Use iwconfig.')
shell_command = 'iwconfig | grep "IEEE 802.11" | cut -d " " -f 1'
nodes = Shell(shell_command).stdout.split()
wifi_devs = [Obj(devtype='wifi', path='/sys/class/net/%s/device' % node)
for node in nodes]
if wifi_devs:'iwconfig found: %s', wifi_devs)
cls.cached_dev_list += wifi_devs
return [dev for dev in cls.cached_dev_list if dev.devtype == devtype]
def ReadSysfsDeviceIds(cls, devtype, ignore_usb=False):
"""Return _ReadSysfsDeviceId result for each device of specified type."""
ids = [_ReadSysfsDeviceId(dev.path, ignore_usb)
for dev in cls.GetDevices(devtype)]
# Filter out 'None' results
return sorted(device for device in ids if device is not None)
class _GobiDevices(object):
"""Wrapper around Gobi specific utility information."""
# TODO(bhthompson): This will need to be rewritten when gobi-fw is
# deprecated, see
def IsDeviceGobi(cls):
"""Return true if there is a Gobi modem, false if not."""
for path in glob('/sys/class/net/*/device/uevent'):
with open(path) as f:
if 'DRIVER=gobi' in [x.strip() for x in f.readlines()]:
return True
return False
def ReadFirmwareList(cls):
"""Return a list of firmware tuples from the `gobi-fw list` command"""
if not cls.IsDeviceGobi():
return None
firmwares = []
Firmware = collections.namedtuple('Firmware', 'attrs active build_id '
# Split utility output into a list and remove the legend and last newline.
# The attrs field consists of some/all of the characters AIPM from the
# gobi-fw utility 'Legend: A available I installed P pri M modem * active'
# We separate out the * for active as it is an initial configuration,
# modifiable by the user or tests to enable different carriers/regions.
for l in Shell('gobi-fw list').stdout.splitlines()[1:]:
m = re.match(r'^([A ][I ][P ][M ])([* ]) (\S+)\s+(.+)$', l)
if not m:
raise ValueError('Unable to parse line %r in gobi-fw output' % l)
firmwares.append(Firmware(, != ' ',,
return firmwares
def ActiveFirmware(cls):
"""Return the string of the active firmware (build_id for Gobi)."""
if not cls.IsDeviceGobi():
return None
firmwares = cls.ReadFirmwareList()
active_firmwares = [fw.build_id for fw in firmwares if]
active_firmware = active_firmwares[0] if active_firmwares else None
return active_firmware
class _TouchpadData(object): # pylint: disable=W0232
"""Return Obj with hw_ident and fw_ident string fields."""
def Synaptics(cls):
detect_program = '/opt/Synaptics/bin/syndetect'
if not os.path.exists(detect_program):
return None
lock_check = Shell('lsof /dev/serio_raw0 | grep -q "^X"')
if lock_check.success and not os.getenv('DISPLAY'):
logging.error('Synaptics touchpad detection with X in the '
'foreground requires DISPLAY and XAUTHORITY '
'to be set properly.')
return None
result = Shell(detect_program)
if not result.success:
return None
properties = dict(map(str.strip, line.split('=', 1))
for line in result.stdout.splitlines() if '=' in line)
model = properties.get('Model String', 'Unknown Synaptics')
# Delete the " on xxx Port" substring, as we do not care about the port.
model = re.sub(' on [^ ]* [Pp]ort$', '', model)
firmware = properties.get('Firmware ID', None)
return Obj(ident_str=model, fw_version=firmware)
def Cypress(cls):
for node in glob('/sys/class/input/mouse[0-9]*/device/device'):
model_path_list = [os.path.join(node, field) for field in
['product_id', 'hardware_version', 'protocol_version']]
firmware_path = os.path.join(node, 'firmware_version')
if not all(os.path.exists(path) for path in
model_path_list + [firmware_path]):
return Obj(
[open(path).read().strip() for path in model_path_list]),
return None
def Atmel(cls):
input_file = '/proc/bus/input/devices'
re_device_name = re.compile(r'^N: Name="(Atmel.*Touchpad)"$', re.MULTILINE)
re_sysfs = re.compile(r'^S: Sysfs=(.*)$', re.MULTILINE)
with open(input_file, 'r') as f:
buf =
devices = buf.split('\n\n')
for d in devices:
match = re_device_name.findall(d)
if not match:
device_name = match[0]
sysfs_path = os.path.join('/sys', re_sysfs.findall(d)[0].lstrip('/'))
with open(os.path.join(sysfs_path, '..', '..', 'fw_version'), 'r') as f:
fw_version =
with open(os.path.join(sysfs_path, '..', '..', 'config_csum'), 'r') as f:
config_csum =
return Obj(ident_str=device_name, fw_version=fw_version,
def Elan(cls):
for driver_link in glob('/sys/bus/i2c/drivers/elan_i2c/*'):
if not os.path.islink(driver_link):
with open(os.path.join(driver_link, 'name'), 'r') as f:
name =
with open(os.path.join(driver_link, 'product_id'), 'r') as f:
product_id =
with open(os.path.join(driver_link, 'firmware_version'), 'r') as f:
firmware_version =
with open(os.path.join(driver_link, 'fw_checksum'), 'r') as f:
fw_checksum =
return Obj(ident_str=name, product_id=product_id,
fw_version=firmware_version, fw_csum=fw_checksum)
def Generic(cls):
# TODO(hungte) add more information from id/*
# format: N: Name="???_trackpad"
input_file = '/proc/bus/input/devices'
cmd = 'grep -iE "^N.*(touch *pad|track *pad)" %s' % input_file
info = Shell(cmd).stdout.splitlines()
info = [re.sub('^[^"]*"(.*)"$', r'\1', device) for device in info]
return Obj(ident_str=(', '.join(info) if info else None), fw_version=None)
def HidOverI2c(cls):
# Since hid-over-i2c support many classes of devices,
# no good method to differentiate touchpad/touchscreen .. from others.
# so we use a list of tuple [("vendor id","product id"),...] to list
# all known touchpad here so that we can report touchpad info correctly.
# ("06cb","7a3b") is synaptics hid-over-i2c touchpad.
known_hid_tp = [('06cb', '7a3b')]
input_file = '/proc/bus/input/devices'
re_device_name = re.compile(r'^N: Name="(hid-over-i2c.*)"$', re.MULTILINE)
re_sysfs = re.compile(r'^S: Sysfs=(.*)$', re.MULTILINE)
with open(input_file, 'r') as f:
buf =
devices = buf.split('\n\n')
for d in devices:
match = re_device_name.findall(d)
if not match:
device_name = match[0]
sysfs_path = os.path.join('/sys', re_sysfs.findall(d)[0].lstrip('/'))
with open(os.path.join(sysfs_path, 'id/vendor'), 'r') as f:
idVendor =
with open(os.path.join(sysfs_path, 'id/product'), 'r') as f:
idProduct =
for vendor, product in known_hid_tp:
if((vendor.lower() == idVendor.lower()) and
(product.lower() == idProduct.lower())):
return Obj(ident_str=device_name, fw_version=None)
cached_data = None
def Get(cls):
if cls.cached_data is None:
cls.cached_data = Obj(ident_str=None, fw_version=None)
for vendor_fun in [cls.Cypress, cls.Synaptics, cls.Atmel,
cls.HidOverI2c, cls.Elan, cls.Generic]:
data = vendor_fun()
if data is not None:
cls.cached_data = data
return cls.cached_data
class _TouchscreenData(object): # pylint: disable=W0232
"""Return Obj with hw_ident and fw_ident string fields."""
def Atmel(cls):
input_file = '/proc/bus/input/devices'
re_device_name = re.compile(r'^N: Name="(Atmel.*Touchscreen)"$',
re_sysfs = re.compile(r'^S: Sysfs=(.*)$', re.MULTILINE)
with open(input_file, 'r') as f:
buf =
devices = buf.split('\n\n')
for d in devices:
match = re_device_name.findall(d)
if not match:
device_name = match[0]
sysfs_path = os.path.join('/sys', re_sysfs.findall(d)[0].lstrip('/'))
with open(os.path.join(sysfs_path, '..', '..', 'fw_version'), 'r') as f:
fw_version =
with open(os.path.join(sysfs_path, '..', '..', 'config_csum'), 'r') as f:
config_csum =
return Obj(ident_str=device_name, fw_version=fw_version,
def Elan(cls):
for device_path in glob('/sys/bus/i2c/devices/*'):
driver_link = os.path.join(device_path, 'driver')
if not os.path.islink(driver_link):
driver_name = os.path.basename(os.readlink(driver_link))
if driver_name != 'elants_i2c':
with open(os.path.join(device_path, 'name'), 'r') as f:
device_name =
with open(os.path.join(device_path, 'hw_version'), 'r') as f:
hw_version =
with open(os.path.join(device_path, 'fw_version'), 'r') as f:
fw_version =
return Obj(ident_str=device_name, hw_version=hw_version,
def Generic(cls):
# TODO(hungte) add more information from id/*
# format: N: Name="??? touchscreen"
input_file = '/proc/bus/input/devices'
cmd = 'grep -iE "^N.*(touch *screen)" %s' % input_file
info = Shell(cmd).stdout.splitlines()
info = [re.sub('^[^"]*"(.*)"$', r'\1', device) for device in info]
return Obj(ident_str=(', '.join(info) if info else None), fw_version=None)
cached_data = None
def Get(cls):
if cls.cached_data is None:
cls.cached_data = Obj(ident_str=None, fw_version=None)
for vendor_fun in [cls.Atmel, cls.Elan, cls.Generic]:
data = vendor_fun()
if data is not None:
cls.cached_data = data
return cls.cached_data
def _ProbeFun(probe_map, probe_class, *arch_targets):
"""Decorator that populates probe_map.
There can only be one probe function for each arch for each
probe_class. If no arch_targets are specified, the probe is assumed
to be general and apply for those arches whithout arch specific
probe_map: Map to update.
probe_class: Probe class for which the probe fun produces results.
arch_targets: List of arches for which the probe is relevant.
def Decorate(f):
arch_list = arch_targets if arch_targets else [None]
for arch in arch_list:
arch_probe_map = probe_map.setdefault(arch, {})
assert probe_class not in arch_probe_map, (
'Multiple component probe functions for %r %r',
arch if arch else 'generic', probe_class)
arch_probe_map[probe_class] = f
return f
return Decorate
def _ComponentProbe(probe_class, *arch_targets):
return _ProbeFun(_COMPONENT_PROBE_MAP, probe_class, *arch_targets)
def _InitialConfigProbe(probe_class, *arch_targets):
return _ProbeFun(_INITIAL_CONFIG_PROBE_MAP, probe_class, *arch_targets)
def _ProbeAudioCodec():
"""Looks for codec strings.
Collect /sys/kernel/debug/asoc/codecs for ASOC (ALSA
SOC) drivers, /proc/asound for HDA codecs, then PCM details.
There is a set of known invalid codec names that are not included in the
return value.
'ts3a227e.4-003b', # autonomous audiojack switch, not an audio codec
'dw-hdmi-audio' # this is a virtual audio codec driver
with open('/sys/kernel/debug/asoc/codecs') as f:
results = [DictCompactProbeStr(codec) for codec in
grep_result = Shell('grep -R "Codec:" /proc/asound/*')
match_set = set()
for line in grep_result.stdout.splitlines():
match_set |= set(re.findall(r'.*Codec:(.*)', line))
results += [DictCompactProbeStr(match) for match in sorted(match_set) if
if results:
return results
# Formatted '00-00: WM??? PCM wm???-hifi-0: ...'
pcm_data = open('/proc/asound/pcm').read().strip().split(' ')
if len(pcm_data) > 2:
return [DictCompactProbeStr(pcm_data[1])]
return []
def _ProbeBattery():
"""Compose data from sysfs."""
node_path_list = glob('/sys/class/power_supply/*')
type_data_list = [_ReadSysfsFields(node_path, ['type'])['type']
for node_path in node_path_list]
battery_field_list = ['manufacturer', 'model_name', 'technology']
# probe energy_full_design or charge_full_design, battery can have either
battery_full_field_candidate = ['charge_full_design',
battery_full_field_candidate_found = False
for candidate in battery_full_field_candidate:
if any(os.path.exists(os.path.join(path, candidate))
for path in node_path_list):
battery_full_field_candidate_found = True
if not battery_full_field_candidate_found:
return []
battery_data_list = [_ReadSysfsFields(node_path, battery_field_list)
for node_path, type_data
in zip(node_path_list, type_data_list)
if type_data == 'Battery']
return sorted(x for x in battery_data_list if x)
def _ProbeBluetooth():
# Probe in primary path
device_id = _ReadSysfsDeviceId('/sys/class/bluetooth/hci0/device')
if device_id:
return [device_id]
# Use information in driver if probe failed in primary path
device_id_list = _RecursiveProbe('/sys/module/bluetooth/holders',
return sorted(x for x in device_id_list if x)
def _GetV4L2Data(video_idx):
# Get information from video4linux2 (v4l2) interface.
# See /usr/include/linux/videodev2.h for definition of these consts.
# 'ident' values are defined in include/media/v4l2-chip-ident.h
info = {}
# Get v4l2 capability
# struct v4l2_capability
# {
# __u8 driver[16];
# __u8 card[32];
# __u8 bus_info[32];
# __u32 version;
# __u32 capabilities; /* V4L2_CAPABILITIES_OFFSET */
# __u32 reserved[4];
# };
# Webcam should have CAPTURE capability but no OUTPUT capability.
V4L2_CAP_VIDEO_CAPTURE = 0x00000001
V4L2_CAP_VIDEO_OUTPUT = 0x00000002
# V4L2 encode/decode device should have the following capabilities.
V4L2_CAP_STREAMING = 0x04000000
def _TryIoctl(fileno, request, *args):
"""Try to invoke ioctl without raising an exception if it fails."""
ioctl(fileno, request, *args)
except: # pylint: disable=W0702
with open('/dev/video%d' % video_idx, 'r+') as f:
# Read chip identifier.
buf = array('i', [0] * V4L2_DBG_CHIP_IDENT_SIZE)
_TryIoctl(f.fileno(), VIDIOC_DBG_G_CHIP_IDENT, buf, 1)
v4l2_ident = buf[V4L2_INDEX_IDENT]
if v4l2_ident >= V4L2_VALID_IDENT:
info['ident'] = 'V4L2:%04x %04x' % (v4l2_ident,
# Read V4L2 capabilities.
buf = array('B', [0] * V4L2_CAPABILITY_STRUCT_SIZE)
_TryIoctl(f.fileno(), IOCTL_VIDIOC_QUERYCAP, buf, 1)
capabilities = struct.unpack_from('<I', buf, V4L2_CAPABILITIES_OFFSET)[0]
if ((capabilities & V4L2_CAP_VIDEO_CAPTURE) and
(not capabilities & V4L2_CAP_VIDEO_OUTPUT)):
info['type'] = 'webcam'
elif capabilities & V4L2_CAP_VIDEO_CODEC == V4L2_CAP_VIDEO_CODEC:
info['type'] = 'video_codec'
except: # pylint: disable=W0702
return info
def _ProbeVideo():
# TODO(tammo/sheckylin): Try to replace the code below with OpenCV calls.
result = []
for video_node in glob('/sys/class/video4linux/video*'):
video_idx ='video(\d+)$', video_node).group(1)
info = {}
video_data = _ReadSysfsNodeId(video_node)
if video_data:
# Also check video max packet size
video_max_packet_size = _ReadSysfsFields(
os.path.join(video_node, 'device', 'ep_82'),
# We do not want to override compact_str in info
if video_max_packet_size:
info.update({'wMaxPacketSize': video_max_packet_size['wMaxPacketSize']})
# For SOC videos
video_data_soc = _ReadSysfsFields(video_node, ['device/control/name'])
if video_data_soc:
# Get video4linux2 (v4l2) info.
v4l2_data = _GetV4L2Data(int(video_idx))
if v4l2_data:
return result
def _ProbeCellular():
data = _FlimflamDevices.ReadSysfsDeviceIds('cellular')
if data:
modem_status = Shell('modem status').stdout
for key in ['carrier', 'firmware_revision', 'Revision']:
matches = re.findall(
r'^\s*' + key + ': (.*)$', modem_status, re.M)
if matches:
data[0][key] = matches[0]
# For some chipsets we can use custom utilities for more data
if _GobiDevices.IsDeviceGobi():
full_fw_string = []
for fw in _GobiDevices.ReadFirmwareList():
fw_string = '%s %s %s' % (fw.attrs, fw.build_id, fw.carrier)
data[0]['firmwares'] = ', '.join(full_fw_string)
data[0]['active_firmware'] = str(_GobiDevices.ActiveFirmware())
return data
def _ProbeWimax():
return _FlimflamDevices.ReadSysfsDeviceIds('wimax')
def _ProbeDisplayConverter():
"""Try brand-specific probes, return the first viable result."""
def ProbeChrontel():
"""Search style borrowed from the /etc/init/chrontel.conf behavior."""
# i2c-i801 is not available on some devices (ex, ARM).
_LoadKernelModule('i2c-i801', error_on_fail=False)
dev_chrontel = '/dev/i2c-chrontel'
if not os.path.exists(dev_chrontel):
for dev_path in glob('/sys/class/i2c-adapter/*'):
adapter_name = open(os.path.join(dev_path, 'name')).read().strip()
if adapter_name.startswith('SMBus I801 adapter'):
dev_chrontel = os.path.basename(dev_path)
cmd = 'ch7036_monitor -d %s -p' % dev_chrontel
if os.path.exists(dev_chrontel) and Shell(cmd).success:
return 'ch7036'
return None
part_id_gen = (probe_fun() for probe_fun in [ProbeChrontel])
return next(([x] for x in part_id_gen if x is not None), [])
@_ComponentProbe('chipset', 'x86')
def _ProbeChipsetX86():
"""On x86, host bridge is always the first PCI device."""
device_id = _ReadSysfsDeviceId('/sys/bus/pci/devices/0000:00:00.0')
return [device_id] if device_id is not None else []
@_ComponentProbe('chipset', 'arm')
def _ProbeChipsetArm():
"""On ARM SOC-based systems, use first compatible list in device-tree."""
# Format: manufacturer,model [NUL] compat-manufacturer,model [NUL] ...
fdt_compatible_file = '/proc/device-tree/compatible'
if not os.path.exists(fdt_compatible_file):
return []
compatible_list = open(fdt_compatible_file).read().strip()
return [DictCompactProbeStr(compatible_list.strip(chr(0)).split(chr(0)))]
@_ComponentProbe('cpu', 'x86')
def _ProbeCpuX86():
"""Reformat /proc/cpuinfo data."""
# For platforms like x86, it provides names for each core.
# Sample output for dual-core:
# model name : Intel(R) Atom(TM) CPU ???
# model name : Intel(R) Atom(TM) CPU ???
cmd = r'sed -nr "s/^model name\s*: (.*)/\1/p" /proc/cpuinfo'
stdout = Shell(cmd).stdout.splitlines()
return [{'model': stdout[0], 'cores': str(len(stdout)),
'%s [%d cores]' % (stdout[0], len(stdout)))}]
@_ComponentProbe('cpu', 'arm')
def _ProbeCpuArm():
"""Reformat /proc/cpuinfo data."""
# For platforms like arm, it sometimes gives the model name in 'Processor',
# and sometimes in 'model name'. But they all give something like 'ARMv7
# Processor rev 4 (v71)' only. So to uniquely identify an ARM CPU, we should
# use the 'Hardware' field.
with open('/proc/cpuinfo') as f:
cpuinfo =
model ='^(?:Processor|model name)\s*: (.*)$',
cpuinfo, re.MULTILINE).group(1)
except AttributeError:
model = 'unknown'
logging.error("Unable to find 'Processor' or 'model name' field in "
"/proc/cpuinfo, can't determine CPU model.")
hardware ='^Hardware\s*: (.*)$',
cpuinfo, re.MULTILINE).group(1)
except AttributeError:
hardware = 'unknown'
logging.error("Unable to find 'Hardware' field in /proc/cpuinfo, "
"can't determine CPU hardware.")
cores = 0
while os.path.exists('/sys/devices/system/cpu/cpu%s' % cores):
cores += 1
return [{'model': model, 'cores': str(cores), 'hardware': hardware,
'%s [%d cores] %s' % (model, cores, hardware))}]
def _ProbeDisplayPanel():
"""Combine all available edid data, from sysfs and directly from the i2c."""
edid_list = []
glob_list = [
path_list = []
for path in glob_list:
path_list += glob(path)
for path in path_list:
with open(path) as f:
parsed_edid = edid.Parse(
if parsed_edid:
for path in sorted(glob('/dev/i2c-[0-9]*')):
parsed_edid = edid.LoadFromI2c(path)
if parsed_edid:
return edid_list
def _ProbeDram():
"""Combine mosys memory timing and geometry information."""
# TODO(tammo): Document why mosys cannot load i2c_dev itself.
part_data = Shell('mosys -k memory spd print id').stdout
timing_data = Shell('mosys -k memory spd print timings').stdout
size_data = Shell('mosys -k memory spd print geometry').stdout
parts = dict(re.findall('dimm="([^"]*)".*part_number="([^"]*)"', part_data))
timings = dict(re.findall('dimm="([^"]*)".*speeds="([^"]*)"', timing_data))
sizes = dict(re.findall('dimm="([^"]*)".*size_mb="([^"]*)"', size_data))
results = []
for slot in sorted(parts):
part = parts[slot]
size = sizes[slot]
timing = timings[slot].replace(' ', '')
'slot': slot,
'part': part,
'size': size,
'timing': timing,
COMPACT_PROBE_STR: CompactStr(['|'.join([slot, part, size, timing])])})
return results
def _ProbeEcFlashChip():
ret = []
ec_chip_id = crosfw.LoadEcFirmware().GetChipId()
if ec_chip_id is not None:
ret.append({COMPACT_PROBE_STR: ec_chip_id})
pd_chip_id = crosfw.LoadPDFirmware().GetChipId()
if pd_chip_id is not None:
ret.append({COMPACT_PROBE_STR: pd_chip_id})
return ret
def _ProbeEmbeddedController():
"""Reformat mosys output."""
# Example mosys command output:
# vendor="VENDOR" name="CHIPNAME" fw_version="ECFWVER"
ret = []
info_keys = ('vendor', 'name')
for name in ('ec', 'pd'):
ec_info = dict(
(key, process_utils.CheckOutput(
['mosys', name, 'info', '-s', key]).strip())
for key in info_keys)
ec_info[COMPACT_PROBE_STR] = CompactStr(
[ec_info[key] for key in info_keys])
except subprocess.CalledProcessError:
# The EC type is not supported on this board.
return ret
def _ProbePowerMgmtChip():
tpschrome_ver = re.findall(
r'Read from I2C port 0 at 0x90 offset 0x19 = (\w+)',
Shell('ectool i2cread 8 0 0x90 0x19').stdout)
if not tpschrome_ver:
return []
return [{'tpschrome_ver': tpschrome_ver[0],
COMPACT_PROBE_STR: tpschrome_ver[0]}]
def _ProbeEthernet():
# Build-in ethernet devices should not be attached to USB. They are usually
# either PCI or SOC.
return _FlimflamDevices.ReadSysfsDeviceIds('ethernet', ignore_usb=True)
def _ProbeMainFlashChip():
chip_id = crosfw.LoadMainFirmware().GetChipId()
return [{COMPACT_PROBE_STR: chip_id}] if chip_id else []
def _GetFixedDevices():
"""Returns paths to all fixed storage devices on the system."""
ret = []
for node in sorted(glob('/sys/class/block/*')):
path = os.path.join(node, 'removable')
if not os.path.exists(path) or open(path).read().strip() != '0':
if re.match(r'^loop|^dm-', os.path.basename(node)):
# Loopback or dm-verity device; skip
return ret
def _GetEMMC5FirmwareVersion(node_path):
"""Extracts eMMC 5.0 firmware version from EXT_CSD[254:261].
node_path: the node_path returned by _GetFixedDevices(). For example,
A string indicating the firmware version if firmware version is found.
Return None if firmware version doesn't present.
ext_csd = process_utils.GetLines(Shell(
'mmc extcsd read /dev/%s' % os.path.basename(node_path)).stdout)
# The output for firmware version is encoded by hexdump of a ASCII
# string or hexdump of hexadecimal values, always in 8 characters.
# For example, version 'ABCDEFGH' is:
# [FIRMWARE_VERSION[261]]: 0x48
# [FIRMWARE_VERSION[260]]: 0x47
# [FIRMWARE_VERSION[259]]: 0x46
# [FIRMWARE_VERSION[258]]: 0x45
# [FIRMWARE_VERSION[257]]: 0x44
# [FIRMWARE_VERSION[256]]: 0x43
# [FIRMWARE_VERSION[255]]: 0x42
# [FIRMWARE_VERSION[254]]: 0x41
# Some vendors might use hexadecimal values for it.
# For example, version 3 is:
# [FIRMWARE_VERSION[261]]: 0x00
# [FIRMWARE_VERSION[260]]: 0x00
# [FIRMWARE_VERSION[259]]: 0x00
# [FIRMWARE_VERSION[258]]: 0x00
# [FIRMWARE_VERSION[257]]: 0x00
# [FIRMWARE_VERSION[256]]: 0x00
# [FIRMWARE_VERSION[255]]: 0x00
# [FIRMWARE_VERSION[254]]: 0x03
# To handle both cases, this function returns a 64-bit hexadecimal value
# and will try to decode it as a ASCII string or as a 64-bit little-endian
# integer. It returns '4142434445464748 (ABCDEFGH)' for the first example
# and returns '0300000000000000 (3)' for the second example.
pattern = re.compile(r'^\[FIRMWARE_VERSION\[(\d+)\]\]: (.*)$')
data = dict(m.groups() for m in map(pattern.match, ext_csd) if m)
if not data:
return None
raw_version = [int(data[str(i)], 0) for i in range(254, 262)]
version = ''.join(('%02x' % c for c in raw_version))
# Try to decode it as a ASCII string.
# Note vendor may choose SPACE (0x20) or NUL (0x00) to pad version string,
# so we want to strip both in the human readable part.
ascii = ''.join(map(chr, raw_version)).strip(' \0')
if len(ascii) > 0 and all(c in string.printable for c in ascii):
version += ' (%s)' % ascii
# Try to decode it as a 64-bit little-endian integer.
version += ' (%s)' % struct.unpack_from('<q', version.decode('hex'))
return version
def _ProbeRegion():
"""Probes the region of the DUT based on the region field in RO VPD."""
region_code = ReadRoVpd().get('region', None)
if region_code:
region_obj = regions.REGIONS[region_code]
ret = [{'region_code': region_obj.region_code,}]
ret = []
return ret
def _ProbeStorage():
"""Compile sysfs data for all non-removable block storage devices."""
def ProcessNode(node_path):
dev_path = os.path.join(node_path, 'device')
size_path = os.path.join(os.path.dirname(dev_path), 'size')
sectors = (open(size_path).read().strip()
if os.path.exists(size_path) else '')
ata_fields = ['vendor', 'model']
emmc_fields = ['type', 'name', 'hwrev', 'oemid', 'manfid']
optional_fields = ['cid', 'prv']
data = (_ReadSysfsFields(dev_path, ata_fields) or
_ReadSysfsFields(dev_path, emmc_fields, optional_fields) or
if not data:
return None
emmc5_fw_ver = _GetEMMC5FirmwareVersion(node_path)
if emmc5_fw_ver is not None:
data['emmc5_fw_ver'] = emmc5_fw_ver
data['sectors'] = sectors
data[COMPACT_PROBE_STR] = ' '.join([data[COMPACT_PROBE_STR],
'#' + data['sectors']])
return data
return [ident for ident in map(ProcessNode, _GetFixedDevices())
if ident is not None]
def _ProbeTouchpad():
data = _TouchpadData.Get()
if data.ident_str is None:
return []
results = {'id': data.ident_str}
for key in ('product_id', 'fw_version', 'fw_csum', 'config_csum'):
value = getattr(data, key, '')
if value:
results[key] = value
return [results]
def _ProbeTouchscreen():
data = _TouchscreenData.Get()
if data.ident_str is None:
return []
results = {'id': data.ident_str}
for key in ('fw_version', 'hw_version', 'config_csum'):
value = getattr(data, key, '')
if value:
results[key] = value
return [results]
def _ProbeTpm():
"""Return Manufacturer_info : Chip_Version string from tpm_version output."""
tpm_data = [line.partition(':') for line in
tpm_dict = dict((key.strip(), value.strip()) for
key, _, value in tpm_data)
mfg = tpm_dict.get('Manufacturer Info', None)
version = tpm_dict.get('Chip Version', None)
if mfg is not None and version is not None:
return [{'manufacturer_info': mfg, 'version': version,
COMPACT_PROBE_STR: CompactStr(mfg + ':' + version)}]
return []
def _ProbeUsbHosts():
"""Compile USB data from sysfs."""
# On x86, USB hosts are PCI devices, located in parent of root USB.
# On ARM and others, use the root device itself.
# TODO(tammo): Think of a better way to do this, without arch.
arch = Shell('crossystem arch').stdout.strip()
relpath = '.' if arch == 'arm' else '..'
usb_bus_list = glob('/sys/bus/usb/devices/usb*')
usb_host_list = [os.path.join(os.path.realpath(path), relpath)
for path in usb_bus_list]
# Usually there are several USB hosts, so only list the primary information.
device_id_list = [_ReadSysfsDeviceId(usb_host) for usb_host in usb_host_list]
return [x for x in device_id_list if x is not None]
def _ProbeVga():
node_id = _ReadSysfsNodeId('/sys/class/graphics/fb0')
return [node_id] if node_id is not None else []
def _ProbeWireless():
return _FlimflamDevices.ReadSysfsDeviceIds('wifi')
def _ProbePmic():
pmics = glob('/sys/bus/platform/devices/*-pmic')
return ([{COMPACT_PROBE_STR: os.path.basename(x)} for x in pmics]
if pmics else [])
def _ProbeBoardVersion():
result = Shell('mosys platform version')
board_version = result.stdout.strip() if result.success else None
if board_version is None:
return []
return [{COMPACT_PROBE_STR: board_version}]
def _ProbeCellularFirmwareVersion():
"""Return firmware detail strings for all cellular devices."""
def GetVersionString(dev_attrs):
"""Use flimflam or modem status data to generate a version string.
The fields present in the flimflam data may differ for
# TODO(tammo): Document breakdown of known combinations for each
# supported part, correspondingly document when the 'modem status'
# fallback is necessary.
version_formats = [
['Carrier', 'FirmwareRevision'],
for version_format in version_formats:
if not set(version_format).issubset(set(dev_attrs)):
# Compact all fields into single line with limited space.
return CompactStr([dev_attrs[key] for key in version_format])
# If nothing available, try 'modem status'.
cmd = 'modem status | grep firmware_revision'
modem_status = Shell(cmd).stdout.strip()
info = re.findall(r'^\s*firmware_revision:\s*(.*)', modem_status)
if info and info[0]:
return info[0]
return None
results = [GetVersionString(dev.attributes) for dev in
results = [x for x in results if x is not None]
return ' ; '.join(results)
def _ProbeRwFirmwareVersion():
"""Returns RW (writable) firmware version from VBLOCK sections."""
def GetVersion(section_name):
data = image.get_section(section_name)
block = vblock.unpack_verification_block(data)
return block['VbFirmwarePreambleHeader']['firmware_version']
main_fw_file = crosfw.LoadMainFirmware().GetFileName()
image = crosfw.FirmwareImage(open(main_fw_file, 'rb').read())
versions = map(GetVersion, ['VBLOCK_A', 'VBLOCK_B'])
if versions[0] != versions[1]:
return 'A=%d, B=%d' % versions
return '%d' % versions[0]
def _ProbeTouchpadFirmwareVersion():
return _TouchpadData.Get().fw_version
def _ProbeStorageFirmwareVersion():
"""Returns firmware rev for all fixed devices."""
ret = []
for f in _GetFixedDevices():
smartctl = Shell('smartctl --all %s' %
os.path.join('/dev', os.path.basename(f))).stdout
matches = re.findall(r'(?m)^Firmware Version:\s+(.+)$', smartctl)
if matches:
if'(?m)^Device Model:\s+SanDisk', smartctl):
# Canonicalize SanDisk firmware versions by replacing 'CS' with '11'.
matches = [re.sub('^CS', '11', x) for x in matches]
# Use fwrev file (e.g., for eMMC where smartctl is unsupported)
fw_rev = _ReadSysfsFields(os.path.join(f, 'device'), ['fwrev'])
if fw_rev:
return CompactStr(ret)
def _AddFirmwareIdTag(image, id_name='RO_FRID'):
"""Returns firmware ID in '#NAME' format if available."""
if not image.has_section(id_name):
return ''
id_stripped = image.get_section(id_name).strip(chr(0))
if id_stripped:
return '#%s' % id_stripped
return ''
def _GbbHash(image):
"""Algorithm: sha256(GBB[-HWID]); GBB without HWID."""
with NamedTemporaryFile('w+b') as f:
data = image.get_section('GBB')
if not Shell('gbb_utility -s --hwid="ChromeOS" --flags=0 "%s"' %
logging.error('Failed calling gbb_utility to calcuate GBB hash.')
return None
# Rewind to re-read the data.
hash_src =
assert len(hash_src) == len(data)
# pylint: disable=E1101
return {COMPACT_PROBE_STR: 'gv2#' + hashlib.sha256(hash_src).hexdigest()}
def _MainRoHash(image):
"""Algorithm: sha256(fmap, RO_SECTION[-GBB])."""
hash_src = image.get_fmap_blob()
gbb = image.get_section('GBB')
zero_gbb = chr(0) * len(gbb)
image.put_section('GBB', zero_gbb)
hash_src += image.get_section('RO_SECTION')
image.put_section('GBB', gbb)
# pylint: disable=E1101
return {
'hash': hashlib.sha256(hash_src).hexdigest(),
'version': _AddFirmwareIdTag(image).lstrip('#'),
COMPACT_PROBE_STR: 'mv2#%s%s' % (hashlib.sha256(hash_src).hexdigest(),
def _EcRoHash(image):
"""Algorithm: sha256(fmap, EC_RO)."""
hash_src = image.get_fmap_blob()
hash_src += image.get_section('EC_RO')
# pylint: disable=E1101
return {
'hash': hashlib.sha256(hash_src).hexdigest(),
'version': _AddFirmwareIdTag(image).lstrip('#'),
COMPACT_PROBE_STR: 'ev2#%s%s' % (hashlib.sha256(hash_src).hexdigest(),
def _FwKeyHash(main_fw_file, key_name):
"""Hash specified GBB key, extracted by vbutil_key."""
known_hashes = {
'b11d74edd286c144e1135b49e7f0bc20cf041f10': 'devkeys/rootkey',
'c14bd720b70d97394257e3e826bd8f43de48d4ed': 'devkeys/recovery',
with NamedTemporaryFile(prefix='gbb_%s_' % key_name) as f:
if not Shell('gbb_utility -g --%s=%s %s' %
(key_name,, main_fw_file)).success:
raise Error('cannot get %s from GBB' % key_name)
key_info = Shell('vbutil_key --unpack %s' %
sha1sum = re.findall(r'Key sha1sum:[\s]+([\w]+)', key_info)
if len(sha1sum) != 1:
logging.error('Failed calling vbutil_key for firmware key hash.')
return None
sha1 = sha1sum[0]
if sha1 in known_hashes:
sha1 += '#' + known_hashes[sha1]
return {COMPACT_PROBE_STR: 'kv3#' + sha1}
def CalculateFirmwareHashes(fw_file_path):
"""Calculate the volatile hashes corresponding to a firmware blob.
Given a firmware blob, determine what kind of firmware it is based
on what sections are present. Then generate a dict containing the
corresponding hash values.
raw_image = open(fw_file_path, 'rb').read()
image = crosfw.FirmwareImage(raw_image)
except: # pylint: disable=W0702
return None
hashes = {}
if image.has_section('EC_RO'):
hashes['ro_ec_firmware'] = _EcRoHash(image)
elif image.has_section('GBB') and image.has_section('RO_SECTION'):
hashes['hash_gbb'] = _GbbHash(image)
hashes['ro_main_firmware'] = _MainRoHash(image)
hashes['key_recovery'] = _FwKeyHash(fw_file_path, 'recoverykey')
hashes['key_root'] = _FwKeyHash(fw_file_path, 'rootkey')
return hashes
def ReadVpd(kind, fw_image_file=None):
"""Reads data from VPD.
kind: VPD section name to read.
fw_image_file: A string for path to existing firmware image file. None to
use the crosfw.LoadMainFirmware().
A dictionary for the key-value pairs stored in VPD.
# Do not log command output since this will include private data such as
# registration codes.
if fw_image_file is None:
fw_image_file = crosfw.LoadMainFirmware().GetFileName()
raw_data = Shell('vpd -l -i %s -f %s' %
(kind, fw_image_file), log=False).stdout
return ParseKeyValueData('"(.*)"="(.*)"$', raw_data)
def ReadRoVpd(fw_image_file=None):
"""Reads VPD data from RO section."""
return ReadVpd('RO_VPD', fw_image_file)
def ReadRwVpd(fw_image_file=None):
"""Reads VPD data from RW section."""
return ReadVpd('RW_VPD', fw_image_file)
def DeleteVpd(kind, keys):
"""Deletes VPD data by specified keys.
kind: The VPD section to select.
keys: A list of VPD key names to delete.
True if updated successfully, otherwise False.
command = 'vpd -i %s %s' % (
kind, ' '.join('-d %s' % k for k in keys))
return Shell(command).success
def UpdateVpd(kind, values):
"""Updates VPD data by given values.
kind: The VPD section to select.
values: A dictionary containing VPD values to set.
True if updated successfully, otherwise False.
command = 'vpd -i %s %s' % (
kind, ' '.join(('-s "%s"="%s"' % (k, v) for k, v in values.iteritems())))
return Shell(command).success
def DeleteRoVpd(keys):
"""Deletes VPD data in read-only partition before write-protected."""
return DeleteVpd('RO_VPD', keys)
def DeleteRwVpd(keys):
"""Deletes VPD data in read-write partition."""
return DeleteVpd('RW_VPD', keys)
def UpdateRoVpd(values):
"""Changes VPD data in read-only partition before write-protected."""
return UpdateVpd('RO_VPD', values)
def UpdateRwVpd(values):
"""Changes VPD data in read-write partition."""
return UpdateVpd('RW_VPD', values)
def Probe(target_comp_classes=None,
"""Return device component, hash, and initial_config data.
Run all of the available probing routines that make sense for the
target architecture, for example if the machine being probed is x86
then somewhat different probes would be run than for an ARM machine.
All probe results are returned directly, without analysis. Matching
these results against the component database or against HWID data
can be done afterwards.
target_comp_classes: Which component classes to probe for. A None
value implies all classes.
fast_fw_probe: Do a fast probe for EC and main firmware version. Setting
this to True implies probe_volatile, probe_initial_config, probe_vpd,
and all probing related to VPD (for example, region) are False.
probe_volatile: On False, do not probe for volatile data and
return None for the corresponding field.
probe_initial_config: On False, do not probe for initial_config
data and return None for the corresponding field.
probe_vpd: On True, include vpd data in the volatiles (handy for use with
'gooftool verify_hwid --probe_results=...').
Obj with components, volatile, and initial_config fields, each
containing the corresponding dict of probe results.
if os.path.exists(FAKE_PROBE_RESULTS_FILE):
# Overriding with results from a file (for testing).
with open(FAKE_PROBE_RESULTS_FILE) as f:
logging.warning('Using fake probe results in %s',
return ProbeResults.Decode(f)
def RunProbe(probe_fun):
return probe_fun()
except Exception: # pylint: disable=W0703
logging.exception('Probe %r FAILED (see traceback), returning None.',
return None
def FilterProbes(ref_probe_map, arch, probe_class_white_list):
generic_probes = ref_probe_map.get(None, {})
arch_probes = ref_probe_map.get(arch, {})
if probe_class_white_list is None:
probe_class_white_list = set(generic_probes) | set(arch_probes)
return dict((probe_class, (arch_probes[probe_class]
if probe_class in arch_probes
else generic_probes[probe_class]))
for probe_class in sorted(probe_class_white_list)
if probe_class not in (
'ro_ec_firmware', 'ro_pd_firmware', 'ro_main_firmware',
'hash_gbb', 'key_recovery', 'key_root'))
arch = Shell('crossystem arch').stdout.strip()
comp_probes = FilterProbes(_COMPONENT_PROBE_MAP, arch, target_comp_classes)
initial_configs = {}
volatiles = {}
def CallOutput(command):
"""Returns the command's output if succeeded, otherwise None.."""
result = Shell(command)
return result.stdout.strip() if result.success else None
board_version = CallOutput('mosys platform version')
if fast_fw_probe:
logging.debug('fast_fw_probe enabled.')
volatiles['ro_ec_firmware'] = {
'version': CallOutput('mosys ec info -s fw_version')}
volatiles['ro_pd_firmware'] = {
'version': CallOutput('mosys pd info -s fw_version')}
volatiles['ro_main_firmware'] = {
'version': CallOutput('crossystem ro_fwid')}
probe_volatile = False
probe_initial_config = False
probe_vpd = False
if probe_initial_config:
ic_probes = FilterProbes(_INITIAL_CONFIG_PROBE_MAP, arch, None)
ic_probes = {}
found_probe_value_map = {}
missing_component_classes = []
# TODO(hungte) Extend _ComponentProbe to support filtering flashrom related
# probing methods.
vpd_classes = ['region']
for comp_class, probe_fun in comp_probes.items():'probing [%s]...', comp_class)
if comp_class in vpd_classes and not probe_vpd:
logging.warn('Ignored probing [%s]', comp_class)
probe_values = RunProbe(probe_fun)
if not probe_values:
elif len(probe_values) == 1:
found_probe_value_map[comp_class] = probe_values.pop()
found_probe_value_map[comp_class] = sorted(probe_values)
for ic_class, probe_fun in ic_probes.items():
probe_value = RunProbe(probe_fun)
if probe_value is not None:
initial_configs[ic_class] = probe_value
if probe_volatile:
main_fw_file = crosfw.LoadMainFirmware().GetFileName()
ec_fw_file = crosfw.LoadEcFirmware().GetFileName()
if ec_fw_file is not None:
pd_fw_file = crosfw.LoadPDFirmware().GetFileName()
if pd_fw_file is not None:
# Currently PD is using same FMAP layout as EC so we have to rename
# section name to avoid conflict.
hashes = CalculateFirmwareHashes(pd_fw_file)
volatiles.update({'ro_pd_firmware': hashes['ro_ec_firmware']})
if probe_vpd:
for which, vpd_field in (('ro', ReadRoVpd()),
('rw', ReadRwVpd())):
for k, v in sorted(vpd_field.items()):
volatiles['vpd.%s.%s' % (which, k)] = v
return ProbeResults(