add get system info method
This commit is contained in:
92
test.log
Normal file
92
test.log
Normal file
@@ -0,0 +1,92 @@
|
||||
|
||||
Collecting system information for 192.168.50.173...
|
||||
|
||||
--- crossystem output ---
|
||||
arch = x86 # [RO/str] Platform architecture
|
||||
backup_nvram_request = 1 # [RW/int] Backup the nvram somewhere at the next boot. Cleared on success.
|
||||
battery_cutoff_request = 0 # [RW/int] Cut off battery and shutdown on next boot
|
||||
block_devmode = 0 # [RW/int] Block all use of developer mode
|
||||
board_id = 2 # [RO/int] Board hardware revision number
|
||||
clear_tpm_owner_done = 1 # [RW/int] Clear TPM owner done
|
||||
clear_tpm_owner_request = 0 # [RW/int] Clear TPM owner on next boot
|
||||
cros_debug = 1 # [RO/int] OS should allow debug features
|
||||
dbg_reset = 0 # [RW/int] Debug reset mode request
|
||||
debug_build = 1 # [RO/int] OS image built for debug features
|
||||
dev_boot_altfw = 0 # [RW/int] Enable developer mode alternate bootloader
|
||||
dev_boot_signed_only = 0 # [RW/int] Enable developer mode boot only from official kernels
|
||||
dev_boot_usb = 0 # [RW/int] Enable developer mode boot from external disk (USB/SD)
|
||||
dev_default_boot = disk # [RW/str] Default boot from disk, altfw or usb
|
||||
dev_enable_udc = 0 # [RW/int] Enable USB Device Controller
|
||||
devsw_boot = 1 # [RO/int] Developer switch position at boot
|
||||
devsw_cur = 1 # [RO/int] Developer switch current position
|
||||
diagnostic_request = 0 # [RW/int] Request diagnostic rom run on next boot
|
||||
disable_dev_request = 0 # [RW/int] Disable virtual dev-mode on next boot
|
||||
ecfw_act = RW # [RO/str] Active EC firmware
|
||||
post_ec_sync_delay = 0 # [RW/int] Short delay after EC software sync (persistent, writable, eve only)
|
||||
fw_prev_result = unknown # [RO/str] Firmware result of previous boot
|
||||
fw_prev_tried = A # [RO/str] Firmware tried on previous boot (A or B)
|
||||
fw_result = unknown # [RW/str] Firmware result this boot
|
||||
fw_tried = A # [RO/str] Firmware tried this boot (A or B)
|
||||
fw_try_count = 0 # [RW/int] Number of times to try fw_try_next
|
||||
fw_try_next = A # [RW/str] Firmware to try next (A or B)
|
||||
fw_vboot2 = 1 # [RO/int] 1 if firmware was selected by vboot2 or 0 otherwise
|
||||
fwb_tries = 0 # [RW/int] Try firmware B count
|
||||
fwid = Google_Joxer.15217.608.0 # [RO/str] Active firmware ID
|
||||
fwupdate_tries = 0 # [RW/int] Times to try OS firmware update (inside kern_nv)
|
||||
hwid = JOXER TEST 8200 # [RO/str] Hardware ID
|
||||
inside_vm = 0 # [RO/int] Running in a VM?
|
||||
kern_nv = 0x0000 # [RO/int] Non-volatile field for kernel use
|
||||
kernel_max_rollforward = 0xfffffffe # [RW/int] Max kernel version to store into TPM
|
||||
kernkey_vfy = hash # [RO/str] Type of verification done on kernel keyblock
|
||||
loc_idx = 0 # [RW/int] Localization index for firmware screens
|
||||
mainfw_act = A # [RO/str] Active main firmware
|
||||
mainfw_type = developer # [RO/str] Active main firmware type
|
||||
minios_priority = A # [RW/str] miniOS image to try first (A or B)
|
||||
nvram_cleared = 0 # [RW/int] Have NV settings been lost? Write 0 to clear
|
||||
display_request = 0 # [RW/int] Should we initialize the display at boot?
|
||||
phase_enforcement = (error) # [RO/int] Board should have full security settings applied
|
||||
recovery_reason = 0 # [RO/int] Recovery mode reason for current boot
|
||||
recovery_request = 0 # [RW/int] Recovery mode request
|
||||
recovery_subcode = 0 # [RW/int] Recovery reason subcode
|
||||
recoverysw_boot = 0 # [RO/int] Recovery switch position at boot
|
||||
recoverysw_cur = (error) # [RO/int] Recovery switch current position
|
||||
recoverysw_ec_boot = 0 # [RO/int] Recovery switch position at EC boot
|
||||
ro_fwid = Google_Joxer.15217.439.0 # [RO/str] Read-only firmware ID
|
||||
tpm_attack = 0 # [RW/int] TPM was interrupted since this flag was cleared
|
||||
tpm_fwver = 0x00010001 # [RO/int] Firmware version stored in TPM
|
||||
tpm_kernver = 0x00010001 # [RO/int] Kernel version stored in TPM
|
||||
tpm_rebooted = 0 # [RO/int] TPM requesting repeated reboot
|
||||
tried_fwb = 0 # [RO/int] Tried firmware B before A this boot
|
||||
try_ro_sync = 0 # [RO/int] try read only software sync
|
||||
vdat_flags = 0x00008810 # [RO/int] Flags from VbSharedData
|
||||
wipeout_request = 0 # [RW/int] Firmware requested factory reset (wipeout)
|
||||
wpsw_cur = 0 # [RO/int] Firmware write protect hardware switch current position
|
||||
|
||||
--- /etc/lsb-release output ---
|
||||
CHROMEOS_RELEASE_APPID={A5F9E181-D0BE-4D6D-B67D-125069233535}
|
||||
CHROMEOS_BOARD_APPID={A5F9E181-D0BE-4D6D-B67D-125069233535}
|
||||
CHROMEOS_CANARY_APPID={90F229CE-83E2-4FAF-8479-E368A34938B1}
|
||||
DEVICETYPE=REFERENCE
|
||||
CHROMEOS_RELEASE_NAME=Chrome OS
|
||||
CHROMEOS_AUSERVER=https://tools.google.com/service/update2
|
||||
CHROMEOS_DEVSERVER=
|
||||
CHROMEOS_RELEASE_BUILDER_PATH=factory-nissa-15199.B-nissa/R109-15199.624.0
|
||||
CHROMEOS_RELEASE_KEYSET=devkeys
|
||||
CHROMEOS_RELEASE_TRACK=testimage-channel
|
||||
CHROMEOS_RELEASE_BUILD_TYPE=Official Build
|
||||
CHROMEOS_RELEASE_DESCRIPTION=15199.624.0 (Official Build) dev-channel nissa test
|
||||
CHROMEOS_RELEASE_BOARD=nissa
|
||||
CHROMEOS_RELEASE_BRANCH_NUMBER=624
|
||||
CHROMEOS_RELEASE_BUILD_NUMBER=15199
|
||||
CHROMEOS_RELEASE_CHROME_MILESTONE=109
|
||||
CHROMEOS_RELEASE_PATCH_NUMBER=0
|
||||
CHROMEOS_RELEASE_VERSION=15199.624.0
|
||||
GOOGLE_RELEASE=15199.624.0
|
||||
CHROMEOS_RELEASE_UNIBUILD=1
|
||||
|
||||
|
||||
|
||||
Starting loop 1/100...
|
||||
Initial event log line: 326 | 2025-06-11 00:31:45 | Firmware vboot info | boot_mode=Developer | fw_tried=A | fw_try_count=0 | fw_prev_tried=A | fw_prev_result=Unknown
|
||||
Running firmware update...
|
||||
Firmware update command: /usr/local/chromeos-firmwareupdate_joxer_r132 -m factory
|
||||
Reference in New Issue
Block a user