diff options
author | Shawn Nematbakhsh <shawnn@chromium.org> | 2013-06-03 10:38:07 -0700 |
---|---|---|
committer | ChromeBot <chrome-bot@google.com> | 2013-06-03 10:45:55 -0700 |
commit | 3d940812deb74ce25fe8b4f27ea9dfa498d4188c (patch) | |
tree | 7e0f0cef028c2e96b55382dc853f1994a6138f09 /firmware/lib/cgptlib/cgptlib.c | |
parent | 3ca3816394dd9718991476b09480002d734ade66 (diff) | |
download | vboot-3d940812deb74ce25fe8b4f27ea9dfa498d4188c.tar.gz |
BUTTERFLY-FIRMWARE: Add more recovery_reason codesfirmware-butterfly-2788.B
There are several places where the same recovery_reason was used to report
slightly different points of failure. Let's create some new codes instead.
Remember that recovery mode is handled by RO firmware, so if an updated RW
firmware uses one of the new error codes, pressing TAB at the recovery
screen will say "We have no idea what this means". That's not a bug. This CL
deprecates the original codes, so the fact that the RO firmware doesn't
recognize it just means it's a new code reported by a new RW BIOS.
BUG=chromium:245528
TEST=manual
BRANCH=butterfly
Run
make && make runtests
It should pass. You can test some of the error cases on actual hardware by
using
crossystem recovery_reason=86
reboot
and pressing TAB at the recovery screen. For that example you should see the
message
recovery_reason: 0x56 TPM lock error in rewritable firmare
Change-Id: I386f77f920f39a55c2a2075d0854fea0d0b0f7e5
Original-Change-Id: I123c781e6c6f6fe0284c4fd49f5f5a855eece7df
Reviewed-on: https://gerrit.chromium.org/gerrit/57347
Commit-Queue: Shawn Nematbakhsh <shawnn@chromium.org>
Reviewed-by: Shawn Nematbakhsh <shawnn@chromium.org>
Tested-by: Shawn Nematbakhsh <shawnn@chromium.org>
Diffstat (limited to 'firmware/lib/cgptlib/cgptlib.c')
-rw-r--r-- | firmware/lib/cgptlib/cgptlib.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/firmware/lib/cgptlib/cgptlib.c b/firmware/lib/cgptlib/cgptlib.c index e708b7bc..c3f37442 100644 --- a/firmware/lib/cgptlib/cgptlib.c +++ b/firmware/lib/cgptlib/cgptlib.c @@ -89,7 +89,7 @@ int GptNextKernelEntry(GptData* gpt, uint64_t* start_sector, uint64_t* size) { return GPT_ERROR_NO_VALID_KERNEL; } - VBDEBUG(("GptNextKernelEntry likes that one\n")); + VBDEBUG(("GptNextKernelEntry likes partition %d\n", new_kernel+1)); e = entries + new_kernel; *start_sector = e->starting_lba; *size = e->ending_lba - e->starting_lba + 1; |