summaryrefslogtreecommitdiff
path: root/futility/vb1_helper.c
diff options
context:
space:
mode:
Diffstat (limited to 'futility/vb1_helper.c')
-rw-r--r--futility/vb1_helper.c52
1 files changed, 26 insertions, 26 deletions
diff --git a/futility/vb1_helper.c b/futility/vb1_helper.c
index 84dc7969..66f0b5dc 100644
--- a/futility/vb1_helper.c
+++ b/futility/vb1_helper.c
@@ -70,7 +70,7 @@ uint8_t *ReadConfigFile(const char *config_file, uint32_t *config_size)
if (VB2_SUCCESS != vb2_read_file(config_file, &config_buf, config_size))
return NULL;
- VB2_DEBUG(" config file size=0x%x\n", *config_size);
+ VB2_DEBUG(" config file size=%#x\n", *config_size);
if (CROS_CONFIG_SIZE <= *config_size) { /* room for trailing '\0' */
fprintf(stderr, "Config file %s is too large (>= %d bytes)\n",
config_file, CROS_CONFIG_SIZE);
@@ -203,10 +203,10 @@ static int PickApartVmlinuz(uint8_t *kernel_buf,
params->cmd_line_ptr = kernel_body_load_address +
roundup(kernel32_size, CROS_ALIGN) +
find_cmdline_start(g_config_data, g_config_size);
- VB2_DEBUG(" cmdline_addr=0x%x\n", params->cmd_line_ptr);
- VB2_DEBUG(" version=0x%x\n", params->version);
- VB2_DEBUG(" kernel_alignment=0x%x\n", params->kernel_alignment);
- VB2_DEBUG(" relocatable_kernel=0x%x\n",
+ VB2_DEBUG(" cmdline_addr=%#x\n", params->cmd_line_ptr);
+ VB2_DEBUG(" version=%#x\n", params->version);
+ VB2_DEBUG(" kernel_alignment=%#x\n", params->kernel_alignment);
+ VB2_DEBUG(" relocatable_kernel=%#x\n",
params->relocatable_kernel);
/* Add a fake e820 memory map with 2 entries. */
params->n_e820_entry = 2;
@@ -255,9 +255,9 @@ static void UnpackKernelBlob(uint8_t *kernel_blob_data)
g_vmlinuz_header_size = vmlinuz_header_size;
g_vmlinuz_header_data = kernel_blob_data + now;
- VB2_DEBUG("vmlinuz_header_size = 0x%x\n",
+ VB2_DEBUG("vmlinuz_header_size = %#x\n",
g_vmlinuz_header_size);
- VB2_DEBUG("vmlinuz_header_ofs = 0x%x\n", now);
+ VB2_DEBUG("vmlinuz_header_ofs = %#x\n", now);
}
/* Where does the bootloader stub begin? */
@@ -268,25 +268,25 @@ static void UnpackKernelBlob(uint8_t *kernel_blob_data)
g_bootloader_data = kernel_blob_data + now;
/* TODO: What to do if this is beyond the end of the blob? */
- VB2_DEBUG("bootloader_size = 0x%x\n", g_bootloader_size);
- VB2_DEBUG("bootloader_ofs = 0x%x\n", now);
+ VB2_DEBUG("bootloader_size = %#x\n", g_bootloader_size);
+ VB2_DEBUG("bootloader_ofs = %#x\n", now);
/* Before that is the params */
now -= CROS_PARAMS_SIZE;
g_param_size = CROS_PARAMS_SIZE;
g_param_data = kernel_blob_data + now;
- VB2_DEBUG("param_ofs = 0x%x\n", now);
+ VB2_DEBUG("param_ofs = %#x\n", now);
/* Before that is the config */
now -= CROS_CONFIG_SIZE;
g_config_size = CROS_CONFIG_SIZE;
g_config_data = kernel_blob_data + now;
- VB2_DEBUG("config_ofs = 0x%x\n", now);
+ VB2_DEBUG("config_ofs = %#x\n", now);
/* The kernel starts at offset 0 and extends up to the config */
g_kernel_data = kernel_blob_data;
g_kernel_size = now;
- VB2_DEBUG("kernel_size = 0x%x\n", g_kernel_size);
+ VB2_DEBUG("kernel_size = %#x\n", g_kernel_size);
}
@@ -324,7 +324,7 @@ uint8_t *unpack_kernel_partition(uint8_t *kpart_data,
/* Sanity-check the keyblock */
struct vb2_keyblock *keyblock = (struct vb2_keyblock *)kpart_data;
- VB2_DEBUG("Keyblock is 0x%x bytes\n", keyblock->keyblock_size);
+ VB2_DEBUG("Keyblock is %#x bytes\n", keyblock->keyblock_size);
now += keyblock->keyblock_size;
if (now > kpart_size) {
fprintf(stderr,
@@ -343,7 +343,7 @@ uint8_t *unpack_kernel_partition(uint8_t *kpart_data,
/* And the preamble */
preamble = (struct vb2_kernel_preamble *)(kpart_data + now);
- VB2_DEBUG("Preamble is 0x%x bytes\n", preamble->preamble_size);
+ VB2_DEBUG("Preamble is %#x bytes\n", preamble->preamble_size);
now += preamble->preamble_size;
if (now > kpart_size) {
fprintf(stderr,
@@ -359,12 +359,12 @@ uint8_t *unpack_kernel_partition(uint8_t *kpart_data,
VB2_DEBUG(" kernel_version = %d\n", preamble->kernel_version);
VB2_DEBUG(" bootloader_address = 0x%" PRIx64 "\n",
preamble->bootloader_address);
- VB2_DEBUG(" bootloader_size = 0x%x\n", preamble->bootloader_size);
- VB2_DEBUG(" kern_blob_size = 0x%x\n",
+ VB2_DEBUG(" bootloader_size = %#x\n", preamble->bootloader_size);
+ VB2_DEBUG(" kern_blob_size = %#x\n",
preamble->body_signature.data_size);
uint32_t flags = vb2_kernel_get_flags(preamble);
- VB2_DEBUG(" flags = 0x%x\n", flags);
+ VB2_DEBUG(" flags = %#x\n", flags);
g_preamble = preamble;
g_ondisk_bootloader_addr = g_preamble->bootloader_address;
@@ -375,18 +375,18 @@ uint8_t *unpack_kernel_partition(uint8_t *kpart_data,
if (vmlinuz_header_size) {
VB2_DEBUG(" vmlinuz_header_address = 0x%" PRIx64 "\n",
vmlinuz_header_address);
- VB2_DEBUG(" vmlinuz_header_size = 0x%x\n", vmlinuz_header_size);
+ VB2_DEBUG(" vmlinuz_header_size = %#x\n", vmlinuz_header_size);
g_ondisk_vmlinuz_header_addr = vmlinuz_header_address;
}
- VB2_DEBUG("kernel blob is at offset 0x%x\n", now);
+ VB2_DEBUG("kernel blob is at offset %#x\n", now);
g_kernel_blob_data = kpart_data + now;
g_kernel_blob_size = preamble->body_signature.data_size;
/* Sanity check */
if (g_kernel_blob_size < preamble->body_signature.data_size)
fprintf(stderr,
- "Warning: kernel file only has 0x%x bytes\n",
+ "Warning: kernel file only has %#x bytes\n",
g_kernel_blob_size);
/* Update the blob pointers */
@@ -536,7 +536,7 @@ int VerifyKernelBlob(uint8_t *kernel_blob,
struct vb2_packed_key *data_key = &g_keyblock->data_key;
printf(" Signature: %s\n",
signpub_key ? "valid" : "ignored");
- printf(" Size: 0x%x\n", g_keyblock->keyblock_size);
+ printf(" Size: %#x\n", g_keyblock->keyblock_size);
printf(" Flags: %u ", g_keyblock->keyblock_flags);
if (g_keyblock->keyblock_flags & KEY_BLOCK_FLAG_DEVELOPER_0)
printf(" !DEV");
@@ -591,18 +591,18 @@ int VerifyKernelBlob(uint8_t *kernel_blob,
}
printf("Preamble:\n");
- printf(" Size: 0x%x\n", g_preamble->preamble_size);
+ printf(" Size: %#x\n", g_preamble->preamble_size);
printf(" Header version: %u.%u\n",
g_preamble->header_version_major,
g_preamble->header_version_minor);
printf(" Kernel version: %u\n", g_preamble->kernel_version);
printf(" Body load address: 0x%" PRIx64 "\n",
g_preamble->body_load_address);
- printf(" Body size: 0x%x\n",
+ printf(" Body size: %#x\n",
g_preamble->body_signature.data_size);
printf(" Bootloader address: 0x%" PRIx64 "\n",
g_preamble->bootloader_address);
- printf(" Bootloader size: 0x%x\n", g_preamble->bootloader_size);
+ printf(" Bootloader size: %#x\n", g_preamble->bootloader_size);
vb2_kernel_get_vmlinuz_header(g_preamble,
&vmlinuz_header_address,
@@ -610,11 +610,11 @@ int VerifyKernelBlob(uint8_t *kernel_blob,
if (vmlinuz_header_size) {
printf(" Vmlinuz header address: 0x%" PRIx64 "\n",
vmlinuz_header_address);
- printf(" Vmlinuz header size: 0x%x\n",
+ printf(" Vmlinuz header size: %#x\n",
(uint32_t)vmlinuz_header_size);
}
- printf(" Flags : 0x%x\n",
+ printf(" Flags : %#x\n",
vb2_kernel_get_flags(g_preamble));
if (g_preamble->kernel_version < (min_version & 0xFFFF)) {