| OLD | NEW |
| 1 /* Copyright (c) 2011 The Chromium OS Authors. All rights reserved. | 1 /* Copyright (c) 2011 The Chromium OS Authors. All rights reserved. |
| 2 * Use of this source code is governed by a BSD-style license that can be | 2 * Use of this source code is governed by a BSD-style license that can be |
| 3 * found in the LICENSE file. | 3 * found in the LICENSE file. |
| 4 * | 4 * |
| 5 * Chrome OS firmware/system interface utility | 5 * Chrome OS firmware/system interface utility |
| 6 */ | 6 */ |
| 7 | 7 |
| 8 #include <stdio.h> | 8 #include <stdio.h> |
| 9 #include <stdlib.h> | 9 #include <stdlib.h> |
| 10 #include <string.h> | 10 #include <string.h> |
| (...skipping 16 matching lines...) Expand all Loading... |
| 27 {"recoverysw_cur", 0, 0, "Recovery switch current position"}, | 27 {"recoverysw_cur", 0, 0, "Recovery switch current position"}, |
| 28 {"recoverysw_boot", 0, 0, "Recovery switch position at boot"}, | 28 {"recoverysw_boot", 0, 0, "Recovery switch position at boot"}, |
| 29 {"recoverysw_ec_boot", 0, 0, "Recovery switch position at EC boot"}, | 29 {"recoverysw_ec_boot", 0, 0, "Recovery switch position at EC boot"}, |
| 30 {"wpsw_cur", 0, 0, "Firmware write protect switch current position"}, | 30 {"wpsw_cur", 0, 0, "Firmware write protect switch current position"}, |
| 31 {"wpsw_boot", 0, 0, "Firmware write protect switch position at boot"}, | 31 {"wpsw_boot", 0, 0, "Firmware write protect switch position at boot"}, |
| 32 {"recovery_reason", 0, 0, "Recovery mode reason for current boot"}, | 32 {"recovery_reason", 0, 0, "Recovery mode reason for current boot"}, |
| 33 {"savedmem_base", 0, 0, "RAM debug data area physical address", "0x%08x"}, | 33 {"savedmem_base", 0, 0, "RAM debug data area physical address", "0x%08x"}, |
| 34 {"savedmem_size", 0, 0, "RAM debug data area size in bytes"}, | 34 {"savedmem_size", 0, 0, "RAM debug data area size in bytes"}, |
| 35 {"fmap_base", 0, 0, "Main firmware flashmap physical address", "0x%08x"}, | 35 {"fmap_base", 0, 0, "Main firmware flashmap physical address", "0x%08x"}, |
| 36 {"tried_fwb", 0, 0, "Tried firmware B before A this boot"}, | 36 {"tried_fwb", 0, 0, "Tried firmware B before A this boot"}, |
| 37 {"cros_debug", 0, 0, "OS should allow debug features"}, |
| 37 /* Read-only strings */ | 38 /* Read-only strings */ |
| 38 {"hwid", 1, 0, "Hardware ID"}, | 39 {"hwid", 1, 0, "Hardware ID"}, |
| 39 {"fwid", 1, 0, "Active firmware ID"}, | 40 {"fwid", 1, 0, "Active firmware ID"}, |
| 40 {"ro_fwid", 1, 0, "Read-only firmware ID"}, | 41 {"ro_fwid", 1, 0, "Read-only firmware ID"}, |
| 41 {"mainfw_act", 1, 0, "Active main firmware"}, | 42 {"mainfw_act", 1, 0, "Active main firmware"}, |
| 42 {"mainfw_type", 1, 0, "Active main firmware type"}, | 43 {"mainfw_type", 1, 0, "Active main firmware type"}, |
| 43 {"ecfw_act", 1, 0, "Active EC firmware"}, | 44 {"ecfw_act", 1, 0, "Active EC firmware"}, |
| 44 {"kernkey_vfy", 1, 0, "Type of verification done on kernel key block"}, | 45 {"kernkey_vfy", 1, 0, "Type of verification done on kernel key block"}, |
| 45 /* Writable integers */ | 46 /* Writable integers */ |
| 46 {"nvram_cleared", 0, 1, "Have NV settings been lost? Write 0 to clear"}, | 47 {"nvram_cleared", 0, 1, "Have NV settings been lost? Write 0 to clear"}, |
| (...skipping 143 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 190 if (i > 1) | 191 if (i > 1) |
| 191 printf(" "); /* Output params space-delimited */ | 192 printf(" "); /* Output params space-delimited */ |
| 192 if (value) | 193 if (value) |
| 193 retval = SetParam(p, value); | 194 retval = SetParam(p, value); |
| 194 else | 195 else |
| 195 retval = PrintParam(p); | 196 retval = PrintParam(p); |
| 196 } | 197 } |
| 197 | 198 |
| 198 return retval; | 199 return retval; |
| 199 } | 200 } |
| OLD | NEW |