最終更新:2015-10-26 (月) 08:39:25 (3103d)
crossystem
Top / crossystem
Dell Chromebook 11
chronos@localhost / $ sudo crossystem --all We trust you have received the usual lecture from the local System Administrator. It usually boils down to these three things: #1) Respect the privacy of others. #2) Think before you type. #3) With great power comes great responsibility. arch = x86 # Platform architecture backup_nvram_request = 0 # Backup the nvram somewhere at the next boot. Cleared on success. block_devmode = 0 # Block all use of developer mode clear_tpm_owner_request = 0 # Clear TPM owner on next boot clear_tpm_owner_done = 0 # Clear TPM owner done cros_debug = 1 # OS should allow debug features dbg_reset = 0 # Debug reset mode request (writable) debug_build = 0 # OS image built for debug features dev_boot_usb = 0 # Enable developer mode boot from USB/SD (writable) dev_boot_legacy = 0 # Enable developer mode boot Legacy OSes (writable) dev_boot_signed_only = 0 # Enable developer mode boot only from official kernels (writable) devsw_boot = 1 # Developer switch position at boot devsw_cur = 1 # Developer switch current position disable_dev_request = 0 # Disable virtual dev-mode on next boot ecfw_act = RW # Active EC firmware fmap_base = 0xffe10000 # Main firmware flashmap physical address fwb_tries = 0 # Try firmware B count (writable) fw_vboot2 = 0 # 1 if firmware was selected by vboot2 or 0 otherwise fwid = Google_Wolf.4389.24.62 # Active firmware ID fwupdate_tries = 0 # Times to try OS firmware update (writable, inside kern_nv) fw_tried = A # Firmware tried this boot (vboot2) fw_try_count = 0 # Number of times to try fw_try_next (writable) fw_try_next = A # Firmware to try next (vboot2,writable) fw_result = unknown # Firmware result this boot (vboot2,writable) fw_prev_tried = A # Firmware tried on previous boot (vboot2) fw_prev_result = unknown # Firmware result of previous boot (vboot2) hwid = WOLF C5K-L4A-Q55 # Hardware ID kern_nv = 0x00000000 # Non-volatile field for kernel use kernkey_vfy = sig # Type of verification done on kernel key block loc_idx = 0 # Localization index for firmware screens (writable) mainfw_act = A # Active main firmware mainfw_type = developer # Active main firmware type nvram_cleared = 1 # Have NV settings been lost? Write 0 to clear oprom_needed = 0 # Should we load the VGA Option ROM at boot? platform_family = Haswell # Platform family type recovery_reason = 0 # Recovery mode reason for current boot recovery_request = 0 # Recovery mode request (writable) recovery_subcode = 0 # Recovery reason subcode (writable) recoverysw_boot = 0 # Recovery switch position at boot recoverysw_cur = (error) # Recovery switch current position recoverysw_ec_boot = 0 # Recovery switch position at EC boot ro_fwid = Google_Wolf.4389.24.58 # Read-only firmware ID savedmem_base = 0x00f00000 # RAM debug data area physical address savedmem_size = 1048576 # RAM debug data area size in bytes sw_wpsw_boot = 0 # Firmware write protect software setting enabled at boot (Baytrail only) tpm_attack = 0 # TPM was interrupted since this flag was cleared tpm_fwver = 0x00010001 # Firmware version stored in TPM tpm_kernver = 0x00010001 # Kernel version stored in TPM tried_fwb = 0 # Tried firmware B before A this boot vdat_flags = 0x00000c56 # Flags from VbSharedData vdat_lfdebug = Check A result=12 Check B result=0 Firmware index booted=0x00 TPM combined version at start=0x00010001 Lowest combined version from firmware=0x00010001 # LoadFirmware() debug data (not in print-all) vdat_lkdebug = Calls to LoadKernel()=1 Call 1: Boot flags=0x01 Boot mode=2 Test error=0 Return code=0 Debug flags=0x00 Drive sectors=31277232 Sector size=512 Check result=4 Kernel partitions found=1 Kernel 1: GPT index=4 Start sector=53248 Sector count=32768 Combined version=0x00010001 Check result=19 Debug flags=0x01 # LoadKernel() debug data (not in print-all) vdat_timers = LFS=312116322,343231301 LF=343384804,490460131 LK=2842474392,4474541208 # Timer values from VbSharedData wipeout_request = 0 # Firmware requested factory reset (wipeout) wpsw_boot = 1 # Firmware write protect hardware switch position at boot wpsw_cur = 1 # Firmware write protect hardware switch current position
help
chronos@localhost / $ crossystem --help Invalid parameter name: --help Usage: crossystem [--all] Prints all parameters with descriptions and current values. If --all is specified, prints even normally hidden fields. crossystem [param1 [param2 [...]]] Prints the current value(s) of the parameter(s). crossystem [param1=value1] [param2=value2 [...]]] Sets the parameter(s) to the specified value(s). crossystem [param1?value1] [param2?value2 [...]]] Checks if the parameter(s) all contain the specified value(s). Stops at the first error. Valid parameters: arch Platform architecture backup_nvram_request Backup the nvram somewhere at the next boot. Cleared on success. block_devmode Block all use of developer mode clear_tpm_owner_request Clear TPM owner on next boot clear_tpm_owner_done Clear TPM owner done cros_debug OS should allow debug features dbg_reset Debug reset mode request (writable) debug_build OS image built for debug features dev_boot_usb Enable developer mode boot from USB/SD (writable) dev_boot_legacy Enable developer mode boot Legacy OSes (writable) dev_boot_signed_only Enable developer mode boot only from official kernels (writable) devsw_boot Developer switch position at boot devsw_cur Developer switch current position disable_dev_request Disable virtual dev-mode on next boot ecfw_act Active EC firmware fmap_base Main firmware flashmap physical address fwb_tries Try firmware B count (writable) fw_vboot2 1 if firmware was selected by vboot2 or 0 otherwise fwid Active firmware ID fwupdate_tries Times to try OS firmware update (writable, inside kern_nv) fw_tried Firmware tried this boot (vboot2) fw_try_count Number of times to try fw_try_next (writable) fw_try_next Firmware to try next (vboot2,writable) fw_result Firmware result this boot (vboot2,writable) fw_prev_tried Firmware tried on previous boot (vboot2) fw_prev_result Firmware result of previous boot (vboot2) hwid Hardware ID kern_nv Non-volatile field for kernel use kernkey_vfy Type of verification done on kernel key block loc_idx Localization index for firmware screens (writable) mainfw_act Active main firmware mainfw_type Active main firmware type nvram_cleared Have NV settings been lost? Write 0 to clear oprom_needed Should we load the VGA Option ROM at boot? platform_family Platform family type recovery_reason Recovery mode reason for current boot recovery_request Recovery mode request (writable) recovery_subcode Recovery reason subcode (writable) recoverysw_boot Recovery switch position at boot recoverysw_cur Recovery switch current position recoverysw_ec_boot Recovery switch position at EC boot ro_fwid Read-only firmware ID savedmem_base RAM debug data area physical address savedmem_size RAM debug data area size in bytes sw_wpsw_boot Firmware write protect software setting enabled at boot (Baytrail only) tpm_attack TPM was interrupted since this flag was cleared tpm_fwver Firmware version stored in TPM tpm_kernver Kernel version stored in TPM tried_fwb Tried firmware B before A this boot vdat_flags Flags from VbSharedData vdat_lfdebug LoadFirmware() debug data (not in print-all) vdat_lkdebug LoadKernel() debug data (not in print-all) vdat_timers Timer values from VbSharedData wipeout_request Firmware requested factory reset (wipeout) wpsw_boot Firmware write protect hardware switch position at boot wpsw_cur Firmware write protect hardware switch current position