<table border="1" cellspacing="0" cellpadding="8">
<tr>
<th>Issue</th>
<td>
<a href=https://github.com/llvm/llvm-project/issues/65236>65236</a>
</td>
</tr>
<tr>
<th>Summary</th>
<td>
mnt/host/source/src/third_party/llvm-project%2098f5a340975bc00197c57e39eb4ca26e2da0e8a2
</td>
</tr>
<tr>
<th>Labels</th>
<td>
new issue
</td>
</tr>
<tr>
<th>Assignees</th>
<td>
</td>
</tr>
<tr>
<th>Reporter</th>
<td>
UnhackHER
</td>
</tr>
</table>
<pre>
Is anyone able to help me understand this log
[debug_vboot_noisy.log](https://github.com/llvm/llvm-project/files/12507691/debug_vboot_noisy.log)
Running /usr/bin/dev_debug_vboot
+ date
Sun Sep 3 13:15:55 MST 2023
# DEV_DEBUG_FORCE=()
# OPT_CLEANUP=(yes)
# OPT_BIOS=()
# OPT_FORCE=()
# OPT_IMAGE=()
# OPT_KERNEL=()
# FLAG_SAVE_LOG_FILE=(yes)
+ crossystem --all
arch = x86 # [RO/str] Platform architecture
backup_nvram_request = (error) # [RW/int] Backup the nvram somewhere at the next boot. Cleared on success.
battery_cutoff_request = (error) # [RW/int] Cut off battery and shutdown on next boot
block_devmode = (error) # [RW/int] Block all use of developer mode
board_id = (error) # [RO/int] Board hardware revision number
clear_tpm_owner_done = (error) # [RW/int] Clear TPM owner done
clear_tpm_owner_request = (error) # [RW/int] Clear TPM owner on next boot
cros_debug = 0 # [RO/int] OS should allow debug features
dbg_reset = (error) # [RW/int] Debug reset mode request
debug_build = 0 # [RO/int] OS image built for debug features
dev_boot_altfw = (error) # [RW/int] Enable developer mode alternate bootloader
dev_boot_signed_only = (error) # [RW/int] Enable developer mode boot only from official kernels
dev_boot_usb = (error) # [RW/int] Enable developer mode boot from external disk (USB/SD)
dev_default_boot = unknown # [RW/str] Default boot from disk, altfw or usb
dev_enable_udc = (error) # [RW/int] Enable USB Device Controller
devsw_boot = (error) # [RO/int] Developer switch position at boot
devsw_cur = (error) # [RO/int] Developer switch current position
diagnostic_request = (error) # [RW/int] Request diagnostic rom run on next boot
disable_dev_request = (error) # [RW/int] Disable virtual dev-mode on next boot
ecfw_act = (error) # [RO/str] Active EC firmware
post_ec_sync_delay = (error) # [RW/int] Short delay after EC software sync (persistent, writable, eve only)
fw_prev_result = unknown # [RO/str] Firmware result of previous boot
fw_prev_tried = B # [RO/str] Firmware tried on previous boot (A or B)
fw_result = unknown # [RW/str] Firmware result this boot
fw_tried = B # [RO/str] Firmware tried this boot (A or B)
fw_try_count = (error) # [RW/int] Number of times to try fw_try_next
fw_try_next = B # [RW/str] Firmware to try next (A or B)
fw_vboot2 = (error) # [RO/int] 1 if firmware was selected by vboot2 or 0 otherwise
fwb_tries = (error) # [RW/int] Try firmware B count
fwid = (error) # [RO/str] Active firmware ID
fwupdate_tries = 0 # [RW/int] Times to try OS firmware update (inside kern_nv)
hwid = REVEN-ANAE A6A-A7I # [RO/str] Hardware ID
inside_vm = 0 # [RO/int] Running in a VM?
kern_nv = (error) # [RO/int] Non-volatile field for kernel use
kernel_max_rollforward = (error) # [RW/int] Max kernel version to store into TPM
kernkey_vfy = (error) # [RO/str] Type of verification done on kernel keyblock
loc_idx = (error) # [RW/int] Localization index for firmware screens
mainfw_act = (error) # [RO/str] Active main firmware
mainfw_type = nonchrome # [RO/str] Active main firmware type
minios_priority = B # [RW/str] miniOS image to try fFallback to WPSW_BOOT (-1), which may be invalid
irst (A or B)
nvram_cleared = (error) # [RW/int] Have NV settings been lost? Write 0 to clear
display_request = (error) # [RW/int] Should we initialize the display at boot?
phase_enforcement = (error) # [RO/int] Board should have full security settings applied
recovery_reason = (error) # [RO/int] Recovery mode reason for current boot
recovery_request = (error) # [RW/int] Recovery mode request
recovery_subcode = (error) # [RW/int] Recovery reason subcode
recoverysw_boot = (error) # [RO/int] Recovery switch position at boot
recoverysw_cur = (error) # [RO/int] Recovery switch current position
recoverysw_ec_boot = (error) # [RO/int] Recovery switch position at EC boot
ro_fwid = (error) # [RO/str] Read-only firmware ID
tpm_attack = (error) # [RW/int] TPM was interrupted since this flag was cleared
tpm_fwver = (error) # [RO/int] Firmware version stored in TPM
tpm_kernver = (error) # [RO/int] Kernel version stored in TPM
tpm_rebooted = (error) # [RO/int] TPM requesting repeated reboot
tried_fwb = (error) # [RO/int] Tried firmware B before A this boot
try_ro_sync = (error) # [RO/int] try read only software sync
vdat_flags = (error) # [RO/int] Flags from VbSharedData
vdat_lfdebug = (error) # [RO/str] LoadFirmware() debug data (not in print-all)
wipeout_request = (error) # [RW/int] Firmware requested factory reset (wipeout)
wpsw_cur = (error) # [RO/int] Firmware write protect hardware switch current position
+ rootdev -s
/dev/sda3
+ ls -aCF /root
./ ../ .force_update_firmware
+ ls -aCF /mnt/stateful_partition
./ encrypted/ encrypted.key home/ unencrypted/
../ encrypted.block etc/ lost+found/ var_overlay/
+ cgpt show /dev/sda
start size part contents
0 1 PMBR (Boot GUID: A222493A-7E81-6840-AB16-3884DB26F968)
1 1 Pri GPT header
2 32 Pri GPT table
17010688 959762432 1 Label: "STATE"
Type: Linux data
UUID: BDFDC1D9-A482-FA4F-833D-81CD35AD702E
16879616 131072 2 Label: "KERN-A"
Type: ChromeOS kernel
UUID: 625D75FC-C5CB-2F44-969D-E056BFEBEBAE
Attr: priority=2 tries=0 successful=1 error_counter=0
8622080 8257536 3 Label: "ROOT-A"
Type: ChromeOS rootfs
UUID: 18134A0D-3365-BA42-9777-1EE8B4D8CF40
8491008 131072 4 Label: "KERN-B"
Type: ChromeOS kernel
UUID: 43FC5FD0-A036-714E-8177-90048D7D980F
Attr: priority=1 tries=0 successful=1 error_counter=0
233472 8257536 5 Label: "ROOT-B"
Type: ChromeOS rootfs
UUID: 64CBB358-7F50-DA4F-86CF-8B0B2366442E
65 1 6 Label: "KERN-C"
Type: ChromeOS kernel
UUID: AA87544C-C89C-6840-94F9-8DD43E40217E
Attr: priority=0 tries=15 successful=0 error_counter=0
66 1 7 Label: "ROOT-C"
Type: ChromeOS rootfs
UUID: E2FD4938-EDE6-BA42-93D0-7BAE2BB8E049
69632 32768 8 Label: "OEM"
Type: Linux data
UUID: 69BAA272-44B6-2149-9249-FE32D8277328
67 1 9 Label: "reserved"
Type: ChromeOS reserved
UUID: 8E5D124A-05AC-7549-8995-ADC6314749C3
68 1 10 Label: "reserved"
Type: ChromeOS reserved
UUID: EF9E8F55-20E5-FC44-8051-1F61B88D1EE6
64 1 11 Label: "RWFW"
Type: ChromeOS firmware
UUID: BD872E78-4693-654E-972E-6B7D7EEF9AA4
102400 131072 12 Label: "EFI-SYSTEM"
Type: EFI System Partition
UUID: A222493A-7E81-6840-AB16-3884DB26F968
Attr: legacy_boot=1
976773135 32 Sec GPT table
976773167 1 Sec GPT header
+ flashrom -V -p host --wp-status
flashrom 1.4.0-devel on Linux 5.15.124-20255-g6fec128ef5b0 (x86_64)
flashrom is free software, get the source code at https://flashrom.org
Calibrating delay loop... OK.
flashrom was built with LLVM Clang 17.0.0 (/mnt/host/source/src/third_party/llvm-project 98f5a340975bc00197c57e39eb4ca26e2da0e8a2), little endian
Command line (4 args): flashrom -V -p host --wp-status
Acquiring lock (timeout=180 sec)...
Opened file lock "/run/lock/firmware_utility_lock"
Lock acquired.
Initializing host programmer
cros_host_alias_init(): Redirecting dispatch -> internal_init().
/sys/class/mtd/mtd0 does not exist
ERROR: Could not get I/O privileges (Operation not permitted).
Your kernel may prevent access based on security policies.
Issue a 'dmesg | grep flashrom' for further information
Error: Programmer initialization failed.
# Extracting BIOS components...
+ flashrom -p host -r /dev/null -iGBB:GBB -iFMAP:FMAP -iVBLOCK_A:VBLOCK_A -iVBLOCK_B:VBLOCK_B -iFW_MAIN_A:FW_MAIN_A -iFW_MAIN_B:FW_MAIN_B
flashrom 1.4.0-devel on Linux 5.15.124-20255-g6fec128ef5b0 (x86_64)
flashrom is free software, get the source code at https://flashrom.org
Calibrating delay loop... OK.
ERROR: Could not get I/O privileges (Operation not permitted).
Your kernel may prevent access based on security policies.
Issue a 'dmesg | grep flashrom' for further information
Error: Programmer initialization failed.
# Couldn't read individual components. Read the whole thing...
+ flashrom -p host -r bios.rom
flashrom 1.4.0-devel on Linux 5.15.124-20255-g6fec128ef5b0 (x86_64)
flashrom is free software, get the source code at https://flashrom.org
Calibrating delay loop... OK.
ERROR: Could not get I/O privileges (Operation not permitted).
Your kernel may prevent access based on security policies.
Issue a 'dmesg | grep flashrom' for further information
Error: Programmer initialization failed.
+ERROR: Can't read BIOS at all. Giving up.
</pre>
<img width="1px" height="1px" alt="" src="http://email.email.llvm.org/o/eJzse1tzm7729qehN2vwgDhf9AIM9JdpUmfitJ19xcgg23qDkbck7Pj99P-RABsnbo6dfbFn-yJ2AT3POmlpLYliIeiqIeSr4SWGl37BrVwz_vVns8blwz_Z3ZcFqw5frwTg5sAaAnhRE5AM1qTewoZA21SEC4mbCuSaCqjZyrBSw4r7v15SkUW7KnYLxmTRMCoOE_WMlxooXEu5FYYTGyg3UL6ict0uJiXbGCiv693wZW45-3-klAbKl7QmwkC5jTwr8CPbQPlleBSNpbhrm4Y2KzBQ3gpuoHxBGz10V4yGQz8EJVBhSbp_zdsG5mQL4IDtGE5se4YTex7czO8BWcgZxjiQZr-KNEt-fivy2d00Mxyl4UkQ5MDs9r6YXmfxj5-33d2DUubJA8nVbP6HsS_hXt3E3_5073t29yO7vnAzv46_FfP4V1Zcz74V-dV1dkmuBErOhDgISTZgmriuuzuYl2u48DGcFB5D_9Kt4yPIAcNL7mYGyoXkhpfCbY3lkvENKFgqSSlb3vtggcuHdls0O443BSf_bomQA5GBQsI54waKXiP7baCcNlKRJRoR5JqARgXBNmS_JpwAlt1l8ihBRcUEpjXBnFTAGhBtWRIhJoNcUhJ-KMpWsuXyJNnH5Zq2EthyCT0yqGkl1q2s2L5R_EepegFqVj4UFdltWEU-Yw6FA7iuoRUE2BIqsiM12xIOCrknY5hXBa0uufsdtLMRrUKENebVHnMCnOyooErLdrMgvGMtlfELud0UbN8QXlQqCV1gvWRMNRTub29ADwU19DLo4LlPOO4J13NfqTnUZZvn5rP-xPRH083mINasrSvlNbaHDnhJsJo1omOsFquCE0HkKw67oE6q4brBOrZ6C_XAOmcuWlpXf0cVusErAgpQwpLxy9qQXaGTPK7lcv9nbd7us6zRi9l5rAOuJeENlkT7rma4GkLxKIFeMauCNfXhr9PrhUgjLznbqGRAS4preCC8IfVTW7Ri8U7PvsCqCcmjVr-GiooHBfZznhgon6fHBaFbNZe4raUWYkzeNg-NSlVvsEKf9tMOaSSBIjbQFDo_Mw6tWJyYiZa_aKvyL4bAz3kCKdnRksCUNZKzuh45XezP9PwQ52w8twbTiz2V5Rq2TFCp8h4e54uOuGz5U8S_R1y2nJNGHgXoiSleNUxIWo7X2s9Y-a6HOSGDcjRvL61pFRXaw8rZY_6P06cdIuwol62KbLIzddQ_Jyflcl_g8mnG_IjR-_iOS0l3BLIpLCnfqHWuY9oyIQtSFuLQlEVFany4zHRBn_macQndGLyUhCt0wZZSr6IKUCFsCRdUSNJINZn2nEplBPWb7IjOMMcZvdwXW67NLdRUPNP6jTN6pHHe6wk9HFuCQqesFSNLD5ySU1I9sXTyImw3gjXnqErlWGWLZKzWU43eq9bvP6ulu50zfZ6q8i59jnCXFZGqzGRt85ka5Ycuq5Q_JN0Qobo4yQ_Qo6uZcEanp8ZzVV78vGS3nk7DXtRRN2Hogv0uzYdRXrOBLo-zC_ZYgCA1KSWpYHGAHpVxsIDJNeF7KsjAudBOE69wvt3E98qegyQJaI8NXM8r59f0O08hR9yrdIBst6pRfapDV4Zdkm7s9tn8hNjhKDloI2hFdLVRNLujd9YvSH-X_cp-mPGPOIPYj804uLpopZFC_wwV_6BJx1rsNhfgrUsuHxp62gCGXzeGk3dAvdzvsvIwO1hj7liNJa2VrUld6VK0q7tUX3RiIHWxwY-FKhOWjO9VE_OJmLnBjwPLTuVs1igXCck4AdpIprqKE_cDORS75eG9MXR_2OrGbkc4XdIS63pD91KsGdgfyEE3lB1ZzcqCVo-vmvLtil6zEtf0_3fctKnIo7bwMQpFyQlp-hJ3g2lzaS3-9EqsgJ-sxT2XVDZS-A1ryjVnG_IpbFB4PQFtKBPFllPGqTycKfP-jKrQjk3TkMRzXNcLXD6oC79v57-LZDa7V5YybTWLVQmwpuUaNvgACxVYO1zTqp9-XFxKyd1-S9nvfvyNCPgH7wj8-AWCSEmblYAFIQ3UTEjDyQF-cyoJWEoFzXosCLc1PvyFJn3edcx7pT6VVAUj0Zs9PcWxAB_SyXaNBSlIs2S8JBtVKl-2wB_3Nvoefa30XrZ1DYKUrQ6BownwdltT0nuCk5LtCFfKYsGaj5p8nCl7xKGN17Bq2g3F_6mEGZGPyv7PFf7n5KM9hCOZaBeluvv3yHole-Bzuqe93Bs8ecR9sV0bEaie7S847MUmbURHypFKf493rGY2HWvKiovFzMcz8x3BldnteTytceR2U2ApVWL7RFV2e6PLQtpIwnm7VZWhoE1Juqp7WeOVvt-nuhPzcr8jr_XfF0x5LHmH9Vwv5pWqVo5ruYJX664i-LjTvp_XDX_g4UR577w3-TinsmY_lVUJxsmWYAXesfSsqqcplvvF-413r9uhURG9IEtVCsVPOy7Vo3BWdP3uh7WRXcKouj23sy66o9lVWBYqRMTLqrydMtdgeq_r12K-ViGXYolHdPXy2UbxG2q8a4arIfS6k55-I7XCEqvBDZMqNracNlIf4wwr_Z5uCWvl08T_iSk36pY1pHIpLiXT1hZElxs960mK7aeT55F2r0uJLWeSlPJ0xPBiTjVQApwxWZEdmGK4lldkp2xcYef0WC3AxNMcDJTzY0BODJTDRP-FiS4Zir5BOy83nwBsGql9iCVZtnWxxVyOhNJwpCn5QaUtja0_x0uTB3IAWLMNMVBuWBFA24yf72E6sU6jdKUPRJbDKICuEEPJkrVNx7TDvFCLQo0PRyR9HrjaSlXb7GFsn-5-L5-QmEsQqsICAKUUQMkaSRopzh5Un_GhgX36eXuT3KlASNTy9u3nVWo4McQIITdyYjPIQtv0Q9cy48T2TScM3TRBfh75p0POy7hgwy2n8O32HtbktL8_emC0C-GMfg-juq20bpAdWLblhyEARF4U-Mg9jrABrvGC1EpsA6H5fXyfGQj1A1VLpu5c06Z91HP0mRh_-PzsTZGkeTq108iM3RCZeezmZug4qRna09Tx4jSwUHbCtP0wiHy7P5e1HdsK0FHdsZzfs7sfZnwS9NXPoMlUN02zed9QvlcdH3lp4OVTc-pNExPlrmtGfpSameX5SZ4lWRIP6sRScjVk6KgMJ0V6I00YTmoNx7TLtjac1AadSLrtM8L1AyPRQh8hK7QgRF7gOcOptXPuurvZ7P5zJlFpYvk88l8xiR3ajhtbqek4vmcmsYvMKAgC086yMHHTcJq71lgXN7ItK-wwzjzsPvdw8p_3sOvkUy9PLTO2HN8MbDczQzsIzMiy3DAN0ii08j972P6ghwE5jhugJx72Lnj4Uyb5mId9d5okjheaQe5ZZqrnsD_NzTCxEuT4vuuO53D38b0R0JDX_Ocenv7nPRzHYeC57tSchtG0y86Rm0dmmKauk7kWsoMX5rB19LDtnbvYesXF2gL-0RjBBed-yhofc26G8tSNnNDM0szvp6-TWmaQxBlKkjCz3POFyo_84-rhoMDvpzKEZ-rMspsP6PJsnTmGYJTEMQqQ6bqJbyLbjcwIuZGZZw5KQxQEDgr7IX4wAh6MHZ0bW9V3fKdqj6cr3cmawyPvtGeYeamN3Ni0vHhqBp4bmWEUeWacTn3HdgM3mjrPoiJ8LrJtvSLxm436aZWyPMrC3PNMZGWemU9d1wwtzzbt3LeTMEztLPOfqeReUMk-j_jf-e_PqHNesb5dnSQNA5QFoen6kWP6npuZUYAy00-CNMiyPIpjd4xpW8i1-vJvvGDZ5yVJll-Z83_N7z8U-Fl-BfPu7bXb8-L67Xq9qeo8z2s1WeHyUHQbiql9SldR4AeBYzujLD4uMuekfFZk9kMuTr_RkHE1q-r0ZY2F8iiYv8DcwpoJCaa535qq22j7dHZ8yJ64E8vUb4YAa_p84U1sb2Ij10QW8jxz5S9JaaOQLL2FpWrzx9AvfPd0jDeAUdXhEnLsqA00hRXp3q0TrOUlAb3thyWcvwU6IEwYP3uTdIpruuBY7zl0Z981Y9vJZAKz75Mn5Hss-reJ9lSu4fr61w1Ma9yswA4m1kQLfuy81rrryTuh1A-ueiK5przSzdjhyWuoEIVLDzuuFQXeorQsOwpKLyBORBZuiZFPUIUtEmLU77vXVMqaAGkqivu4m7LNBjcV1LTRp24uYL7Sr1w68ducFpf_bilXttB9nIFCSTe6m3ZSO7RAkNJA0WTSW2a2JY3eVanJMACp3rVtlHKsfNDv1nZTvmglrak8FN31frpd6zcENSupetSrYRddyaHl3HK24nizOb69x5ko1J0C1xSLgjZU9i-hOjHckYpyUnYupWKLVW9uGk7W7dQ1uB4NmBwbcnEQBsrLGgv1vZFV99eCihEBDZNAHumwz5zd3c3udGrTO_HqrgrDKwPlM1V67GhNVkQoC862hHeHU-qpLeEbKnUPPXD_i7XHA8ENPugXEEgjAetCBRZY9G-JDpv8W1bTkpLhfdErIVoCGAwUVBsiVmAEU1hxsj363EBBdybWcrkmHGizZHyDTxkr03siTgy3R0ufDjM64ZeY1kcXGciB7FFy3Fk5uZrNoWSbLWtUI36Mj_NkMQQdP7X3TVvXYNJvSWI48bckAZPmN_Gt4cTqC0z6K7meTb8XseHEw8_T1eR0VY_8XdzEVz_0w8ffo-vJ6Hry35ak_heQneaNgQLZbb3SpqI7WrW4HsemPhbQrtivWa336pvVqxG7oExMlOD_C5v_rrBJThbAo9jRGQ1LwHU9gW90p0zYbidfqq9OFTkR_kK-2n7kBIHvBt6X9dewWhB_sVguSGRFkRuWESY4CAlGnmXZVfiFfkUWcqzIcpCNAs-buNhzUGAtEAnLRRnYhmuRDab1RBUFypNfqLLHV99Djv-lVlWr0P-bBqGG7EHfVMuol37hX3UhsWhXwnCtmgopTiiSypp8_VhNYiAPWW-tS760vP767v96o_VQC67W8_8CAAD__xPUn6w">