src/security/vboot: Fix typo

Change-Id: Ie98ee00a83d837b6d6491fed3a474048dc23e104
Signed-off-by: Elyes HAOUAS <ehaouas@noos.fr>
Reviewed-on: https://review.coreboot.org/27910
Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
Reviewed-by: Martin Roth <martinroth@google.com>
This commit is contained in:
Elyes HAOUAS 2018-08-07 12:15:54 +02:00 committed by Martin Roth
parent 809aeeed98
commit bc0ec507f2
1 changed files with 2 additions and 2 deletions

View File

@ -63,7 +63,7 @@ static void vb2_clear_recovery_reason_vbnv(void *unused)
* make sure that the stored recovery reason is cleared off before that * make sure that the stored recovery reason is cleared off before that
* happens. * happens.
* IMPORTANT: Any reboot occurring after BS_DEV_INIT state will cause loss of * IMPORTANT: Any reboot occurring after BS_DEV_INIT state will cause loss of
* recovery reason on reboot. Until now, we have seen reboots occuring on x86 * recovery reason on reboot. Until now, we have seen reboots occurring on x86
* only in FSP stages which run before BS_DEV_INIT. * only in FSP stages which run before BS_DEV_INIT.
*/ */
BOOT_STATE_INIT_ENTRY(BS_DEV_INIT, BS_ON_EXIT, BOOT_STATE_INIT_ENTRY(BS_DEV_INIT, BS_ON_EXIT,
@ -99,7 +99,7 @@ static int vboot_possibly_executed(void)
* from it. * from it.
* 3. Checks recovery request in handoff for stages post-cbmem. * 3. Checks recovery request in handoff for stages post-cbmem.
* 4. For non-CBMEM stages, check if vboot verification is done and look-up * 4. For non-CBMEM stages, check if vboot verification is done and look-up
* selected region to identify if vboot_refence library has requested recovery * selected region to identify if vboot_reference library has requested recovery
* path. If yes, return the reason code from shared data. * path. If yes, return the reason code from shared data.
* 5. If nothing applies, return 0 indicating no recovery request. * 5. If nothing applies, return 0 indicating no recovery request.
*/ */