| /* |
| * Copyright (C) 2017 Amlogic, Inc. All rights reserved. |
| * * |
| This program is free software; you can redistribute it and/or modify |
| * it under the terms of the GNU General Public License as published by |
| * the Free Software Foundation; either version 2 of the License, or |
| * (at your option) any later version. |
| * * |
| This program is distributed in the hope that it will be useful, but WITHOUT |
| * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or |
| * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for |
| * more details. |
| * * |
| You should have received a copy of the GNU General Public License along |
| * with this program; if not, write to the Free Software Foundation, Inc., |
| * 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. |
| * * |
| Description: |
| */ |
| |
| #include <common.h> |
| #include <command.h> |
| #include <environment.h> |
| #include <malloc.h> |
| #include <asm/byteorder.h> |
| #include <config.h> |
| #include <asm/arch/io.h> |
| #include <partition_table.h> |
| #include <libavb.h> |
| #include <version.h> |
| #include <fb_mmc.h> |
| #include <mmc.h> |
| #include <amlogic/aml_mmc.h> |
| #include <u-boot/sha1.h> |
| |
| #ifdef CONFIG_BOOTLOADER_CONTROL_BLOCK |
| |
| // Spaces used by misc partition are as below: |
| // 0 - 2K For bootloader_message |
| // 2K - 16K Used by Vendor's bootloader (the 2K - 4K range may be optionally used |
| // as bootloader_message_ab struct) |
| // 16K - 32K Used by uncrypt and recovery to store wipe_package for A/B devices |
| // 32K - 64K System space, used for miscellanious AOSP features. See below. |
| // Note that these offsets are admitted by bootloader,recovery and uncrypt, so they |
| // are not configurable without changing all of them. |
| #define BOOTLOADER_MESSAGE_OFFSET_IN_MISC 0 |
| #define VENDOR_SPACE_OFFSET_IN_MISC 2 * 1024 |
| #define WIPE_PACKAGE_OFFSET_IN_MISC 16 * 1024 |
| #define SYSTEM_SPACE_OFFSET_IN_MISC 32 * 1024 |
| #define SYSTEM_SPACE_SIZE_IN_MISC 32 * 1024 |
| |
| extern int store_read_ops( |
| unsigned char *partition_name, |
| unsigned char *buf, uint64_t off, uint64_t size); |
| extern int store_write_ops( |
| unsigned char *partition_name, |
| unsigned char *buf, uint64_t off, uint64_t size); |
| |
| #define AB_METADATA_MISC_PARTITION_OFFSET 2048 |
| |
| #define MISCBUF_SIZE 2080 |
| |
| /* Bootloader Message (2-KiB) |
| * |
| * This structure describes the content of a block in flash |
| * that is used for recovery and the bootloader to talk to |
| * each other. |
| * |
| * The command field is updated by linux when it wants to |
| * reboot into recovery or to update radio or bootloader firmware. |
| * It is also updated by the bootloader when firmware update |
| * is complete (to boot into recovery for any final cleanup) |
| * |
| * The status field was used by the bootloader after the completion |
| * of an "update-radio" or "update-hboot" command, which has been |
| * deprecated since Froyo. |
| * |
| * The recovery field is only written by linux and used |
| * for the system to send a message to recovery or the |
| * other way around. |
| * |
| * The stage field is written by packages which restart themselves |
| * multiple times, so that the UI can reflect which invocation of the |
| * package it is. If the value is of the format "#/#" (eg, "1/3"), |
| * the UI will add a simple indicator of that status. |
| * |
| * We used to have slot_suffix field for A/B boot control metadata in |
| * this struct, which gets unintentionally cleared by recovery or |
| * uncrypt. Move it into struct bootloader_message_ab to avoid the |
| * issue. |
| */ |
| struct bootloader_message { |
| char command[32]; |
| char status[32]; |
| char recovery[768]; |
| |
| // The 'recovery' field used to be 1024 bytes. It has only ever |
| // been used to store the recovery command line, so 768 bytes |
| // should be plenty. We carve off the last 256 bytes to store the |
| // stage string (for multistage packages) and possible future |
| // expansion. |
| char stage[32]; |
| |
| // The 'reserved' field used to be 224 bytes when it was initially |
| // carved off from the 1024-byte recovery field. Bump it up to |
| // 1184-byte so that the entire bootloader_message struct rounds up |
| // to 2048-byte. |
| char reserved[1184]; |
| }; |
| |
| /** |
| * The A/B-specific bootloader message structure (4-KiB). |
| * |
| * We separate A/B boot control metadata from the regular bootloader |
| * message struct and keep it here. Everything that's A/B-specific |
| * stays after struct bootloader_message, which should be managed by |
| * the A/B-bootloader or boot control HAL. |
| * |
| * The slot_suffix field is used for A/B implementations where the |
| * bootloader does not set the androidboot.ro.boot.slot_suffix kernel |
| * commandline parameter. This is used by fs_mgr to mount /system and |
| * other partitions with the slotselect flag set in fstab. A/B |
| * implementations are free to use all 32 bytes and may store private |
| * data past the first NUL-byte in this field. It is encouraged, but |
| * not mandatory, to use 'struct bootloader_control' described below. |
| * |
| * The update_channel field is used to store the Omaha update channel |
| * if update_engine is compiled with Omaha support. |
| */ |
| struct bootloader_message_ab { |
| struct bootloader_message message; |
| char slot_suffix[32]; |
| char update_channel[128]; |
| |
| // Round up the entire struct to 4096-byte. |
| char reserved[1888]; |
| }; |
| |
| #define BOOT_CTRL_MAGIC 0x42414342 /* Bootloader Control AB */ |
| #define BOOT_CTRL_VERSION 1 |
| |
| typedef struct slot_metadata { |
| // Slot priority with 15 meaning highest priority, 1 lowest |
| // priority and 0 the slot is unbootable. |
| uint8_t priority : 4; |
| // Number of times left attempting to boot this slot. |
| uint8_t tries_remaining : 3; |
| // 1 if this slot has booted successfully, 0 otherwise. |
| uint8_t successful_boot : 1; |
| // 1 if this slot is corrupted from a dm-verity corruption, 0 |
| // otherwise. |
| uint8_t verity_corrupted : 1; |
| // Reserved for further use. |
| uint8_t reserved : 7; |
| } slot_metadata; |
| |
| /* Bootloader Control AB |
| * |
| * This struct can be used to manage A/B metadata. It is designed to |
| * be put in the 'slot_suffix' field of the 'bootloader_message' |
| * structure described above. It is encouraged to use the |
| * 'bootloader_control' structure to store the A/B metadata, but not |
| * mandatory. |
| */ |
| typedef struct bootloader_control { |
| // NUL terminated active slot suffix. |
| char slot_suffix[4]; |
| // Bootloader Control AB magic number (see BOOT_CTRL_MAGIC). |
| u32 magic; |
| // Version of struct being used (see BOOT_CTRL_VERSION). |
| u8 version; |
| // Number of slots being managed. |
| u8 nb_slot : 3; |
| // Number of times left attempting to boot recovery. |
| u8 recovery_tries_remaining : 3; |
| // Status of any pending snapshot merge of dynamic partitions. |
| u8 merge_status : 3; |
| // Ensure 4-bytes alignment for slot_info field. |
| u8 roll_flag; |
| // Per-slot information. Up to 4 slots. |
| struct slot_metadata slot_info[4]; |
| // Reserved for further use. |
| u8 reserved1[8]; |
| // CRC32 of all 28 bytes preceding this field (little endian |
| // format). |
| u32 crc32_le; |
| } bootloader_control; |
| |
| #define MISC_VIRTUAL_AB_MESSAGE_VERSION 2 |
| #define MISC_VIRTUAL_AB_MAGIC_HEADER 0x56740AB0 |
| |
| unsigned int kDefaultBootAttempts = 4; |
| |
| /* Magic for the A/B struct when serialized. */ |
| #define AVB_AB_MAGIC "\0AB0" |
| #define AVB_AB_MAGIC_LEN 4 |
| |
| /* Versioning for the on-disk A/B metadata - keep in sync with avbtool. */ |
| #define AVB_AB_MAJOR_VERSION 1 |
| #define AVB_AB_MINOR_VERSION 0 |
| |
| /* Size of AvbABData struct. */ |
| #define AVB_AB_DATA_SIZE 32 |
| |
| /* Maximum values for slot data */ |
| #define AVB_AB_MAX_PRIORITY 15 |
| #define AVB_AB_MAX_TRIES_REMAINING 4 |
| |
| /* Struct used for recording per-slot metadata. |
| * |
| * When serialized, data is stored in network byte-order. |
| */ |
| typedef struct AvbABSlotData { |
| /* Slot priority. Valid values range from 0 to AVB_AB_MAX_PRIORITY, |
| * both inclusive with 1 being the lowest and AVB_AB_MAX_PRIORITY |
| * being the highest. The special value 0 is used to indicate the |
| * slot is unbootable. |
| */ |
| uint8_t priority; |
| |
| /* Number of times left attempting to boot this slot ranging from 0 |
| * to AVB_AB_MAX_TRIES_REMAINING. |
| */ |
| uint8_t tries_remaining; |
| |
| /* Non-zero if this slot has booted successfully, 0 otherwise. */ |
| uint8_t successful_boot; |
| |
| /* Reserved for future use. */ |
| uint8_t reserved[1]; |
| } AvbABSlotData; |
| |
| /* Struct used for recording A/B metadata. |
| * |
| * When serialized, data is stored in network byte-order. |
| */ |
| typedef struct AvbABData { |
| /* Magic number used for identification - see AVB_AB_MAGIC. */ |
| uint8_t magic[AVB_AB_MAGIC_LEN]; |
| |
| /* Version of on-disk struct - see AVB_AB_{MAJOR,MINOR}_VERSION. */ |
| uint8_t version_major; |
| uint8_t version_minor; |
| |
| /* Padding to ensure |slots| field start eight bytes in. */ |
| u8 roll_flag; |
| u8 reserved1[1]; |
| |
| /* Per-slot metadata. */ |
| AvbABSlotData slots[2]; |
| |
| /* Reserved for future use. */ |
| uint8_t reserved2[12]; |
| |
| /* CRC32 of all 28 bytes preceding this field. */ |
| uint32_t crc32; |
| }AvbABData; |
| |
| bool boot_info_validate_VAB(bootloader_control *info) |
| { |
| if (info->magic != BOOT_CTRL_MAGIC) { |
| printf("Magic 0x%x is incorrect.\n", info->magic); |
| return false; |
| } |
| return true; |
| } |
| |
| bool boot_info_validate(AvbABData* info) |
| { |
| if (memcmp(info->magic, AVB_AB_MAGIC, AVB_AB_MAGIC_LEN) != 0) { |
| printf("Magic %s is incorrect.\n", info->magic); |
| return false; |
| } |
| if (info->version_major > AVB_AB_MAJOR_VERSION) { |
| printf("No support for given major version.\n"); |
| return false; |
| } |
| return true; |
| } |
| |
| void boot_info_reset(AvbABData* info) |
| { |
| memset(info, '\0', sizeof(AvbABData)); |
| memcpy(info->magic, AVB_AB_MAGIC, AVB_AB_MAGIC_LEN); |
| info->version_major = AVB_AB_MAJOR_VERSION; |
| info->version_minor = AVB_AB_MINOR_VERSION; |
| info->slots[0].priority = AVB_AB_MAX_PRIORITY; |
| info->slots[0].tries_remaining = AVB_AB_MAX_TRIES_REMAINING; |
| info->slots[0].successful_boot = 0; |
| info->slots[1].priority = AVB_AB_MAX_PRIORITY - 1; |
| info->slots[1].tries_remaining = AVB_AB_MAX_TRIES_REMAINING; |
| info->slots[1].successful_boot = 0; |
| } |
| |
| void dump_boot_info(AvbABData* info) |
| { |
| #if 0 |
| printf("info->magic = %s\n", info->magic); |
| printf("info->version_major = %d\n", info->version_major); |
| printf("info->version_minor = %d\n", info->version_minor); |
| printf("info->slots[0].priority = %d\n", info->slots[0].priority); |
| printf("info->slots[0].tries_remaining = %d\n", info->slots[0].tries_remaining); |
| printf("info->slots[0].successful_boot = %d\n", info->slots[0].successful_boot); |
| printf("info->slots[1].priority = %d\n", info->slots[1].priority); |
| printf("info->slots[1].tries_remaining = %d\n", info->slots[1].tries_remaining); |
| printf("info->slots[1].successful_boot = %d\n", info->slots[1].successful_boot); |
| |
| printf("info->crc32 = %d\n", info->crc32); |
| #endif |
| } |
| |
| void dump_boot_info_VAB(bootloader_control *boot_ctrl) |
| { |
| } |
| |
| static bool slot_is_bootable_VAB(slot_metadata *slot) |
| { |
| return slot->tries_remaining != 0; |
| } |
| |
| int get_active_slot_VAB(bootloader_control *info) |
| { |
| if (info->slot_info[0].priority > info->slot_info[1].priority) { |
| return 0; |
| } else if (info->slot_info[0].priority == info->slot_info[1].priority) { |
| if (info->slot_info[0].successful_boot == 1) |
| return 0; |
| else |
| return 1; |
| } else { |
| return 1; |
| } |
| } |
| |
| static bool slot_is_bootable(AvbABSlotData* slot) { |
| return slot->priority > 0 && |
| (slot->successful_boot || (slot->tries_remaining > 0)); |
| } |
| |
| int get_active_slot(AvbABData* info) { |
| if (info->slots[0].priority > info->slots[1].priority) |
| return 0; |
| else |
| return 1; |
| } |
| |
| |
| int boot_info_set_active_slot(AvbABData* info, int slot) |
| { |
| unsigned int other_slot_number; |
| |
| /* Make requested slot top priority, unsuccessful, and with max tries. */ |
| info->slots[slot].priority = AVB_AB_MAX_PRIORITY; |
| info->slots[slot].tries_remaining = AVB_AB_MAX_TRIES_REMAINING; |
| //info->slots[slot].successful_boot = 0; |
| |
| /* Ensure other slot doesn't have as high a priority. */ |
| other_slot_number = 1 - slot; |
| info->slots[other_slot_number].priority -= 1; |
| if (info->slots[other_slot_number].priority == AVB_AB_MAX_PRIORITY) |
| info->slots[other_slot_number].priority = AVB_AB_MAX_PRIORITY - 1; |
| |
| //dump_boot_info(info); |
| |
| return 0; |
| } |
| |
| int boot_info_open_partition(char *miscbuf) |
| { |
| char *partition = "misc"; |
| |
| printf("Start read %s partition datas!\n", partition); |
| if (store_read_ops((unsigned char *)partition, |
| (unsigned char *)miscbuf, 0, MISCBUF_SIZE) < 0) { |
| printf("failed to store read %s.\n", partition); |
| return -1; |
| } |
| |
| return 0; |
| } |
| |
| bool boot_info_load_VAB(bootloader_control *out_info, char *miscbuf) |
| { |
| memcpy(out_info, miscbuf + AB_METADATA_MISC_PARTITION_OFFSET, sizeof(bootloader_control)); |
| dump_boot_info_VAB(out_info); |
| return true; |
| } |
| |
| bool boot_info_load(AvbABData *out_info, char *miscbuf) |
| { |
| memcpy(out_info, miscbuf + AB_METADATA_MISC_PARTITION_OFFSET, AVB_AB_DATA_SIZE); |
| dump_boot_info(out_info); |
| return true; |
| } |
| |
| bool boot_info_save(AvbABData *info, char *miscbuf) |
| { |
| char *partition = "misc"; |
| |
| printf("save boot-info\n"); |
| info->crc32 = avb_htobe32(avb_crc32((const uint8_t *)info, |
| sizeof(AvbABData) - sizeof(uint32_t))); |
| |
| memcpy(miscbuf + AB_METADATA_MISC_PARTITION_OFFSET, info, AVB_AB_DATA_SIZE); |
| dump_boot_info(info); |
| store_write_ops((unsigned char *)partition, (unsigned char *)miscbuf, 0, MISCBUF_SIZE); |
| return true; |
| } |
| |
| int write_bootloader(int copy, int dstindex) |
| { |
| int ret = -1; |
| unsigned char *buffer = NULL; |
| char str[128] = {0}; |
| u64 addr; |
| u64 size = 0x2000 * 512 - 512; |
| int map = 0; |
| |
| buffer = (unsigned char *)malloc(size); |
| if (!buffer) { |
| printf("ERROR! fail to allocate memory ...\n"); |
| goto exit; |
| } |
| memset(buffer, 0, size); |
| addr = (unsigned long)buffer; |
| |
| if (copy == 0) { |
| sprintf(str, "amlmmc switch 1 user"); |
| ret = run_command(str, 0); |
| } else if (copy == 1) { |
| sprintf(str, "amlmmc switch 1 boot0"); |
| ret = run_command(str, 0); |
| } else if (copy == 2) { |
| sprintf(str, "amlmmc switch 1 boot1"); |
| ret = run_command(str, 0); |
| } |
| if (ret != 0) { |
| printf("amlmmc cmd %s failed\n", str); |
| goto exit; |
| } |
| |
| sprintf(str, "amlmmc read bootloader 0x%llx 0x200 0x%llx", addr, size); |
| printf("command: %s\n", str); |
| ret = run_command(str, 0); |
| if (ret != 0) { |
| printf("amlmmc cmd %s failed\n", str); |
| goto exit; |
| } |
| |
| if (dstindex == 0) |
| map = AML_BL_USER; |
| else if (dstindex == 1) |
| map = AML_BL_BOOT0; |
| else if (dstindex == 2) |
| map = AML_BL_BOOT1; |
| |
| if (map) { |
| ret = amlmmc_write_bootloader(1, map, size, buffer); |
| if (ret) { |
| printf("update error"); |
| goto exit; |
| } |
| } |
| |
| sprintf(str, "amlmmc switch 1 user"); |
| ret = run_command(str, 0); |
| |
| exit: |
| if (buffer) { |
| free(buffer); |
| buffer = NULL; |
| } |
| return ret; |
| } |
| |
| static void update_after_failed_rollback(void) |
| { |
| run_command("run init_display; run storeargs; run update;", 0); |
| } |
| |
| void rollback_failure_handler(void) __attribute__((weak, alias("update_after_failed_rollback"))); |
| |
| static int do_GetValidSlot( |
| cmd_tbl_t *cmdtp, |
| int flag, |
| int argc, |
| char * const argv[]) |
| { |
| char miscbuf[MISCBUF_SIZE] = {0}; |
| bootloader_control boot_ctrl; |
| AvbABData info; |
| int slot; |
| int AB_mode = 0; |
| bool bootable_a, bootable_b; |
| char str_count[16]; |
| |
| if (argc != 1) |
| return cmd_usage(cmdtp); |
| |
| //recovery mode, need disable dolby |
| run_command("get_rebootmode", 0); |
| char *rebootmode = getenv("reboot_mode"); |
| |
| if (rebootmode) { |
| if ((!strcmp(rebootmode, "factory_reset")) || (!strcmp(rebootmode, "update"))) |
| setenv("dolby_status", "0"); |
| } |
| |
| boot_info_open_partition(miscbuf); |
| boot_info_load(&info, miscbuf); |
| |
| if (!boot_info_validate(&info)) { |
| printf("boot-info is invalid. Try VAB.\n"); |
| boot_info_load_VAB(&boot_ctrl, miscbuf); |
| if (!boot_info_validate_VAB(&boot_ctrl)) { |
| printf("boot-info is invalid. Resetting.\n"); |
| boot_info_reset(&info); |
| boot_info_save(&info, miscbuf); |
| } else { |
| printf("rollback from R\n"); |
| AB_mode = 1; |
| } |
| } |
| |
| //if recovery mode, need disable dolby |
| if (!memcmp(miscbuf, "boot-recovery", strlen("boot-recovery"))) { |
| printf("recovery mode, need disable dolby\n"); |
| setenv("dolby_status", "0"); |
| } |
| |
| if (AB_mode == 1) { |
| slot = get_active_slot_VAB(&boot_ctrl); |
| printf("active slot = %d\n", slot); |
| printf("boot_ctrl.roll_flag = %d\n", boot_ctrl.roll_flag); |
| bootable_a = slot_is_bootable_VAB(&boot_ctrl.slot_info[0]); |
| bootable_b = slot_is_bootable_VAB(&boot_ctrl.slot_info[1]); |
| boot_info_reset(&info); |
| info.slots[0].successful_boot = boot_ctrl.slot_info[0].successful_boot; |
| info.slots[1].successful_boot = boot_ctrl.slot_info[1].successful_boot; |
| boot_info_set_active_slot(&info, slot); |
| info.roll_flag = boot_ctrl.roll_flag; |
| boot_info_save(&info, miscbuf); |
| } else { |
| slot = get_active_slot(&info); |
| printf("active slot = %d\n", slot); |
| bootable_a = slot_is_bootable(&info.slots[0]); |
| bootable_b = slot_is_bootable(&info.slots[1]); |
| } |
| |
| |
| if (has_boot_slot == 1) { |
| sprintf(str_count, "%d", info.slots[0].tries_remaining); |
| setenv("retry-count_a", str_count); |
| sprintf(str_count, "%d", info.slots[1].tries_remaining); |
| setenv("retry-count_b", str_count); |
| } |
| |
| if (dynamic_partition) |
| setenv("partition_mode", "dynamic"); |
| else |
| setenv("partition_mode", "normal"); |
| |
| if (vendor_boot_partition) { |
| setenv("vendor_boot_mode", "true"); |
| printf("set vendor_boot_mode true\n"); |
| } else { |
| setenv("vendor_boot_mode", "false"); |
| printf("set vendor_boot_mode false\n"); |
| } |
| if (slot == 0) { |
| if (bootable_a) { |
| if (has_boot_slot == 1) { |
| setenv("active_slot", "_a"); |
| setenv("boot_part", "boot_a"); |
| setenv("recovery_part", "recovery_a"); |
| setenv("slot-suffixes", "0"); |
| } else { |
| setenv("active_slot", "normal"); |
| setenv("boot_part", "boot"); |
| setenv("recovery_part", "recovery"); |
| setenv("slot-suffixes", "-1"); |
| } |
| return 0; |
| } else if (bootable_b) { |
| info.roll_flag = 1; |
| boot_info_save(&info, miscbuf); |
| run_command("set_active_slot b", 0); |
| setenv("default_env", "1"); |
| run_command("saveenv", 0); |
| if (write_bootloader(2, 0) == 0) { |
| printf("rollback ok\n"); |
| run_command("reset", 0); |
| } else { |
| printf("rollback failed\n"); |
| rollback_failure_handler(); |
| } |
| } else { |
| rollback_failure_handler(); |
| } |
| } |
| |
| if (slot == 1) { |
| if (bootable_b) { |
| if (has_boot_slot == 1) { |
| setenv("active_slot", "_b"); |
| setenv("boot_part", "boot_b"); |
| setenv("recovery_part", "recovery_b"); |
| setenv("slot-suffixes", "1"); |
| } else { |
| setenv("active_slot", "normal"); |
| setenv("boot_part", "boot"); |
| setenv("recovery_part", "recovery"); |
| setenv("slot-suffixes", "-1"); |
| } |
| return 0; |
| } else if (bootable_a) { |
| info.roll_flag = 1; |
| boot_info_save(&info, miscbuf); |
| run_command("set_active_slot a", 0); |
| setenv("default_env", "1"); |
| run_command("saveenv", 0); |
| |
| if (write_bootloader(1, 0) == 0) { |
| printf("rollback ok\n"); |
| run_command("reset", 0); |
| } else { |
| printf("rollback failed\n"); |
| rollback_failure_handler(); |
| } |
| } else { |
| rollback_failure_handler(); |
| } |
| } |
| |
| if (rebootmode && (strcmp(rebootmode, "rescueparty") == 0)) { |
| printf("rebootmode is rescueparty, need rollback\n"); |
| |
| if (slot == 0) { |
| info.roll_flag = 1; |
| boot_info_save(&info, miscbuf); |
| run_command("set_active_slot b", 0); |
| setenv("default_env", "1"); |
| run_command("saveenv", 0); |
| if (write_bootloader(2, 0) == 0) { |
| printf("rollback ok\n"); |
| run_command("reset", 0); |
| } else { |
| printf("rollback failed\n"); |
| rollback_failure_handler(); |
| } |
| } else if (slot == 1) { |
| info.roll_flag = 1; |
| boot_info_save(&info, miscbuf); |
| run_command("set_active_slot a", 0); |
| setenv("default_env", "1"); |
| run_command("saveenv", 0); |
| if (write_bootloader(1, 0) == 0) { |
| printf("rollback ok\n"); |
| run_command("reset", 0); |
| } else { |
| printf("rollback failed\n"); |
| rollback_failure_handler(); |
| } |
| } |
| } |
| |
| return 0; |
| } |
| |
| static int do_SetActiveSlot( |
| cmd_tbl_t *cmdtp, |
| int flag, |
| int argc, |
| char * const argv[]) |
| { |
| char miscbuf[MISCBUF_SIZE] = {0}; |
| AvbABData info; |
| |
| if (argc != 2) |
| return cmd_usage(cmdtp); |
| |
| if (has_boot_slot == 0) { |
| printf("device is not ab mode\n"); |
| return -1; |
| } |
| |
| boot_info_open_partition(miscbuf); |
| boot_info_load(&info, miscbuf); |
| |
| if (!boot_info_validate(&info)) { |
| printf("boot-info is invalid. Resetting.\n"); |
| boot_info_reset(&info); |
| boot_info_save(&info, miscbuf); |
| } |
| |
| if (strcmp(argv[1], "a") == 0) { |
| setenv("active_slot", "_a"); |
| setenv("slot-suffixes", "0"); |
| setenv("boot_part", "boot_a"); |
| setenv("recovery_part", "recovery_a"); |
| printf("set active slot a\n"); |
| boot_info_set_active_slot(&info, 0); |
| } else if (strcmp(argv[1], "b") == 0) { |
| setenv("active_slot", "_b"); |
| setenv("slot-suffixes", "1"); |
| setenv("boot_part", "boot_b"); |
| setenv("recovery_part", "recovery_b"); |
| printf("set active slot b\n"); |
| boot_info_set_active_slot(&info, 1); |
| } else { |
| printf("error input slot\n"); |
| return -1; |
| } |
| |
| boot_info_save(&info, miscbuf); |
| |
| printf("info.roll_flag = %d\n", info.roll_flag); |
| |
| if (info.roll_flag == 1) { |
| printf("if null gpt, write dtb back when rollback\n"); |
| run_command("imgread dtb ${boot_part} ${dtb_mem_addr}", 0); |
| run_command("emmc dtb_write ${dtb_mem_addr} 0", 0); |
| } |
| |
| return 0; |
| } |
| |
| static int do_SetUpdateTries |
| (cmd_tbl_t *cmdtp, |
| int flag, |
| int argc, |
| char * const argv[]) |
| { |
| char miscbuf[MISCBUF_SIZE] = {0}; |
| AvbABData info; |
| int slot; |
| bool bootable_a, bootable_b; |
| int update_flag = 0; |
| |
| if (has_boot_slot == 0) { |
| printf("device is not ab mode\n"); |
| return -1; |
| } |
| |
| //unsupport update dt in boothal, update dt in uboot |
| run_command("update_dt;", 0); |
| |
| boot_info_open_partition(miscbuf); |
| boot_info_load(&info, miscbuf); |
| |
| if (!boot_info_validate(&info)) { |
| printf("boot-info is invalid. Resetting.\n"); |
| boot_info_reset(&info); |
| boot_info_save(&info, miscbuf); |
| } |
| |
| slot = get_active_slot(&info); |
| bootable_a = slot_is_bootable(&info.slots[0]); |
| bootable_b = slot_is_bootable(&info.slots[1]); |
| |
| if (slot == 0) { |
| if (bootable_a) { |
| if (info.slots[0].successful_boot == 0) { |
| info.slots[0].tries_remaining -= 1; |
| update_flag = 1; |
| } |
| } |
| } |
| |
| if (slot == 1) { |
| if (bootable_b) { |
| if (info.slots[1].successful_boot == 0) { |
| info.slots[1].tries_remaining -= 1; |
| update_flag = 1; |
| } |
| } |
| } |
| |
| if (update_flag == 1) |
| boot_info_save(&info, miscbuf); |
| |
| printf("%s info.roll_flag = %d\n", __func__, info.roll_flag); |
| if (info.roll_flag == 1) |
| setenv("rollback_flag", "1"); |
| |
| return 0; |
| } |
| |
| static int do_SetRollFlag |
| (cmd_tbl_t *cmdtp, |
| int flag, |
| int argc, |
| char * const argv[]) |
| { |
| char miscbuf[MISCBUF_SIZE] = {0}; |
| AvbABData info; |
| |
| if (has_boot_slot == 0) { |
| printf("device is not ab mode\n"); |
| return -1; |
| } |
| |
| boot_info_open_partition(miscbuf); |
| boot_info_load(&info, miscbuf); |
| |
| if (!boot_info_validate(&info)) { |
| printf("boot-info is invalid. Resetting.\n"); |
| return 0; |
| } |
| |
| if (strcmp(argv[1], "1") == 0) |
| info.roll_flag = 1; |
| else |
| info.roll_flag = 0; |
| |
| boot_info_save(&info, miscbuf); |
| |
| printf("set info.roll_flag = %d\n", info.roll_flag); |
| |
| return 0; |
| } |
| |
| static int do_Get_slot_state( |
| cmd_tbl_t *cmdtp, |
| int flag, |
| int argc, |
| char * const argv[]) |
| { |
| char miscbuf[MISCBUF_SIZE] = {0}; |
| AvbABData info; |
| |
| if (argc != 3) |
| return cmd_usage(cmdtp); |
| |
| if (has_boot_slot == 0) { |
| printf("device is not ab mode\n"); |
| return -1; |
| } |
| |
| boot_info_open_partition(miscbuf); |
| boot_info_load(&info, miscbuf); |
| |
| if (!boot_info_validate(&info)) { |
| printf("boot-info is invalid. Resetting.\n"); |
| boot_info_reset(&info); |
| boot_info_save(&info, miscbuf); |
| } |
| |
| if (strcmp(argv[2], "suc_stete") == 0) { |
| if (strcmp(argv[1], "a") == 0) { |
| if (info.slots[0].successful_boot == 1) |
| return 1; |
| else |
| return 0; |
| } |
| if (strcmp(argv[1], "b") == 0) { |
| if (info.slots[1].successful_boot == 1) |
| return 1; |
| else |
| return 0; |
| } |
| } |
| |
| if (strcmp(argv[2], "boot_state") == 0) { |
| if (strcmp(argv[1], "a") == 0) { |
| if (slot_is_bootable(&info.slots[0])) |
| return 1; |
| else |
| return 0; |
| } |
| if (strcmp(argv[1], "b") == 0) { |
| if (slot_is_bootable(&info.slots[1])) |
| return 1; |
| else |
| return 0; |
| } |
| } |
| |
| return -1; |
| } |
| |
| int do_GetSystemMode (cmd_tbl_t *cmdtp, int flag, int argc, char * const argv[]) |
| { |
| #ifdef CONFIG_SYSTEM_AS_ROOT |
| setenv("system_mode", "1"); |
| #else |
| setenv("system_mode", "0"); |
| #endif |
| |
| return 0; |
| } |
| |
| int do_GetAvbMode (cmd_tbl_t *cmdtp, int flag, int argc, char * const argv[]) |
| { |
| #ifdef CONFIG_AVB2 |
| setenv("avb2", "1"); |
| #else |
| setenv("avb2", "0"); |
| #endif |
| |
| return 0; |
| } |
| |
| int do_UpdateDt(cmd_tbl_t *cmdtp, int flag, int argc, char * const argv[]) |
| { |
| char *update_dt = getenv("update_dt"); |
| char *part_changed = getenv("part_changed"); |
| |
| printf("update_dt %s, part_changed: %s\n", update_dt, part_changed); |
| if (update_dt && (!strcmp(update_dt, "1"))) { |
| printf("write dtb\n"); |
| run_command("imgread dtb ${boot_part} ${dtb_mem_addr}", 0); |
| run_command("emmc dtb_write ${dtb_mem_addr} 0", 0); |
| |
| setenv("update_dt", "0"); |
| run_command("saveenv", 0); |
| |
| if (part_changed && (!strcmp(part_changed, "1"))) { |
| setenv("part_changed", "0"); |
| run_command("saveenv", 0); |
| |
| run_command("reset", 0); |
| } |
| } |
| return 0; |
| } |
| |
| #endif /* CONFIG_BOOTLOADER_CONTROL_BLOCK */ |
| |
| U_BOOT_CMD( |
| get_valid_slot, 2, 0, do_GetValidSlot, |
| "get_valid_slot", |
| "\nThis command will choose valid slot to boot up which saved in misc\n" |
| "partition by mark to decide whether execute command!\n" |
| "So you can execute command: get_valid_slot" |
| ); |
| |
| U_BOOT_CMD( |
| set_active_slot, 2, 1, do_SetActiveSlot, |
| "set_active_slot", |
| "\nThis command will set active slot\n" |
| "So you can execute command: set_active_slot a" |
| ); |
| |
| U_BOOT_CMD |
| (set_roll_flag, 2, 1, do_SetRollFlag, |
| "set_roll_flag", |
| "\nThis command will set active slot\n" |
| "So you can execute command: set_active_slot a" |
| ); |
| |
| U_BOOT_CMD |
| (update_tries, 2, 0, do_SetUpdateTries, |
| "update_tries", |
| "\nThis command will change tries_remaining in misc\n" |
| "So you can execute command: update_tries" |
| ); |
| |
| U_BOOT_CMD( |
| get_slot_state, 3, 2, do_Get_slot_state, |
| "get_slot_state a suc_stete", |
| "\nThis command will get slot state\n" |
| "you can run: get_slot_state a suc_stete/boot_state" |
| ); |
| |
| |
| U_BOOT_CMD( |
| get_system_as_root_mode, 1, 0, do_GetSystemMode, |
| "get_system_as_root_mode", |
| "\nThis command will get system_as_root_mode\n" |
| "So you can execute command: get_system_as_root_mode" |
| ); |
| |
| U_BOOT_CMD( |
| get_avb_mode, 1, 0, do_GetAvbMode, |
| "get_avb_mode", |
| "\nThis command will get avb mode\n" |
| "So you can execute command: get_avb_mode" |
| ); |
| |
| U_BOOT_CMD |
| (update_dt, 1, 0, do_UpdateDt, |
| "update_dt", |
| "\nThis command will update dt\n" |
| "So you can execute command: update_dt" |
| ); |
| |