blob: 665236c1d5f2f6d5a4c4d13dfb735e6e9f738fb3 [file] [log] [blame] [edit]
// SPDX-License-Identifier: (GPL-2.0+ OR MIT)
/*
* Copyright (c) 2019 Amlogic, Inc. All rights reserved.
*/
#include <common.h>
#include <command.h>
#include <env.h>
#include <malloc.h>
#ifdef CONFIG_AML_MTD
#include <linux/mtd/mtd.h>
#endif
#include <asm/byteorder.h>
#include <config.h>
#include <asm/amlogic/arch/io.h>
#include <amlogic/partition_table.h>
#include <amlogic/libavb/libavb.h>
#include <version.h>
#include <amlogic/storage.h>
#include <amlogic/emmc_partitions.h>
#ifdef CONFIG_UNIFY_BOOTLOADER
#include "cmd_bootctl_wrapper.h"
#endif
#include "cmd_bootctl_utils.h"
#include <amlogic/store_wrapper.h>
#ifdef CONFIG_BOOTLOADER_CONTROL_BLOCK
// Spaces used by misc partition are as below:
// 0 - 2K For bootloader_message
// 2K - 16K Used by Vendor's bootloader (the 2K - 4K range may be optionally used
// as bootloader_message_ab struct)
// 16K - 32K Used by uncrypt and recovery to store wipe_package for A/B devices
// 32K - 64K System space, used for miscellanious AOSP features. See below.
// Note that these offsets are admitted by bootloader,recovery and uncrypt, so they
// are not configurable without changing all of them.
#define BOOTLOADER_MESSAGE_OFFSET_IN_MISC 0
#define VENDOR_SPACE_OFFSET_IN_MISC 2 * 1024
#define WIPE_PACKAGE_OFFSET_IN_MISC 16 * 1024
#define SYSTEM_SPACE_OFFSET_IN_MISC 32 * 1024
#define SYSTEM_SPACE_SIZE_IN_MISC 32 * 1024
#define AB_METADATA_MISC_PARTITION_OFFSET 2048
#define MISCBUF_SIZE 2080
/* Bootloader Message (2-KiB)
*
* This structure describes the content of a block in flash
* that is used for recovery and the bootloader to talk to
* each other.
*
* The command field is updated by linux when it wants to
* reboot into recovery or to update radio or bootloader firmware.
* It is also updated by the bootloader when firmware update
* is complete (to boot into recovery for any final cleanup)
*
* The status field was used by the bootloader after the completion
* of an "update-radio" or "update-hboot" command, which has been
* deprecated since Froyo.
*
* The recovery field is only written by linux and used
* for the system to send a message to recovery or the
* other way around.
*
* The stage field is written by packages which restart themselves
* multiple times, so that the UI can reflect which invocation of the
* package it is. If the value is of the format "#/#" (eg, "1/3"),
* the UI will add a simple indicator of that status.
*
* We used to have slot_suffix field for A/B boot control metadata in
* this struct, which gets unintentionally cleared by recovery or
* uncrypt. Move it into struct bootloader_message_ab to avoid the
* issue.
*/
struct bootloader_message {
char command[32];
char status[32];
char recovery[768];
// The 'recovery' field used to be 1024 bytes. It has only ever
// been used to store the recovery command line, so 768 bytes
// should be plenty. We carve off the last 256 bytes to store the
// stage string (for multistage packages) and possible future
// expansion.
char stage[32];
// The 'reserved' field used to be 224 bytes when it was initially
// carved off from the 1024-byte recovery field. Bump it up to
// 1184-byte so that the entire bootloader_message struct rounds up
// to 2048-byte.
char reserved[1184];
};
/**
* The A/B-specific bootloader message structure (4-KiB).
*
* We separate A/B boot control metadata from the regular bootloader
* message struct and keep it here. Everything that's A/B-specific
* stays after struct bootloader_message, which should be managed by
* the A/B-bootloader or boot control HAL.
*
* The slot_suffix field is used for A/B implementations where the
* bootloader does not set the androidboot.ro.boot.slot_suffix kernel
* commandline parameter. This is used by fs_mgr to mount /system and
* other partitions with the slotselect flag set in fstab. A/B
* implementations are free to use all 32 bytes and may store private
* data past the first NUL-byte in this field. It is encouraged, but
* not mandatory, to use 'struct bootloader_control' described below.
*
* The update_channel field is used to store the Omaha update channel
* if update_engine is compiled with Omaha support.
*/
struct bootloader_message_ab {
struct bootloader_message message;
char slot_suffix[32];
char update_channel[128];
// Round up the entire struct to 4096-byte.
char reserved[1888];
};
#define BOOT_CTRL_MAGIC 0x42414342 /* Bootloader Control AB */
#define BOOT_CTRL_VERSION 1
typedef struct slot_metadata {
// Slot priority with 15 meaning highest priority, 1 lowest
// priority and 0 the slot is unbootable.
u8 priority : 4;
// Number of times left attempting to boot this slot.
u8 tries_remaining : 3;
// 1 if this slot has booted successfully, 0 otherwise.
u8 successful_boot : 1;
// 1 if this slot is corrupted from a dm-verity corruption, 0
// otherwise.
u8 verity_corrupted : 1;
// Reserved for further use.
u8 reserved : 7;
} slot_metadata;
/* Bootloader Control AB
*
* This struct can be used to manage A/B metadata. It is designed to
* be put in the 'slot_suffix' field of the 'bootloader_message'
* structure described above. It is encouraged to use the
* 'bootloader_control' structure to store the A/B metadata, but not
* mandatory.
*/
typedef struct bootloader_control {
// NUL terminated active slot suffix.
char slot_suffix[4];
// Bootloader Control AB magic number (see BOOT_CTRL_MAGIC).
u32 magic;
// Version of struct being used (see BOOT_CTRL_VERSION).
u8 version;
// Number of slots being managed.
u8 nb_slot : 3;
// Number of times left attempting to boot recovery.
u8 recovery_tries_remaining : 3;
// Status of any pending snapshot merge of dynamic partitions.
u8 merge_status : 3;
// Ensure 4-bytes alignment for slot_info field.
u8 roll_flag;
// Per-slot information. Up to 4 slots.
struct slot_metadata slot_info[4];
// Reserved for further use.
u8 reserved1[8];
// CRC32 of all 28 bytes preceding this field (little endian
// format).
u32 crc32_le;
} bootloader_control;
#define MISC_VIRTUAL_AB_MESSAGE_VERSION 2
#define MISC_VIRTUAL_AB_MAGIC_HEADER 0x56740AB0
#ifndef CONFIG_UNIFY_BOOTLOADER
unsigned int kDefaultBootAttempts = 4;
#endif
/* Magic for the A/B struct when serialized. */
#define AVB_AB_MAGIC "\0AB0"
#define AVB_AB_MAGIC_LEN 4
/* Versioning for the on-disk A/B metadata - keep in sync with avbtool. */
#define AVB_AB_MAJOR_VERSION 1
#define AVB_AB_MINOR_VERSION 0
/* Size of AvbABData struct. */
#define AVB_AB_DATA_SIZE 32
/* Maximum values for slot data */
#define AVB_AB_MAX_PRIORITY 15
#define AVB_AB_MAX_TRIES_REMAINING 4
/* Struct used for recording per-slot metadata.
*
* When serialized, data is stored in network byte-order.
*/
typedef struct AvbABSlotData {
/* Slot priority. Valid values range from 0 to AVB_AB_MAX_PRIORITY,
* both inclusive with 1 being the lowest and AVB_AB_MAX_PRIORITY
* being the highest. The special value 0 is used to indicate the
* slot is unbootable.
*/
u8 priority;
/* Number of times left attempting to boot this slot ranging from 0
* to AVB_AB_MAX_TRIES_REMAINING.
*/
u8 tries_remaining;
/* Non-zero if this slot has booted successfully, 0 otherwise. */
u8 successful_boot;
/* Reserved for future use. */
u8 reserved[1];
} AvbABSlotData;
/* Struct used for recording A/B metadata.
*
* When serialized, data is stored in network byte-order.
*/
typedef struct AvbABData {
/* Magic number used for identification - see AVB_AB_MAGIC. */
u8 magic[AVB_AB_MAGIC_LEN];
/* Version of on-disk struct - see AVB_AB_{MAJOR,MINOR}_VERSION. */
u8 version_major;
u8 version_minor;
/* Padding to ensure |slots| field start eight bytes in. */
u8 roll_flag;
u8 reserved1[1];
/* Per-slot metadata. */
AvbABSlotData slots[2];
/* Reserved for future use. */
u8 reserved2[12];
/* CRC32 of all 28 bytes preceding this field. */
u32 crc32;
} AvbABData;
#ifdef CONFIG_UNIFY_BOOTLOADER
bootctl_func_handles avb_cmd_bootctrl_handles = {0};
#endif
static bool boot_info_validate_VAB(bootloader_control *info)
{
if (info->magic != BOOT_CTRL_MAGIC) {
printf("Magic 0x%x is incorrect.\n", info->magic);
return false;
}
return true;
}
static bool boot_info_validate(AvbABData *info)
{
if (memcmp(info->magic, AVB_AB_MAGIC, AVB_AB_MAGIC_LEN) != 0) {
printf("Magic %s is incorrect.\n", info->magic);
return false;
}
if (info->version_major > AVB_AB_MAJOR_VERSION) {
printf("No support for given major version.\n");
return false;
}
return true;
}
static void boot_info_reset(AvbABData *info)
{
memset(info, '\0', sizeof(AvbABData));
memcpy(info->magic, AVB_AB_MAGIC, AVB_AB_MAGIC_LEN);
info->version_major = AVB_AB_MAJOR_VERSION;
info->version_minor = AVB_AB_MINOR_VERSION;
info->slots[0].priority = AVB_AB_MAX_PRIORITY;
info->slots[0].tries_remaining = AVB_AB_MAX_TRIES_REMAINING;
info->slots[0].successful_boot = 1;
info->slots[1].priority = AVB_AB_MAX_PRIORITY - 1;
info->slots[1].tries_remaining = AVB_AB_MAX_TRIES_REMAINING;
info->slots[1].successful_boot = 0;
}
static void dump_boot_info(AvbABData *info)
{
#if 0
printf("info->magic = %s\n", info->magic);
printf("info->version_major = %d\n", info->version_major);
printf("info->version_minor = %d\n", info->version_minor);
printf("info->slots[0].priority = %d\n", info->slots[0].priority);
printf("info->slots[0].tries_remaining = %d\n", info->slots[0].tries_remaining);
printf("info->slots[0].successful_boot = %d\n", info->slots[0].successful_boot);
printf("info->slots[1].priority = %d\n", info->slots[1].priority);
printf("info->slots[1].tries_remaining = %d\n", info->slots[1].tries_remaining);
printf("info->slots[1].successful_boot = %d\n", info->slots[1].successful_boot);
printf("info->crc32 = %d\n", info->crc32);
#endif
}
void dump_boot_info_VAB(bootloader_control *boot_ctrl)
{
}
static bool slot_is_bootable_VAB(slot_metadata *slot)
{
return slot->tries_remaining != 0;
}
int get_active_slot_VAB(bootloader_control *info)
{
if (info->slot_info[0].priority > info->slot_info[1].priority) {
return 0;
} else if (info->slot_info[0].priority == info->slot_info[1].priority) {
if (info->slot_info[0].successful_boot == 1)
return 0;
else
return 1;
} else {
return 1;
}
}
static bool slot_is_bootable(AvbABSlotData *slot)
{
return slot->priority > 0 &&
(slot->successful_boot || (slot->tries_remaining > 0));
}
static int get_active_slot(AvbABData *info)
{
if (info->slots[0].priority > info->slots[1].priority)
return 0;
else
return 1;
}
static int boot_info_set_active_slot(AvbABData *info, int slot)
{
unsigned int other_slot_number;
/* Make requested slot top priority, unsuccessful, and with max tries. */
info->slots[slot].priority = AVB_AB_MAX_PRIORITY;
info->slots[slot].tries_remaining = AVB_AB_MAX_TRIES_REMAINING;
//info->slots[slot].successful_boot = 0;
/* Ensure other slot doesn't have as high a priority. */
other_slot_number = 1 - slot;
//info->slots[other_slot_number].priority -= 1;
if (info->slots[other_slot_number].priority == AVB_AB_MAX_PRIORITY)
info->slots[other_slot_number].priority = AVB_AB_MAX_PRIORITY - 1;
//dump_boot_info(info);
return 0;
}
bool boot_info_load_VAB(bootloader_control *out_info, char *miscbuf)
{
memcpy(out_info, miscbuf + AB_METADATA_MISC_PARTITION_OFFSET, sizeof(bootloader_control));
dump_boot_info_VAB(out_info);
return true;
}
static bool boot_info_load(AvbABData *out_info, char *miscbuf)
{
memcpy(out_info, miscbuf + AB_METADATA_MISC_PARTITION_OFFSET, AVB_AB_DATA_SIZE);
dump_boot_info(out_info);
return true;
}
static bool boot_info_save(AvbABData *info, char *miscbuf)
{
char *partition = "misc";
int ret = 0;
printf("save boot-info\n");
info->crc32 = avb_htobe32(avb_crc32((const uint8_t *)info,
sizeof(AvbABData) - sizeof(uint32_t)));
memcpy(miscbuf + AB_METADATA_MISC_PARTITION_OFFSET, info, AVB_AB_DATA_SIZE);
dump_boot_info(info);
#ifdef CONFIG_AML_MTD
enum boot_type_e device_boot_flag = store_get_type();
if (device_boot_flag == BOOT_NAND_NFTL || device_boot_flag == BOOT_NAND_MTD ||
device_boot_flag == BOOT_SNAND) {
int ret = 0;
ret = run_command("store erase misc 0 0x4000", 0);
if (ret != 0) {
printf("erase partition misc failed!\n");
return false;
}
}
#endif
ret = store_logic_write((const char *)partition, 0, MISCBUF_SIZE,
(unsigned char *)miscbuf);
if (ret) {
printf("store logic write failed at %s\n", partition);
return false;
}
return true;
}
static int write_bootloader(int copy, int dstindex)
{
int iRet = 0;
int ret = -1;
unsigned char *buffer = NULL;
int capacity_boot = 0;
#ifdef CONFIG_MMC_MESON_GX
struct mmc *mmc = NULL;
if (store_get_type() == BOOT_EMMC)
mmc = find_mmc_device(1);
if (mmc)
capacity_boot = mmc->capacity_boot;
#endif
printf("write_bootloader_capacity_boot: %x\n", capacity_boot);
buffer = (unsigned char *)malloc(capacity_boot);
if (!buffer) {
printf("ERROR! fail to allocate memory ...\n");
goto exit;
}
memset(buffer, 0, capacity_boot);
printf("copy from boot%d to boot%d\n", copy, dstindex);
iRet = store_boot_read("bootloader", copy, 0, buffer);
if (iRet) {
printf("Fail read bootloader from rsv with sz\n");
goto exit;
}
iRet = store_boot_write("bootloader", dstindex, 0, buffer);
if (iRet) {
printf("Failed to write bootloader\n");
goto exit;
} else {
ret = 0;
}
exit:
if (buffer) {
free(buffer);
buffer = NULL;
}
return ret;
}
static void update_after_failed_rollback(void)
{
run_command("run init_display; run storeargs; run update;", 0);
}
void rollback_failure_handler(void) __attribute__((weak, alias("update_after_failed_rollback")));
static int do_GetValidSlot
(cmd_tbl_t *cmdtp,
int flag,
int argc,
char * const argv[])
{
char miscbuf[MISCBUF_SIZE] = {0};
bootloader_control boot_ctrl;
AvbABData info;
int slot;
int AB_mode = 0;
bool bootable_a, bootable_b;
if (argc != 1)
return cmd_usage(cmdtp);
boot_info_open_partition(miscbuf);
boot_info_load(&info, miscbuf);
if (!boot_info_validate(&info)) {
printf("boot-info is invalid. Try VAB.\n");
boot_info_load_VAB(&boot_ctrl, miscbuf);
if (!boot_info_validate_VAB(&boot_ctrl)) {
printf("boot-info is invalid. Resetting.\n");
boot_info_reset(&info);
boot_info_save(&info, miscbuf);
} else {
printf("rollback from R\n");
AB_mode = 1;
}
}
if (AB_mode == 1) {
slot = get_active_slot_VAB(&boot_ctrl);
printf("active slot = %d\n", slot);
printf("boot_ctrl.roll_flag = %d\n", boot_ctrl.roll_flag);
bootable_a = slot_is_bootable_VAB(&boot_ctrl.slot_info[0]);
bootable_b = slot_is_bootable_VAB(&boot_ctrl.slot_info[1]);
boot_info_reset(&info);
boot_info_set_active_slot(&info, slot);
info.roll_flag = boot_ctrl.roll_flag;
boot_info_save(&info, miscbuf);
} else {
slot = get_active_slot(&info);
printf("active slot = %d\n", slot);
bootable_a = slot_is_bootable(&info.slots[0]);
bootable_b = slot_is_bootable(&info.slots[1]);
}
if (dynamic_partition)
env_set("partition_mode", "dynamic");
else
env_set("partition_mode", "normal");
if (vendor_boot_partition) {
env_set("vendor_boot_mode", "true");
printf("set vendor_boot_mode true\n");
} else {
env_set("vendor_boot_mode", "false");
printf("set vendor_boot_mode false\n");
}
if (slot == 0) {
if (bootable_a) {
if (has_boot_slot == 1) {
env_set("active_slot", "_a");
env_set("boot_part", "boot_a");
env_set("recovery_part", "recovery_a");
env_set("slot-suffixes", "0");
} else {
env_set("active_slot", "normal");
env_set("boot_part", "boot");
env_set("recovery_part", "recovery");
env_set("slot-suffixes", "-1");
}
return 0;
} else if (bootable_b) {
write_bootloader(2, 0);
info.roll_flag = 1;
boot_info_save(&info, miscbuf);
run_command("set_active_slot b", 0);
env_set("update_env", "1");
env_set("reboot_status", "reboot_next");
env_set("expect_index", "0");
run_command("saveenv", 0);
run_command("reset", 0);
} else {
rollback_failure_handler();
}
}
if (slot == 1) {
if (bootable_b) {
if (has_boot_slot == 1) {
env_set("active_slot", "_b");
env_set("boot_part", "boot_b");
env_set("recovery_part", "recovery_b");
env_set("slot-suffixes", "1");
} else {
env_set("active_slot", "normal");
env_set("boot_part", "boot");
env_set("recovery_part", "recovery");
env_set("slot-suffixes", "-1");
}
return 0;
} else if (bootable_a) {
write_bootloader(1, 0);
info.roll_flag = 1;
boot_info_save(&info, miscbuf);
run_command("set_active_slot a", 0);
env_set("update_env", "1");
env_set("reboot_status", "reboot_next");
env_set("expect_index", "0");
run_command("saveenv", 0);
run_command("reset", 0);
} else {
rollback_failure_handler();
}
}
return 0;
}
static int do_SetActiveSlot
(cmd_tbl_t *cmdtp,
int flag,
int argc,
char * const argv[])
{
char miscbuf[MISCBUF_SIZE] = {0};
AvbABData info;
if (argc != 2)
return cmd_usage(cmdtp);
if (has_boot_slot == 0) {
printf("device is not ab mode\n");
return -1;
}
boot_info_open_partition(miscbuf);
boot_info_load(&info, miscbuf);
if (!boot_info_validate(&info)) {
printf("boot-info is invalid. Resetting.\n");
boot_info_reset(&info);
boot_info_save(&info, miscbuf);
}
if (strcmp(argv[1], "a") == 0) {
env_set("active_slot", "_a");
env_set("slot-suffixes", "0");
env_set("boot_part", "boot_a");
env_set("recovery_part", "recovery_a");
printf("set active slot a\n");
boot_info_set_active_slot(&info, 0);
} else if (strcmp(argv[1], "b") == 0) {
env_set("active_slot", "_b");
env_set("slot-suffixes", "1");
env_set("boot_part", "boot_b");
env_set("recovery_part", "recovery_b");
printf("set active slot b\n");
boot_info_set_active_slot(&info, 1);
} else {
printf("error input slot\n");
return -1;
}
boot_info_save(&info, miscbuf);
printf("info.roll_flag = %d\n", info.roll_flag);
if (info.roll_flag == 1) {
if (run_command("imgread dtb ${boot_part} ${dtb_mem_addr}", 0)) {
printf("Fail in load dtb\n");
} else {
printf("write dtb back\n");
run_command("emmc dtb_write ${dtb_mem_addr} 0", 0);
}
}
return 0;
}
static int do_SetUpdateTries
(cmd_tbl_t *cmdtp,
int flag,
int argc,
char * const argv[])
{
char miscbuf[MISCBUF_SIZE] = {0};
AvbABData info;
int slot;
bool bootable_a, bootable_b;
int update_flag = 0;
if (has_boot_slot == 0) {
printf("device is not ab mode\n");
return -1;
}
boot_info_open_partition(miscbuf);
boot_info_load(&info, miscbuf);
if (!boot_info_validate(&info)) {
printf("boot-info is invalid. Resetting.\n");
boot_info_reset(&info);
boot_info_save(&info, miscbuf);
}
slot = get_active_slot(&info);
bootable_a = slot_is_bootable(&info.slots[0]);
bootable_b = slot_is_bootable(&info.slots[1]);
if (slot == 0) {
if (bootable_a) {
if (info.slots[0].successful_boot == 0) {
info.slots[0].tries_remaining -= 1;
update_flag = 1;
}
}
}
if (slot == 1) {
if (bootable_b) {
if (info.slots[1].successful_boot == 0) {
info.slots[1].tries_remaining -= 1;
update_flag = 1;
}
}
}
if (update_flag == 1)
boot_info_save(&info, miscbuf);
printf("%s info.roll_flag = %d\n", __func__, info.roll_flag);
if (info.roll_flag == 1)
env_set("rollback_flag", "1");
return 0;
}
static int do_SetRollFlag
(cmd_tbl_t *cmdtp,
int flag,
int argc,
char * const argv[])
{
char miscbuf[MISCBUF_SIZE] = {0};
AvbABData info;
if (has_boot_slot == 0) {
printf("device is not ab mode\n");
return -1;
}
boot_info_open_partition(miscbuf);
boot_info_load(&info, miscbuf);
if (!boot_info_validate(&info)) {
printf("boot-info is invalid. Resetting.\n");
return 0;
}
if (strcmp(argv[1], "1") == 0)
info.roll_flag = 1;
else
info.roll_flag = 0;
boot_info_save(&info, miscbuf);
printf("set info.roll_flag = %d\n", info.roll_flag);
return 0;
}
static int do_GetSystemMode(cmd_tbl_t *cmdtp, int flag, int argc, char * const argv[])
{
#ifdef CONFIG_SYSTEM_AS_ROOT
env_set("system_mode", "1");
#else
env_set("system_mode", "0");
#endif
return 0;
}
static int do_UpdateDt(cmd_tbl_t *cmdtp, int flag, int argc, char * const argv[])
{
char *update_dt = env_get("update_dt");
if (update_dt && (!strcmp(update_dt, "1"))) {
printf("write dtb from ${boot_part}\n");
run_command("imgread dtb ${boot_part} ${dtb_mem_addr}", 0);
run_command("emmc dtb_write ${dtb_mem_addr} 0", 0);
env_set("update_dt", "0");
#if CONFIG_IS_ENABLED(AML_UPDATE_ENV)
run_command("update_env_part -p update_dt;", 0);
#else
run_command("saveenv", 0);
#endif
char *part_changed = env_get("part_changed");
if (part_changed && (!strcmp(part_changed, "1"))) {
env_set("part_changed", "0");
#if CONFIG_IS_ENABLED(AML_UPDATE_ENV)
run_command("update_env_part -p part_changed;", 0);
#else
run_command("saveenv", 0);
#endif
run_command("reset", 0);
}
}
return 0;
}
#endif /* CONFIG_BOOTLOADER_CONTROL_BLOCK */
#ifdef CONFIG_UNIFY_BOOTLOADER
bootctl_func_handles *get_bootctl_cmd_func_avb(void)
{
avb_cmd_bootctrl_handles.do_GetValidSlot_func = do_GetValidSlot;
avb_cmd_bootctrl_handles.do_SetActiveSlot_func = do_SetActiveSlot;
avb_cmd_bootctrl_handles.do_SetRollFlag_func = do_SetRollFlag;
avb_cmd_bootctrl_handles.do_SetUpdateTries_func = do_SetUpdateTries;
avb_cmd_bootctrl_handles.do_GetSystemMode_func = do_GetSystemMode;
avb_cmd_bootctrl_handles.do_UpdateDt_func = do_UpdateDt;
return &avb_cmd_bootctrl_handles;
}
#else
U_BOOT_CMD
(get_valid_slot, 2, 0, do_GetValidSlot,
"get_valid_slot",
"\nThis command will choose valid slot to boot up which saved in misc\n"
"partition by mark to decide whether execute command!\n"
"So you can execute command: get_valid_slot"
);
U_BOOT_CMD
(set_active_slot, 2, 1, do_SetActiveSlot,
"set_active_slot",
"\nThis command will set active slot\n"
"So you can execute command: set_active_slot a"
);
U_BOOT_CMD
(set_roll_flag, 2, 1, do_SetRollFlag,
"set_roll_flag",
"\nThis command will set active slot\n"
"So you can execute command: set_active_slot a"
);
U_BOOT_CMD
(update_tries, 2, 0, do_SetUpdateTries,
"update_tries",
"\nThis command will change tries_remaining in misc\n"
"So you can execute command: update_tries"
);
U_BOOT_CMD
(get_system_as_root_mode, 1, 0, do_GetSystemMode,
"get_system_as_root_mode",
"\nThis command will get system_as_root_mode\n"
"So you can execute command: get_system_as_root_mode"
);
U_BOOT_CMD
(update_dt, 1, 0, do_UpdateDt,
"update_dt",
"\nThis command will update dt\n"
"So you can execute command: update_dt"
);
#endif
static int get_bootloader_message_block(char * miscbuf, int size, AvbABData *info) {
const char *misc_device = "misc";
printf("read misc for emmc device\n");
if (store_read(misc_device, 0, size, miscbuf) < 0) {
printf("Error opening %s\n", misc_device);
return -1;
}
memcpy(info, miscbuf + AB_METADATA_MISC_PARTITION_OFFSET, AVB_AB_DATA_SIZE);
if (!boot_info_validate(info)) {
printf("boot-info is invalid.\n");
return -1;
//boot_info_reset(&info);
}
dump_boot_info(info);
return 0;
}
int set_successful_boot(void) {
int ret = 0;
char miscbuf[MISCBUF_SIZE] = {0};
AvbABData info;
int slot = 0;
ret = get_bootloader_message_block(miscbuf, MISCBUF_SIZE, &info);
if (ret != 0) {
printf("get_bootloader_message failed!\n");
return -1;
}
if (info.slots[1].priority > info.slots[0].priority) {
printf("slot = 1\n");
slot = 1;
}
if (info.slots[slot].successful_boot) {
printf("info.slots[%d].successful_boot\n", slot);
return 0;
}
return -1;
}