summaryrefslogtreecommitdiffstats
path: root/bootloader.h (unfollow)
Commit message (Collapse)AuthorFilesLines
2016-10-18Create bootloader_message static library.Yabin Cui1-155/+2
bootloader_messages merges bootloader_message_writer and bootloader.cpp, so we can use the same library to manage bootloader_message in normal boot and recovery mode. Bug: 29582118 Change-Id: I9efdf776ef8f02b53911ff43a518e035e0c29618 (cherry picked from commit 2f272c0551f984e83bc5abaf240e0dddb38a3326)
2016-06-30Create bootloader_message static library.Yabin Cui1-73/+2
bootloader_messages merges bootloader_message_writer and bootloader.cpp, so we can use the same library to manage bootloader_message in normal boot and recovery mode. Bug: 29582118 Change-Id: I9efdf776ef8f02b53911ff43a518e035e0c29618
2016-06-21Verify wipe package when wiping A/B device in recovery.Yabin Cui1-0/+18
To increase the security of wiping A/B devices, let uncrypt write wipe package in misc partition. Then recovery verifies the wipe package before wiping the device. Bug: 29159185 Change-Id: I186691bab1928d3dc036bc5542abd64a81bc2168
2016-06-10Add bootloader_message_ab struct.Tao Bao1-13/+58
Move A/B-specific fields, effectively slot_suffix as in this CL, out of bootloader_message struct. Those A/B-specific fields are expected to be managed by the A/B-bootloader or boot control HAL, which shouldn't be cleared by recovery or uncrypt. Round up the bootloader_message struct to 2-KiB. Round up the bootloader_message_ab struct to 4-KiB. Bug: 29193360 Change-Id: I5740a612456da6d4d3b00e49a202d8f689d32690
2016-05-23slot_metadata: add verity_corrupted fieldJeremy Compostella1-1/+4
In rootfs context, the verity mode must be supplied by the bootloader to the kernel. This patch creates a new verity_corrupted field in the slot metadata structure to remind that this slot is corrupted from a dm-verity point of view. If the bootloader receives the "dm-verity device corrupted" reboot target, it should set this bit to 1. If this bit value is 1, the bootloader should set the veritymode to "eio". Change-Id: I9335a39d7d009200318c58c53a3139d542788a9b Signed-off-by: Jeremy Compostella <jeremy.compostella@intel.com>
2016-04-06Define the Bootloader Control A/B structureJeremy Compostella1-1/+53
Define the A/B structure for implementation using the misc partition as storage. The bootloader_control structure is designed to be put in the bootloader_message slot_suffix field. Change-Id: I158bdf3e69b3f327a1dde4c6eb1f907dbaf8939c Signed-off-by: Jeremy Compostella <jeremy.compostella@intel.com>
2015-11-16Add slot_suffix field to struct bootloader_message.David Zeuthen1-1/+9
This is needed by fs_mgr for certain A/B implementations. Change-Id: I7bb404d61198eb7a962c2b693911f5156745daae
2015-09-02Add slot_suffix field to struct bootloader_message.David Zeuthen1-1/+9
This is needed by fs_mgr for certain A/B implementations. Change-Id: I7bb404d61198eb7a962c2b693911f5156745daae
2015-08-06updater: Clean up char* with std::string.Tao Bao1-8/+0
So we can remove a few free()s. And also replace a few pointers with references. Change-Id: I4b6332216704f4f9ea4a044b8d4bb7aa42a7ef26
2015-05-18bootloader: align with AOSP codethat1-10/+1
- Define a minimal Volume structure so that AOSP code for handling /misc works in TWRP without major changes. - Remove set/get_bootloader_message_*_name Change-Id: Ifcee59568141a184adebb94b8ef8beca072a7942
2013-11-27add the functions for multi-stage packages to updaterDoug Zongker1-1/+14
In order to support multi-stage recovery packages, we add the set_stage() and get_stage() functions, which store a short string somewhere it can be accessed across invocations of recovery. We also add reboot_now() which updater can invoke to immediately reboot the device, without doing normal recovery cleanup. (It can also choose whether to boot off the boot or recovery partition.) If the stage string is of the form "#/#", recovery's UI will be augmented with a simple indicator of what stage you're in, so it doesn't look like a reboot loop. Change-Id: I62f7ff0bc802b549c9bcf3cc154a6bad99f94603
2013-04-08Fix handling of AOSP recovery commandsDees_Troy1-0/+2
2013-04-04Move all AOSP code out of recovery binaryDees_Troy1-0/+3
Improves license compatibility between GPL and Apache Change-Id: I2b165aa575bb6213af6b07936f99610c113443f0
2011-10-31turn recovery into a C++ binaryDoug Zongker1-0/+8
Change-Id: I423a23581048d451d53eef46e5f5eac485b77555
2011-10-28turn recovery into a C++ binaryDoug Zongker1-0/+8
Change-Id: I68a67a4c8edec9a74463b3d4766005ce27b51316
2010-02-03bump updater API version to 3; deprecate firmware update commandDoug Zongker1-16/+0
Remove support for the HTC-specific "firmware" update command and the corresponding edify function write_firmware_update(). This functionality is now done by an edify extension library that lives in vendor/htc. Change-Id: I80858951ff10ed8dfff98aefb796bef009e05efb
2010-01-21save the recovery log from before HTC firmware updatesDoug Zongker1-1/+8
When doing a firmware (radio or hboot) update on HTC devices, save the recovery log in block 1 of the cache partition, before the firmware image and the UI bitmaps. When we boot back into recovery after the firmware update to reformat the cache partition, copy that log out of cache before reformatting it and dump it into the current invocation's log. The practical upshot of all this is that we can see the log output from radio and hboot updates. Change-Id: Ie0e89566754c88f4bed6a90d8a0aa04047b01a27
2009-03-04auto import from //depot/cupcake/@135843The Android Open Source Project1-0/+59
2009-03-04auto import from //depot/cupcake/@135843The Android Open Source Project1-59/+0