summaryrefslogtreecommitdiffstats
path: root/bootloader.h (follow)
Commit message (Collapse)AuthorAgeFilesLines
* resolve merge conflicts of ed4c49c to nyc-mr1-dev-plus-aospYabin Cui2016-06-211-0/+18
|\ | | | | | | Change-Id: I8788cc80473dc77bfa0cd2682f3acb6e17ac36df
| * Verify wipe package when wiping A/B device in recovery.Yabin Cui2016-06-211-0/+18
| | | | | | | | | | | | | | | | | | | | To increase the security of wiping A/B devices, let uncrypt write wipe package in misc partition. Then recovery verifies the wipe package before wiping the device. Bug: 29159185 Change-Id: I186691bab1928d3dc036bc5542abd64a81bc2168
* | Add bootloader_message_ab struct.Tao Bao2016-06-101-13/+58
| | | | | | | | | | | | | | | | | | | | | | | | | | Move A/B-specific fields, effectively slot_suffix as in this CL, out of bootloader_message struct. Those A/B-specific fields are expected to be managed by the A/B-bootloader or boot control HAL, which shouldn't be cleared by recovery or uncrypt. Round up the bootloader_message struct to 2-KiB. Round up the bootloader_message_ab struct to 4-KiB. Bug: 29193360 Change-Id: I5740a612456da6d4d3b00e49a202d8f689d32690
* | slot_metadata: add verity_corrupted fieldJeremy Compostella2016-05-231-1/+4
| | | | | | | | | | | | | | | | | | | | | | | | | | | | In rootfs context, the verity mode must be supplied by the bootloader to the kernel. This patch creates a new verity_corrupted field in the slot metadata structure to remind that this slot is corrupted from a dm-verity point of view. If the bootloader receives the "dm-verity device corrupted" reboot target, it should set this bit to 1. If this bit value is 1, the bootloader should set the veritymode to "eio". Change-Id: I9335a39d7d009200318c58c53a3139d542788a9b Signed-off-by: Jeremy Compostella <jeremy.compostella@intel.com>
* | Define the Bootloader Control A/B structureJeremy Compostella2016-04-061-1/+53
|/ | | | | | | | | Define the A/B structure for implementation using the misc partition as storage. The bootloader_control structure is designed to be put in the bootloader_message slot_suffix field. Change-Id: I158bdf3e69b3f327a1dde4c6eb1f907dbaf8939c Signed-off-by: Jeremy Compostella <jeremy.compostella@intel.com>
* Add slot_suffix field to struct bootloader_message.David Zeuthen2015-09-021-1/+9
| | | | | | This is needed by fs_mgr for certain A/B implementations. Change-Id: I7bb404d61198eb7a962c2b693911f5156745daae
* updater: Clean up char* with std::string.Tao Bao2015-08-061-8/+0
| | | | | | | So we can remove a few free()s. And also replace a few pointers with references. Change-Id: I4b6332216704f4f9ea4a044b8d4bb7aa42a7ef26
* add the functions for multi-stage packages to updaterDoug Zongker2013-11-271-1/+14
| | | | | | | | | | | | | | | In order to support multi-stage recovery packages, we add the set_stage() and get_stage() functions, which store a short string somewhere it can be accessed across invocations of recovery. We also add reboot_now() which updater can invoke to immediately reboot the device, without doing normal recovery cleanup. (It can also choose whether to boot off the boot or recovery partition.) If the stage string is of the form "#/#", recovery's UI will be augmented with a simple indicator of what stage you're in, so it doesn't look like a reboot loop. Change-Id: I62f7ff0bc802b549c9bcf3cc154a6bad99f94603
* turn recovery into a C++ binaryDoug Zongker2011-10-311-0/+8
| | | | Change-Id: I423a23581048d451d53eef46e5f5eac485b77555
* bump updater API version to 3; deprecate firmware update commandDoug Zongker2010-02-031-16/+0
| | | | | | | | | Remove support for the HTC-specific "firmware" update command and the corresponding edify function write_firmware_update(). This functionality is now done by an edify extension library that lives in vendor/htc. Change-Id: I80858951ff10ed8dfff98aefb796bef009e05efb
* save the recovery log from before HTC firmware updatesDoug Zongker2010-01-211-1/+8
| | | | | | | | | | | | | | When doing a firmware (radio or hboot) update on HTC devices, save the recovery log in block 1 of the cache partition, before the firmware image and the UI bitmaps. When we boot back into recovery after the firmware update to reformat the cache partition, copy that log out of cache before reformatting it and dump it into the current invocation's log. The practical upshot of all this is that we can see the log output from radio and hboot updates. Change-Id: Ie0e89566754c88f4bed6a90d8a0aa04047b01a27
* auto import from //depot/cupcake/@135843The Android Open Source Project2009-03-041-0/+59
|
* auto import from //depot/cupcake/@135843The Android Open Source Project2009-03-041-59/+0
|
* Initial ContributionThe Android Open Source Project2008-10-211-0/+59