summaryrefslogtreecommitdiffstats
path: root/update_verifier/include
diff options
context:
space:
mode:
authorTianjie Xu <xunchang@google.com>2018-09-21 07:54:57 +0200
committerandroid-build-merger <android-build-merger@google.com>2018-09-21 07:54:57 +0200
commit4c65ab54c1211362ce5f135be804d22866603b3f (patch)
tree953295f16c621146f623963000f345f9307814af /update_verifier/include
parentMerge "Move the parse of last_install to recovery-persist" (diff)
parentMerge "Refactor update_verifier into a class" (diff)
downloadandroid_bootable_recovery-4c65ab54c1211362ce5f135be804d22866603b3f.tar
android_bootable_recovery-4c65ab54c1211362ce5f135be804d22866603b3f.tar.gz
android_bootable_recovery-4c65ab54c1211362ce5f135be804d22866603b3f.tar.bz2
android_bootable_recovery-4c65ab54c1211362ce5f135be804d22866603b3f.tar.lz
android_bootable_recovery-4c65ab54c1211362ce5f135be804d22866603b3f.tar.xz
android_bootable_recovery-4c65ab54c1211362ce5f135be804d22866603b3f.tar.zst
android_bootable_recovery-4c65ab54c1211362ce5f135be804d22866603b3f.zip
Diffstat (limited to 'update_verifier/include')
-rw-r--r--update_verifier/include/update_verifier/update_verifier.h42
1 files changed, 35 insertions, 7 deletions
diff --git a/update_verifier/include/update_verifier/update_verifier.h b/update_verifier/include/update_verifier/update_verifier.h
index 534384e1d..bdfabed0c 100644
--- a/update_verifier/include/update_verifier/update_verifier.h
+++ b/update_verifier/include/update_verifier/update_verifier.h
@@ -16,17 +16,45 @@
#pragma once
+#include <map>
#include <string>
+#include <vector>
-int update_verifier(int argc, char** argv);
+#include "otautil/rangeset.h"
+
+// The update verifier performs verification upon the first boot to a new slot on A/B devices.
+// During the verification, it reads all the blocks in the care_map. And if a failure happens,
+// it rejects the current boot and triggers a fallback.
-// Returns true to indicate a passing verification (or the error should be ignored); Otherwise
-// returns false on fatal errors, where we should reject the current boot and trigger a fallback.
-// This function tries to process the care_map.txt as protobuf message; and falls back to use the
-// plain text format if the parse failed.
-//
// Note that update_verifier should be backward compatible to not reject care_map.txt from old
// releases, which could otherwise fail to boot into the new release. For example, we've changed
// the care_map format between N and O. An O update_verifier would fail to work with N care_map.txt.
// This could be a result of sideloading an O OTA while the device having a pending N update.
-bool verify_image(const std::string& care_map_name);
+int update_verifier(int argc, char** argv);
+
+// The UpdateVerifier parses the content in the care map, and continues to verify the
+// partitions by reading the cared blocks if there's no format error in the file. Otherwise,
+// it should skip the verification to avoid bricking the device.
+class UpdateVerifier {
+ public:
+ // This function tries to process the care_map.pb as protobuf message; and falls back to use
+ // care_map.txt if the pb format file doesn't exist. If the parsing succeeds, put the result of
+ // the pair <partition_name, ranges> into the |partition_map_|.
+ bool ParseCareMap(const std::string& file_name = "");
+
+ // Verifies the new boot by reading all the cared blocks for partitions in |partition_map_|.
+ bool VerifyPartitions();
+
+ private:
+ // Parses the legacy care_map.txt in plain text format.
+ bool ParseCareMapPlainText(const std::string& content);
+
+ // Finds all the dm-enabled partitions, and returns a map of <partition_name, block_device>.
+ std::map<std::string, std::string> FindDmPartitions();
+
+ // Returns true if we successfully read the blocks in |ranges| of the |dm_block_device|.
+ bool ReadBlocks(const std::string partition_name, const std::string& dm_block_device,
+ const RangeSet& ranges);
+
+ std::map<std::string, RangeSet> partition_map_;
+};