[PATCH v2 4/6] cmd: bcb: introduce 'ab_dump' command to print BCB block content
Simon Glass
sjg at chromium.org
Thu Sep 12 03:00:57 CEST 2024
On Wed, 11 Sept 2024 at 15:49, Dmitry Rokosov
<ddrokosov at salutedevices.com> wrote:
>
> It's really helpful to have the ability to dump BCB block for debugging
> A/B logic on the board supported this partition schema.
>
> Command 'bcb ab_dump' prints all fields of bootloader_control struct
> including slot_metadata for all presented slots.
>
> Output example:
> =====
> > board# bcb ab_dump ubi 0#misc
> > Read 512 bytes from volume misc to 000000000bf07580
> > Read 512 bytes from volume misc to 000000000bf42f40
> > Bootloader Control: [misc]
> > Active Slot: _a
> > Magic Number: 0x42414342
> > Version: 1
> > Number of Slots: 2
> > Recovery Tries Remaining: 0
> > CRC: 0x2c8b50bc (Valid)
> >
> > Slot[0] Metadata:
> > - Priority: 15
> > - Tries Remaining: 0
> > - Successful Boot: 1
> > - Verity Corrupted: 0
> >
> > Slot[1] Metadata:
> > - Priority: 14
> > - Tries Remaining: 7
> > - Successful Boot: 0
> > - Verity Corrupted: 0
> ====
>
> Signed-off-by: Dmitry Rokosov <ddrokosov at salutedevices.com>
> ---
> boot/android_ab.c | 68 ++++++++++++++++++++++++++++++++++++++++++++
> cmd/bcb.c | 35 +++++++++++++++++++++++
> include/android_ab.h | 10 +++++++
> 3 files changed, 113 insertions(+)
Reviewed-by: Simon Glass <sjg at chromium.org>
More information about the U-Boot
mailing list