summaryrefslogtreecommitdiff
path: root/boot/bootmeth_android.c
diff options
context:
space:
mode:
authorTom Rini <[email protected]>2025-01-24 08:48:48 -0600
committerTom Rini <[email protected]>2025-01-24 08:48:48 -0600
commit8fcb7a883231ac573a2e3ee0a44dee07b463cbc3 (patch)
tree47629e69be71ac6244fb834e6205aaccd49f1324 /boot/bootmeth_android.c
parentf409054d6a5281b9be08ac5653c17ec81b60d897 (diff)
parent6745cbed6edc06fae7fbc4b360e39c3963d57b13 (diff)
Merge tag 'u-boot-dfu-20250124' of https://source.denx.de/u-boot/custodians/u-boot-dfu
CI: https://source.denx.de/u-boot/custodians/u-boot-dfu/-/pipelines/24323 Android: - Fix kcmdline null pointer dereference (reported by coverity and multiple users) - Move Igor to reviewers instead of maintainers for avb/ab - Fix booting Android with AVB built-in, but disabled via fastboot flash --disable-verity vbmeta vbmeta.img
Diffstat (limited to 'boot/bootmeth_android.c')
-rw-r--r--boot/bootmeth_android.c39
1 files changed, 25 insertions, 14 deletions
diff --git a/boot/bootmeth_android.c b/boot/bootmeth_android.c
index d8c92b44a99..a5a86b29d7f 100644
--- a/boot/bootmeth_android.c
+++ b/boot/bootmeth_android.c
@@ -422,7 +422,7 @@ static int run_avb_verification(struct bootflow *bflow)
{
struct blk_desc *desc = dev_get_uclass_plat(bflow->blk);
struct android_priv *priv = bflow->bootmeth_priv;
- const char * const requested_partitions[] = {"boot", "vendor_boot"};
+ const char * const requested_partitions[] = {"boot", "vendor_boot", NULL};
struct AvbOps *avb_ops;
AvbSlotVerifyResult result;
AvbSlotVerifyData *out_data;
@@ -450,17 +450,26 @@ static int run_avb_verification(struct bootflow *bflow)
AVB_HASHTREE_ERROR_MODE_RESTART_AND_INVALIDATE,
&out_data);
- if (result != AVB_SLOT_VERIFY_RESULT_OK) {
- printf("Verification failed, reason: %s\n",
- str_avb_slot_error(result));
- avb_slot_verify_data_free(out_data);
- return log_msg_ret("avb verify", -EIO);
- }
-
- if (unlocked)
- boot_state = AVB_ORANGE;
- else
+ if (!unlocked) {
+ /* When device is locked, we only accept AVB_SLOT_VERIFY_RESULT_OK */
+ if (result != AVB_SLOT_VERIFY_RESULT_OK) {
+ printf("Verification failed, reason: %s\n",
+ str_avb_slot_error(result));
+ avb_slot_verify_data_free(out_data);
+ return log_msg_ret("avb verify", -EIO);
+ }
boot_state = AVB_GREEN;
+ } else {
+ /* When device is unlocked, we also accept verification errors */
+ if (result != AVB_SLOT_VERIFY_RESULT_OK &&
+ result != AVB_SLOT_VERIFY_RESULT_ERROR_VERIFICATION) {
+ printf("Unlocked verification failed, reason: %s\n",
+ str_avb_slot_error(result));
+ avb_slot_verify_data_free(out_data);
+ return log_msg_ret("avb verify unlocked", -EIO);
+ }
+ boot_state = AVB_ORANGE;
+ }
extra_args = avb_set_state(avb_ops, boot_state);
if (extra_args) {
@@ -470,9 +479,11 @@ static int run_avb_verification(struct bootflow *bflow)
goto free_out_data;
}
- ret = avb_append_commandline(bflow, out_data->cmdline);
- if (ret < 0)
- goto free_out_data;
+ if (result == AVB_SLOT_VERIFY_RESULT_OK) {
+ ret = avb_append_commandline(bflow, out_data->cmdline);
+ if (ret < 0)
+ goto free_out_data;
+ }
return 0;