aboutsummaryrefslogtreecommitdiff
path: root/resources/depthcharge
diff options
context:
space:
mode:
authorPaul Kocialkowski <contact@paulk.fr>2016-12-23 14:13:48 +0100
committerLeah Rowe <info@minifree.org>2017-01-15 14:24:40 +0000
commit3d08effb91acf985bae9c4eb4386937ce7ed92a9 (patch)
tree9d890b07e4abf2f885cf9c494a9103bf4b96d891 /resources/depthcharge
parent0698cb38d1e26495c953f01daf9604551b6ed7d5 (diff)
downloadlibrebootfr-3d08effb91acf985bae9c4eb4386937ce7ed92a9.tar.gz
librebootfr-3d08effb91acf985bae9c4eb4386937ce7ed92a9.zip
Current build system removal
Signed-off-by: Paul Kocialkowski <contact@paulk.fr>
Diffstat (limited to 'resources/depthcharge')
-rw-r--r--resources/depthcharge/patch/0001-arm-armv7-a-march-abi-flag-for-ARMv7-hardware.patch30
-rw-r--r--resources/depthcharge/patch/0002-Coreboot-image-integration-removal.patch33
-rw-r--r--resources/depthcharge/patch/0003-DOTCONFIG-location-correction.patch29
-rw-r--r--resources/depthcharge/patch/0004-Adaptation-for-a-read-only-boot-path-when-no-vboot-h.patch132
-rw-r--r--resources/depthcharge/patch/0005-vboot-Only-initialize-cparams-once.patch34
-rw-r--r--resources/depthcharge/patch/0006-Proper-firmware-index-report-for-read-only-boot-path.patch70
-rw-r--r--resources/depthcharge/patch/0007-fdt-nonvolatile-context-storage-report-to-mkbp-for-E.patch30
-rw-r--r--resources/depthcharge/patch/0008-vboot-Display-callbacks-for-developer-and-recovery-m.patch251
8 files changed, 0 insertions, 609 deletions
diff --git a/resources/depthcharge/patch/0001-arm-armv7-a-march-abi-flag-for-ARMv7-hardware.patch b/resources/depthcharge/patch/0001-arm-armv7-a-march-abi-flag-for-ARMv7-hardware.patch
deleted file mode 100644
index d99a574d..00000000
--- a/resources/depthcharge/patch/0001-arm-armv7-a-march-abi-flag-for-ARMv7-hardware.patch
+++ /dev/null
@@ -1,30 +0,0 @@
-From 80e3428c2e50b5a6838d71a89007f610eda5e2dc Mon Sep 17 00:00:00 2001
-From: Paul Kocialkowski <contact@paulk.fr>
-Date: Mon, 3 Aug 2015 14:39:42 +0200
-Subject: [PATCH 1/8] arm: armv7-a march abi flag for ARMv7 hardware
-
-Specifying the march is required to get depthcharge to build with e.g. the arm
-toolchain built by coreboot's crossgcc script. Without this flag, the toolchain
-will complain that some ARM mrc/mcr ASM instructions are not defined.
-
-Signed-off-by: Paul Kocialkowski <contact@paulk.fr>
----
- src/arch/arm/build_vars | 2 +-
- 1 file changed, 1 insertion(+), 1 deletion(-)
-
-diff --git a/src/arch/arm/build_vars b/src/arch/arm/build_vars
-index b2fce32..455e370 100644
---- a/src/arch/arm/build_vars
-+++ b/src/arch/arm/build_vars
-@@ -17,7 +17,7 @@
-
- VB_FIRMWARE_ARCH=arm
- ifeq ($(CONFIG_ARCH_ARM_V7),y)
--ARCH_ABI_FLAGS += -mthumb
-+ARCH_ABI_FLAGS += -mthumb -march=armv7-a
- endif
-
- ifeq ($(CONFIG_ARCH_ARM_V8),y)
---
-2.8.0
-
diff --git a/resources/depthcharge/patch/0002-Coreboot-image-integration-removal.patch b/resources/depthcharge/patch/0002-Coreboot-image-integration-removal.patch
deleted file mode 100644
index 611be4ff..00000000
--- a/resources/depthcharge/patch/0002-Coreboot-image-integration-removal.patch
+++ /dev/null
@@ -1,33 +0,0 @@
-From f095d901afe02728fb0471d51e02553036cd2538 Mon Sep 17 00:00:00 2001
-From: Paul Kocialkowski <contact@paulk.fr>
-Date: Mon, 3 Aug 2015 14:49:34 +0200
-Subject: [PATCH 2/8] Coreboot image integration removal
-
-There is no need to integrate the built depthcharge binary inside a coreboot
-image right after building it, coreboot will handle this on its own.
-
-Signed-off-by: Paul Kocialkowski <contact@paulk.fr>
----
- src/Makefile.inc | 6 ------
- 1 file changed, 6 deletions(-)
-
-diff --git a/src/Makefile.inc b/src/Makefile.inc
-index a73785b..564dd13 100644
---- a/src/Makefile.inc
-+++ b/src/Makefile.inc
-@@ -77,12 +77,6 @@ $(eval $(call declare_bin,$1,$2 $$$$(VB_LIB),$3))
-
- $1.payload: $1.elf
- @printf " PAYLOAD $$(subst $$(obj)/,,$$@)\n"
-- $$(Q)-rm -f $1.rom $1.bb
-- $$(Q)dd if=/dev/zero of=$1.bb bs=512 count=1
-- $$(Q)cbfstool $1.rom create -m $$(ARCH) -s 1024K -B $1.bb
-- $$(Q)cbfstool $1.rom add-payload -f $$< -n dc.elf -c lzma
-- $$(Q)cbfstool $1.rom extract -n dc.elf -f $$@
-- $$(Q)rm -f $1.rom $1.bb
-
- $(notdir $1)_unified: $1.bin $1.payload
- PHONY += $(notdir $1)_unified
---
-2.8.0
-
diff --git a/resources/depthcharge/patch/0003-DOTCONFIG-location-correction.patch b/resources/depthcharge/patch/0003-DOTCONFIG-location-correction.patch
deleted file mode 100644
index d4b6ae98..00000000
--- a/resources/depthcharge/patch/0003-DOTCONFIG-location-correction.patch
+++ /dev/null
@@ -1,29 +0,0 @@
-From dfdcd8c218215df4e1523bf6dd11270bc4f52605 Mon Sep 17 00:00:00 2001
-From: Paul Kocialkowski <contact@paulk.fr>
-Date: Sun, 9 Aug 2015 12:06:28 +0200
-Subject: [PATCH 3/8] DOTCONFIG location correction
-
-The configuration file doesn't have to be in src and HAVE_DOTCONFIG holds its
-current location.
-
-Signed-off-by: Paul Kocialkowski <contact@paulk.fr>
----
- Makefile | 2 +-
- 1 file changed, 1 insertion(+), 1 deletion(-)
-
-diff --git a/Makefile b/Makefile
-index a1a9d33..13305cd 100644
---- a/Makefile
-+++ b/Makefile
-@@ -73,7 +73,7 @@ all: help
-
- else
-
--include $(src)/.config
-+include $(HAVE_DOTCONFIG)
-
- ifeq ($(CONFIG_ARCH_X86),y)
- ARCH = x86
---
-2.8.0
-
diff --git a/resources/depthcharge/patch/0004-Adaptation-for-a-read-only-boot-path-when-no-vboot-h.patch b/resources/depthcharge/patch/0004-Adaptation-for-a-read-only-boot-path-when-no-vboot-h.patch
deleted file mode 100644
index ed491a4c..00000000
--- a/resources/depthcharge/patch/0004-Adaptation-for-a-read-only-boot-path-when-no-vboot-h.patch
+++ /dev/null
@@ -1,132 +0,0 @@
-From 0ec9edead1d9de5f913333e6aa77bcd3de83a617 Mon Sep 17 00:00:00 2001
-From: Paul Kocialkowski <contact@paulk.fr>
-Date: Sun, 9 Aug 2015 12:09:35 +0200
-Subject: [PATCH 4/8] Adaptation for a read-only boot path when no vboot
- handoff data is found
-
-When no vboot handoff data is found, this makes the unified depthcharge build
-attempt to follow the read-only boot path.
-
-vboot_select_firmware is called to grab the kernel key from the firmware header,
-but it won't actually jump to a RW version of depthcharge.
-
-Signed-off-by: Paul Kocialkowski <contact@paulk.fr>
----
- src/image/Makefile.inc | 1 +
- src/image/startrw_stub.c | 34 ++++++++++++++++++++++++++++++++++
- src/vboot/main.c | 17 ++++++++++++++++-
- src/vboot/util/commonparams-unified.c | 11 +++++++++--
- 4 files changed, 60 insertions(+), 3 deletions(-)
- create mode 100644 src/image/startrw_stub.c
-
-diff --git a/src/image/Makefile.inc b/src/image/Makefile.inc
-index 95aeda1..4b74c11 100644
---- a/src/image/Makefile.inc
-+++ b/src/image/Makefile.inc
-@@ -18,6 +18,7 @@
- depthcharge-y += fmap.c
- depthcharge-y += index.c
- readonly-y += startrw.c
-+unified-y += startrw_stub.c
-
- trampoline-y += load_elf.c
-
-diff --git a/src/image/startrw_stub.c b/src/image/startrw_stub.c
-new file mode 100644
-index 0000000..8e40302
---- /dev/null
-+++ b/src/image/startrw_stub.c
-@@ -0,0 +1,34 @@
-+/*
-+ * Copyright 2012 Google Inc.
-+ *
-+ * See file CREDITS for list of people who contributed to this
-+ * project.
-+ *
-+ * This program is free software; you can redistribute it and/or
-+ * modify it under the terms of the GNU General Public License as
-+ * published by the Free Software Foundation; either version 2 of
-+ * the License, or (at your option) any later version.
-+ *
-+ * This program is distributed in the hope that it will be useful,
-+ * but without any warranty; without even the implied warranty of
-+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
-+ * GNU General Public License for more details.
-+ *
-+ * You should have received a copy of the GNU General Public License
-+ * along with this program; if not, write to the Free Software
-+ * Foundation, Inc., 59 Temple Place, Suite 330, Boston,
-+ * MA 02111-1307 USA
-+ */
-+
-+#include <libpayload.h>
-+#include <lzma.h>
-+
-+#include "base/elf.h"
-+#include "image/enter_trampoline.h"
-+#include "image/startrw.h"
-+#include "image/symbols.h"
-+
-+int start_rw_firmware(const void *compressed_image, uint32_t size)
-+{
-+ return 0;
-+}
-diff --git a/src/vboot/main.c b/src/vboot/main.c
-index 7dc05f5..97a218d 100644
---- a/src/vboot/main.c
-+++ b/src/vboot/main.c
-@@ -82,6 +82,20 @@ static int vboot_init_handoff()
- return vboot_do_init_out_flags(vboot_handoff->init_params.out_flags);
- }
-
-+static int vboot_init_ro()
-+{
-+ // Set up the common param structure, clearing shared data.
-+ if (common_params_init(1))
-+ return 1;
-+
-+ // Initialize vboot.
-+ if (vboot_init())
-+ return 1;
-+
-+ // Select firmware.
-+ return vboot_select_firmware();
-+}
-+
- int main(void)
- {
- // Let the world know we're alive.
-@@ -108,7 +122,8 @@ int main(void)
-
- // Set up the common param structure, not clearing shared data.
- if (vboot_init_handoff())
-- halt();
-+ if (vboot_init_ro())
-+ halt();
-
- /* Fastboot is only entered in recovery path */
- if (vboot_in_recovery())
-diff --git a/src/vboot/util/commonparams-unified.c b/src/vboot/util/commonparams-unified.c
-index 10fcb93..575dcfd 100644
---- a/src/vboot/util/commonparams-unified.c
-+++ b/src/vboot/util/commonparams-unified.c
-@@ -28,7 +28,14 @@
- int find_common_params(void **blob, int *size)
- {
- struct vboot_handoff *vboot_handoff = lib_sysinfo.vboot_handoff;
-- *blob = &vboot_handoff->shared_data[0];
-- *size = ARRAY_SIZE(vboot_handoff->shared_data);
-+
-+ if (vboot_handoff != NULL) {
-+ *blob = &vboot_handoff->shared_data[0];
-+ *size = ARRAY_SIZE(vboot_handoff->shared_data);
-+ } else {
-+ *blob = shared_data_blob;
-+ *size = sizeof(shared_data_blob);
-+ }
-+
- return 0;
- }
---
-2.8.0
-
diff --git a/resources/depthcharge/patch/0005-vboot-Only-initialize-cparams-once.patch b/resources/depthcharge/patch/0005-vboot-Only-initialize-cparams-once.patch
deleted file mode 100644
index 8bc56a73..00000000
--- a/resources/depthcharge/patch/0005-vboot-Only-initialize-cparams-once.patch
+++ /dev/null
@@ -1,34 +0,0 @@
-From 40668e8b5fb9a9e07a3b1ddf334bd4e12a38525f Mon Sep 17 00:00:00 2001
-From: Paul Kocialkowski <contact@paulk.fr>
-Date: Mon, 18 Apr 2016 11:14:19 +0200
-Subject: [PATCH 5/8] vboot: Only initialize cparams once
-
-Calling common_params_init multiple times in a row results in emptying cparams
-each time, causing the GBB data to be lost as it is only read once (the first
-time).
-
-Signed-off-by: Paul Kocialkowski <contact@paulk.fr>
----
- src/vboot/util/commonparams.c | 6 ++++--
- 1 file changed, 4 insertions(+), 2 deletions(-)
-
-diff --git a/src/vboot/util/commonparams.c b/src/vboot/util/commonparams.c
-index 9f29473..3a71a8b 100644
---- a/src/vboot/util/commonparams.c
-+++ b/src/vboot/util/commonparams.c
-@@ -159,8 +159,10 @@ int is_cparams_initialized(void)
- int common_params_init(int clear_shared_data)
- {
- // Set up the common param structure.
-- memset(&cparams, 0, sizeof(cparams));
-- cparams_initialized = 1;
-+ if (!is_cparams_initialized()) {
-+ memset(&cparams, 0, sizeof(cparams));
-+ cparams_initialized = 1;
-+ }
-
- if (gbb_init())
- return 1;
---
-2.8.0
-
diff --git a/resources/depthcharge/patch/0006-Proper-firmware-index-report-for-read-only-boot-path.patch b/resources/depthcharge/patch/0006-Proper-firmware-index-report-for-read-only-boot-path.patch
deleted file mode 100644
index 7692ff2b..00000000
--- a/resources/depthcharge/patch/0006-Proper-firmware-index-report-for-read-only-boot-path.patch
+++ /dev/null
@@ -1,70 +0,0 @@
-From 8acd4854603672dd1bc16900c9eb58dd5c8c342d Mon Sep 17 00:00:00 2001
-From: Paul Kocialkowski <contact@paulk.fr>
-Date: Mon, 10 Aug 2015 20:24:50 +0200
-Subject: [PATCH 6/8] Proper firmware index report for read-only boot path
-
-When booting from a read-only boot path, the active firmware to report is RO.
-This is detected with the lack of a vboot handoff pointer.
-
-Signed-off-by: Paul Kocialkowski <contact@paulk.fr>
----
- src/vboot/crossystem/fdt.c | 2 +-
- src/vboot/firmware_id.c | 6 +++++-
- src/vboot/firmware_id.h | 1 +
- 3 files changed, 7 insertions(+), 2 deletions(-)
-
-diff --git a/src/vboot/crossystem/fdt.c b/src/vboot/crossystem/fdt.c
-index ca39dac..a79b192 100644
---- a/src/vboot/crossystem/fdt.c
-+++ b/src/vboot/crossystem/fdt.c
-@@ -73,7 +73,7 @@ static int install_crossystem_data(DeviceTreeFixup *fixup, DeviceTree *tree)
- nvstorage_flash_get_blob_size());
- }
-
-- int fw_index = vdat->firmware_index;
-+ int fw_index = get_active_fw_index(vdat);
- const char *fwid;
- int fwid_size;
-
-diff --git a/src/vboot/firmware_id.c b/src/vboot/firmware_id.c
-index 3662921..955bc84 100644
---- a/src/vboot/firmware_id.c
-+++ b/src/vboot/firmware_id.c
-@@ -36,6 +36,7 @@ static struct fwid {
- } fw_fmap_ops[] = {
- {VDAT_RW_A, "RW_FWID_A", NULL, 0, "RW A: ID NOT FOUND"},
- {VDAT_RW_B, "RW_FWID_B", NULL, 0, "RW B: ID NOT FOUND"},
-+ {VDAT_RO, "RO_FRID", NULL, 0, "RO: ID NOT FOUND"},
- {VDAT_RECOVERY, "RO_FRID", NULL, 0, "RO: ID NOT FOUND"},
- };
-
-@@ -130,10 +131,13 @@ static VbSharedDataHeader *get_vdat(void)
- return NULL;
- }
-
--static inline int get_active_fw_index(VbSharedDataHeader *vdat)
-+int get_active_fw_index(VbSharedDataHeader *vdat)
- {
- int fw_index = VDAT_UNKNOWN;
-
-+ if (lib_sysinfo.vboot_handoff == NULL)
-+ return VDAT_RO;
-+
- if (vdat)
- fw_index = vdat->firmware_index;
-
-diff --git a/src/vboot/firmware_id.h b/src/vboot/firmware_id.h
-index fb6f206..090e9d1 100644
---- a/src/vboot/firmware_id.h
-+++ b/src/vboot/firmware_id.h
-@@ -49,6 +49,7 @@ int get_rwb_fw_size(void);
- * Get firmware details for currently active fw type. It looks up vdat,
- * identifies fw_index and returns appropriate id and size for that index.
- */
-+int get_active_fw_index(VbSharedDataHeader *vdat);
- const char *get_active_fw_id(void);
- int get_active_fw_size(void);
-
---
-2.8.0
-
diff --git a/resources/depthcharge/patch/0007-fdt-nonvolatile-context-storage-report-to-mkbp-for-E.patch b/resources/depthcharge/patch/0007-fdt-nonvolatile-context-storage-report-to-mkbp-for-E.patch
deleted file mode 100644
index bfbe96b8..00000000
--- a/resources/depthcharge/patch/0007-fdt-nonvolatile-context-storage-report-to-mkbp-for-E.patch
+++ /dev/null
@@ -1,30 +0,0 @@
-From ff08bf3966b3c299d6ead9707cc17a71ff9e50c7 Mon Sep 17 00:00:00 2001
-From: Paul Kocialkowski <contact@paulk.fr>
-Date: Mon, 10 Aug 2015 20:30:14 +0200
-Subject: [PATCH 7/8] fdt: nonvolatile-context-storage report to mkbp for EC NV
- storage
-
-This allows old versions of crossystem to detect that it should use mosys to
-access NV storage in case it is stored on the EC.
-
-Signed-off-by: Paul Kocialkowski <contact@paulk.fr>
----
- src/vboot/crossystem/fdt.c | 2 +-
- 1 file changed, 1 insertion(+), 1 deletion(-)
-
-diff --git a/src/vboot/crossystem/fdt.c b/src/vboot/crossystem/fdt.c
-index a79b192..0487513 100644
---- a/src/vboot/crossystem/fdt.c
-+++ b/src/vboot/crossystem/fdt.c
-@@ -56,7 +56,7 @@ static int install_crossystem_data(DeviceTreeFixup *fixup, DeviceTree *tree)
- dt_add_string_prop(node, "nonvolatile-context-storage","nvram");
- } else if (CONFIG_NV_STORAGE_CROS_EC) {
- dt_add_string_prop(node,
-- "nonvolatile-context-storage", "cros-ec");
-+ "nonvolatile-context-storage", "mkbp");
- } else if (CONFIG_NV_STORAGE_DISK) {
- dt_add_string_prop(node, "nonvolatile-context-storage", "disk");
- dt_add_u32_prop(node, "nonvolatile-context-lba",
---
-2.8.0
-
diff --git a/resources/depthcharge/patch/0008-vboot-Display-callbacks-for-developer-and-recovery-m.patch b/resources/depthcharge/patch/0008-vboot-Display-callbacks-for-developer-and-recovery-m.patch
deleted file mode 100644
index cacc3ecd..00000000
--- a/resources/depthcharge/patch/0008-vboot-Display-callbacks-for-developer-and-recovery-m.patch
+++ /dev/null
@@ -1,251 +0,0 @@
-From 50a27cb948d3e944e3e466146b0d81939e8ce9a5 Mon Sep 17 00:00:00 2001
-From: Paul Kocialkowski <contact@paulk.fr>
-Date: Tue, 11 Aug 2015 11:22:54 +0200
-Subject: [PATCH 8/8] vboot: Display callbacks for developer and recovery mode
- screens
-
-We don't want to use bitmaps stored in GBB since they recommend the use of non-
-free software (Chrome OS), so this implements a text-based interface instead.
-
-Signed-off-by: Paul Kocialkowski <contact@paulk.fr>
----
- src/vboot/callbacks/display.c | 200 ++++++++++++++++++++++++++++++++++++++----
- 1 file changed, 185 insertions(+), 15 deletions(-)
-
-diff --git a/src/vboot/callbacks/display.c b/src/vboot/callbacks/display.c
-index 183e278..ece9140 100644
---- a/src/vboot/callbacks/display.c
-+++ b/src/vboot/callbacks/display.c
-@@ -86,12 +86,19 @@ void print_on_center(const char *msg)
- print_string(msg);
- }
-
--VbError_t VbExDisplayScreen(uint32_t screen_type, uint32_t locale)
-+VbError_t VbExDisplayScreen(uint32_t screen_type, VbNvContext *vnc,
-+ uint32_t locale)
- {
-- const char *msg = NULL;
--
-- if (vboot_draw_screen(screen_type, locale) == CBGFX_SUCCESS)
-- return VBERROR_SUCCESS;
-+ unsigned int rows, cols;
-+ uint32_t default_boot = 0;
-+ uint32_t boot_signed_only = 0;
-+ uint32_t boot_usb = 0;
-+ uint32_t boot_legacy = 0;
-+ const char *fw_id;
-+ int fw_index;
-+ void *blob = NULL;
-+ int size = 0;
-+ char *msg;
-
- /*
- * Show the debug messages for development. It is a backup method
-@@ -103,31 +110,194 @@ VbError_t VbExDisplayScreen(uint32_t screen_type, uint32_t locale)
- video_console_clear();
- break;
- case VB_SCREEN_DEVELOPER_WARNING:
-- msg = "developer mode warning";
-+ video_console_clear();
-+ video_console_set_cursor(0, 0);
-+
-+ if (vnc != NULL) {
-+ VbNvGet(vnc, VBNV_DEV_BOOT_SIGNED_ONLY,
-+ &boot_signed_only);
-+
-+ VbNvGet(vnc, VBNV_DEV_BOOT_USB, &boot_usb);
-+ VbNvGet(vnc, VBNV_DEV_BOOT_LEGACY, &boot_legacy);
-+
-+ VbNvGet(vnc, VBNV_DEV_DEFAULT_BOOT, &default_boot);
-+ }
-+
-+ print_string(
-+ "Welcome to developer mode!\n\n"
-+ "Useful key combinations:\n"
-+ "- Ctrl + H: Hold developer mode\n"
-+ "- Ctrl + D: Boot from internal storage\n");
-+
-+ if (boot_usb)
-+ print_string("- Ctrl + U: Boot from external media\n");
-+
-+ if (boot_legacy)
-+ print_string("- Ctrl + L: Boot from legacy payload\n");
-+
-+ print_string(
-+ "- Ctrl + I: Show device information\n"
-+ "- Space: Disable developer mode\n\n"
-+ "This screen is shown for 3 seconds (if not held)."
-+ "\n\n");
-+
-+ if (vnc != NULL) {
-+ if (!boot_signed_only)
-+ print_string(
-+ "Warning: this device will boot kernels"
-+ " without verifying their signature!"
-+ "\n");
-+
-+ if (boot_usb)
-+ print_string(
-+ "Warning: this device will boot from "
-+ "external media!\n");
-+
-+ if (boot_legacy)
-+ print_string(
-+ "Warning: this device will boot legacy "
-+ "payloads!\n");
-+
-+ if (!boot_signed_only || boot_usb)
-+ print_string("\n");
-+
-+ print_string("Default boot medium: ");
-+
-+ switch (default_boot) {
-+ case VBNV_DEV_DEFAULT_BOOT_DISK:
-+ print_string("internal storage");
-+ break;
-+ case VBNV_DEV_DEFAULT_BOOT_USB:
-+ print_string("external media");
-+ break;
-+ case VBNV_DEV_DEFAULT_BOOT_LEGACY:
-+ print_string("legacy payload");
-+ break;
-+ default:
-+ print_string("unknown");
-+ break;
-+ }
-+
-+ print_string("\n");
-+ }
-+
-+ find_common_params(&blob, &size);
-+
-+ if (blob != NULL) {
-+ VbSharedDataHeader *vdat = (VbSharedDataHeader *) blob;
-+ fw_index = get_active_fw_index(vdat);
-+ fw_id = get_fw_id(fw_index);
-+
-+ if (fw_id == NULL)
-+ fw_id = "NOT FOUND";
-+
-+ print_string("Active firmware id: ");
-+ print_string(fw_id);
-+
-+ switch (fw_index) {
-+ case VDAT_RW_A:
-+ print_string(" (RW A)\n");
-+ break;
-+ case VDAT_RW_B:
-+ print_string(" (RW A)\n");
-+ break;
-+ case VDAT_RO:
-+ print_string(" (RO)\n");
-+ break;
-+ default:
-+ print_string(" (UNKNOWN)\n");
-+ break;
-+ }
-+ }
- break;
- case VB_SCREEN_DEVELOPER_EGG:
-- msg = "easter egg";
-+ video_console_clear();
-+ print_on_center("Free as in Freedom!");
- break;
- case VB_SCREEN_RECOVERY_REMOVE:
-- msg = "remove inserted devices";
-+ video_console_clear();
-+ print_on_center(
-+ "Please remove any external media before accessing "
-+ "recovery screen.");
- break;
- case VB_SCREEN_RECOVERY_INSERT:
-- msg = "insert recovery image";
-- break;
- case VB_SCREEN_RECOVERY_NO_GOOD:
-- msg = "insert image invalid";
-+ video_console_clear();
-+ print_string(
-+ "Welcome to recovery mode!\n\n"
-+ "Useful key combinations:\n"
-+ "- Ctrl + D: Enable developer mode (if possible)\n\n");
-+
-+ if (screen_type == VB_SCREEN_RECOVERY_NO_GOOD)
-+ print_on_center(
-+ "Invalid recovery media, please instert a "
-+ "valid one.");
-+ else
-+ print_on_center(
-+ "Please insert an external recovery media.");
-+ break;
-+ case VB_SCREEN_RECOVERY_TO_DEV:
-+ video_console_clear();
-+ video_get_rows_cols(&rows, &cols);
-+
-+ video_console_set_cursor(0, 0);
-+
-+ print_string(
-+ "Enabling developer mode will allow booting unsigned "
-+ "kernels and booting from external media (when enabled "
-+ "with crossystem).\n\n"
-+ "Developer mode can be disabled via the developer mode "
-+ "screen.");
-+
-+ msg = "Developer mode will be enabled.";
-+ video_console_set_cursor((cols - strlen(msg)) / 2, rows / 2);
-+ print_string(msg);
-+
-+ msg = "Press enter to confirm or escape to go back.";
-+ video_console_set_cursor((cols - strlen(msg)) / 2,
-+ rows / 2 + 2);
-+ print_string(msg);
-+ break;
-+ case VB_SCREEN_DEVELOPER_TO_NORM:
-+ video_console_clear();
-+ video_get_rows_cols(&rows, &cols);
-+
-+ video_console_set_cursor(0, 0);
-+
-+ print_string(
-+ "Disabling developer mode will restrict boot to signed "
-+ "kernels stored on internal memory only.\n\n"
-+ "Developer mode can be enabled again via the recovery "
-+ "mode screen.");
-+
-+ msg = "Developer mode will be disabled.";
-+ video_console_set_cursor((cols - strlen(msg)) / 2, rows / 2);
-+ print_string(msg);
-+
-+ msg = "Press enter to confirm or escape to go back.";
-+ video_console_set_cursor((cols - strlen(msg)) / 2,
-+ rows / 2 + 2);
-+ print_string(msg);
- break;
- case VB_SCREEN_WAIT:
-- msg = "wait for ec update";
-+ video_console_clear();
-+ print_on_center("Waiting for EC update...");
-+ break;
-+ case VB_SCREEN_TO_NORM_CONFIRMED:
-+ video_console_clear();
-+ print_on_center("Disabling developer mode.");
-+ break;
-+ case VB_SCREEN_OS_BROKEN:
-+ video_console_clear();
-+ print_on_center(
-+ "Something went wrong and the device cannot boot.\n"
-+ "Press Escape + Refresh + Power to access recovery.");
- break;
- default:
- printf("Not a valid screen type: %d.\n", screen_type);
- return VBERROR_INVALID_SCREEN_INDEX;
- }
-
-- if (msg)
-- print_on_center(msg);
--
- return VBERROR_SUCCESS;
- }
-
---
-2.8.0
-