From e2f6270f2da844d598555702d3af4f2e3fae3f9f Mon Sep 17 00:00:00 2001 From: Igor Opaniuk Date: Fri, 9 Feb 2024 20:20:45 +0100 Subject: [PATCH] doc: android: avb: sync usage details Sync usage info with the one cmd/avb.c. Signed-off-by: Igor Opaniuk Reviewed-by: Mattijs Korpershoek Link: https://lore.kernel.org/r/20240209192045.3961832-8-igor.opaniuk@foundries.io Signed-off-by: Mattijs Korpershoek --- doc/android/avb2.rst | 16 +++++++++++----- 1 file changed, 11 insertions(+), 5 deletions(-) diff --git a/doc/android/avb2.rst b/doc/android/avb2.rst index a072119574..4aca7a5c66 100644 --- a/doc/android/avb2.rst +++ b/doc/android/avb2.rst @@ -38,16 +38,22 @@ AVB 2.0 U-Boot shell commands Provides CLI interface to invoke AVB 2.0 verification + misc. commands for different testing purposes:: - avb init - initialize avb 2.0 for - avb verify - run verification process using hash data from vbmeta structure + avb init - initialize avb 2 for avb read_rb - read rollback index at location avb write_rb - write rollback index to avb is_unlocked - returns unlock status of the device - avb get_uuid - read and print uuid of partition + avb get_uuid - read and print uuid of partition avb read_part - read bytes from - partition to buffer + partition to buffer + avb read_part_hex - read bytes from + partition and print to stdout avb write_part - write bytes to - by using data from + by using data from + avb read_pvalue - read a persistent value + avb write_pvalue - write a persistent value + avb verify [slot_suffix] - run verification process using hash data + from vbmeta structure + [slot_suffix] - _a, _b, etc (if vbmeta partition is slotted) Partitions tampering (example) ------------------------------ -- 2.39.5