diff options
author | Saksham Jain <saksham.jain@nxp.com> | 2016-03-23 16:24:44 +0530 |
---|---|---|
committer | York Sun <york.sun@nxp.com> | 2016-03-29 08:46:23 -0700 |
commit | c4666cf6954a28ade5a8550505d5bc25dc7f92d7 (patch) | |
tree | 5184777122a49b548bc89ca143f7a8a9df976d41 /include | |
parent | 2bfe4890856c94d939e193999dccdc75afc5c5bd (diff) |
SECURE BOOT: Halt execution when secure boot fail
In case of fatal failure during secure boot execution (e.g. header
not found), reset is asserted to stop execution. If the RESET_REQ
is not tied to HRESET, this allows the execution to continue.
Add esbh_halt() after the reset to make sure execution stops.
Signed-off-by: Aneesh Bansal <aneesh.bansal@nxp.com>
Signed-off-by: Saksham Jain <saksham.jain@nxp.com>
Reviewed-by: York Sun <york.sun@nxp.com>
Diffstat (limited to 'include')
-rw-r--r-- | include/fsl_validate.h | 3 |
1 files changed, 3 insertions, 0 deletions
diff --git a/include/fsl_validate.h b/include/fsl_validate.h index f812c1a1fd..ff6f6b7552 100644 --- a/include/fsl_validate.h +++ b/include/fsl_validate.h @@ -242,6 +242,9 @@ struct fsl_secboot_img_priv { uint32_t img_size; /* ESBC Image Size */ }; +int do_esbc_halt(cmd_tbl_t *cmdtp, int flag, int argc, + char * const argv[]); + int fsl_secboot_validate(uintptr_t haddr, char *arg_hash_str, uintptr_t img_loc); int fsl_secboot_blob_encap(cmd_tbl_t *cmdtp, int flag, int argc, |