summaryrefslogtreecommitdiff
path: root/include
diff options
context:
space:
mode:
authorSaksham Jain <saksham.jain@nxp.com>2016-03-23 16:24:44 +0530
committerYork Sun <york.sun@nxp.com>2016-03-29 08:46:23 -0700
commitc4666cf6954a28ade5a8550505d5bc25dc7f92d7 (patch)
tree5184777122a49b548bc89ca143f7a8a9df976d41 /include
parent2bfe4890856c94d939e193999dccdc75afc5c5bd (diff)
SECURE BOOT: Halt execution when secure boot fail
In case of fatal failure during secure boot execution (e.g. header not found), reset is asserted to stop execution. If the RESET_REQ is not tied to HRESET, this allows the execution to continue. Add esbh_halt() after the reset to make sure execution stops. Signed-off-by: Aneesh Bansal <aneesh.bansal@nxp.com> Signed-off-by: Saksham Jain <saksham.jain@nxp.com> Reviewed-by: York Sun <york.sun@nxp.com>
Diffstat (limited to 'include')
-rw-r--r--include/fsl_validate.h3
1 files changed, 3 insertions, 0 deletions
diff --git a/include/fsl_validate.h b/include/fsl_validate.h
index f812c1a1fd..ff6f6b7552 100644
--- a/include/fsl_validate.h
+++ b/include/fsl_validate.h
@@ -242,6 +242,9 @@ struct fsl_secboot_img_priv {
uint32_t img_size; /* ESBC Image Size */
};
+int do_esbc_halt(cmd_tbl_t *cmdtp, int flag, int argc,
+ char * const argv[]);
+
int fsl_secboot_validate(uintptr_t haddr, char *arg_hash_str,
uintptr_t img_loc);
int fsl_secboot_blob_encap(cmd_tbl_t *cmdtp, int flag, int argc,