diff options
author | Saksham Jain <saksham.jain@nxp.com> | 2016-03-23 16:24:44 +0530 |
---|---|---|
committer | York Sun <york.sun@nxp.com> | 2016-03-29 08:46:23 -0700 |
commit | c4666cf6954a28ade5a8550505d5bc25dc7f92d7 (patch) | |
tree | 5184777122a49b548bc89ca143f7a8a9df976d41 /board/freescale/common/cmd_esbc_validate.c | |
parent | 2bfe4890856c94d939e193999dccdc75afc5c5bd (diff) | |
download | talos-obmc-uboot-c4666cf6954a28ade5a8550505d5bc25dc7f92d7.tar.gz talos-obmc-uboot-c4666cf6954a28ade5a8550505d5bc25dc7f92d7.zip |
SECURE BOOT: Halt execution when secure boot fail
In case of fatal failure during secure boot execution (e.g. header
not found), reset is asserted to stop execution. If the RESET_REQ
is not tied to HRESET, this allows the execution to continue.
Add esbh_halt() after the reset to make sure execution stops.
Signed-off-by: Aneesh Bansal <aneesh.bansal@nxp.com>
Signed-off-by: Saksham Jain <saksham.jain@nxp.com>
Reviewed-by: York Sun <york.sun@nxp.com>
Diffstat (limited to 'board/freescale/common/cmd_esbc_validate.c')
-rw-r--r-- | board/freescale/common/cmd_esbc_validate.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/board/freescale/common/cmd_esbc_validate.c b/board/freescale/common/cmd_esbc_validate.c index dfa3e2100e..375bc24968 100644 --- a/board/freescale/common/cmd_esbc_validate.c +++ b/board/freescale/common/cmd_esbc_validate.c @@ -8,7 +8,7 @@ #include <command.h> #include <fsl_validate.h> -static int do_esbc_halt(cmd_tbl_t *cmdtp, int flag, int argc, +int do_esbc_halt(cmd_tbl_t *cmdtp, int flag, int argc, char * const argv[]) { if (fsl_check_boot_mode_secure() == 0) { |