aboutsummaryrefslogtreecommitdiff
path: root/src/security/vboot/vboot_common.h
diff options
context:
space:
mode:
authordnojiri <dnojiri@chromium.org>2020-04-03 10:56:43 -0700
committerJulius Werner <jwerner@chromium.org>2020-04-17 22:01:48 +0000
commitdff56a056c7dadf0d970cfe29f0bc9c1fec69e82 (patch)
treef45288b8377774613b0a3deffe689dcd64977af7 /src/security/vboot/vboot_common.h
parent622c6b84ab029a366dd09740a24d36ae9fad697f (diff)
ec_sync: Run EFS2 in romstage
EFS2 allows EC RO to enable PD for special cases. When doing so, it sets NO_BOOT flag to avoid booting the OS. AP needs to get NO_BOOT flag from Cr50 and enforce that. This patch makes verstage get a boot mode and a mirrored hash stored in kernel secdata from Cr50. This patch also makes romstage write an expected EC hash (a.k.a. Hexp) to Cr50 (if there is an update). BUG=b:147298634, chromium:1045217, b:148259137 BRANCH=none TEST=Verify software sync succeeds on Puff. Signed-off-by: dnojiri <dnojiri@chromium.org> Change-Id: I1f387b6e920205b9cc4c8536561f2a279c36413d Reviewed-on: https://review.coreboot.org/c/coreboot/+/40389 Tested-by: build bot (Jenkins) <no-reply@coreboot.org> Reviewed-by: Julius Werner <jwerner@chromium.org>
Diffstat (limited to 'src/security/vboot/vboot_common.h')
-rw-r--r--src/security/vboot/vboot_common.h1
1 files changed, 0 insertions, 1 deletions
diff --git a/src/security/vboot/vboot_common.h b/src/security/vboot/vboot_common.h
index 50995e6c04..f25ee46b6f 100644
--- a/src/security/vboot/vboot_common.h
+++ b/src/security/vboot/vboot_common.h
@@ -61,7 +61,6 @@ static inline void vboot_run_logic(void) {}
static inline int vboot_locate_cbfs(struct region_device *rdev) { return -1; }
#endif
-void vboot_save_nvdata_only(struct vb2_context *ctx);
void vboot_save_data(struct vb2_context *ctx);
/*