
From: Ruchika Gupta ruchika.gupta@nxp.com
Make secure boot validation available without using command.
Signed-off-by: Ruchika Gupta ruchika.gupta@nxp.com Signed-off-by: York Sun york.sun@nxp.com ---
board/freescale/common/Makefile | 5 ++++- board/freescale/common/fsl_validate.c | 6 ++++-- 2 files changed, 8 insertions(+), 3 deletions(-)
diff --git a/board/freescale/common/Makefile b/board/freescale/common/Makefile index 1c53fb6..fb2025d 100644 --- a/board/freescale/common/Makefile +++ b/board/freescale/common/Makefile @@ -75,7 +75,10 @@ obj-$(CONFIG_TARGET_P5040DS) += p_corenet/ obj-$(CONFIG_LAYERSCAPE_NS_ACCESS) += ns_access.o
ifdef CONFIG_SECURE_BOOT -obj-$(CONFIG_CMD_ESBC_VALIDATE) += fsl_validate.o cmd_esbc_validate.o +ifndef CONFIG_SPL_BUILD +obj-$(CONFIG_CMD_ESBC_VALIDATE) += cmd_esbc_validate.o +endif +obj-y += fsl_validate.o endif obj-$(CONFIG_CHAIN_OF_TRUST) += fsl_chain_of_trust.o
diff --git a/board/freescale/common/fsl_validate.c b/board/freescale/common/fsl_validate.c index ed48c5c..86baecc 100644 --- a/board/freescale/common/fsl_validate.c +++ b/board/freescale/common/fsl_validate.c @@ -351,7 +351,8 @@ static void fsl_secboot_header_verification_failure(void) printf("Generating reset request\n"); do_reset(NULL, 0, 0, NULL); /* If reset doesn't coocur, halt execution */ - do_esbc_halt(NULL, 0, 0, NULL); + while (1) + ; }
/* @@ -373,7 +374,8 @@ static void fsl_secboot_image_verification_failure(void) printf("Generating reset request\n"); do_reset(NULL, 0, 0, NULL); /* If reset doesn't coocur, halt execution */ - do_esbc_halt(NULL, 0, 0, NULL); + while (1) + ;
} else { set_sec_mon_state(HPSR_SSM_ST_NON_SECURE);