summaryrefslogtreecommitdiff
path: root/firmware/2lib/include/2return_codes.h
diff options
context:
space:
mode:
authorDaisuke Nojiri <dnojiri@chromium.org>2019-10-22 15:37:14 -0700
committerCommit Bot <commit-bot@chromium.org>2020-03-05 02:40:39 +0000
commit5059062dd352e3864fb68f8a061e87bd7055d12a (patch)
treee2897970757ee3337d1c2e9cc506084e0d382709 /firmware/2lib/include/2return_codes.h
parent1b4affa3650261efa2684a6e551030291fe00590 (diff)
downloadvboot-5059062dd352e3864fb68f8a061e87bd7055d12a.tar.gz
EFS: Implement EFS2 and NO_BOOT mode
EFS v1 allowed Chromeboxes to verify RW without AP. EFS v2 will bring the benefts to Chromebooks, which are: - Reduce RO dependency and presence. Allow more code to be updated in the fields. - Remove jumptag and workarounds needed for late sysjump. Major imporvements over v1 are: - No A/B slot required. - No signature in RW or public key in RO. - Rollback-attack protection. For battery-equipped devices, additional benefts are: - Immediate boot on drained battery. - Support recovery mode regardless of battery condition. - Faster charge in S5/G3. EC-Cr50 communication is based on the shared UART (go/ec-cr50-comm). EFS2 is documented in go/ec-efs2. BUG=chromium:1020578,chromium:1045217 TEST=Boot Helios in NORMAL/RECOVERY/NO_BOOT mode. TEST=Verify EC is updated by software sync in Depthcharge. Signed-off-by: Daisuke Nojiri <dnojiri@chromium.org> Change-Id: Ie07e6f6ce46c0955a6a0adf595633e65c4ffe724 Reviewed-on: https://chromium-review.googlesource.com/c/chromiumos/platform/vboot_reference/+/1901868
Diffstat (limited to 'firmware/2lib/include/2return_codes.h')
-rw-r--r--firmware/2lib/include/2return_codes.h3
1 files changed, 3 insertions, 0 deletions
diff --git a/firmware/2lib/include/2return_codes.h b/firmware/2lib/include/2return_codes.h
index 5e5e5266..79b1a122 100644
--- a/firmware/2lib/include/2return_codes.h
+++ b/firmware/2lib/include/2return_codes.h
@@ -630,6 +630,9 @@ enum vb2_return_code {
/* Problem with workbuf validity (see vb2api_init and vb2api_reinit) */
VB2_ERROR_WORKBUF_INVALID,
+ /* Escape from NO_BOOT mode is detected. */
+ VB2_ERROR_ESCAPE_NO_BOOT,
+
/**********************************************************************
* API-level errors
*/