summaryrefslogtreecommitdiff
path: root/firmware/2lib/include/2secdata_struct.h
diff options
context:
space:
mode:
authorMichał Żygowski <miczyg94@gmail.com>2023-04-11 15:03:15 +0200
committerChromeos LUCI <chromeos-scoped@luci-project-accounts.iam.gserviceaccount.com>2023-04-12 03:23:51 +0000
commitb76cd8c806a47ca42b4df67b547a1d3fb0093a22 (patch)
treecd8145e11fe98517acec4a46a9e6817862ac8332 /firmware/2lib/include/2secdata_struct.h
parent3edb610af0cd614901c0beb671e0784a8468c533 (diff)
downloadvboot-b76cd8c806a47ca42b4df67b547a1d3fb0093a22.tar.gz
firmware/2lib: Expose vb2_clear_recovery as vb2api
For ChromeOS platform the recovery reason is cleared in vb2api_kernel_phase2 which is probably not called by any non-ChromeOS system. It results in the platform being stuck in recovery mode, e.g. when RW firmware verification fails. Even if the RW partition is flashed with correctly signed image, the persistent non-zero recovery reason will prevent vboot from attempting the RW partition check. Expose vb2_clear_recovery as vb2api to let non-ChromeOS coreboot platform to clear the recovery reason when needed. TEST=Clear the recovery reason in mainboard_final function right before payload jump when RW partition is corrupted and RW partition is valid. In case it is corrupted, the platform stays in recovery mode, when valid the platform boots from RW partition. Tested on MSI PRO Z690-A DDR4. Change-Id: Ic2946150c404fc8e2d50d07d0746b2e42f7cbcde Signed-off-by: Michał Żygowski <miczyg94@gmail.com> Reviewed-on: https://chromium-review.googlesource.com/c/chromiumos/platform/vboot_reference/+/4414956 Reviewed-by: Julius Werner <jwerner@chromium.org> Commit-Queue: Julius Werner <jwerner@chromium.org> Tested-by: Julius Werner <jwerner@chromium.org>
Diffstat (limited to 'firmware/2lib/include/2secdata_struct.h')
0 files changed, 0 insertions, 0 deletions