summaryrefslogtreecommitdiff
path: root/firmware
diff options
context:
space:
mode:
authorBill Richardson <wfrichar@chromium.org>2012-08-28 17:04:40 -0700
committerGerrit <chrome-bot@google.com>2012-08-28 18:42:20 -0700
commite0c55a3238f41ce30d6d592725670766355bed67 (patch)
tree00674d949e3cfb113ee1be8ca634b122fa046be3 /firmware
parent9dc62178c97b94e5c308f1c36fd0858c316959e5 (diff)
downloadvboot-e0c55a3238f41ce30d6d592725670766355bed67.tar.gz
Declare VbExProtectFlash() in vboot_api.h so we can implement it.
We have to define the function we need here, so that we can implement it in U-Boot, then we can come back here and try to use it. Grr. BUG=chrome-os-partner:11215 BRANCH=link TEST=none This just defines the function prototype. No change to test. Change-Id: I38a19baa54c59c9744d20f743eb53260f2d19852 Signed-off-by: Bill Richardson <wfrichar@chromium.org> Reviewed-on: https://gerrit.chromium.org/gerrit/31658 Reviewed-by: Randall Spangler <rspangler@chromium.org>
Diffstat (limited to 'firmware')
-rw-r--r--firmware/include/vboot_api.h8
1 files changed, 8 insertions, 0 deletions
diff --git a/firmware/include/vboot_api.h b/firmware/include/vboot_api.h
index 3d9b6921..12da9550 100644
--- a/firmware/include/vboot_api.h
+++ b/firmware/include/vboot_api.h
@@ -655,6 +655,14 @@ VbError_t VbExEcUpdateRW(const uint8_t *image, int image_size);
* Subsequent calls to VbExEcUpdateRW() this boot will fail. */
VbError_t VbExEcProtectRW(void);
+/* Args to VbExProtectFlash() */
+enum VbProtectFlash_t { VBPROTECT_RW_A, VBPROTECT_RW_B, VBPROTECT_RW_DEVKEY };
+
+/* Lock a section of the BIOS flash address space to prevent updates until the
+ * host is rebooted. Subsequent attempts to erase or modify the specified BIOS
+ * image will fail. If this function is called more than once each call should
+ * be cumulative. */
+VbError_t VbExProtectFlash(enum VbProtectFlash_t region);
/*****************************************************************************/
/* Misc */