aboutsummaryrefslogtreecommitdiff
path: root/include/image.h
diff options
context:
space:
mode:
authorCristian Ciocaltea <cristian.ciocaltea@gmail.com>2019-12-24 18:05:38 +0200
committerHeinrich Schuchardt <xypron.glpk@gmx.de>2020-01-07 18:08:21 +0100
commita031b03f6448fafba46d08f7a88fa33690d50858 (patch)
tree3913214d3b3546007829901dd83125a8078f4b30 /include/image.h
parent07e2fe797115b1239c513ba12caa017978322da0 (diff)
downloadu-boot-a031b03f6448fafba46d08f7a88fa33690d50858.zip
u-boot-a031b03f6448fafba46d08f7a88fa33690d50858.tar.gz
u-boot-a031b03f6448fafba46d08f7a88fa33690d50858.tar.bz2
image: Add IH_OS_EFI for EFI chain-load boot
Add a new OS type to be used for chain-loading an EFI compatible firmware or boot loader like GRUB2, possibly in a verified boot scenario. Bellow is sample ITS file that generates a FIT image supporting secure boot. Please note the presence of 'os = "efi";' line, which identifies the currently introduced OS type: / { #address-cells = <1>; images { efi-grub { description = "GRUB EFI"; data = /incbin/("bootarm.efi"); type = "kernel_noload"; arch = "arm"; os = "efi"; compression = "none"; load = <0x0>; entry = <0x0>; hash-1 { algo = "sha256"; }; }; }; configurations { default = "config-grub"; config-grub { kernel = "efi-grub"; signature-1 { algo = "sha256,rsa2048"; sign-images = "kernel"; }; }; }; }; Signed-off-by: Cristian Ciocaltea <cristian.ciocaltea@gmail.com> Reviewed-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
Diffstat (limited to 'include/image.h')
-rw-r--r--include/image.h1
1 files changed, 1 insertions, 0 deletions
diff --git a/include/image.h b/include/image.h
index f4d2aaf..4a280b7 100644
--- a/include/image.h
+++ b/include/image.h
@@ -157,6 +157,7 @@ enum {
IH_OS_ARM_TRUSTED_FIRMWARE, /* ARM Trusted Firmware */
IH_OS_TEE, /* Trusted Execution Environment */
IH_OS_OPENSBI, /* RISC-V OpenSBI */
+ IH_OS_EFI, /* EFI Firmware (e.g. GRUB2) */
IH_OS_COUNT,
};