Skip to content

Conversation

@pamaury
Copy link
Contributor

@pamaury pamaury commented Jan 26, 2026

Backport #27092, depends on #29163

@pamaury pamaury requested review from a team and cfrantz as code owners January 26, 2026 09:18
@pamaury pamaury requested review from alees24, jwnrt and timothytrippel and removed request for a team January 26, 2026 09:18
@pamaury pamaury force-pushed the backport_27092 branch 2 times, most recently from 5fca845 to 8fadef2 Compare January 28, 2026 16:36
@pamaury
Copy link
Contributor Author

pamaury commented Jan 28, 2026

The test doesn't pass, it might require more backport work before passing (likely culprit is 27041 but to be confirmed)

@pamaury pamaury marked this pull request as draft January 29, 2026 09:57
1. Make the ROM_EXT detect the `secver_write` extension in the manifest.
   If present and the manifest security version is greater than the
   current boot_data minimum security version, update the value and
   write boot_data.
2. Add a string flag to the build system that allows the `secver_write`
   value to be set at build time.
3. Add a test which sequences firmware through a series of ROM_EXTs
   which advance the security version.  Confirm each update and confirm
   that an older ROM_EXT will no longer execute.

Signed-off-by: Chris Frantz <[email protected]>
(cherry picked from commit 86dce8a)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants