diff options
| author | Ilya Smirnov <ismirno@us.ibm.com> | 2018-12-11 09:47:55 -0600 |
|---|---|---|
| committer | Daniel M. Crowell <dcrowell@us.ibm.com> | 2019-04-12 12:12:11 -0500 |
| commit | a9addc3db4f8940ca38fb63c99fcab26126c88f0 (patch) | |
| tree | 081e8545ba2b6585342c73dd6101fef562765fae /src/include/usr/isteps | |
| parent | 75c14bbdbc1f8706d8dccab7d273cc3fd581717f (diff) | |
| download | blackbird-hostboot-a9addc3db4f8940ca38fb63c99fcab26126c88f0.tar.gz blackbird-hostboot-a9addc3db4f8940ca38fb63c99fcab26126c88f0.zip | |
SMF: Logic For Creating Non-Secure HOMER Memory Space
For SMF to be enabled, HOMER requires a small amount of
non-SMF (unsecure) memory where the "jump to Ultravisor"
instruction can be put (to transition to UV mode). This
commit sets up a region of non-secure memory space for
that purpose.
Change-Id: Ib91ec69f49a4e174e65f3c2aad337a68eaa0803b
RTC: 205986
Reviewed-on: http://rchgit01.rchland.ibm.com/gerrit1/70699
Reviewed-by: Prem Shanker Jha <premjha2@in.ibm.com>
Tested-by: Jenkins Server <pfd-jenkins+hostboot@us.ibm.com>
Tested-by: Jenkins OP Build CI <op-jenkins+hostboot@us.ibm.com>
Tested-by: FSP CI Jenkins <fsp-CI-jenkins+hostboot@us.ibm.com>
Tested-by: Jenkins OP HW <op-hw-jenkins+hostboot@us.ibm.com>
Reviewed-by: Nicholas E. Bofferding <bofferdn@us.ibm.com>
Reviewed-by: Daniel M. Crowell <dcrowell@us.ibm.com>
Diffstat (limited to 'src/include/usr/isteps')
| -rw-r--r-- | src/include/usr/isteps/istep_reasoncodes.H | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/src/include/usr/isteps/istep_reasoncodes.H b/src/include/usr/isteps/istep_reasoncodes.H index 7aa3abc5e..5bd5fbf94 100644 --- a/src/include/usr/isteps/istep_reasoncodes.H +++ b/src/include/usr/isteps/istep_reasoncodes.H @@ -67,6 +67,7 @@ namespace ISTEP MOD_GET_LANEMASK_FROM_HX_KEYWORD = 0x24, MOD_MSS_SCRUB = 0x25, MOD_CALL_UPDATE_UCD_FLASH = 0x26, + MOD_LOAD_HCODE = 0x27, }; /** @@ -140,6 +141,7 @@ namespace ISTEP RC_PNOR_IPMI_NOT_ENABLED = ISTEP_COMP_ID | 0x4D, RC_SLAVE_CORE_WAKEUP_ERROR = ISTEP_COMP_ID | 0x4E, RC_UCD_IMG_NOT_IN_CONTAINER = ISTEP_COMP_ID | 0x4F, + RC_MM_UNMAP_FAILED = ISTEP_COMP_ID | 0x50, }; }; |

