diff options
| author | Mike Baiocchi <mbaiocch@us.ibm.com> | 2017-02-10 09:06:46 -0600 |
|---|---|---|
| committer | Daniel M. Crowell <dcrowell@us.ibm.com> | 2017-03-15 17:27:23 -0400 |
| commit | e8b8f27d39f6633ff89f2dc541db77c802988685 (patch) | |
| tree | 5c7c43d099f605881a11ffa7a3cf394220bb76f5 /src/usr/secureboot/base/securerommgr.C | |
| parent | d5358edf5e5ff7835099e4503e4bcf1518e24024 (diff) | |
| download | blackbird-hostboot-e8b8f27d39f6633ff89f2dc541db77c802988685.tar.gz blackbird-hostboot-e8b8f27d39f6633ff89f2dc541db77c802988685.zip | |
Trace Processor Security Registers; add them to Secure Error Logs
This commit adds a trace of the Security Switch and CBS Control/Status
registers for all processors in the system. These registers are also
captured for Security-specific error logs.
Change-Id: I245815c720725a9aaf15a3cbad9a50b3288fc1f9
RTC:165205
Reviewed-on: http://ralgit01.raleigh.ibm.com/gerrit1/37290
Tested-by: Jenkins Server <pfd-jenkins+hostboot@us.ibm.com>
Tested-by: Jenkins OP Build CI <op-jenkins+hostboot@us.ibm.com>
Tested-by: FSP CI Jenkins <fsp-CI-jenkins+hostboot@us.ibm.com>
Reviewed-by: Stephen M. Cprek <smcprek@us.ibm.com>
Reviewed-by: Nicholas E. Bofferding <bofferdn@us.ibm.com>
Reviewed-by: Daniel M. Crowell <dcrowell@us.ibm.com>
Diffstat (limited to 'src/usr/secureboot/base/securerommgr.C')
| -rw-r--r-- | src/usr/secureboot/base/securerommgr.C | 5 |
1 files changed, 2 insertions, 3 deletions
diff --git a/src/usr/secureboot/base/securerommgr.C b/src/usr/secureboot/base/securerommgr.C index 4f92b3d14..1a21f3350 100644 --- a/src/usr/secureboot/base/securerommgr.C +++ b/src/usr/secureboot/base/securerommgr.C @@ -208,7 +208,7 @@ errlHndl_t SecureRomManager::initialize() reinterpret_cast<uint64_t>(iv_securerom), true /*Add HB Software Callout*/ ); - l_errl->collectTrace(SECURE_COMP_NAME,256); + l_errl->collectTrace(SECURE_COMP_NAME,ERROR_TRACE_SIZE); break; } @@ -216,7 +216,6 @@ errlHndl_t SecureRomManager::initialize() /***************************************************************/ /* Retrieve HW Hash Keys From The System */ /***************************************************************/ - SecureRomManager::getHwKeyHash(); TRACFCOMP(g_trac_secure,INFO_MRK"SecureRomManager::initialize(): SUCCESSFUL:" @@ -336,7 +335,7 @@ errlHndl_t SecureRomManager::verifyContainer(void * i_container, // Callout code to force a rewrite of the contents //@todo RTC:93870 - Define new callout for verification fail - l_errl->collectTrace(SECURE_COMP_NAME,256); + l_errl->collectTrace(SECURE_COMP_NAME,ERROR_TRACE_SIZE); break; } |

