blob: e0d78dfa6b0b04d03593d46e65f69c3816319300 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
|
/* IBM_PROLOG_BEGIN_TAG */
/* This is an automatically generated prolog. */
/* */
/* $Source: src/usr/secureboot/base/service.C $ */
/* */
/* IBM CONFIDENTIAL */
/* */
/* COPYRIGHT International Business Machines Corp. 2013 */
/* */
/* p1 */
/* */
/* Object Code Only (OCO) source materials */
/* Licensed Internal Code Source Materials */
/* IBM HostBoot Licensed Internal Code */
/* */
/* The source code for this program is not published or otherwise */
/* divested of its trade secrets, irrespective of what has been */
/* deposited with the U.S. Copyright Office. */
/* */
/* Origin: 30 */
/* */
/* IBM_PROLOG_END_TAG */
#include <secureboot/service.H>
#include <stdint.h>
#include <sys/mm.h>
#include <util/singleton.H>
#include <secureboot/secure_reasoncodes.H>
#include "settings.H"
#include "header.H"
#include "purge.H"
namespace SECUREBOOT
{
void* initializeBase(void* unused)
{
errlHndl_t l_errl = NULL;
do
{
// Load original secureboot header.
if (enabled())
{
Singleton<Header>::instance().loadBaseHeader();
}
// Blind-purge lower portion of cache.
l_errl = issueBlindPurge();
if (l_errl)
{
break;
}
// Extend memory footprint into lower portion of cache.
// This can only fail is someone has already called to extend
// to post-secureboot state. Major coding bug, so just assert.
assert(0 == mm_extend(MM_EXTEND_POST_SECUREBOOT));
// Initialize the Secure ROM
l_errl = initializeSecureROM();
if (l_errl)
{
break;
}
} while(0);
return l_errl;
}
bool enabled()
{
return Singleton<Settings>::instance().getEnabled();
}
}
|