<feed xmlns='http://www.w3.org/2005/Atom'>
<title>talos-hostboot/src/bootloader, branch master</title>
<subtitle>Talos™ II hostboot sources</subtitle>
<id>https://git.raptorcs.com/git/talos-hostboot/atom?h=master</id>
<link rel='self' href='https://git.raptorcs.com/git/talos-hostboot/atom?h=master'/>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/talos-hostboot/'/>
<updated>2018-04-09T20:29:14+00:00</updated>
<entry>
<title>Secure Boot: Support Phyp debug flag in HDAT</title>
<updated>2018-04-09T20:29:14+00:00</updated>
<author>
<name>Ilya Smirnov</name>
<email>ismirno@us.ibm.com</email>
</author>
<published>2018-03-19T22:12:32+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/talos-hostboot/commit/?id=da8911ce095aa7d18231c9d344dc978dae7cf984'/>
<id>urn:sha1:da8911ce095aa7d18231c9d344dc978dae7cf984</id>
<content type='text'>
PHYP needs a way to know if SBE security backdoor is enabled
for debug purposes. This change creates a flag in TPM instance
data structure to indicate whether the backdoor is enabled. This
flag is passed by SBE to the hb bootloader; also added the flag
to indicate whether PCR is poisoned (default of 0).
The population of this flag will be implemented on Fleetwood.

Change-Id: I22305dbc9651134ba7dfe3b0bd3c760fe53c2c85
RTC: 188961
Reviewed-on: http://ralgit01.raleigh.ibm.com/gerrit1/56045
Tested-by: Jenkins Server &lt;pfd-jenkins+hostboot@us.ibm.com&gt;
Tested-by: Jenkins OP Build CI &lt;op-jenkins+hostboot@us.ibm.com&gt;
Tested-by: Jenkins OP HW &lt;op-hw-jenkins+hostboot@us.ibm.com&gt;
Tested-by: FSP CI Jenkins &lt;fsp-CI-jenkins+hostboot@us.ibm.com&gt;
Reviewed-by: Nicholas E. Bofferding &lt;bofferdn@us.ibm.com&gt;
Reviewed-by: Michael Baiocchi &lt;mbaiocch@us.ibm.com&gt;
CI-Ready: Daniel M. Crowell &lt;dcrowell@us.ibm.com&gt;
Reviewed-by: Daniel M. Crowell &lt;dcrowell@us.ibm.com&gt;
</content>
</entry>
<entry>
<title>Force checkstops for unhandled machine checks</title>
<updated>2018-03-29T16:03:50+00:00</updated>
<author>
<name>Dan Crowell</name>
<email>dcrowell@us.ibm.com</email>
</author>
<published>2017-10-01T21:09:56+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/talos-hostboot/commit/?id=90eaed6f430c88eb0127ce47671bd80b21f35433'/>
<id>urn:sha1:90eaed6f430c88eb0127ce47671bd80b21f35433</id>
<content type='text'>
Default MSR[ME]=0 during initial boot for bootloader and
 hostboot kernel
Once the xscom address range has been mapped in, enable the
 machine check handler to force a checkstop and set MSR[ME]=1
 to allow regular machine check handling

CQ: SW401402
Change-Id: I104e39465e61b3b19d5c073e71271102711ae54f
Reviewed-on: http://ralgit01.raleigh.ibm.com/gerrit1/47179
Reviewed-by: Christian R. Geddes &lt;crgeddes@us.ibm.com&gt;
Tested-by: Jenkins Server &lt;pfd-jenkins+hostboot@us.ibm.com&gt;
Tested-by: Jenkins OP Build CI &lt;op-jenkins+hostboot@us.ibm.com&gt;
Tested-by: Jenkins OP HW &lt;op-hw-jenkins+hostboot@us.ibm.com&gt;
Tested-by: FSP CI Jenkins &lt;fsp-CI-jenkins+hostboot@us.ibm.com&gt;
Reviewed-by: William G. Hoffa &lt;wghoffa@us.ibm.com&gt;
Reviewed-by: Daniel M. Crowell &lt;dcrowell@us.ibm.com&gt;
</content>
</entry>
<entry>
<title>Remove Secure Boot workarounds</title>
<updated>2017-12-18T22:27:59+00:00</updated>
<author>
<name>Stephen Cprek</name>
<email>smcprek@us.ibm.com</email>
</author>
<published>2017-11-20T22:56:44+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/talos-hostboot/commit/?id=9ae6e9595f9773d295b7e3ade47088f554c1ed48'/>
<id>urn:sha1:9ae6e9595f9773d295b7e3ade47088f554c1ed48</id>
<content type='text'>
- Removing the magic number checks that would block sb functionality
  if things didn't appear secure
- Remove Best Effort Policy and all of its related code
- Remove the legacy PCR extension
- Remove the non-secure header preservation path.
- Always load HB base image header from the bl to hb data path
  vs settings unsecurely out of pnor

Change-Id: Ie638384ac50ed47850985c959ea7a32e5757d64e
RTC: 178520
RTC: 155374
RTC: 173489
Reviewed-on: http://ralgit01.raleigh.ibm.com/gerrit1/49925
Tested-by: Jenkins Server &lt;pfd-jenkins+hostboot@us.ibm.com&gt;
Tested-by: Jenkins OP Build CI &lt;op-jenkins+hostboot@us.ibm.com&gt;
Reviewed-by: Nicholas E. Bofferding &lt;bofferdn@us.ibm.com&gt;
Tested-by: FSP CI Jenkins &lt;fsp-CI-jenkins+hostboot@us.ibm.com&gt;
Tested-by: Jenkins OP HW &lt;op-hw-jenkins+hostboot@us.ibm.com&gt;
Reviewed-by: Michael Baiocchi &lt;mbaiocch@us.ibm.com&gt;
Reviewed-by: Daniel M. Crowell &lt;dcrowell@us.ibm.com&gt;
</content>
</entry>
<entry>
<title>Add component ID check for Master Container Lid Processing</title>
<updated>2017-12-12T22:06:11+00:00</updated>
<author>
<name>Stephen Cprek</name>
<email>smcprek@us.ibm.com</email>
</author>
<published>2017-11-29T21:44:23+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/talos-hostboot/commit/?id=d527220c6ffe651548c3e002e0d473492c37ad27'/>
<id>urn:sha1:d527220c6ffe651548c3e002e0d473492c37ad27</id>
<content type='text'>
Change-Id: Ie6d99d6f67f09861f0d09c8432cf90abc27400b8
RTC: 181848
Reviewed-on: http://ralgit01.raleigh.ibm.com/gerrit1/50156
Tested-by: Jenkins Server &lt;pfd-jenkins+hostboot@us.ibm.com&gt;
Tested-by: Jenkins OP Build CI &lt;op-jenkins+hostboot@us.ibm.com&gt;
Tested-by: Jenkins OP HW &lt;op-hw-jenkins+hostboot@us.ibm.com&gt;
Reviewed-by: Michael Baiocchi &lt;mbaiocch@us.ibm.com&gt;
Reviewed-by: Nicholas E. Bofferding &lt;bofferdn@us.ibm.com&gt;
Tested-by: FSP CI Jenkins &lt;fsp-CI-jenkins+hostboot@us.ibm.com&gt;
Reviewed-by: Daniel M. Crowell &lt;dcrowell@us.ibm.com&gt;
</content>
</entry>
<entry>
<title>Story 179465 - Smarter HBBL id handling ...</title>
<updated>2017-11-19T18:15:50+00:00</updated>
<author>
<name>Brian Bakke</name>
<email>bbakke@us.ibm.com</email>
</author>
<published>2017-11-15T17:17:17+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/talos-hostboot/commit/?id=5353e40a1ad90530b9678233b0f52eb0b54535e4'/>
<id>urn:sha1:5353e40a1ad90530b9678233b0f52eb0b54535e4</id>
<content type='text'>
    to avoid constant SBE updates

Change-Id: Id02c7eb95a8e83274968477514130512ee553968
RTC: 179465
Reviewed-on: http://ralgit01.raleigh.ibm.com/gerrit1/49748
Reviewed-by: Martin Gloff &lt;mgloff@us.ibm.com&gt;
Tested-by: Jenkins Server &lt;pfd-jenkins+hostboot@us.ibm.com&gt;
Tested-by: Jenkins OP Build CI &lt;op-jenkins+hostboot@us.ibm.com&gt;
Tested-by: Jenkins OP HW &lt;op-hw-jenkins+hostboot@us.ibm.com&gt;
Tested-by: FSP CI Jenkins &lt;fsp-CI-jenkins+hostboot@us.ibm.com&gt;
Reviewed-by: Christian R. Geddes &lt;crgeddes@us.ibm.com&gt;
Reviewed-by: Daniel M. Crowell &lt;dcrowell@us.ibm.com&gt;
</content>
</entry>
<entry>
<title>Secure Boot: Enforce PNOR section component IDs</title>
<updated>2017-11-03T13:45:20+00:00</updated>
<author>
<name>Nick Bofferding</name>
<email>bofferdn@us.ibm.com</email>
</author>
<published>2017-10-21T02:13:34+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/talos-hostboot/commit/?id=07d75753d59419ea6ba9ee3bd930e0aa8e7e7fd5'/>
<id>urn:sha1:07d75753d59419ea6ba9ee3bd930e0aa8e7e7fd5</id>
<content type='text'>
- In secure mode, bootloader will enforce that HBB component ID is set
- In secure mode, Hostboot will enforce that PNOR component IDs are set

Change-Id: I04f3bbc45417b3229003c56e1083e1fc31c01cd7
RTC: 179422
Reviewed-on: http://ralgit01.raleigh.ibm.com/gerrit1/48711
Reviewed-by: Michael Baiocchi &lt;mbaiocch@us.ibm.com&gt;
Tested-by: Jenkins Server &lt;pfd-jenkins+hostboot@us.ibm.com&gt;
Reviewed-by: Marshall J. Wilks &lt;mjwilks@us.ibm.com&gt;
Tested-by: Jenkins OP Build CI &lt;op-jenkins+hostboot@us.ibm.com&gt;
Tested-by: Jenkins OP HW &lt;op-hw-jenkins+hostboot@us.ibm.com&gt;
Reviewed-by: Stephen M. Cprek &lt;smcprek@us.ibm.com&gt;
Tested-by: FSP CI Jenkins &lt;fsp-CI-jenkins+hostboot@us.ibm.com&gt;
Reviewed-by: William G. Hoffa &lt;wghoffa@us.ibm.com&gt;
</content>
</entry>
<entry>
<title>Refactor SecureBoot Workarounds to better control leniency</title>
<updated>2017-08-26T03:16:28+00:00</updated>
<author>
<name>Stephen Cprek</name>
<email>smcprek@us.ibm.com</email>
</author>
<published>2017-07-26T15:33:24+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/talos-hostboot/commit/?id=cefc4c2c1bf3a43a993f2091813ee181779ddee4'/>
<id>urn:sha1:cefc4c2c1bf3a43a993f2091813ee181779ddee4</id>
<content type='text'>
At this time we are trying to secure OpenPOWER in secure mode,
but allow best effort policies in other scenarios

Change-Id: I9ec2b5be49dbfcff678c4d30bb85f8762e448cb6
RTC: 170136
RTC: 155374
RTC: 168021
Reviewed-on: http://ralgit01.raleigh.ibm.com/gerrit1/43640
Tested-by: Jenkins Server &lt;pfd-jenkins+hostboot@us.ibm.com&gt;
Tested-by: Jenkins OP Build CI &lt;op-jenkins+hostboot@us.ibm.com&gt;
Tested-by: Jenkins OP HW &lt;op-hw-jenkins+hostboot@us.ibm.com&gt;
Reviewed-by: Nicholas E. Bofferding &lt;bofferdn@us.ibm.com&gt;
Reviewed-by: Michael Baiocchi &lt;mbaiocch@us.ibm.com&gt;
Tested-by: FSP CI Jenkins &lt;fsp-CI-jenkins+hostboot@us.ibm.com&gt;
Reviewed-by: Daniel M. Crowell &lt;dcrowell@us.ibm.com&gt;
</content>
</entry>
<entry>
<title>Pass Key-Addr info through bootloader</title>
<updated>2017-08-18T14:26:41+00:00</updated>
<author>
<name>crgeddes</name>
<email>crgeddes@us.ibm.com</email>
</author>
<published>2017-08-09T18:42:03+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/talos-hostboot/commit/?id=d53d9f226aaa8080eb65717ae895dac06a855bf8'/>
<id>urn:sha1:d53d9f226aaa8080eb65717ae895dac06a855bf8</id>
<content type='text'>
RTC: 165369
Change-Id: If15f6ccc7a7c3649b8352467ae10173a15f3f501
Reviewed-on: http://ralgit01.raleigh.ibm.com/gerrit1/44426
Tested-by: Jenkins Server &lt;pfd-jenkins+hostboot@us.ibm.com&gt;
Tested-by: FSP CI Jenkins &lt;fsp-CI-jenkins+hostboot@us.ibm.com&gt;
Tested-by: Jenkins OP Build CI &lt;op-jenkins+hostboot@us.ibm.com&gt;
Reviewed-by: Matt Derksen &lt;mderkse1@us.ibm.com&gt;
Reviewed-by: Martin Gloff &lt;mgloff@us.ibm.com&gt;
Tested-by: Jenkins OP HW &lt;op-hw-jenkins+hostboot@us.ibm.com&gt;
Reviewed-by: Daniel M. Crowell &lt;dcrowell@us.ibm.com&gt;
</content>
</entry>
<entry>
<title>Fix duplicate sha512 definitions</title>
<updated>2017-08-04T13:53:51+00:00</updated>
<author>
<name>Jaymes Wilks</name>
<email>mjwilks@us.ibm.com</email>
</author>
<published>2017-07-25T21:08:02+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/talos-hostboot/commit/?id=0914d87ae57960ef859886a67b5ae1187aa82474'/>
<id>urn:sha1:0914d87ae57960ef859886a67b5ae1187aa82474</id>
<content type='text'>
All instances for sha2_hash_t have been replaced with SHA512_t and
the SHA512_t typedef is now in securerom/contrib/sha512.H in place
of the old definition.

Change-Id: I32524524d755eb3b0264881317d9be5a294dc9a7
RTC:172333
Reviewed-on: http://ralgit01.raleigh.ibm.com/gerrit1/43610
Tested-by: Jenkins Server &lt;pfd-jenkins+hostboot@us.ibm.com&gt;
Reviewed-by: Stephen M. Cprek &lt;smcprek@us.ibm.com&gt;
Tested-by: Jenkins OP Build CI &lt;op-jenkins+hostboot@us.ibm.com&gt;
Tested-by: Jenkins OP HW &lt;op-hw-jenkins+hostboot@us.ibm.com&gt;
Tested-by: FSP CI Jenkins &lt;fsp-CI-jenkins+hostboot@us.ibm.com&gt;
Reviewed-by: Michael Baiocchi &lt;mbaiocch@us.ibm.com&gt;
Reviewed-by: Daniel M. Crowell &lt;dcrowell@us.ibm.com&gt;
</content>
</entry>
<entry>
<title>Hostboot not able to send a valid TI after corrupting HB base</title>
<updated>2017-08-04T13:28:37+00:00</updated>
<author>
<name>Marty Gloff</name>
<email>mgloff@us.ibm.com</email>
</author>
<published>2017-07-28T15:21:07+00:00</published>
<link rel='alternate' type='text/html' href='https://git.raptorcs.com/git/talos-hostboot/commit/?id=c252560d78ef1fbbf9b902d0238a4218e8af4642'/>
<id>urn:sha1:c252560d78ef1fbbf9b902d0238a4218e8af4642</id>
<content type='text'>
Bootloader TI design is incomplete and does not set up the TI info
at HBB offset 0x2000 with the magic signature or pointer to the
Bootloader TI data.

Change-Id: I16229fed67a2cf67322dce02f0a1b8f0b68d275f
CQ: SW397043
Reviewed-on: http://ralgit01.raleigh.ibm.com/gerrit1/43941
Tested-by: Jenkins Server &lt;pfd-jenkins+hostboot@us.ibm.com&gt;
Tested-by: Jenkins OP Build CI &lt;op-jenkins+hostboot@us.ibm.com&gt;
Tested-by: FSP CI Jenkins &lt;fsp-CI-jenkins+hostboot@us.ibm.com&gt;
Tested-by: Jenkins OP HW &lt;op-hw-jenkins+hostboot@us.ibm.com&gt;
Reviewed-by: Christian R. Geddes &lt;crgeddes@us.ibm.com&gt;
Reviewed-by: Stephen M. Cprek &lt;smcprek@us.ibm.com&gt;
Reviewed-by: Corey V. Swenson &lt;cswenson@us.ibm.com&gt;
Reviewed-by: Daniel M. Crowell &lt;dcrowell@us.ibm.com&gt;
</content>
</entry>
</feed>
