diff options
author | Stephen Cprek <smcprek@us.ibm.com> | 2017-11-27 11:44:14 -0600 |
---|---|---|
committer | Daniel M. Crowell <dcrowell@us.ibm.com> | 2017-12-05 15:16:08 -0500 |
commit | 5b5972e5580c20b3dc34bf529f7ddc1a2d872a52 (patch) | |
tree | 702ebd5824df5bf8246f6baca7e34e1370e858ef /src/include/usr/secureboot | |
parent | ca52131dad3de16f44b9c9f07b5413edf1e9742a (diff) | |
download | talos-hostboot-5b5972e5580c20b3dc34bf529f7ddc1a2d872a52.tar.gz talos-hostboot-5b5972e5580c20b3dc34bf529f7ddc1a2d872a52.zip |
Create a Trusted boot trace component and collect trace on errors
Error log trace never included "TRBOOT" trace
Change-Id: I0ff99d3d3cc78a7a25c576059d69d1644a2c802d
RTC: 181899
Reviewed-on: http://ralgit01.raleigh.ibm.com/gerrit1/50077
Tested-by: Jenkins Server <pfd-jenkins+hostboot@us.ibm.com>
Tested-by: Jenkins OP Build CI <op-jenkins+hostboot@us.ibm.com>
Tested-by: FSP CI Jenkins <fsp-CI-jenkins+hostboot@us.ibm.com>
Reviewed-by: Michael Baiocchi <mbaiocch@us.ibm.com>
Reviewed-by: Nicholas E. Bofferding <bofferdn@us.ibm.com>
Reviewed-by: Daniel M. Crowell <dcrowell@us.ibm.com>
Diffstat (limited to 'src/include/usr/secureboot')
-rw-r--r-- | src/include/usr/secureboot/trustedboot_reasoncodes.H | 46 |
1 files changed, 23 insertions, 23 deletions
diff --git a/src/include/usr/secureboot/trustedboot_reasoncodes.H b/src/include/usr/secureboot/trustedboot_reasoncodes.H index 5663ba318..846d9c664 100644 --- a/src/include/usr/secureboot/trustedboot_reasoncodes.H +++ b/src/include/usr/secureboot/trustedboot_reasoncodes.H @@ -33,7 +33,7 @@ #ifdef __HOSTBOOT_MODULE #include <hbotcompid.H> #else -#define SECURE_COMP_ID 0x1E00 +#define TRBOOT_COMP_ID 0x2B00 #endif #ifdef __cplusplus @@ -70,28 +70,28 @@ namespace TRUSTEDBOOT { // Reason codes 0x00 - 0x9F reserved for secure_reasoncodes.H - RC_TPM_START_FAIL = SECURE_COMP_ID | 0xA0, - RC_TPM_EXISTENCE_FAIL = SECURE_COMP_ID | 0xA1, - RC_TPM_GETCAP_FAIL = SECURE_COMP_ID | 0xA2, - RC_TPM_GETCAP_FW_INVALID_RESP = SECURE_COMP_ID | 0xA3, - RC_TPM_GETCAP2_FAIL = SECURE_COMP_ID | 0xA4, - RC_TPM_GETCAP2_FW_INVALID_RESP = SECURE_COMP_ID | 0xA5, - RC_TPM_MARSHAL_INVALID_CMD = SECURE_COMP_ID | 0xA6, - RC_TPM_MARSHALING_FAIL = SECURE_COMP_ID | 0xA7, - RC_TPM_UNMARSHAL_INVALID_CMD = SECURE_COMP_ID | 0xA8, - RC_TPM_UNMARSHALING_FAIL = SECURE_COMP_ID | 0xA9, - RC_TPMLOGMGR_ADDEVENT_FAIL = SECURE_COMP_ID | 0xAA, - RC_TPMLOGMGR_ADDEVENTMARSH_FAIL = SECURE_COMP_ID | 0xAB, - RC_TPMLOGMGR_INIT_FAIL = SECURE_COMP_ID | 0xAC, - RC_TPM_NOFUNCTIONALTPM_FAIL = SECURE_COMP_ID | 0xAD, - RC_TPM_COMMAND_FAIL = SECURE_COMP_ID | 0xAE, - RC_TPM_INVALID_ARGS = SECURE_COMP_ID | 0xAF, - RC_TPMLOGMGR_LOGWALKFAIL = SECURE_COMP_ID | 0xB0, - RC_SENDRECV_FAIL = SECURE_COMP_ID | 0xB1, - RC_SEND_FAIL = SECURE_COMP_ID | 0xB2, - RC_MSGRESPOND_FAIL = SECURE_COMP_ID | 0xB3, - RC_UPDATE_SECURITY_CTRL_HWP_FAIL = SECURE_COMP_ID | 0xB4, - RC_TPM_NVINDEX_VALIDATE_FAIL = SECURE_COMP_ID | 0xB5, + RC_TPM_START_FAIL = TRBOOT_COMP_ID | 0xA0, + RC_TPM_EXISTENCE_FAIL = TRBOOT_COMP_ID | 0xA1, + RC_TPM_GETCAP_FAIL = TRBOOT_COMP_ID | 0xA2, + RC_TPM_GETCAP_FW_INVALID_RESP = TRBOOT_COMP_ID | 0xA3, + RC_TPM_GETCAP2_FAIL = TRBOOT_COMP_ID | 0xA4, + RC_TPM_GETCAP2_FW_INVALID_RESP = TRBOOT_COMP_ID | 0xA5, + RC_TPM_MARSHAL_INVALID_CMD = TRBOOT_COMP_ID | 0xA6, + RC_TPM_MARSHALING_FAIL = TRBOOT_COMP_ID | 0xA7, + RC_TPM_UNMARSHAL_INVALID_CMD = TRBOOT_COMP_ID | 0xA8, + RC_TPM_UNMARSHALING_FAIL = TRBOOT_COMP_ID | 0xA9, + RC_TPMLOGMGR_ADDEVENT_FAIL = TRBOOT_COMP_ID | 0xAA, + RC_TPMLOGMGR_ADDEVENTMARSH_FAIL = TRBOOT_COMP_ID | 0xAB, + RC_TPMLOGMGR_INIT_FAIL = TRBOOT_COMP_ID | 0xAC, + RC_TPM_NOFUNCTIONALTPM_FAIL = TRBOOT_COMP_ID | 0xAD, + RC_TPM_COMMAND_FAIL = TRBOOT_COMP_ID | 0xAE, + RC_TPM_INVALID_ARGS = TRBOOT_COMP_ID | 0xAF, + RC_TPMLOGMGR_LOGWALKFAIL = TRBOOT_COMP_ID | 0xB0, + RC_SENDRECV_FAIL = TRBOOT_COMP_ID | 0xB1, + RC_SEND_FAIL = TRBOOT_COMP_ID | 0xB2, + RC_MSGRESPOND_FAIL = TRBOOT_COMP_ID | 0xB3, + RC_UPDATE_SECURITY_CTRL_HWP_FAIL = TRBOOT_COMP_ID | 0xB4, + RC_TPM_NVINDEX_VALIDATE_FAIL = TRBOOT_COMP_ID | 0xB5, }; #ifdef __cplusplus } |