diff options
author | Chris Engel <cjengel@us.ibm.com> | 2015-08-25 09:37:28 -0500 |
---|---|---|
committer | Daniel M. Crowell <dcrowell@us.ibm.com> | 2016-03-15 16:46:13 -0400 |
commit | e09fae967685172091f4b90657dacd4a0c5a1e5c (patch) | |
tree | f7bfaded7697b23093300d9aa6ccdada85c6ac8b /src/include/usr/secureboot | |
parent | f52d668fcefa6e35650aa8eab78b5405b0612992 (diff) | |
download | talos-hostboot-e09fae967685172091f4b90657dacd4a0c5a1e5c.tar.gz talos-hostboot-e09fae967685172091f4b90657dacd4a0c5a1e5c.zip |
Trustedboot TPM Event log manager
Change-Id: I4a8c2010421a63e44112666bdd424e2e5d010e7f
RTC: 125289
ForwardPort: yes
Reviewed-on: http://ralgit01.raleigh.ibm.com/gerrit1/960
Tested-by: Jenkins Server
Tested-by: Jenkins OP Build CI
Tested-by: Jenkins OP HW
Tested-by: FSP CI Jenkins
Reviewed-by: Timothy R. Block <block@us.ibm.com>
Reviewed-by: Stephen M. Cprek <smcprek@us.ibm.com>
Reviewed-by: Daniel M. Crowell <dcrowell@us.ibm.com>
Reviewed-on: http://ralgit01.raleigh.ibm.com/gerrit1/22009
Diffstat (limited to 'src/include/usr/secureboot')
-rw-r--r-- | src/include/usr/secureboot/trustedboot_reasoncodes.H | 8 | ||||
-rw-r--r-- | src/include/usr/secureboot/trustedbootif.H | 6 |
2 files changed, 12 insertions, 2 deletions
diff --git a/src/include/usr/secureboot/trustedboot_reasoncodes.H b/src/include/usr/secureboot/trustedboot_reasoncodes.H index c636681fb..77d237012 100644 --- a/src/include/usr/secureboot/trustedboot_reasoncodes.H +++ b/src/include/usr/secureboot/trustedboot_reasoncodes.H @@ -49,6 +49,10 @@ namespace TRUSTEDBOOT MOD_TPM_CMD_GETCAPFWVERSION = 0x03, MOD_TPM_MARSHALCMDDATA = 0x04, MOD_TPM_UNMARSHALRESPDATA = 0x05, + MOD_TPM_VERIFYFUNCTIONAL = 0x06, + + MOD_TPMLOGMGR_INITIALIZE = 0x10, + MOD_TPMLOGMGR_ADDEVENT = 0x11, }; enum TRUSTEDReasonCode @@ -65,6 +69,10 @@ namespace TRUSTEDBOOT RC_TPM_MARSHALING_FAIL = SECURE_COMP_ID | 0xA7, RC_TPM_UNMARSHAL_INVALID_CMD = SECURE_COMP_ID | 0xA8, RC_TPM_UNMARSHALING_FAIL = SECURE_COMP_ID | 0xA9, + RC_TPMLOGMGR_ADDEVENT_FAIL = SECURE_COMP_ID | 0xAA, + RC_TPMLOGMGR_ADDEVENTMARSH_FAIL = SECURE_COMP_ID | 0xAB, + RC_TPMLOGMGR_INIT_FAIL = SECURE_COMP_ID | 0xAC, + RC_TPM_NOFUNCTIONALTPM_FAIL = SECURE_COMP_ID | 0xAD, }; #ifdef __cplusplus } diff --git a/src/include/usr/secureboot/trustedbootif.H b/src/include/usr/secureboot/trustedbootif.H index f9e4c1e48..acd9a867f 100644 --- a/src/include/usr/secureboot/trustedbootif.H +++ b/src/include/usr/secureboot/trustedbootif.H @@ -39,6 +39,7 @@ namespace TRUSTEDBOOT { + struct _TpmLogMgr; /// Track system TPM status struct TpmTarget @@ -48,20 +49,21 @@ namespace TRUSTEDBOOT uint8_t initAttempted:1;///< Has TPM init been run uint8_t available:1; ///< Is TPM physically in system uint8_t failed:1; ///< Is TPM currently failed + struct _TpmLogMgr* logMgr; ///< Event log manager for TPM mutex_t tpmMutex; ///< TPM Mutex TpmTarget(); }; /// TPM PCR designations - enum TPM_Pcr + typedef enum { PCR_0 = 0, PCR_1 = 1, PCR_4 = 4, PCR_DEBUG = 16, PCR_MAX = 16, - }; + } TPM_Pcr; /** |