diff options
author | Stephen Cprek <smcprek@us.ibm.com> | 2018-01-10 16:51:09 -0600 |
---|---|---|
committer | Daniel M. Crowell <dcrowell@us.ibm.com> | 2018-01-17 11:57:12 -0500 |
commit | 26bbcd97d817453a114a43b661bceff5aa0131f2 (patch) | |
tree | 3d91980415cf096c63fab050df41c3fa8238b230 /src/include/usr | |
parent | 329b81443b43d3fd0ea2218e72f5c0139e47d184 (diff) | |
download | talos-hostboot-26bbcd97d817453a114a43b661bceff5aa0131f2.tar.gz talos-hostboot-26bbcd97d817453a114a43b661bceff5aa0131f2.zip |
Open Untrusted Communication for SP
Change-Id: I87c7fe74349521eaec6ebf373e99f13eb1bf74f8
CQ:SW412793
Backport:release-fips910
Reviewed-on: http://ralgit01.raleigh.ibm.com/gerrit1/51742
Reviewed-by: Nicholas E. Bofferding <bofferdn@us.ibm.com>
Tested-by: Jenkins Server <pfd-jenkins+hostboot@us.ibm.com>
Tested-by: Jenkins OP Build CI <op-jenkins+hostboot@us.ibm.com>
Tested-by: Jenkins OP HW <op-hw-jenkins+hostboot@us.ibm.com>
Reviewed-by: Michael Baiocchi <mbaiocch@us.ibm.com>
Reviewed-by: Daniel M. Crowell <dcrowell@us.ibm.com>
Diffstat (limited to 'src/include/usr')
-rw-r--r-- | src/include/usr/runtime/runtime.H | 24 |
1 files changed, 22 insertions, 2 deletions
diff --git a/src/include/usr/runtime/runtime.H b/src/include/usr/runtime/runtime.H index d8d22a8d5..f82bf63fe 100644 --- a/src/include/usr/runtime/runtime.H +++ b/src/include/usr/runtime/runtime.H @@ -5,7 +5,7 @@ /* */ /* OpenPOWER HostBoot Project */ /* */ -/* Contributors Listed Below - COPYRIGHT 2012,2017 */ +/* Contributors Listed Below - COPYRIGHT 2012,2018 */ /* [+] International Business Machines Corp. */ /* */ /* */ @@ -163,7 +163,17 @@ enum SectionId RESERVED_MEM, //< Hostboot's Reserved Mainstore Memory HRMOR_STASH, //< Pointer to address in reserved memory // where PHYP can write HRMOR - LAST_SECTION = HRMOR_STASH //< Placeholder for arrays + CPU_CTRL, // Spira-H CPU controls area + LAST_SECTION = CPU_CTRL //< Placeholder for arrays +}; + +/** + * Range of SBE unsecure memory region to open + */ +enum SbeUnsecureMemoryRegions +{ + SP_HOST_UNTRUSTED_COMM_AREA_ADDR = 0, + SP_HOST_UNTRUSTED_COMM_AREA_SIZE = 64*MEGABYTE, }; /** @@ -249,6 +259,16 @@ void setPayloadBaseAddress(uint64_t i_payloadAddress); */ void rediscover_hdat( void ); +/** + * @brief Open necessary unsecure SBE windows for SP -> host communication + * Currently opens two windows + * 1. CPU controls SP ATTN areas + * 2. SP_HOST_UNTRUSTED_COMM_AREA_ADDR + * + * @return errlHndl_t Returns nullptr on success; otherwise errlog + */ +errlHndl_t openUntrustedSpCommArea(); + } #endif |