diff options
author | Mike Baiocchi <mbaiocch@us.ibm.com> | 2017-07-07 12:06:09 -0500 |
---|---|---|
committer | Daniel M. Crowell <dcrowell@us.ibm.com> | 2017-07-19 13:50:21 -0400 |
commit | 3eabaf7eb4a10ab8b3860de26860258af48d00aa (patch) | |
tree | 7438b26c573b64cbfc9dd19153d78477800f0891 /src/include | |
parent | c0f528fbaf2532d8cfaf51165fe4f7055a11f24a (diff) | |
download | talos-hostboot-3eabaf7eb4a10ab8b3860de26860258af48d00aa.tar.gz talos-hostboot-3eabaf7eb4a10ab8b3860de26860258af48d00aa.zip |
Secureboot: Add IPL calls to Open/Close Memory Regions via SBE
This commit adds the open/close SBE memory region calls
throughout the IPL, as needed. The underlying SBE calls are still
commented out, however, as we await SBE support.
Change-Id: I87685dca95e5cb7d10997eb6eb414a1927862d64
RTC:145686
Reviewed-on: http://ralgit01.raleigh.ibm.com/gerrit1/42873
Reviewed-by: Nicholas E. Bofferding <bofferdn@us.ibm.com>
Tested-by: Jenkins Server <pfd-jenkins+hostboot@us.ibm.com>
Reviewed-by: Stephen M. Cprek <smcprek@us.ibm.com>
Reviewed-by: Michael Baiocchi <mbaiocch@us.ibm.com>
Tested-by: Jenkins OP Build CI <op-jenkins+hostboot@us.ibm.com>
Tested-by: Jenkins OP HW <op-hw-jenkins+hostboot@us.ibm.com>
Tested-by: FSP CI Jenkins <fsp-CI-jenkins+hostboot@us.ibm.com>
Reviewed-by: Marshall J. Wilks <mjwilks@us.ibm.com>
Reviewed-by: Daniel M. Crowell <dcrowell@us.ibm.com>
Diffstat (limited to 'src/include')
-rw-r--r-- | src/include/usr/sbeio/sbeioif.H | 21 |
1 files changed, 15 insertions, 6 deletions
diff --git a/src/include/usr/sbeio/sbeioif.H b/src/include/usr/sbeio/sbeioif.H index fc3fb347b..6bf1568ab 100644 --- a/src/include/usr/sbeio/sbeioif.H +++ b/src/include/usr/sbeio/sbeioif.H @@ -183,20 +183,26 @@ namespace SBEIO * Unsecure Memory Region to Open * * @param[in] i_size Size in bytes of the Unsecure Memory Region + * Assert if size = 0 * * @param[in] i_isWritable Specifies if the Unsecure Memory is Read-Only - * or Read-Write: If false then Read-only Region + * or Read-Write: If false then Read-Only Region * If true then Read-Write Region * + * @param[in] i_target Target associated with SBE command + * If nullptr, default to Master Processor + * * @return errlHndl_t Error log handle on failure. * * @note Function is not thread-safe. - * @note Read-Only/Read-Write settings are not considered when closing any - * existing regions that overlap with the requested region to open. + * @note Read-Only/Read-Write settings and Target associated with the + * region are not considered when closing any existing regions + * that overlap with the requested region to open. */ errlHndl_t openUnsecureMemRegion(const uint64_t i_start_addr, const uint32_t i_size, - const bool i_isWritable); + const bool i_isWritable, + TARGETING::Target* i_target=nullptr); /** * @brief Close Unsecure Memory Region @@ -204,12 +210,15 @@ namespace SBEIO * @param[in] i_start_addr Starting Physical Memory Address of the * Unsecure Memory Region to Close * + * @param[in] i_target Target associated with SBE command + * If nullptr, default to Master Processor + * * @return errlHndl_t Error log handle on failure. * * @note Function is not thread-safe. */ - errlHndl_t closeUnsecureMemRegion(const uint64_t i_start_addr); - + errlHndl_t closeUnsecureMemRegion(const uint64_t i_start_addr, + TARGETING::Target* i_target=nullptr); /** * @brief Close All Unsecure Memory Regions |