summaryrefslogtreecommitdiffstats
path: root/src/kernel
diff options
context:
space:
mode:
authorStephen Cprek <smcprek@us.ibm.com>2017-06-22 16:20:55 -0500
committerDaniel M. Crowell <dcrowell@us.ibm.com>2017-06-26 18:07:56 -0400
commit2374128170d355578a8d5141a19dfe6be7f8bd8e (patch)
tree7a44948ed3b93a62fcb9d79fd2bf1a963a8ff15f /src/kernel
parentaa5ff65d1a960643a9bb6633921ed3b95ea34919 (diff)
downloadtalos-hostboot-2374128170d355578a8d5141a19dfe6be7f8bd8e.tar.gz
talos-hostboot-2374128170d355578a8d5141a19dfe6be7f8bd8e.zip
Remove asserts on variables that have valid default values
Currently the BlToHbData structure asserts when a caller asks for info, but the structure was initialized as invalid. Now for the the fields that have valid default values, we allow access to them. Change-Id: I703526ab30c47c0e7723dbbfaf876ce4e2da6e3a Reviewed-on: http://ralgit01.raleigh.ibm.com/gerrit1/42321 Tested-by: Jenkins Server <pfd-jenkins+hostboot@us.ibm.com> Reviewed-by: Martin Gloff <mgloff@us.ibm.com> Tested-by: Jenkins OP Build CI <op-jenkins+hostboot@us.ibm.com> Tested-by: FSP CI Jenkins <fsp-CI-jenkins+hostboot@us.ibm.com> Tested-by: Jenkins OP HW <op-hw-jenkins+hostboot@us.ibm.com> Reviewed-by: Marshall J. Wilks <mjwilks@us.ibm.com> Reviewed-by: Michael Baiocchi <mbaiocch@us.ibm.com> Reviewed-by: Nicholas E. Bofferding <bofferdn@us.ibm.com> Reviewed-by: Daniel M. Crowell <dcrowell@us.ibm.com>
Diffstat (limited to 'src/kernel')
-rw-r--r--src/kernel/bltohbdatamgr.C24
1 files changed, 8 insertions, 16 deletions
diff --git a/src/kernel/bltohbdatamgr.C b/src/kernel/bltohbdatamgr.C
index 919509c96..1bc076628 100644
--- a/src/kernel/bltohbdatamgr.C
+++ b/src/kernel/bltohbdatamgr.C
@@ -54,16 +54,16 @@ void BlToHbDataManager::validAssert() const
void BlToHbDataManager::print() const
{
- printkd("\nBlToHbData (all addr HRMOR relative):\n");
-
- if(iv_data.version >= Bootloader::BLTOHB_SAB)
- {
- printkd("-- secureSettings: SAB=%d, SecOvrd=%d, AllowAttrOvrd=%d\n",
- iv_data.secureAccessBit, iv_data.securityOverride,
- iv_data.allowAttrOverrides);
- }
if(iv_dataValid)
{
+ printkd("\nBlToHbData (all addr HRMOR relative):\n");
+ if(iv_data.version >= Bootloader::BLTOHB_SAB)
+ {
+ printkd("-- secureSettings: SAB=%d, SecOvrd=%d, AllowAttrOvrd=%d\n",
+ iv_data.secureAccessBit, iv_data.securityOverride,
+ iv_data.allowAttrOverrides);
+ }
+
printkd("-- eyeCatch = 0x%lX (%s)\n", iv_data.eyeCatch,
reinterpret_cast<char*>(&iv_data.eyeCatch));
printkd("-- version = 0x%lX\n", iv_data.version);
@@ -197,7 +197,6 @@ void BlToHbDataManager::initInvalid ()
const uint64_t BlToHbDataManager::getBranchtableOffset() const
{
- validAssert();
return iv_data.branchtableOffset;
}
@@ -215,7 +214,6 @@ const uint64_t BlToHbDataManager::getSecureRomAddr() const
const size_t BlToHbDataManager::getSecureRomSize() const
{
- validAssert();
return iv_data.secureRomSize;
}
@@ -233,7 +231,6 @@ const uint64_t BlToHbDataManager::getHwKeysHashAddr() const
const size_t BlToHbDataManager::getHwKeysHashSize() const
{
- validAssert();
return iv_data.hwKeysHashSize;
}
@@ -251,31 +248,26 @@ const uint64_t BlToHbDataManager::getHbbHeaderAddr() const
const size_t BlToHbDataManager::getHbbHeaderSize() const
{
- validAssert();
return iv_data.hbbHeaderSize;
}
const bool BlToHbDataManager::getSecureAccessBit() const
{
- validAssert();
return iv_data.secureAccessBit;
}
const bool BlToHbDataManager::getSecurityOverride() const
{
- validAssert();
return iv_data.securityOverride;
}
const bool BlToHbDataManager::getAllowAttrOverrides() const
{
- validAssert();
return iv_data.allowAttrOverrides;
}
const size_t BlToHbDataManager::getPreservedSize() const
{
- validAssert();
return iv_preservedSize;
}
OpenPOWER on IntegriCloud