diff options
author | Ilya Smirnov <ismirno@us.ibm.com> | 2018-12-12 11:33:38 -0600 |
---|---|---|
committer | Daniel M. Crowell <dcrowell@us.ibm.com> | 2019-01-10 14:52:34 -0600 |
commit | 21f75b9e4475b92665e4dd8ca182108dab53045f (patch) | |
tree | 5534008afd3766285c4da672f3082a03d056fb88 /src/usr/secureboot | |
parent | 1ba78c4580b6067882d62909c2ce2941ad36008d (diff) | |
download | talos-hostboot-21f75b9e4475b92665e4dd8ca182108dab53045f.tar.gz talos-hostboot-21f75b9e4475b92665e4dd8ca182108dab53045f.zip |
SMF: NVRAM Reading and Mem Distribution end-to-end Changes
This commit introduces the changes to read out the SMF secure
memory amount value from NVRAM and to distribute the secure
memory amount based on the value read. strtou64 was copied
from runtime code to convert the value read from NVRAM (as a
string) to uint64_t.
Change-Id: I83e41f0aaff9b4035d20a517cf866f348acedd59
Reviewed-on: http://rchgit01.rchland.ibm.com/gerrit1/69728
Tested-by: Jenkins Server <pfd-jenkins+hostboot@us.ibm.com>
Tested-by: Jenkins OP Build CI <op-jenkins+hostboot@us.ibm.com>
Tested-by: FSP CI Jenkins <fsp-CI-jenkins+hostboot@us.ibm.com>
Reviewed-by: Nicholas E. Bofferding <bofferdn@us.ibm.com>
Tested-by: Jenkins OP HW <op-hw-jenkins+hostboot@us.ibm.com>
Reviewed-by: Daniel M. Crowell <dcrowell@us.ibm.com>
Diffstat (limited to 'src/usr/secureboot')
-rw-r--r-- | src/usr/secureboot/smf/smf.C | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/src/usr/secureboot/smf/smf.C b/src/usr/secureboot/smf/smf.C index 6793f0fa6..a743163d6 100644 --- a/src/usr/secureboot/smf/smf.C +++ b/src/usr/secureboot/smf/smf.C @@ -168,7 +168,7 @@ errlHndl_t distributeSmfMem(uint64_t i_requestedSmfMemAmtInBytes) l_procToMemVec.push_back(l_pToM); } - TRACFCOMP(SMF_TRACE::g_trac_smf, "distributeSmfMem: distributing 0x%x requested memory.", i_requestedSmfMemAmtInBytes); + TRACFCOMP(SMF_TRACE::g_trac_smf, "distributeSmfMem: distributing 0x%.16llx requested memory.", i_requestedSmfMemAmtInBytes); int64_t l_remainingAmtToAllocate = i_requestedSmfMemAmtInBytes; uint64_t l_currChunkSize = MIN_SMF_MEMORY_AMT; @@ -270,7 +270,7 @@ errlHndl_t distributeSmfMem(uint64_t i_requestedSmfMemAmtInBytes) uint64_t l_totMemOnSystem = 0; // For error handling below for(const auto l_proc : l_procList) { - TRACFCOMP(SMF_TRACE::g_trac_smf, "distributeSmfMem: proc 0x%x SMF_BAR_SIZE = 0x%x", + TRACFCOMP(SMF_TRACE::g_trac_smf, "distributeSmfMem: proc 0x%x SMF_BAR_SIZE = 0x%.16llx", TARGETING::get_huid(l_proc), l_proc->getAttr<TARGETING::ATTR_PROC_SMF_BAR_SIZE>()); l_totMemOnSystem += getTotalProcMemSize(l_proc); @@ -311,7 +311,7 @@ errlHndl_t distributeSmfMem(uint64_t i_requestedSmfMemAmtInBytes) // that could be allocated. if(i_requestedSmfMemAmtInBytes != l_totalAllocated) { - TRACFCOMP(SMF_TRACE::g_trac_smf, "distributeSmfMem: could not allocate exactly 0x%x SMF mem, allocated 0x%x instead.", i_requestedSmfMemAmtInBytes, l_totalAllocated); + TRACFCOMP(SMF_TRACE::g_trac_smf, "distributeSmfMem: could not allocate exactly 0x%.16llx SMF mem, allocated 0x%.16llx instead.", i_requestedSmfMemAmtInBytes, l_totalAllocated); /*@ * @reasoncode SECUREBOOT::RC_ALLOCATED_NE_REQUESTED * @moduleid SECUREBOOT::MOD_SMF_SPLIT_SMF_MEM |