summaryrefslogtreecommitdiffstats
path: root/src/usr/runtime/populate_hbruntime.C
diff options
context:
space:
mode:
Diffstat (limited to 'src/usr/runtime/populate_hbruntime.C')
-rw-r--r--src/usr/runtime/populate_hbruntime.C12
1 files changed, 11 insertions, 1 deletions
diff --git a/src/usr/runtime/populate_hbruntime.C b/src/usr/runtime/populate_hbruntime.C
index 1f59a8d43..1554633ae 100644
--- a/src/usr/runtime/populate_hbruntime.C
+++ b/src/usr/runtime/populate_hbruntime.C
@@ -1430,7 +1430,11 @@ errlHndl_t populate_hbSecurebootData ( void )
uint16_t secureboot : 1;
// bit 1: Measurements Extended to Secure Boot TPM
uint16_t trustedboot : 1;
- uint16_t reserved : 14;
+ // bit 2: SBE Security Backdoor bit.
+ // NOTE: This bit is labeled "Platform Security Overrides Allowed"
+ // in the section 6.1.1 of HDAT spec.
+ uint16_t sbeSecBackdoor : 1;
+ uint16_t reserved : 13;
} SysSecSets;
// populate system security settings in hdat
@@ -1451,6 +1455,9 @@ errlHndl_t populate_hbSecurebootData ( void )
#endif
l_sysSecSets->secureboot = secure? 1: 0;
+ // populate security override setting
+ l_sysSecSets->sbeSecBackdoor = SECUREBOOT::getSbeSecurityBackdoor();
+
// populate TPM config bits in hdat
bool tpmRequired = false;
#ifdef CONFIG_TPMDD
@@ -1768,6 +1775,9 @@ errlHndl_t populate_TpmInfoByNode(const uint64_t i_instance)
l_tpmInstInfo->hdatFunctionalStatus = HDAT::TpmNonPresent;
}
+ // Set TPM configuration flag
+ l_tpmInstInfo->hdatTpmConfigFlags.pcrPoisonedFlag = 0;
+
// advance the current offset to account for this tpm instance info
l_currOffset += sizeof(*l_tpmInstInfo);
OpenPOWER on IntegriCloud