[coreboot-gerrit] New patch to review for coreboot: vboot: Stop creating backup space in TPM

Patrick Georgi (pgeorgi@google.com) gerrit at coreboot.org
Wed Oct 12 15:15:54 CEST 2016


Patrick Georgi (pgeorgi at google.com) just uploaded a new patch set to gerrit, which you can find at https://review.coreboot.org/16997

-gerrit

commit 59d13a0770c15e18d2b9093bc63b6abf3e9a2b93
Author: Daisuke Nojiri <dnojiri at chromium.org>
Date:   Fri Oct 7 13:59:36 2016 -0700

    vboot: Stop creating backup space in TPM
    
    There is no code which uses the backup space in TPM created for vboot
    nvram.
    
    All chromebooks currently supported at the trunk store vboot nvram
    in flash directly or as a backup.
    
    BUG=chrome-os-partner:47915
    BRANCH=none
    TEST=emerge-samus coreboot
    
    Change-Id: I9445dfd822826d668b3bfed8ca50dc9386f2b2b0
    Signed-off-by: Patrick Georgi <pgeorgi at chromium.org>
    Original-Commit-Id: 5cee2d54c96ad7952af2a2c1f773ba09c5248f41
    Original-Change-Id: Ied0cec0ed489df3b39f6b9afd3941f804557944f
    Original-Signed-off-by: Daisuke Nojiri <dnojiri at chromium.org>
    Original-Reviewed-on: https://chromium-review.googlesource.com/395507
    Original-Reviewed-by: Randall Spangler <rspangler at chromium.org>
---
 src/include/antirollback.h | 4 ++--
 src/vboot/secdata_tpm.c    | 5 -----
 2 files changed, 2 insertions(+), 7 deletions(-)

diff --git a/src/include/antirollback.h b/src/include/antirollback.h
index f088ee2..889ba9a 100644
--- a/src/include/antirollback.h
+++ b/src/include/antirollback.h
@@ -17,8 +17,8 @@ enum vb2_pcr_digest;
 /* TPM NVRAM location indices. */
 #define FIRMWARE_NV_INDEX               0x1007
 #define KERNEL_NV_INDEX                 0x1008
-/* This is just an opaque space for backup purposes */
-#define BACKUP_NV_INDEX                 0x1009
+/* 0x1009 used to be used as a backup space. Think of conflicts if you
+ * want to use 0x1009 for something else. */
 
 /* Structure definitions for TPM spaces */
 
diff --git a/src/vboot/secdata_tpm.c b/src/vboot/secdata_tpm.c
index 76b90ab..b1f3197 100644
--- a/src/vboot/secdata_tpm.c
+++ b/src/vboot/secdata_tpm.c
@@ -245,11 +245,6 @@ static uint32_t _factory_initialize_tpm(struct vb2_context *ctx)
 	VBDEBUG("TPM: Clearing owner\n");
 	RETURN_ON_FAILURE(tpm_clear_and_reenable());
 
-	/* Define the backup space. No need to initialize it, though. */
-	RETURN_ON_FAILURE(safe_define_space(BACKUP_NV_INDEX,
-					    TPM_NV_PER_PPWRITE,
-					    VB2_NVDATA_SIZE));
-
 	/* Define and initialize the kernel space */
 	RETURN_ON_FAILURE(safe_define_space(KERNEL_NV_INDEX,
 					    TPM_NV_PER_PPWRITE,



More information about the coreboot-gerrit mailing list