summaryrefslogtreecommitdiff
path: root/common/tpm_registers.c
diff options
context:
space:
mode:
authorVadim Bendebury <vbendeb@chromium.org>2016-12-27 09:44:53 -0800
committerchrome-bot <chrome-bot@chromium.org>2017-01-05 21:13:12 -0800
commit5659d103a669ada5fd173f7b801ed7b0a1066881 (patch)
tree38af5c4b7ce0619e2c16c53e0a921aa542f0c53d /common/tpm_registers.c
parenta59b978317cee5acee51b4e09f91e0fb4dffff99 (diff)
downloadchrome-ec-5659d103a669ada5fd173f7b801ed7b0a1066881.tar.gz
cr50: Avoiding nvram commits at startup
This patch eliminates NVMEM commits at system startup, namely between the moment the TPM is reset and the moment the AP is trying to read a PCR (which is an indication of the AP having booted into OS). To avoid losing NVMEM changes in case TPM is reset before PCR Read command is issued, pending changes (if any) are saved before TPM reset is processed. For the same reason TPM reset invocation is being added to the hard reboot path; this will kick in when there is a restart after cr50 firmware update. BRANCH=none BUG=chrome-os-partner:59873 TEST=with instrumented coreboot/depthcharge observed the following execution times for various TPM command issued at startup command 0x144, 15203 us command 0x14e, 11814 us command 0x182, 12461 us command 0x182, 12456 us command 0x138, 11503 us command 0x138, 11512 us command 0x14e, 14648 us command 0x14e, 12597 us command 0x121, 11353 us which totals 113 ms and shaves more than 200 ms off the boot time. Change-Id: Ic52309291fdb9c3ede96e0ad015ad9fc076bddc5 Signed-off-by: Vadim Bendebury <vbendeb@chromium.org> Reviewed-on: https://chromium-review.googlesource.com/424063 Reviewed-by: Aaron Durbin <adurbin@chromium.org> Reviewed-by: Andrey Pronin <apronin@chromium.org>
Diffstat (limited to 'common/tpm_registers.c')
-rw-r--r--common/tpm_registers.c22
1 files changed, 21 insertions, 1 deletions
diff --git a/common/tpm_registers.c b/common/tpm_registers.c
index 62e4414a52..9c5bb4a3b0 100644
--- a/common/tpm_registers.c
+++ b/common/tpm_registers.c
@@ -730,6 +730,14 @@ static void tpm_reset_now(int wipe_first)
* reset, this is the place to do it.
*/
+ /*
+ * If TPM was reset while commits were disabled, save whatever changes
+ * might have accumulated.
+ */
+ nvmem_enable_commits();
+
+ /* Prevent NVRAM commits until further notice. */
+ nvmem_disable_commits();
/* Re-initialize our registers */
tpm_init();
@@ -793,8 +801,20 @@ void tpm_task(void)
* TODO(vbendeb): revisit this when
* crosbug.com/p/55667 has been addressed.
*/
- if (command_code == TPM2_PCR_Read)
+ if (command_code == TPM2_PCR_Read) {
system_process_retry_counter();
+ /*
+ * The AP issuing a PCR Read command is
+ * considered an indication of the boot
+ * process being finished.
+ *
+ * There is no need to speed up TPM operations
+ * any more, pending NVMEM changes should be
+ * committed and future NVMEM commits should
+ * not be postponed.
+ */
+ nvmem_enable_commits();
+ }
#ifdef CONFIG_EXTENSION_COMMAND
if (!IS_CUSTOM_CODE(command_code))
#endif