[Skiboot] [PATCH v2 0/8] libstb: Advance TSS infrastructure

Mauro S. M. Rodrigues maurosr at linux.vnet.ibm.com
Fri Apr 3 03:52:03 AEDT 2020


The previous TSS infrastructure code in skiboot, although correct, was only
enough for some fundamental TCG software stack operations, like PCR extend and
eventlog, and other TSB work like secvar requires broader infrastructure.

In this series we introduced and switch to a complete TSS implementation,
supporting the previously existent operations, like PCR Extend, PCR Read and
EventLog for measurement, and including a new set of operations, until we're
able to remove the old implementation at patch 07.

Using an external implementation helps to diminish the maintenance burden at
skiboot side, brings code stability and makes easier to update TSS
infrastructure if necessary, for instance to get new features or to obtain new
fixes.

This implementation intruduces at patch 01 the ibmtpm20tss subtree from
https://git.code.sf.net/p/ibmtpm20tss/tss tag: v1.4.0.

Note that in order to reduce the ammount of code copied through the subtree we
select just the portion we need, the directory utils which represents tss 2.


Mauro S. M. Rodrigues (7):
  Squashed 'libstb/tss2/ibmtpm20tss/utils/' content from commit
    fae1383d3d
  libstb/tss2: Add basic Build infrastructure for tss2
  TPM/TSS: Register TPM chip for further use within TSS
  libstb/tss2: Add TSS wrapping functions
  libstb/trustedboot: Introduce new eventlog implementation
  libstb/tss2: Switch to new implementation of PCR Read/Extend and
    Eventlog
  libstb/tss: Remove old tss implementation

Ryan Grimm (1):
  libstb: Set TPM platform auth to random password

 core/init.c                          |    3 +
 libstb/Makefile.inc                  |    6 +-
 libstb/drivers/tpm_i2c_nuvoton.c     |   10 +-
 libstb/tpm_chip.c                    |   62 +-
 libstb/tpm_chip.h                    |   31 +-
 libstb/trustedboot.c                 |   32 +-
 libstb/trustedboot.h                 |   21 +
 libstb/tss/Makefile.inc              |   13 -
 libstb/tss/tpmLogMgr.C               |  571 ---------------
 libstb/tss/tpmLogMgr.H               |  247 -------
 libstb/tss/trustedTypes.C            |  927 -----------------------
 libstb/tss/trustedTypes.H            |  483 ------------
 libstb/tss/trustedboot.H             |   78 --
 libstb/tss/trustedbootCmds.C         | 1009 --------------------------
 libstb/tss/trustedbootCmds.H         |  177 -----
 libstb/tss/trustedbootUtils.C        |   44 --
 libstb/tss/trustedbootUtils.H        |   86 ---
 libstb/tss/trustedboot_reasoncodes.H |   95 ---
 libstb/tss2/Makefile.inc             |   36 +
 libstb/tss2/eventlog.c               |  132 ++++
 libstb/tss2/eventlog.h               |   31 +
 libstb/tss2/netinet/in.h             |   16 +
 libstb/tss2/tssskiboot.c             |  719 ++++++++++++++++++
 libstb/tss2/tssskiboot.h             |   26 +
 24 files changed, 1058 insertions(+), 3797 deletions(-)
 delete mode 100644 libstb/tss/Makefile.inc
 delete mode 100644 libstb/tss/tpmLogMgr.C
 delete mode 100644 libstb/tss/tpmLogMgr.H
 delete mode 100644 libstb/tss/trustedTypes.C
 delete mode 100644 libstb/tss/trustedTypes.H
 delete mode 100644 libstb/tss/trustedboot.H
 delete mode 100644 libstb/tss/trustedbootCmds.C
 delete mode 100644 libstb/tss/trustedbootCmds.H
 delete mode 100644 libstb/tss/trustedbootUtils.C
 delete mode 100644 libstb/tss/trustedbootUtils.H
 delete mode 100644 libstb/tss/trustedboot_reasoncodes.H
 create mode 100644 libstb/tss2/Makefile.inc
 create mode 100644 libstb/tss2/eventlog.c
 create mode 100644 libstb/tss2/eventlog.h
 create mode 100644 libstb/tss2/netinet/in.h
 create mode 100644 libstb/tss2/tssskiboot.c
 create mode 100644 libstb/tss2/tssskiboot.h

--
2.25.1



More information about the Skiboot mailing list