We're now shipping the code that reads VPD into CBMEM and allows the kernel to expose it through sysfs on all boards, and telling people that they can rely on this interface (e.g. https://groups.google.com/a/google.com/forum/#!topic/chromeos-security/H1kdRHUaybA ). We should probably add a FAFT test to ensure that it continues working.
Rough outline:
1. Store original firmware (like for corruption tests)
2. (Re-)Initialize RO and RW VPD, write some test values
3. Reboot
4. Read test values through sysfs
[Restore original firmware in both success and abort cases]
Comment 1 by jwer...@chromium.org
, Oct 20 2016