coreboot-kgpe-d16/src/security/vboot
Patrick Rudolph 6093c5099f security/lockdown: Write-protect WP_RO
Allow to write protect only the WP_RO region in case of enabled VBOOT.
One can either lock the boot device in VERSTAGE early if VBOOT is enabled,
or late in RAMSTAGE. Both options have their downsides as explained below.

Lock early if you don't trust the code that's stored in the writeable
flash partition. This prevents write-protecting the MRC cache, which
is written in ramstage. In case the contents of the MRC cache are
corrupted this can lead to system instability or trigger unwanted code
flows inside the firmware.

Lock late if you trust the code that's stored in the writeable
flash partition. This allows write-protecting the MRC cache, but
if a vulnerability is found in the code of the writeable partition
an attacker might be able to overwrite the whole flash as it hasn't
been locked yet.

Change-Id: I72c3e1a0720514b9b85b0433944ab5fb7109b2a2
Signed-off-by: Patrick Rudolph <patrick.rudolph@9elements.com>
Signed-off-by: Christian Walter <christian.walter@9elements.com>
Reviewed-on: https://review.coreboot.org/c/coreboot/+/32705
Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
Reviewed-by: Julius Werner <jwerner@chromium.org>
Reviewed-by: Philipp Deppenwiese <zaolin.daisuki@gmail.com>
2020-04-28 01:20:43 +00:00
..
antirollback.h ec_sync: Run EFS2 in romstage 2020-04-17 22:01:48 +00:00
bootmode.c src/security: Use SPDX for GPL-2.0-only files 2020-04-04 16:33:38 +00:00
common.c src/security: Use SPDX for GPL-2.0-only files 2020-04-04 16:33:38 +00:00
ec_sync.c ec_sync: Run EFS2 in romstage 2020-04-17 22:01:48 +00:00
Kconfig security/vboot: Decouple measured boot from verified boot 2020-03-31 07:55:18 +00:00
Makefile.inc security/vboot: Decouple measured boot from verified boot 2020-03-31 07:55:18 +00:00
misc.h rules.h: Rename ENV_VERSTAGE to ENV_SEPARATE_VERSTAGE 2020-04-23 01:21:56 +00:00
mrc_cache_hash_tpm.c src/security: Use SPDX for GPL-2.0-only files 2020-04-04 16:33:38 +00:00
secdata_mock.c ec_sync: Run EFS2 in romstage 2020-04-17 22:01:48 +00:00
secdata_tpm.c vboot: Add permission check for kernel space 2020-04-23 01:21:07 +00:00
symbols.h src/security: Use SPDX for GPL-2.0-only files 2020-04-04 16:33:38 +00:00
tpm_common.c src/security: Use SPDX for GPL-2.0-only files 2020-04-04 16:33:38 +00:00
tpm_common.h src/security: Use SPDX for GPL-2.0-only files 2020-04-04 16:33:38 +00:00
vbnv.c src/security: Use SPDX for GPL-2.0-only files 2020-04-04 16:33:38 +00:00
vbnv.h src/security: Use SPDX for GPL-2.0-only files 2020-04-04 16:33:38 +00:00
vbnv_cmos.c src/security: Use SPDX for GPL-2.0-only files 2020-04-04 16:33:38 +00:00
vbnv_ec.c src/security: Use SPDX for GPL-2.0-only files 2020-04-04 16:33:38 +00:00
vbnv_flash.c src/security: Use SPDX for GPL-2.0-only files 2020-04-04 16:33:38 +00:00
vbnv_layout.h src/security: Use SPDX for GPL-2.0-only files 2020-04-04 16:33:38 +00:00
vboot_common.c src/security: Use SPDX for GPL-2.0-only files 2020-04-04 16:33:38 +00:00
vboot_common.h ec_sync: Run EFS2 in romstage 2020-04-17 22:01:48 +00:00
vboot_lib.c security/vboot: relocate vb2ex_abort and vb2ex_printf 2020-02-07 03:56:44 +00:00
vboot_loader.c src/security: Use SPDX for GPL-2.0-only files 2020-04-04 16:33:38 +00:00
vboot_logic.c security/lockdown: Write-protect WP_RO 2020-04-28 01:20:43 +00:00
verstage.c src/security: Use SPDX for GPL-2.0-only files 2020-04-04 16:33:38 +00:00