coreboot-kgpe-d16/src/security/vboot
Aseda Aboagye b9d94ecd78 vboot/secdata_tpm: Add WRITE_STCLEAR attr to RW ARB spaces
It can be nice to update the TPM firmware without having to clear the
TPM owner.  However, in order to do so would require platformHierarchy
to be enabled which would leave the kernel antirollback space a bit
vulnerable.  To protect the kernel antirollback space from being written
to by the OS, we can use the WriteLock command.  In order to do so we
need to add the WRITE_STCLEAR TPM attribute.

This commit adds the WRITE_STCLEAR TPM attribute to the rw antirollback
spaces.  This includes the kernel antirollback space along with the MRC
space.  When an STCLEAR attribute is set, this indicates that the TPM
object will need to be reloaded after any TPM Startup (CLEAR).

BUG=b:186029006
BRANCH=None
TEST=Build and flash a chromebook with no kernel antirollback space set
up, boot to Chrome OS, run `tpm_manager_client get_space_info
--index=0x1007` and verify that the WRITE_STCLEAR attribute is present.
Signed-off-by: Aseda Aboagye <aaboagye@google.com>
Change-Id: I3181b4c18acd908e924ad858b677e891312423fe
Reviewed-on: https://review.coreboot.org/c/coreboot/+/56358
Reviewed-by: Julius Werner <jwerner@chromium.org>
Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
2021-07-26 07:27:48 +00:00
..
Kconfig vboot: add VBOOT_X86_SHA256_ACCELERATION config 2021-07-01 09:38:19 +00:00
Makefile.inc vboot: add VBOOT_X86_SHA256_ACCELERATION config 2021-07-01 09:38:19 +00:00
antirollback.h security/vboot: Add support for ZTE spaces 2021-06-10 23:38:53 +00:00
bootmode.c
common.c
ec_sync.c
misc.h
mrc_cache_hash_tpm.c
mrc_cache_hash_tpm.h
secdata_mock.c vboot/secdata_mock: Make v0 kernel secdata context 2021-05-18 15:30:47 +00:00
secdata_tpm.c vboot/secdata_tpm: Add WRITE_STCLEAR attr to RW ARB spaces 2021-07-26 07:27:48 +00:00
symbols.h
tpm_common.c
tpm_common.h Add Kconfig TPM 2021-05-26 12:31:10 +00:00
vbnv.c
vbnv.h
vbnv_cmos.c
vbnv_ec.c
vbnv_flash.c
vbnv_layout.h
vboot_common.c
vboot_common.h
vboot_lib.c
vboot_loader.c security/vboot: Add timestamps when loading verstage 2021-06-14 05:11:07 +00:00
vboot_logic.c vboot: Assign 2 to EC_EFS_BOOT_MODE_TRUSTED_RO 2021-06-10 21:26:48 +00:00
verstage.c