coreboot/src/security
Aseda Aboagye 3c79777cd6 vboot/secdata_mock: Make v0 kernel secdata context
The new kernel secdata v1 stores the last read EC hash, and reboots the
device during EC software sync when that hash didn't match the currently
active hash on the EC (this is used with TPM_CR50 to support EC-EFS2 and
pretty much a no-op for other devices). Generally, of course the whole
point of secdata is always that it persists across reboots, but with
MOCK_SECDATA we can't do that. Previously we always happened to somewhat
get away with presenting freshly-reinitialized data for MOCK_SECDATA on
every boot, but with the EC hash feature in secdata v1, that would cause
a reboot loop. The simplest solution is to just pretend we're a secdata
v0 device when using MOCK_SECDATA.

This was encountered on using a firmware built with MOCK_SECDATA but had
EC software sync enabled.

BUG=b:187843114
BRANCH=None
TEST=`USE=mocktpm cros build-ap -b keeby`; Flash keeby device, verify
that DUT does not continuously reboot with EC software sync enabled.

Signed-off-by: Aseda Aboagye <aaboagye@google.com>
Change-Id: Id8e81afcddadf27d9eec274f7f85ff1520315aaa
Reviewed-on: https://review.coreboot.org/c/coreboot/+/54304
Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
Reviewed-by: Julius Werner <jwerner@chromium.org>
2021-05-18 15:30:47 +00:00
..
intel src/security/intel/stm: Add warning for non-reproducible build 2021-05-12 15:13:37 +00:00
lockdown lockdown: Add hint for how to check for lockdown support in boot log 2020-06-22 12:27:18 +00:00
memory src/security: Drop unneeded empty lines 2020-09-21 16:26:17 +00:00
tpm src/security/tpm: Deal with zero length tlcl writes 2021-05-13 18:34:51 +00:00
vboot vboot/secdata_mock: Make v0 kernel secdata context 2021-05-18 15:30:47 +00:00
Kconfig cbfs: Add verification for RO CBFS metadata hash 2020-12-03 00:11:08 +00:00
Makefile.inc security: Add common boot media write protection 2020-04-28 01:19:32 +00:00