coreboot/src/security
Jett Rink 3f5de1c8f4 security/vboot: ensure that NVMEM is saved on every kernel space write
If the AP actually needs to write to the TPM, then it is important and
the TPM should commit those changes to NVMEM immediately in case there
is an unexpected power loss (e.g. from a USB-C port partner reset upon
cold reboot request).

BRANCH=none
BUG=b:160913048
TEST=Verify that puff will no longer reboot loop when coreboot writes a
new Hmir (Hash mirror) in the TPM

Change-Id: I9597a55891d11bdf040d70f38b4c5a59c7888b8a
Signed-off-by: Jett Rink <jettrink@chromium.org>
Reviewed-on: https://review.coreboot.org/c/coreboot/+/43414
Reviewed-by: Angel Pons <th3fanbus@gmail.com>
Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
2020-07-15 08:42:11 +00:00
..
intel src: Remove unused 'include <cpu/x86/msr.h>' 2020-07-14 16:14:09 +00:00
lockdown lockdown: Add hint for how to check for lockdown support in boot log 2020-06-22 12:27:18 +00:00
memory src: Remove unused 'include <stdint.h> 2020-07-14 16:11:10 +00:00
tpm security/tpm/tss/tcg-1.2/tss.c: Drop dead code 2020-07-09 21:29:16 +00:00
vboot security/vboot: ensure that NVMEM is saved on every kernel space write 2020-07-15 08:42:11 +00:00
Kconfig treewide: Remove "this file is part of" lines 2020-05-11 17:11:40 +00:00
Makefile.inc security: Add common boot media write protection 2020-04-28 01:19:32 +00:00