summaryrefslogtreecommitdiff
path: root/src/drivers/intel/ptt
diff options
context:
space:
mode:
authorChristian Walter <christian.walter@9elements.com>2019-07-23 10:26:30 +0200
committerPhilipp Deppenwiese <zaolin.daisuki@gmail.com>2019-08-06 12:07:49 +0000
commit0bd84ed25066fc28d3a0750d429a29c64bfb955d (patch)
tree7b61020acdf77ec01a1163851713386d3724ac31 /src/drivers/intel/ptt
parent6d2dbe11ae1f4ae21b3f15699831e53d47e270cd (diff)
security/vboot: Add Support for Intel PTT
Add support for Intel PTT. For supporting Intel PTT we need to disable read and write access to the TPM NVRAM during the bootblock. TPM NVRAM will only be available once the DRAM is initialized. To circumvent this, we mock secdata if HAVE_INTEL_PTT is set. The underlying problem is, that the iTPM only supports a stripped down instruction set while the Intel ME is not fully booted up. Details can be found in Intel document number 571993 - Paragraph 2.10. Change-Id: I08c9a839f53f96506be5fb68f7c1ed5bf6692505 Signed-off-by: Christian Walter <christian.walter@9elements.com> Reviewed-on: https://review.coreboot.org/c/coreboot/+/34510 Tested-by: build bot (Jenkins) <no-reply@coreboot.org> Reviewed-by: Philipp Deppenwiese <zaolin.daisuki@gmail.com> Reviewed-by: Julius Werner <jwerner@chromium.org>
Diffstat (limited to 'src/drivers/intel/ptt')
-rw-r--r--src/drivers/intel/ptt/Kconfig1
1 files changed, 1 insertions, 0 deletions
diff --git a/src/drivers/intel/ptt/Kconfig b/src/drivers/intel/ptt/Kconfig
index c013f42c43..fb70f9a02c 100644
--- a/src/drivers/intel/ptt/Kconfig
+++ b/src/drivers/intel/ptt/Kconfig
@@ -1,5 +1,6 @@
config HAVE_INTEL_PTT
bool
default n
+ select VBOOT_MOCK_SECDATA if VBOOT
help
Activate if your platform has Intel Platform Trust Technology like Intel iTPM and you want to use it.