Hello Aaron Durbin, Patrick Rudolph, Julius Werner, Philipp Deppenwiese, build bot (Jenkins), Furquan Shaikh,
I'd like you to reexamine a change. Please visit
https://review.coreboot.org/c/coreboot/+/31837
to look at the new patch set (#3).
Change subject: drivers/tpm: update TPM initialization logic for Intel FSP2.0 ......................................................................
drivers/tpm: update TPM initialization logic for Intel FSP2.0
Intel FSP memory initialization needs to access the TPM when HAS_RECOVERY_MRC_CACHE is enabled.
* Update its tpm_setup call to include HAS_RECOVERY_MRC_CACHE selection as a condition. * Update vboot's TPM initialization to bypass tpm_setup when HAS_RECOVERY_MRC_CACHE is selected.
See bug for more information: https://bugs.chromium.org/p/chromium/issues/detail?id=940377
BUG=chromium:940377 TEST=util/lint/checkpatch.pl -g origin/master..HEAD TEST=util/abuild/abuild -B -e -y -c 50 -p none -x TEST=make clean && make test-abuild BRANCH=none
Change-Id: I4ba91c275c33245be61041cb592e52f861dbafe6 Signed-off-by: Joel Kitching kitching@google.com --- M src/drivers/intel/fsp2_0/memory_init.c M src/security/vboot/secdata_tpm.c 2 files changed, 12 insertions(+), 3 deletions(-)
git pull ssh://review.coreboot.org:29418/coreboot refs/changes/37/31837/3