Attention is currently required from: Christian Walter, Martin L Roth, Matt DeVillier.
Hello Christian Walter, Julius Werner, Martin L Roth, build bot (Jenkins),
I'd like you to reexamine a change. Please visit
https://review.coreboot.org/c/coreboot/+/74856?usp=email
to look at the new patch set (#3).
The following approvals got outdated and were removed: Verified-1 by build bot (Jenkins)
Change subject: security/tpm: Add Kconfig to allow payload control of TPM1 ......................................................................
security/tpm: Add Kconfig to allow payload control of TPM1
Normally, for TPM1, coreboot will force activate/enable the TPM if TPM_DEACTIVATE is not selected, but this is not desirable in the case that the payload needs to be able to control activation/deactivation/ take ownership etc. Add a Kconfig to allow opting out of this forced enablement.
TEST=build/boot google/lulu with edk2, verify TPM can be enabled/ disabled/cleared from payload TPM menu.
Change-Id: Ieb7db109cbcc1a0166d95b6130b624b635bb7ac9 Signed-off-by: Matt DeVillier matt.devillier@gmail.com --- M src/security/tpm/Kconfig M src/security/tpm/tspi/tspi.c 2 files changed, 10 insertions(+), 1 deletion(-)
git pull ssh://review.coreboot.org:29418/coreboot refs/changes/56/74856/3