[Bug 2047374] Re: TPM PCR0 recontruction fails on Pluton fTPM
Mario Limonciello
2047374 at bugs.launchpad.net
Thu Dec 28 02:57:26 UTC 2023
The way this works is that the tpm event log is used to attempt to
reconstruct pcr0. If it doesn't match the value in the tpm pcr0 then
there is a bug or malware.
The same report was brought into fwupd upstream.
Various artifacts were captured and the conclusion is this is a BIOS bug.
It should be reported to the board vendor to be fixed.
https://github.com/fwupd/fwupd/issues/6574
** Bug watch added: github.com/fwupd/fwupd/issues #6574
https://github.com/fwupd/fwupd/issues/6574
** Changed in: fwupd (Ubuntu)
Status: New => Opinion
** Also affects: fwupd via
https://github.com/fwupd/fwupd/issues/6574
Importance: Unknown
Status: Unknown
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to fwupd in Ubuntu.
https://bugs.launchpad.net/bugs/2047374
Title:
TPM PCR0 recontruction fails on Pluton fTPM
Status in Fwupd:
Unknown
Status in fwupd package in Ubuntu:
Opinion
Bug description:
My Gigabyte UEFI BIOS has an option to select which TPM chip to use.
By default it uses AMD fTPM. After manually enabling Pluton fTPM via
Gigabyte UEFI, TPM PCR0 reconstruction status changed to Invalid.
Ubuntu Version: 23.10
Kernel: Xanmod 6.6.8, Generic 6.5.0-14
Version: org.freedesktop.fwupd 1.9.5
Log
```
Host Security ID: HSI:1 (v1.9.5)
HSI-1
✔ Fused platform: Locked
✔ Supported CPU: Valid
✔ TPM empty PCRs: Valid
✔ TPM v2.0: Found
✔ UEFI bootservice variables: Locked
✔ UEFI platform key: Valid
✔ UEFI secure boot: Enabled
HSI-2
✔ IOMMU: Enabled
✔ Platform debugging: Locked
✔ SPI write protection: Enabled
✘ TPM PCR0 reconstruction: Invalid
HSI-3
✔ Pre-boot DMA protection: Enabled
✘ SPI replay protection: Not supported
✘ Suspend-to-idle: Disabled
✘ Suspend-to-ram: Enabled
HSI-4
✘ Encrypted RAM: Not supported
✘ Processor rollback protection: Disabled
Runtime Suffix -!
✔ Linux kernel: Untainted
✔ Linux kernel lockdown: Enabled
✔ Linux swap: Encrypted
✔ fwupd plugins: Untainted
The TPM PCR0 differs from reconstruction.
» https://fwupd.github.io/hsi.html#pcr0-tpm-event-log-reconstruction
Host Security Events
2023-12-25 18:39:14: ✘ TPM PCR0 reconstruction changed: Valid → Invalid
```
To manage notifications about this bug go to:
https://bugs.launchpad.net/fwupd/+bug/2047374/+subscriptions
More information about the foundations-bugs
mailing list