mirror of
https://git.proxmox.com/git/fwupd
synced 2025-05-16 02:34:37 +00:00
![]() If the measurements are missing but it's a UEFI system, it's a good indication that the user has secure boot turned off. Notify the user on the UEFI device through a non-fatal `UpdateMessage` To accomplish this, move fu-uefi-vars into the plugin library for other plugins to use |
||
---|---|---|
.. | ||
tests | ||
fu-plugin-tpm-eventlog.c | ||
fu-self-test.c | ||
fu-tpm-eventlog-common.c | ||
fu-tpm-eventlog-common.h | ||
fu-tpm-eventlog-device.c | ||
fu-tpm-eventlog-device.h | ||
fu-tpm-eventlog-parser.c | ||
fu-tpm-eventlog-parser.h | ||
fu-tpm-eventlog.c | ||
meson.build | ||
README.md |
TPM Event Log Support
Introduction
The TPM Event Log records which events are registered for the PCR0 hash, which may help in explaining why PCR0 values are differing for some firmware.
The device exposed is not upgradable in any way and is just for debugging. The created device will be a child device of the system TPM device, which may or may not be upgradable.
Vendor ID Security
The device is not upgradable and thus requires no vendor ID set.