mirror of
https://git.proxmox.com/git/fwupd
synced 2025-07-21 23:24:29 +00:00
![]() The HSI specification is currently incomplete and in active development. Sample output for my Lenovo P50 Laptop: Host Security ID: HSI:2+UA! HSI-1 ✔ UEFI dbx: OK ✔ TPM: v2.0 ✔ SPI: Write disabled ✔ SPI: Lock enabled ✔ SPI: SMM required ✔ UEFI Secure Boot: Enabled HSI-2 ✔ TPM Reconstruction: Matched PCR0 reading HSI-3 ✘ Linux Kernel S3 Sleep: Deep sleep available HSI-4 ✘ Intel CET: Unavailable Runtime Suffix -U ✔ Firmware Updates: Newest release is 8 months old Runtime Suffix -A ✔ Firmware Attestation: OK Runtime Suffix -! ✔ fwupd plugins: OK ✔ Linux Kernel: OK ✔ Linux Kernel: Locked down ✘ Linux Swap: Not encrypted |
||
---|---|---|
.. | ||
tests | ||
fu-plugin-tpm-eventlog.c | ||
fu-self-test.c | ||
fu-tpm-eventlog-common.c | ||
fu-tpm-eventlog-common.h | ||
fu-tpm-eventlog-device.c | ||
fu-tpm-eventlog-device.h | ||
fu-tpm-eventlog-parser.c | ||
fu-tpm-eventlog-parser.h | ||
fu-tpm-eventlog.c | ||
meson.build | ||
README.md |
TPM Event Log Support
Introduction
The TPM Event Log records which events are registered for the PCR0 hash, which may help in explaining why PCR0 values are differing for some firmware.
The device exposed is not upgradable in any way and is just for debugging. The created device will be a child device of the system TPM device, which may or may not be upgradable.
Vendor ID Security
The device is not upgradable and thus requires no vendor ID set.