diff options
author | PMR <pmr@pmr-lander> | 2020-03-19 08:40:46 +0000 |
---|---|---|
committer | PMR <pmr@pmr-lander> | 2020-03-19 08:40:46 +0000 |
commit | 67dd5ab74da927834c30fe71537a2d0bb45e3b4e (patch) | |
tree | 512fea00d25761683120953df79157b55730f71e | |
parent | e0e3b2a162bffa21851ad0aca96f6b57aa11a499 (diff) | |
parent | 40008b556169845ccca77f013d02d10ff1883af2 (diff) |
Merge #380466 from ~bettyl/plainbox-provider-checkbox:modify-check-fde-tpm
-rw-r--r-- | units/disk/encryption.pxu | 12 |
1 files changed, 7 insertions, 5 deletions
diff --git a/units/disk/encryption.pxu b/units/disk/encryption.pxu index b805a37e..d4c5df8c 100644 --- a/units/disk/encryption.pxu +++ b/units/disk/encryption.pxu @@ -37,12 +37,14 @@ _purpose: BIOS), the device won't be able to get the master key and decrypt its data partition. _steps: + NOTE!!!! YOU'LL HAVE TO RE-INSTALL THE IMAGE AFTER THIS TEST 1. Install the image and make sure it boots and you can log in. - 2. Turn the device off and upgrade/downgrade the BIOS or modify Secure Boot state - 3. Make sure the BIOS is set up properly (e.g. TPM enabled, UEFI boot mode) - 4. Start the device + 2. Make sure the BIOS is set up properly (e.g. TPM enabled, UEFI boot mode) + 3. Based on your project's situation, choose one of the following methods to clean TPM: + a. Turn the device off and upgrade/downgrade the BIOS or modify Secure Boot state + b. Clean TPM via BIOS menu + c. Install checkbox, execute "checkbox-[project name].checkbox-cli run com.canonical.certification::tpm2.0_3.0.4/tpm2_takeownership" + 4. Start or reboot the device _verification: Mark this test as "Passed" if the device cannot boot anymore. - Note: You must flash the BIOS back to the latest version, re-enable Secure Boot - and re-install the image afterwards. |