From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.3 required=3.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,USER_AGENT_SANE_1 autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id D415DC49ED7 for ; Mon, 16 Sep 2019 07:16:00 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id A5F40206A4 for ; Mon, 16 Sep 2019 07:16:00 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727663AbfIPHQA (ORCPT ); Mon, 16 Sep 2019 03:16:00 -0400 Received: from mga06.intel.com ([134.134.136.31]:43519 "EHLO mga06.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727109AbfIPHQA (ORCPT ); Mon, 16 Sep 2019 03:16:00 -0400 X-Amp-Result: UNKNOWN X-Amp-Original-Verdict: FILE UNKNOWN X-Amp-File-Uploaded: False Received: from orsmga002.jf.intel.com ([10.7.209.21]) by orsmga104.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 16 Sep 2019 00:15:59 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.64,492,1559545200"; d="scan'208";a="198256699" Received: from sshkruni-mobl.ccr.corp.intel.com (HELO localhost) ([10.249.38.138]) by orsmga002.jf.intel.com with ESMTP; 16 Sep 2019 00:15:56 -0700 Date: Mon, 16 Sep 2019 10:15:55 +0300 From: Jarkko Sakkinen To: Mimi Zohar Cc: linux-integrity@vger.kernel.org, Roberto Sassu , Petr Vorel Subject: Re: [PATCH] selftest/trustedkeys: TPM 1.2 trusted keys test Message-ID: <20190916071555.GC4859@linux.intel.com> References: <1568157511-5464-1-git-send-email-zohar@linux.ibm.com> <1568157876.4991.3.camel@linux.ibm.com> <1568203240.5783.8.camel@linux.ibm.com> <20190913140820.GC29755@linux.intel.com> <1568580742.5055.0.camel@linux.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <1568580742.5055.0.camel@linux.ibm.com> Organization: Intel Finland Oy - BIC 0357606-4 - Westendinkatu 7, 02160 Espoo User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-integrity-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-integrity@vger.kernel.org On Sun, Sep 15, 2019 at 04:52:22PM -0400, Mimi Zohar wrote: > On Fri, 2019-09-13 at 15:08 +0100, Jarkko Sakkinen wrote: > > On Wed, Sep 11, 2019 at 08:00:40AM -0400, Mimi Zohar wrote: > > > On Tue, 2019-09-10 at 19:24 -0400, Mimi Zohar wrote: > > > > On Tue, 2019-09-10 at 19:18 -0400, Mimi Zohar wrote: > > > > > Create, save and load trusted keys test > > > > > > > > Creating trusted keys is failing with the following messages. Any idea why? > > > > > > > > [ 147.014653] tpm tpm0: A TPM error (34) occurred attempting to a send a command > > > > [ 147.014678] trusted_key: srkseal failed (-1) > > > > [ 147.014687] trusted_key: key_seal failed (-1) > > > > > > This is a regression, that needs to be resolved.  The test works on > > > kernels prior to 5.1. > > > > It breaks on 5.2? > > No, the regression is in 5.1. > > > > > Can you bisect the failing commit? > > git bisect start -- drivers/char/tpm/ > git bisect bad > git bisect good v5.0  > > # first bad commit: [412eb585587a1dc43c9622db79de9663b6c4c238] tpm: > use tpm_buf in tpm_transmit_cmd() as the IO parameter Thank you. As I said I'll add your test to the tests that I regulary run so that this cannot happen again. /Jarkko