Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp5928011ybl; Tue, 10 Dec 2019 13:56:03 -0800 (PST) X-Google-Smtp-Source: APXvYqx6tpgDl7v7zGoFaOEhN6xLuK928qmy1V1RGThcJF42VzY54ZUwd5SurTjBNOb68hjRMRg4 X-Received: by 2002:a05:6830:120c:: with SMTP id r12mr28364621otp.327.1576014963598; Tue, 10 Dec 2019 13:56:03 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1576014963; cv=none; d=google.com; s=arc-20160816; b=1CbOpHMGwE0bK6eiy7eIcXUofWRBWGrTycea0a3sAT0eY77F80Ce5quCOmpznZrVCg wsj5Q8g7oOTUT7Bvta3AMeFF9N7aBFJanmprQFQ7+neWyabkW2gsAW7oqJeRqBJp37x4 aEC5HKDcu1g8q/M1NfQ/LJgWSB1lPiwnQycdt6PKCF/cln5tRzU3hA8Bg/ARGRzIvlsv 5WxrFUBua3dLdBbaeGN4R37kcAPUWJldv4JhdHv4pQrpUaZOFNt7OiLQj0DCTKZ8KKal nN/B6XPW1ZlX61TAZ54ZsqfnwasWZSJQSrTczYe/Nc2rxZrO1Cy6cDMfaERsSnVJhHde 7vUg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:message-id:date:cc:to:from:subject; bh=0lJnpAtcrphue4vOyimVcYvKOeJOcTG5j1VsadkhaFQ=; b=s/zYL/U/n5iWu4x0+I3B44J7R36CGrxNJ3F8zzmSqTplh8+uPKyrjTLTqWqckME8Kh WLXBcuoxaF0GlPqXMmwKeIM0VijP863PSCimMlwRhYtRvR+YJiSWDLLiubtehCMNgGrc mjXhDtIszgO7TI7AMALv7HdvRiKWuYOzKCT/Nr4DyCxBQYZU03B51np/dZyMydq7PJPg 7H/Lya+pft7X+4ePOQjewEqVPARkARaENU9tm0ot6VKFRK7Bwp1M3TKvuSwGBNf939M/ FBKzhr57G3h8JkDJ7bewTxVLPCPgaKt1urLMbswh1JvWQtLBDJfOj46n9eSiB7LgItnJ dxww== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g16si2653202otj.129.2019.12.10.13.55.51; Tue, 10 Dec 2019 13:56:03 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727131AbfLJVzU (ORCPT + 99 others); Tue, 10 Dec 2019 16:55:20 -0500 Received: from mga04.intel.com ([192.55.52.120]:35698 "EHLO mga04.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726417AbfLJVzU (ORCPT ); Tue, 10 Dec 2019 16:55:20 -0500 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga003.fm.intel.com ([10.253.24.29]) by fmsmga104.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 10 Dec 2019 13:55:19 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.69,301,1571727600"; d="scan'208";a="264663126" Received: from tstruk-mobl1.jf.intel.com (HELO [127.0.1.1]) ([10.7.196.67]) by FMSMGA003.fm.intel.com with ESMTP; 10 Dec 2019 13:55:19 -0800 Subject: [PATCH] tpm: selftests: cleanup after unseal with wrong policy test From: Tadeusz Struk To: jarkko.sakkinen@linux.intel.com Cc: linux-integrity@vger.kernel.org, linux-kernel@vger.kernel.org, tadeusz.struk@intel.com Date: Tue, 10 Dec 2019 13:55:20 -0800 Message-ID: <157601492070.15343.464606544465753590.stgit@tstruk-mobl1> User-Agent: StGit/0.17.1-dirty MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Unseal with wrong policy tests affects DA lockout and eventually causes to fail with: "ProtocolError: TPM_RC_LOCKOUT: cc=0x00000153, rc=0x00000921", when the test runs multiple times. Send tpm clear command after the test to reset the DA counters. Signed-off-by: Tadeusz Struk --- tools/testing/selftests/tpm2/test_smoke.sh | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/tools/testing/selftests/tpm2/test_smoke.sh b/tools/testing/selftests/tpm2/test_smoke.sh index 80521d46220c..22ae4183f2b9 100755 --- a/tools/testing/selftests/tpm2/test_smoke.sh +++ b/tools/testing/selftests/tpm2/test_smoke.sh @@ -2,3 +2,8 @@ # SPDX-License-Identifier: (GPL-2.0 OR BSD-3-Clause) python -m unittest -v tpm2_tests.SmokeTest + +CLEAR_CMD=$(which tpm2_clear) +if [ -n $CLEAR_CMD ]; then + tpm2_clear -T device +fi