Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp3075744ybt; Mon, 22 Jun 2020 14:25:43 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyfhVI+YqMP5jxwT8IZC1miJhRdWlPoiMsDbVMPyJcS7tm/brJUop1KEjnZ9nhbtU6XulQ+ X-Received: by 2002:a05:6402:b4c:: with SMTP id bx12mr4436340edb.117.1592861143185; Mon, 22 Jun 2020 14:25:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1592861143; cv=none; d=google.com; s=arc-20160816; b=LSqI/Iy9QMwwdExMZmX62jIcyUBPXwH1024hsjA5cjTKS8pZ3BG8J85RzeYL5RHCFv jNQ2FvjUh9GDx9GxBkSOoB4CHch+BRuP9D8u4B6IxPDr7Bdiiv1ZH+wHUWK0U1D5l2IV Vh49tCFZlJ6nBpLYQdP/YOXg5gyYNA0iJl93vuCxTwvKIP70pfSMMSTsEs3WQ4A/86dW OkF9+NUAvxYXRMmi/5lkFO3zzMPtp0qK21VEGbyJuORV3+pKbVBuQ0s4MHNrllJspEFW ST51J/2rYcu0/UndHsocqPE6Ehup0MFjAz291J44g4V4YGVklHQz94oYBCCxsc+80Ra8 Gmpw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :ironport-sdr:ironport-sdr; bh=28o6KeH/MgBv1dH4zx1lZAx90YH08q/pdoW+mzbpZ30=; b=ZuvTGngbO0RrzfxNSKSNrNosEmzWmHNX/LyiLZE9CToBo2hSNPHRLXA38h6bOa6rGQ kvpFJv+Z/dyg9W2LhbFQSqjGUg+u2wSTuHHbN+lo4CI1DkQBs/nbUjywyelvQkfecBoZ dq//3dBEjFAPAYWcta2b4iuy2sy/c9n7FCzwnukMRAaNOv3Ip8eihkbKT00dh/vz4HH/ 20pJkx5CTfG+OhOfyN5xixJ8WFtv32k+MKNYRnxdJaOpQdMilbHAd12W3s1HfF153Fs1 GhBUcVL90pEFnR94iS5nk/2VZ+yGwfZx8wjHOZu58U+gyLV3FYW3dQun49ZjfdAViQnX iWlw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f17si10692410edr.515.2020.06.22.14.25.20; Mon, 22 Jun 2020 14:25:43 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730571AbgFVVXN (ORCPT + 99 others); Mon, 22 Jun 2020 17:23:13 -0400 Received: from mga12.intel.com ([192.55.52.136]:2435 "EHLO mga12.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730460AbgFVVXL (ORCPT ); Mon, 22 Jun 2020 17:23:11 -0400 IronPort-SDR: k8dhMNyzdXZbSwDt1OmHO0XN7WDnceahm/RO+LcHcMYFC1tx4+49EOaw8xILN0i/3gDsYqrfab weug+k782/XA== X-IronPort-AV: E=McAfee;i="6000,8403,9660"; a="123548484" X-IronPort-AV: E=Sophos;i="5.75,268,1589266800"; d="scan'208";a="123548484" X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga006.jf.intel.com ([10.7.209.51]) by fmsmga106.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 22 Jun 2020 14:23:07 -0700 IronPort-SDR: HT28r4MFHIWnj1VKD2Ee6Sac8XbdwleMeRtuTIZ4ENl2/A9cbBVaAKyouMzUQhTskq6ulxETRU Ui8VzQS8/Zjw== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.75,268,1589266800"; d="scan'208";a="278894224" Received: from scheller-mobl.ger.corp.intel.com (HELO localhost) ([10.252.33.117]) by orsmga006.jf.intel.com with ESMTP; 22 Jun 2020 14:23:03 -0700 From: Jarkko Sakkinen To: Shuah Khan Cc: pengfei.xu@intel.com, Jarkko Sakkinen , Tadeusz Struk , stable@vger.kernel.org, linux-integrity@vger.kernel.org, linux-kselftest@vger.kernel.org, Nikita Sobolev , Petr Vorel , linux-kernel@vger.kernel.org (open list) Subject: [PATCH 1/3] Revert "tpm: selftest: cleanup after unseal with wrong auth/policy test" Date: Tue, 23 Jun 2020 00:20:20 +0300 Message-Id: <20200622212034.20624-2-jarkko.sakkinen@linux.intel.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20200622212034.20624-1-jarkko.sakkinen@linux.intel.com> References: <20200622212034.20624-1-jarkko.sakkinen@linux.intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The reverted commit illegitly uses tpm2-tools. External dependencies are absolutely forbidden from these tests. There is also the problem that clearing is not necessarily wanted behavior if the test/target computer is not used only solely for testing. Fixes: a9920d3bad40 ("tpm: selftest: cleanup after unseal with wrong auth/policy test") Cc: Tadeusz Struk Cc: stable@vger.kernel.org Cc: linux-integrity@vger.kernel.org Cc: linux-kselftest@vger.kernel.org Signed-off-by: Jarkko Sakkinen --- tools/testing/selftests/tpm2/test_smoke.sh | 5 ----- 1 file changed, 5 deletions(-) diff --git a/tools/testing/selftests/tpm2/test_smoke.sh b/tools/testing/selftests/tpm2/test_smoke.sh index 663062701d5a..79f8e9da5d21 100755 --- a/tools/testing/selftests/tpm2/test_smoke.sh +++ b/tools/testing/selftests/tpm2/test_smoke.sh @@ -8,8 +8,3 @@ ksft_skip=4 python -m unittest -v tpm2_tests.SmokeTest python -m unittest -v tpm2_tests.AsyncTest - -CLEAR_CMD=$(which tpm2_clear) -if [ -n $CLEAR_CMD ]; then - tpm2_clear -T device -fi -- 2.25.1