Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp1134637ybt; Tue, 7 Jul 2020 08:31:11 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyUgFSxbSmir0/U5H8N20/a4a4PLJCfpaQNBrPehop00vv1htPrCUBkXGY9MIHifdbZWHRn X-Received: by 2002:a17:906:c9d6:: with SMTP id hk22mr46988707ejb.101.1594135871145; Tue, 07 Jul 2020 08:31:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1594135871; cv=none; d=google.com; s=arc-20160816; b=U2G+jT4EWtA/PJ8bhSWYmX1YzKtjcyVDe58oM7Qc2jlIobPSPoAuk8WmM+r5o9L7uB JN4lZ/0Iw5WrkjF8Ke08nYYBR8vewPqQL/SYA2ambAC97ZaPSfSnqBDp/nofv9tneX2r rdsNxGl9sCxZQvSgCNMcVrqe3TTp3VFIpn1rpkRJZYxqf/ZWryKDFfGdxEuNH3Ku/re8 B1GnfShGa62akkasOP7VqK9mizg6xWcirESLvoHYVjhxGdjjR4gMJBTVzrjTrNlf/fbv B4JZ648XWSi77XyuJZWae63j4UHByEyMMy8rfB5v0MEC1kazs6H7chKj9IVpehyR5m9U 70oQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=TL/w07vb5SF4iYnSfdSq3E/9eFN01WC01JOnQY6pN1I=; b=wPg3VzrHd0DwmIeuxDODmxIHyCwmDnsMQBZbWuYF2WmeVh90tqhcvT87w1OOsek+GS YT9CITzSE1m7vX+11jEqBN2ywTEd5cA29lWTQj7RD7Le9zwa8yNpogr92vJL9yo+mmWu SsqSpYsxgcZOGI8bk2TEeDwt0l7uQVlV9tLa/CFELkofqUMr+RgRUOI5ts11qo4VffWh rBvN3HDY3ZUJA/c15x1PYqxlbpJZ7P/7olhGuabnEXGmR/lvLgqXrb8N/te4aEU1nOW1 EL/cXnlxau3ofbc76uvWv+op9r5epPSvfuzAYwVIwvKIoRtIkn1SD+vVa5jPFeDQhsMC 0+Xw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ocPc7N5d; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id bc21si15797248edb.51.2020.07.07.08.30.47; Tue, 07 Jul 2020 08:31:11 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ocPc7N5d; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729723AbgGGPap (ORCPT + 99 others); Tue, 7 Jul 2020 11:30:45 -0400 Received: from mail.kernel.org ([198.145.29.99]:37314 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728799AbgGGPX6 (ORCPT ); Tue, 7 Jul 2020 11:23:58 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 251F52082F; Tue, 7 Jul 2020 15:23:56 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1594135437; bh=69SI/+M+EsrYPGUsjvNrScM3WRasXNkolneBXj8DZOk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ocPc7N5dSK6V6EHsGschyl3xU0LGyVbSaYwdf9+7mH0QyxQCiVIkHlZ7Fwz3hNOiw 2ZxmQ9ugNKL7AeI/D5DwscGrNIDd9RYlF2EwVy613tm76YOlIXFVF+Xj1/xj6/5cE2 07Mc0DDx6pJBP8VrREmIF736wRslSIjLYZ0XwrLE= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Tadeusz Struk , linux-integrity@vger.kernel.org, linux-kselftest@vger.kernel.org, Jarkko Sakkinen , Shuah Khan Subject: [PATCH 5.7 041/112] Revert "tpm: selftest: cleanup after unseal with wrong auth/policy test" Date: Tue, 7 Jul 2020 17:16:46 +0200 Message-Id: <20200707145802.953085875@linuxfoundation.org> X-Mailer: git-send-email 2.27.0 In-Reply-To: <20200707145800.925304888@linuxfoundation.org> References: <20200707145800.925304888@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Jarkko Sakkinen commit 5be206eaac9a68992fc3b06fb5dd5634e323de86 upstream. The reverted commit illegitly uses tpm2-tools. External dependencies are absolutely forbidden from these tests. There is also the problem that clearing is not necessarily wanted behavior if the test/target computer is not used only solely for testing. Fixes: a9920d3bad40 ("tpm: selftest: cleanup after unseal with wrong auth/policy test") Cc: Tadeusz Struk Cc: stable@vger.kernel.org Cc: linux-integrity@vger.kernel.org Cc: linux-kselftest@vger.kernel.org Signed-off-by: Jarkko Sakkinen Signed-off-by: Shuah Khan Signed-off-by: Greg Kroah-Hartman --- tools/testing/selftests/tpm2/test_smoke.sh | 5 ----- 1 file changed, 5 deletions(-) --- a/tools/testing/selftests/tpm2/test_smoke.sh +++ b/tools/testing/selftests/tpm2/test_smoke.sh @@ -3,8 +3,3 @@ python -m unittest -v tpm2_tests.SmokeTest python -m unittest -v tpm2_tests.AsyncTest - -CLEAR_CMD=$(which tpm2_clear) -if [ -n $CLEAR_CMD ]; then - tpm2_clear -T device -fi