Received: by 2002:a05:6a10:6744:0:0:0:0 with SMTP id w4csp15322pxu; Wed, 14 Oct 2020 18:35:26 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxdt62/4QUWE4leEFmiECZ4H5/4ZTq8hCCI96v8/lcLINIjmMcF9ofHL9IwVxtsglFi+pEW X-Received: by 2002:a05:6402:1585:: with SMTP id c5mr1904676edv.278.1602725726310; Wed, 14 Oct 2020 18:35:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1602725726; cv=none; d=google.com; s=arc-20160816; b=acnNStlhAoCYXRXZwhgg5t6aEHssvrjtg1nL3/qdQ2qlN6NJMxCJI9pBtZiKODhzTt WMiDWigl1j3yQ92SRiR9AJr3nbVEkRE12uC9gTayRjenqB9RMNHerFf+2xmrMz/nfEcT +Nu5kMN55X3Rcpp+g/EgYROjzQsgOuRkwbTft9y8HA8lZk+yhtCZG0hA5NJAeAQuklmG sKdIA+5YCDWzkI1BiKA+5/ZNjBIMUiWmgHHO6pBP7A7oA9JOuFszOyy2mb4UuHmGsETm sd2A2w6YeYYLXIa0GfntJ5g7b9vkH9sZEGXDVKa3vLePlszfUs3rsRWh2W5jde8g085T qw2Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:date:cc:to:from:subject :message-id:dkim-signature:dkim-signature; bh=PsoIZZegiDhLpJf+ujC+iAYooMKt3MNEBHbDtpT+pIo=; b=MdQ69LKRjbAv9niVF7ZRNXdbF3qmq0sH4aY4ZuIrH4dTEep68GEtNsTAZNQMdudZ66 azeTiM5kTkDq02lTJ+aKcqPGafbDO92LwhWHst/aeGzzJx6npSbcNq4JQjWUQJmXxc1T Dni/41qY7ITq+E+RoZLePpWhqC9PZgNQCI/28kjbfMzn9tlCALG59fAi7ya/40e3vKF1 SeOsfZM/BWZvGWVbr5BmxRxTAbqgdTPTB0B+FokwuZsJIehOteC5xkqKLxdtj8PiJta3 gLTvmuj89PCpBM4EjxuOeqqWo0vW63kO1vA52q37mnuuTqmviuRKBmPqF1QyROt9vYyx QARA== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@hansenpartnership.com header.s=20151216 header.b=ibtqjZ5B; dkim=fail header.i=@hansenpartnership.com header.s=20151216 header.b=ibtqjZ5B; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=hansenpartnership.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a64si910699edf.234.2020.10.14.18.35.04; Wed, 14 Oct 2020 18:35:26 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=fail header.i=@hansenpartnership.com header.s=20151216 header.b=ibtqjZ5B; dkim=fail header.i=@hansenpartnership.com header.s=20151216 header.b=ibtqjZ5B; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=hansenpartnership.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387534AbgJNSYL (ORCPT + 99 others); Wed, 14 Oct 2020 14:24:11 -0400 Received: from bedivere.hansenpartnership.com ([96.44.175.130]:45102 "EHLO bedivere.hansenpartnership.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728969AbgJNSYK (ORCPT ); Wed, 14 Oct 2020 14:24:10 -0400 Received: from localhost (localhost [127.0.0.1]) by bedivere.hansenpartnership.com (Postfix) with ESMTP id 9DFCE1280089; Wed, 14 Oct 2020 11:24:10 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=hansenpartnership.com; s=20151216; t=1602699850; bh=8iBFvTIDoDefM60Uy7VqRbhIBoOaZ44/XOKi6gEvOQ0=; h=Subject:From:To:Cc:Date:In-Reply-To:References:From; b=ibtqjZ5BUS83QzWPZmlvTkgl9Z/KV+XCzz0YHeTUFGzdF9UC+9ooEPaKpZcQRxHcf npDSEjC4ihE2jFbAxcb6A2oXhYlp7mk9TnrNPbwba4zapTMTA42C6pxzNMIyYWHd/c 1L8pE/in4nGIzgRusliNNN40lK5xBvrXdRzCqaX4= Received: from bedivere.hansenpartnership.com ([127.0.0.1]) by localhost (bedivere.hansenpartnership.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MIVls0OFK2yQ; Wed, 14 Oct 2020 11:24:10 -0700 (PDT) Received: from jarvis.int.hansenpartnership.com (c-73-35-198-56.hsd1.wa.comcast.net [73.35.198.56]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by bedivere.hansenpartnership.com (Postfix) with ESMTPSA id 4586A1280082; Wed, 14 Oct 2020 11:24:10 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=hansenpartnership.com; s=20151216; t=1602699850; bh=8iBFvTIDoDefM60Uy7VqRbhIBoOaZ44/XOKi6gEvOQ0=; h=Subject:From:To:Cc:Date:In-Reply-To:References:From; b=ibtqjZ5BUS83QzWPZmlvTkgl9Z/KV+XCzz0YHeTUFGzdF9UC+9ooEPaKpZcQRxHcf npDSEjC4ihE2jFbAxcb6A2oXhYlp7mk9TnrNPbwba4zapTMTA42C6pxzNMIyYWHd/c 1L8pE/in4nGIzgRusliNNN40lK5xBvrXdRzCqaX4= Message-ID: <7729a41ac22dab84a785bc7a6228af28b814a33a.camel@HansenPartnership.com> Subject: Re: WARN_ONCE triggered: tpm_tis: Add a check for invalid status From: James Bottomley To: Dirk Gouders , Jarkko Sakkinen Cc: linux-integrity@vger.kernel.org, linux-kernel@vger.kernel.org Date: Wed, 14 Oct 2020 11:24:08 -0700 In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.34.4 MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 2020-10-14 at 19:57 +0200, Dirk Gouders wrote: > On my laptop the check introduced with 55707d531af62b (tpm_tis: Add a > check for invalid status) triggered the warning (output below). > > So, my laptop seems to be a candidate for testing. I'm afraid this is a known problem on a wide range of TIS TPMs ... it's fixed by the patch set I'm trying to get upstream: https://lore.kernel.org/linux-integrity/20201001180925.13808-1-James.Bottomley@HansenPartnership.com/ But in the meantime, it's harmless. The TIS code at the point in the trace is trying to send a TPM2_GetCapability() command which fails because the locality isn't listening, but the design of that command is only to trigger an interrupt to probe the interrupt handling nothing else depends on it succeeding. James