[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAMxuvaxB=dpz-1J1RJ6Phaan8=a0QXcu7jYiwUOE85NN5v7xTw@mail.gmail.com>
Date: Tue, 23 Nov 2021 12:13:52 +0400
From: Marc-André Lureau <marcandre.lureau@...hat.com>
To: Stefan Berger <stefanb@...ux.ibm.com>
Cc: jarkko@...nel.org, linux-integrity@...r.kernel.org,
peterhuewe@....de,
Linux Kernel Mailing List <linux-kernel@...r.kernel.org>
Subject: Re: [PATCH 2/2] selftests: tpm2: Reset the dictionary attack lock
On Mon, Nov 22, 2021 at 11:18 PM Stefan Berger <stefanb@...ux.ibm.com> wrote:
>
> Reset the dictionary attack lock to avoid the following types of test
> failures after running the test 2 times:
>
> ======================================================================
> ERROR: test_unseal_with_wrong_policy (tpm2_tests.SmokeTest)
> ----------------------------------------------------------------------
> Traceback (most recent call last):
> File "/root/linux-ima-namespaces/tools/testing/selftests/tpm2/tpm2_tests.py", line 105, in test_unseal_with_wrong_policy
> blob = self.client.seal(self.root_key, data, auth, policy_dig)
> File "/root/linux-ima-namespaces/tools/testing/selftests/tpm2/tpm2.py", line 620, in seal
> rsp = self.send_cmd(cmd)
> File "/root/linux-ima-namespaces/tools/testing/selftests/tpm2/tpm2.py", line 397, in send_cmd
> raise ProtocolError(cc, rc)
> tpm2.ProtocolError: TPM_RC_LOCKOUT: cc=0x00000153, rc=0x00000921
>
> Signed-off-by: Stefan Berger <stefanb@...ux.ibm.com>
Tested-by: Marc-André Lureau <marcandre.lureau@...hat.com>
> ---
> tools/testing/selftests/tpm2/tpm2_tests.py | 1 +
> 1 file changed, 1 insertion(+)
>
> diff --git a/tools/testing/selftests/tpm2/tpm2_tests.py b/tools/testing/selftests/tpm2/tpm2_tests.py
> index a569c8d0db08..109ffd736c73 100644
> --- a/tools/testing/selftests/tpm2/tpm2_tests.py
> +++ b/tools/testing/selftests/tpm2/tpm2_tests.py
> @@ -100,6 +100,7 @@ class SmokeTest(unittest.TestCase):
> policy_dig = self.client.get_policy_digest(handle)
> finally:
> self.client.flush_context(handle)
> + self.client.reset_da_lock()
>
> blob = self.client.seal(self.root_key, data, auth, policy_dig)
>
> --
> 2.31.1
>
Powered by blists - more mailing lists