From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S935432AbeEJL2y (ORCPT ); Thu, 10 May 2018 07:28:54 -0400 Received: from anor.bigon.be ([91.121.173.99]:45115 "EHLO anor.bigon.be" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S934380AbeEJL2x (ORCPT ); Thu, 10 May 2018 07:28:53 -0400 Subject: Re: [PATCH] tpm_tis: verify locality released before returning from release_locality To: linux-integrity@vger.kernel.org, linux-kernel@vger.kernel.org, Jarkko Sakkinen , Peter Huewe , Jason Gunthorpe References: <20180505195453.10431-1-jsnitsel@redhat.com> <20180505200315.x7jt33j7psizmfyi@cantor> From: Laurent Bigonville Message-ID: Date: Thu, 10 May 2018 13:21:39 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.7.0 MIME-Version: 1.0 In-Reply-To: <20180505200315.x7jt33j7psizmfyi@cantor> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8bit Content-Language: en-US Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Le 05/05/18 à 22:03, Jerry Snitselaar a écrit : > On Sat May 05 18, Jerry Snitselaar wrote: >> [...] >> > > Laurent, Hello Jerry, > Can you try this patch with your system since it is the one > that has exhibited the problem so far. I've tested on a > tpm2.0 and tpm1.2 system here. I just tested the patch and the driver is loading fine again and the device in /dev is present again, so it seems to work. But for some reason the tpm is again locked (for no visible reason) due to "dictionary attack" so I cannot test further ATM :/ Regards, Laurent > > Regards, > Jerry From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from anor.bigon.be ([91.121.173.99]:45111 "EHLO anor.bigon.be" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S934002AbeEJLWE (ORCPT ); Thu, 10 May 2018 07:22:04 -0400 Subject: Re: [PATCH] tpm_tis: verify locality released before returning from release_locality To: linux-integrity@vger.kernel.org, linux-kernel@vger.kernel.org, Jarkko Sakkinen , Peter Huewe , Jason Gunthorpe References: <20180505195453.10431-1-jsnitsel@redhat.com> <20180505200315.x7jt33j7psizmfyi@cantor> From: Laurent Bigonville Message-ID: Date: Thu, 10 May 2018 13:21:39 +0200 MIME-Version: 1.0 In-Reply-To: <20180505200315.x7jt33j7psizmfyi@cantor> Content-Type: text/plain; charset=utf-8; format=flowed Sender: linux-integrity-owner@vger.kernel.org List-ID: Le 05/05/18 a 22:03, Jerry Snitselaar a ecrit : > On Sat May 05 18, Jerry Snitselaar wrote: >> [...] >> > > Laurent, Hello Jerry, > Can you try this patch with your system since it is the one > that has exhibited the problem so far. I've tested on a > tpm2.0 and tpm1.2 system here. I just tested the patch and the driver is loading fine again and the device in /dev is present again, so it seems to work. But for some reason the tpm is again locked (for no visible reason) due to "dictionary attack" so I cannot test further ATM :/ Regards, Laurent > > Regards, > Jerry