Bug 1465355

Summary: TPM2 Dictionary attack lock reset test failing
Product: Red Hat Enterprise Linux 7 Reporter: Vilém Maršík <vmarsik>
Component: tpm2-tssAssignee: Jerry Snitselaar <jsnitsel>
Status: CLOSED WONTFIX QA Contact: Vilém Maršík <vmarsik>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 7.4CC: kasmith
Target Milestone: rc   
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-02-05 00:24:21 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Vilém Maršík 2017-06-27 09:43:28 UTC
Description of problem:
Dictionary attack lock reset test from tpmtest suite fails on a HW TPM 2.0 (the other tests succeed).

Version-Release number of selected component (if applicable):
tpm2-tss-utils-1.0-5.el7.x86_64
kernel 3.10.0-663.el7.x86_64
dmesg: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1A, rev-id 16)

How reproducible:
100%

Steps to Reproduce:
1. run /usr/bin/tpmtest from tpm2-tss-utils-1.0-5.el7.x86_64
2. select 9 - DICTIONARY ATTACK LOCK RESET TEST
3. select 0 - RUN ALL TEST CASES

Actual results:
test failing

Expected results:
test passing

Additional info:
Running on a physical TPMv2.0

Comment 2 Jerry Snitselaar 2019-02-05 00:24:21 UTC
Intel's old tpmtest tool was developed to be run against a simulator, and had a lot of issues especially when run against real hardware. They completely replaced it for testing purposes, so closing this out. If another issue is seen with dictionary attack lock reset, we can track it down in a new bz.