Ceri,
I found this by searching on google:
https://groups.google.com/a/chromium.org/forum/#!topic/chromium-os-checkins/iJjc8Mzzzow
<https://groups.google.com/a/chromium.org/forum/#%21topic/chromium-os-checkins/iJjc8Mzzzow>
Looks like it's a known characteristic of STM TPMs, which needs to run
the self test after resume operations.
I suggest you take a look at the kernel source of your system and check
if the changes mentioned in this thread were applied to your kernel.
Em 04-11-2013 13:49, Richard escreveu:
Hi Ceri,
I saw something about it in the tpm-dd mailing list. I'll investigate
and get back to you if I find something.
Em 02-11-2013 10:02, Ceri Coburn escreveu:
Hi All,
Up until now I have been using the TPM emulator project for
interfacing with a TPM which has worked great. I am now in the
process of starting to test my TPM unit tests on a real TPM that we
intend on using for our project.
Upon starting the tcsd daemon it fails instantly with the following output.
TCSD tcsd_conf.c:94 platform_class_list_append:
platform_class_list_append start:
TCSD tcsd_conf.c:126 platform_class_list_append: Platform Class Added.
TCSD TCS tcsi_caps_tpm.c:43 Entering Get Cap
To TPM: 00 C1 00 00 00 12 00 00 00 65 00 00 00 1A 00 00
To TPM: 00 00
TCSD TDDL tddl.c:171 Calling write to driver
TCSD TDDL tddl.c:188 ioctl: (25) Inappropriate ioctl for device
TCSD TDDL tddl.c:189 Falling back to Read/Write device support.
>From TPM: 00 C4 00 00 00 1E 00 00 00 00 00 00 00 10 00 30
>From TPM: 01 02 0D 0A 00 02 03 53 54 4D 20 00 01 4B
TCSD TCS tcsi_caps_tpm.c:43 Entering Get Cap
To TPM: 00 C1 00 00 00 16 00 00 00 65 00 00 00 01 00 00
To TPM: 00 04 00 00 00 B4
TCSD TDDL tddl.c:171 Calling write to driver
>From TPM: 00 C4 00 00 00 0A 00 00 08 01
LOG_RETERR TPM tcsi_caps_tpm.c:52: 0x801
TCSD TCS ERROR: tcs_caps.c:191 TCS GetCapability failed with result = 0x801
Would anyone know if this a problem with the ST33 TPM driver or
something inside TrouSerS?
Thanks.
------------------------------------------------------------------------------
Android is increasing in popularity, but the open development platform that
developers love is also attractive to malware creators. Download this white
paper to learn more about secure code signing practices that can help keep
Android apps secure.
http://pubads.g.doubleclick.net/gampad/clk?id=65839951&iu=/4140/ostg.clktrk
_______________________________________________
TrouSerS-tech mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/trousers-tech
------------------------------------------------------------------------------
Android is increasing in popularity, but the open development platform that
developers love is also attractive to malware creators. Download this white
paper to learn more about secure code signing practices that can help keep
Android apps secure.
http://pubads.g.doubleclick.net/gampad/clk?id=65839951&iu=/4140/ostg.clktrk
_______________________________________________
TrouSerS-tech mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/trousers-tech
------------------------------------------------------------------------------
Android is increasing in popularity, but the open development platform that
developers love is also attractive to malware creators. Download this white
paper to learn more about secure code signing practices that can help keep
Android apps secure.
http://pubads.g.doubleclick.net/gampad/clk?id=65839951&iu=/4140/ostg.clktrk
_______________________________________________
TrouSerS-tech mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/trousers-tech