Would it be possible for you to test the latest upstream kernel? Refer
to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest
v4.10 kernel[0].

If this bug is fixed in the mainline kernel, please add the following
tag 'kernel-fixed-upstream'.

If the mainline kernel does not fix this bug, please add the tag:
'kernel-bug-exists-upstream'.

Once testing of the upstream kernel is complete, please mark this bug as
"Confirmed".


Thanks in advance.

[0] http://kernel.ubuntu.com/~kernel-ppa/mainline/v4.10-rc8

** Changed in: linux (Ubuntu)
   Importance: Undecided => Medium

** Tags added: kernel-da-key

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1663904

Title:
  tpm_tis: a TPM error occurred attempting to read a PCR value

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  I recently started getting the same error in Arch Linux and am not
  sure what happened. This is on a work computer, separate drive, so I
  can't disable TPM via the BIOS like various reports suggest. The error
  from dmesg that flashes right after I initiate the boot:

  $ dmesg |grep -i tpm
  [    4.907466] tpm_tis 00:07: 1.2 TPM (device-id 0x1A, rev-id 16)
  [    5.219488] tpm_tis 00:07: TPM is disabled/deactivated (0x7)
  [    5.331494] tpm_tis 00:07: A TPM error (7) occurred attempting to read a 
pcr value
  [    5.331538] ima: No TPM chip found, activating TPM-bypass!

  The same bug appears to have been reported more than a year ago:
  - https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1427860

  It's frustrating to see users were to submit their own separate
  reports, at least one appears to have done so, and then the bug
  expires due to 60 days of no activity. It looks to still be an issue.
  I started experiencing the same thing on Arch recently but they don't
  build tpm_tis into the kernel so I can blacklist the modules.

  ProblemType: Bug
  DistroRelease: Ubuntu 16.04
  Package: linux-image-4.4.0-31-generic 4.4.0-31.50
  ProcVersionSignature: Ubuntu 4.4.0-31.50-generic 4.4.13
  Uname: Linux 4.4.0-31-generic x86_64
  ApportVersion: 2.20.1-0ubuntu2.1
  Architecture: amd64
  AudioDevicesInUse:
   USER        PID ACCESS COMMAND
   /dev/snd/controlC1:  jwhendy    4283 F.... pulseaudio
   /dev/snd/controlC0:  jwhendy    4283 F.... pulseaudio
  CurrentDesktop: Unity
  Date: Sat Feb 11 10:52:33 2017
  InstallationDate: Installed on 2017-02-11 (0 days ago)
  InstallationMedia: Ubuntu 16.04.1 LTS "Xenial Xerus" - Release amd64 
(20160719)
  MachineType: Hewlett-Packard HP ZBook 15 G2
  ProcFB:
   0 nouveaufb
   1 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=../vmlinuz-4.4.0-31-generic 
root=UUID=80262d8f-fc26-45a7-ad8d-1a5bad414250 ro 
rootflags=compress=lzo,discard,ssd,subvol=hostname luks.allow=discards quiet 
splash $vt_handoff initrd=../initrd.img-4.4.0-31-generic
  RelatedPackageVersions:
   linux-restricted-modules-4.4.0-31-generic N/A
   linux-backports-modules-4.4.0-31-generic  N/A
   linux-firmware                            1.157.2
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 04/13/2015
  dmi.bios.vendor: Hewlett-Packard
  dmi.bios.version: M70 Ver. 80.08
  dmi.board.name: 2253
  dmi.board.vendor: Hewlett-Packard
  dmi.board.version: KBC Version 03.10
  dmi.chassis.type: 10
  dmi.chassis.vendor: Hewlett-Packard
  dmi.modalias: 
dmi:bvnHewlett-Packard:bvrM70Ver.80.08:bd04/13/2015:svnHewlett-Packard:pnHPZBook15G2:pvrA3009DD10303:rvnHewlett-Packard:rn2253:rvrKBCVersion03.10:cvnHewlett-Packard:ct10:cvr:
  dmi.product.name: HP ZBook 15 G2
  dmi.product.version: A3009DD10303
  dmi.sys.vendor: Hewlett-Packard

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1663904/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to