Received: by 10.192.165.156 with SMTP id m28csp1332458imm; Wed, 18 Apr 2018 08:04:12 -0700 (PDT) X-Google-Smtp-Source: AIpwx49/gmxZwuF3NF6KH6VjGJMcrpAs/3quU1uWEnZKoXE+sv+K7RizThIaU2SqhlJ8axLHF2cw X-Received: by 2002:a17:902:96a:: with SMTP id 97-v6mr2467073plm.266.1524063852530; Wed, 18 Apr 2018 08:04:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524063852; cv=none; d=google.com; s=arc-20160816; b=pNsiKXW/525we8PML+2HR5we9XLWc4QL/FmAO1Fa2gu4bNR03Ghr/3zOGsI+AYi+a2 Vz+/8zKAStwai+wCE8SoWv5xw4GvBujxf6u334lQPYHWK5b2gneSt9LFXSMXcmGqEzEn 2zGlw4LAvldgOz3eSZkdAwXdrVCAU33nLl5apJkubk7o9NfBretika8ix3mWLNtHyl2Y zY6uH5SL4i3sUdsw641+7pg2pIRNMlRG2YgrCb3v2nl0mUOI3zBucrAnd/pS8XSCXkRW Rc9zRJjCBjkKmplENe3T8iqlEBYpyLCaF74pritwMNoRKH2OogMQ0MrFlJH9Tqf4jEr8 IP/A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:content-transfer-encoding :mime-version:references:in-reply-to:date:cc:to:from:subject :arc-authentication-results; bh=G8SHdn4p4mX+NlYpdRQ7PKn6ChrhA4h/7OY3jJWpG9Y=; b=x5Y0ivUpYfdHyX2BYEeUChYi4a3gZ+NxT3exNK56QN3GNm23/7jeXtVhlAD4s8zWPa N1if0UvwEGsNy8K1fEc0oOJW2bNs36W9MX5Yhoa9kYj0xUyFVX3gJN6rDpjXsijD60wu yhDl6nVtlCm917vLrurxu+Sl9bhQ6LzlA1qYVQad7akgzTaEg0+6adrh9UoE2axF+e4S 2h8hUAFbUTRMj5hfRWsn5fPT1R4Je7GP1fHvoHD7f6UC9UaAsha76CJcNUyaNanprBK3 tNdbKtF4raetxyFbQdme+79aT9R5fwVGQFZeW/o0NXp5b3GP2Lr0F2NRTp22pxdwszUT jZNg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d23si1220569pgn.235.2018.04.18.08.03.33; Wed, 18 Apr 2018 08:04:12 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752617AbeDRPCB (ORCPT + 99 others); Wed, 18 Apr 2018 11:02:01 -0400 Received: from mx0a-001b2d01.pphosted.com ([148.163.156.1]:5854 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751204AbeDRPB7 (ORCPT ); Wed, 18 Apr 2018 11:01:59 -0400 Received: from pps.filterd (m0098410.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w3IEwbs8137629 for ; Wed, 18 Apr 2018 11:01:59 -0400 Received: from e06smtp13.uk.ibm.com (e06smtp13.uk.ibm.com [195.75.94.109]) by mx0a-001b2d01.pphosted.com with ESMTP id 2he6m1wu0m-1 (version=TLSv1.2 cipher=AES256-SHA256 bits=256 verify=NOT) for ; Wed, 18 Apr 2018 11:01:58 -0400 Received: from localhost by e06smtp13.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Wed, 18 Apr 2018 16:01:53 +0100 Received: from b06cxnps3074.portsmouth.uk.ibm.com (9.149.109.194) by e06smtp13.uk.ibm.com (192.168.101.143) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; Wed, 18 Apr 2018 16:01:51 +0100 Received: from d06av24.portsmouth.uk.ibm.com (mk.ibm.com [9.149.105.60]) by b06cxnps3074.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id w3IF1oNC3014976; Wed, 18 Apr 2018 15:01:50 GMT Received: from d06av24.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 781B542041; Wed, 18 Apr 2018 15:53:22 +0100 (BST) Received: from d06av24.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 1F4E642042; Wed, 18 Apr 2018 15:53:21 +0100 (BST) Received: from localhost.localdomain (unknown [9.80.106.43]) by d06av24.portsmouth.uk.ibm.com (Postfix) with ESMTP; Wed, 18 Apr 2018 15:53:20 +0100 (BST) Subject: Re: [PATCH v2 1/2] tpm: reduce poll sleep time in tpm_transmit() From: Mimi Zohar To: Nayna Jain , linux-integrity@vger.kernel.org Cc: linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org, peterhuewe@gmx.de, jarkko.sakkinen@linux.intel.com, tpmdd@selhorst.net, jgunthorpe@obsidianresearch.com, patrickc@us.ibm.com Date: Wed, 18 Apr 2018 11:01:48 -0400 In-Reply-To: <20180417131246.434-2-nayna@linux.vnet.ibm.com> References: <20180417131246.434-1-nayna@linux.vnet.ibm.com> <20180417131246.434-2-nayna@linux.vnet.ibm.com> Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.20.5 (3.20.5-1.fc24) Mime-Version: 1.0 Content-Transfer-Encoding: 7bit X-TM-AS-GCONF: 00 x-cbid: 18041815-0012-0000-0000-000005CC463C X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 18041815-0013-0000-0000-000019489845 Message-Id: <1524063708.3272.301.camel@linux.vnet.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2018-04-18_03:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1011 lowpriorityscore=0 impostorscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1709140000 definitions=main-1804180135 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 2018-04-17 at 09:12 -0400, Nayna Jain wrote: > The TPM polling code in tpm_transmit sleeps in each loop iteration for > 5 msecs. However, the TPM might return earlier, and thus waiting for > 5 msecs adds an unnecessary delay. This patch reduces the polling sleep > time in tpm_transmit() from 5 msecs to 1 msecs. > > Additionally, this patch renames TPM_POLL_SLEEP and moves it to tpm.h as > an enum value. > > After this change, performance on a TPM 1.2 with an 8 byte burstcount > for 1000 extends improved from ~14 sec to ~10.7 sec. > > Signed-off-by: Nayna Jain Reviewed-by: Mimi Zohar > --- > drivers/char/tpm/tpm-interface.c | 2 +- > drivers/char/tpm/tpm.h | 3 ++- > drivers/char/tpm/tpm_tis_core.c | 10 ++-------- > 3 files changed, 5 insertions(+), 10 deletions(-) > > diff --git a/drivers/char/tpm/tpm-interface.c b/drivers/char/tpm/tpm-interface.c > index 9e80a953d693..a676d8ad5992 100644 > --- a/drivers/char/tpm/tpm-interface.c > +++ b/drivers/char/tpm/tpm-interface.c > @@ -470,7 +470,7 @@ ssize_t tpm_transmit(struct tpm_chip *chip, struct tpm_space *space, > goto out; > } > > - tpm_msleep(TPM_TIMEOUT); > + tpm_msleep(TPM_TIMEOUT_POLL); > rmb(); > } while (time_before(jiffies, stop)); > > diff --git a/drivers/char/tpm/tpm.h b/drivers/char/tpm/tpm.h > index f895fba4e20d..7e797377e1eb 100644 > --- a/drivers/char/tpm/tpm.h > +++ b/drivers/char/tpm/tpm.h > @@ -53,7 +53,8 @@ enum tpm_const { > enum tpm_timeout { > TPM_TIMEOUT = 5, /* msecs */ > TPM_TIMEOUT_RETRY = 100, /* msecs */ > - TPM_TIMEOUT_RANGE_US = 300 /* usecs */ > + TPM_TIMEOUT_RANGE_US = 300, /* usecs */ > + TPM_TIMEOUT_POLL = 1 /* msecs */ > }; > > /* TPM addresses */ > diff --git a/drivers/char/tpm/tpm_tis_core.c b/drivers/char/tpm/tpm_tis_core.c > index da074e3db19b..021e6b68f2db 100644 > --- a/drivers/char/tpm/tpm_tis_core.c > +++ b/drivers/char/tpm/tpm_tis_core.c > @@ -31,12 +31,6 @@ > #include "tpm.h" > #include "tpm_tis_core.h" > > -/* This is a polling delay to check for status and burstcount. > - * As per ddwg input, expectation is that status check and burstcount > - * check should return within few usecs. > - */ > -#define TPM_POLL_SLEEP 1 /* msec */ > - > static void tpm_tis_clkrun_enable(struct tpm_chip *chip, bool value); > > static bool wait_for_tpm_stat_cond(struct tpm_chip *chip, u8 mask, > @@ -90,7 +84,7 @@ static int wait_for_tpm_stat(struct tpm_chip *chip, u8 mask, > } > } else { > do { > - tpm_msleep(TPM_POLL_SLEEP); > + tpm_msleep(TPM_TIMEOUT_POLL); > status = chip->ops->status(chip); > if ((status & mask) == mask) > return 0; > @@ -232,7 +226,7 @@ static int get_burstcount(struct tpm_chip *chip) > burstcnt = (value >> 8) & 0xFFFF; > if (burstcnt) > return burstcnt; > - tpm_msleep(TPM_POLL_SLEEP); > + tpm_msleep(TPM_TIMEOUT_POLL); > } while (time_before(jiffies, stop)); > return -EBUSY; > }