Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp1832335pxu; Tue, 24 Nov 2020 09:56:29 -0800 (PST) X-Google-Smtp-Source: ABdhPJyzwm9LIg2t8yJjip1Qi0+YAU/Ky9AdYyNo5YhXIwHiuMRAo9AzA09uhwE9+x3fMOvymGdL X-Received: by 2002:a05:6402:1542:: with SMTP id p2mr5021875edx.298.1606240588873; Tue, 24 Nov 2020 09:56:28 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1606240588; cv=none; d=google.com; s=arc-20160816; b=e/Q0w4eOofIk7GCrkmLU3/AkX1Qgr5W+TbBL3d/v0DNIn10Rjx1DJTKzkB2bm+p9iM 4KkPQoUv7f2fgxjTUclx0LQ8TwSrsPmx1+8eL3KDFZMAbA+Ml6cbKoz0DGXhtH+xyZaq 3l0jr78cdUONeywW/texussoCi7jKsfxsv3hqWoqWFhUmI1kjVOWilRgccBe7iti//ZU ryKV0afoucLZkOomLzLG+DRuKmZ0bb5HPZGAqL6wVRVKFEQzcUJgJ3Q8bg4Mtkgg+T3w czDG5MY6IggV70Ec7toCZu0KrdLkfn4gtEN5JBkDk/iT6FEqIm+NZnwGzAyXQXOdefzs nrdA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:message-id:date:in-reply-to:subject :cc:to:from:user-agent:references:dkim-signature; bh=HRULtG4744uyd3kyq7DHeWDL/Spp1XajpIHhK764cQA=; b=xwRBmb4U93W2g9ewP91mQ9u2z2sgEgpcOejMi7yXhhRs/HpL2Po672bDHt1rkJnJt1 EGdzoeEELTyIgaGLDhyUFpbO+lJsiNjGrw2bgZCMeqm0xCfxz2ELKbqD/y7F8ePi75vz Zyg2jH7HHeyb2R7v9hFTVxkXC7cPDhkwW4MtyJO9imqoAwfp0X86wHkr/7sygjXfXpoA 0WEWLTRgdJxFR3qaWYFMAKw+MMdlZl0wJnLZJQmhRleM0IqSdWckfliJAV0af/O15zGa NprTBVnnKZG349IXlG+UlwdwHxnuPGV48GO54+eCDQnwfshgmJrxMzXEa2pGTh1qiM1j FbIQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=cPSmuwaY; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id r15si6926264edx.70.2020.11.24.09.56.05; Tue, 24 Nov 2020 09:56:28 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=cPSmuwaY; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2404211AbgKXRxF (ORCPT + 99 others); Tue, 24 Nov 2020 12:53:05 -0500 Received: from us-smtp-delivery-124.mimecast.com ([216.205.24.124]:56294 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2404192AbgKXRxF (ORCPT ); Tue, 24 Nov 2020 12:53:05 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1606240382; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=HRULtG4744uyd3kyq7DHeWDL/Spp1XajpIHhK764cQA=; b=cPSmuwaYjH/J+mntGrkELNIh/Ddy6FsROVr+y8vjGHVBkw/t11byOndvdn1i8WkXbyDuyD nSJ/O4VGFEqFpL0z1hSxSE1xJ+FKof+tAhXYcErqpAKMDOb9R/Op0nzQ2jddLUPqQ8PT+2 FFvm+bNaMaMaczyQCBLPjHixEgsu4H4= Received: from mail-qt1-f199.google.com (mail-qt1-f199.google.com [209.85.160.199]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-399-258iJRN5MhCXRGVIh4hNXA-1; Tue, 24 Nov 2020 12:53:00 -0500 X-MC-Unique: 258iJRN5MhCXRGVIh4hNXA-1 Received: by mail-qt1-f199.google.com with SMTP id g17so8763529qtr.8 for ; Tue, 24 Nov 2020 09:53:00 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:references:user-agent:from:to:cc:subject :in-reply-to:date:message-id:mime-version; bh=HRULtG4744uyd3kyq7DHeWDL/Spp1XajpIHhK764cQA=; b=IHZOT/io7TyILcVl92ieRT0Rous5tqVjXAPE3UtXnseo4MbFVt7QYAEtpkfulUab+A CVF6ZDG2ne4BRZpQ/pMzkR2RlsjeAZL1/2jA7Kz4qHNt9fOnCYPOBgMU4aibBEY1HoHT 2t9pqcjJe2fWJhOBAatgVsQraSECiln4V1z2n19PsxZsf1F1/Yv19zuoKDGiAuTfPYyp CnRdAxFfUJb2t3s++G9vJyc6MC3sV+YCwT/ZuWlau4mgw9ZZ2Wpjdp+iS8LSdfuGCyOR 0K5vEzPlzGJyry30RoW88z61iFXs3LIEVIUW4X0STRHmOl6HO+9F+3UMdEqUJ0tSKAn8 rwsw== X-Gm-Message-State: AOAM533OgFuPczdKMeK+nrfNQekZ3/CY5A/ze+BsQtmTXjOdTh/qi0j7 akaH9o9uRvhPy64sSJ5uE9sQAJ1WQyUiuQPg/hiekLDKB+AxsIiqQGoWq9gBQA1FjxvzoDLFGfK r6qxZITUh/N5pWEKGFlW8MbgV X-Received: by 2002:ac8:1c28:: with SMTP id a37mr5392855qtk.356.1606240379731; Tue, 24 Nov 2020 09:52:59 -0800 (PST) X-Received: by 2002:ac8:1c28:: with SMTP id a37mr5392828qtk.356.1606240379408; Tue, 24 Nov 2020 09:52:59 -0800 (PST) Received: from localhost (ip98-179-76-75.ph.ph.cox.net. [98.179.76.75]) by smtp.gmail.com with ESMTPSA id z73sm9834479qkb.112.2020.11.24.09.52.57 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 24 Nov 2020 09:52:58 -0800 (PST) References: <20201015214430.17937-1-jsnitsel@redhat.com> <87d009c0pn.fsf@redhat.com> <20201124032623.GA40007@kernel.org> User-agent: mu4e 1.4.10; emacs 27.1 From: Jerry Snitselaar To: Jarkko Sakkinen Cc: Matthew Garrett , linux-integrity , Linux Kernel Mailing List , Peter Huewe , Jason Gunthorpe , Hans de Goede , James Bottomley Subject: Re: [PATCH] tpm_tis: Disable interrupts on ThinkPad T490s In-reply-to: <20201124032623.GA40007@kernel.org> Date: Tue, 24 Nov 2020 10:52:56 -0700 Message-ID: <871rgiod53.fsf@redhat.com> MIME-Version: 1.0 Content-Type: text/plain Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Jarkko Sakkinen @ 2020-11-23 20:26 MST: > On Wed, Nov 18, 2020 at 11:36:20PM -0700, Jerry Snitselaar wrote: >> >> Matthew Garrett @ 2020-10-15 15:39 MST: >> >> > On Thu, Oct 15, 2020 at 2:44 PM Jerry Snitselaar wrote: >> >> >> >> There is a misconfiguration in the bios of the gpio pin used for the >> >> interrupt in the T490s. When interrupts are enabled in the tpm_tis >> >> driver code this results in an interrupt storm. This was initially >> >> reported when we attempted to enable the interrupt code in the tpm_tis >> >> driver, which previously wasn't setting a flag to enable it. Due to >> >> the reports of the interrupt storm that code was reverted and we went back >> >> to polling instead of using interrupts. Now that we know the T490s problem >> >> is a firmware issue, add code to check if the system is a T490s and >> >> disable interrupts if that is the case. This will allow us to enable >> >> interrupts for everyone else. If the user has a fixed bios they can >> >> force the enabling of interrupts with tpm_tis.interrupts=1 on the >> >> kernel command line. >> > >> > I think an implication of this is that systems haven't been >> > well-tested with interrupts enabled. In general when we've found a >> > firmware issue in one place it ends up happening elsewhere as well, so >> > it wouldn't surprise me if there are other machines that will also be >> > unhappy with interrupts enabled. Would it be possible to automatically >> > detect this case (eg, if we get more than a certain number of >> > interrupts in a certain timeframe immediately after enabling the >> > interrupt) and automatically fall back to polling in that case? It >> > would also mean that users with fixed firmware wouldn't need to pass a >> > parameter. >> >> I believe Matthew is correct here. I found another system today >> with completely different vendor for both the system and the tpm chip. >> In addition another Lenovo model, the L490, has the issue. >> >> This initial attempt at a solution like Matthew suggested works on >> the system I found today, but I imagine it is all sorts of wrong. >> In the 2 systems where I've seen it, there are about 100000 interrupts >> in around 1.5 seconds, and then the irq code shuts down the interrupt >> because they aren't being handled. >> >> >> diff --git a/drivers/char/tpm/tpm_tis_core.c b/drivers/char/tpm/tpm_tis_core.c >> index 49ae09ac604f..478e9d02a3fa 100644 >> --- a/drivers/char/tpm/tpm_tis_core.c >> +++ b/drivers/char/tpm/tpm_tis_core.c >> @@ -27,6 +27,11 @@ >> #include "tpm.h" >> #include "tpm_tis_core.h" >> >> +static unsigned int time_start = 0; >> +static bool storm_check = true; >> +static bool storm_killed = false; >> +static u32 irqs_fired = 0; > > Maybe kstat_irqs() would be a better idea than ad hoc stats. > Thanks, yes that would be better. >> + >> static void tpm_tis_clkrun_enable(struct tpm_chip *chip, bool value); >> >> static void tpm_tis_enable_interrupt(struct tpm_chip *chip, u8 mask) >> @@ -464,25 +469,31 @@ static int tpm_tis_send_data(struct tpm_chip *chip, const u8 *buf, size_t len) >> return rc; >> } >> >> -static void disable_interrupts(struct tpm_chip *chip) >> +static void __disable_interrupts(struct tpm_chip *chip) >> { >> struct tpm_tis_data *priv = dev_get_drvdata(&chip->dev); >> u32 intmask; >> int rc; >> >> - if (priv->irq == 0) >> - return; >> - >> rc = tpm_tis_read32(priv, TPM_INT_ENABLE(priv->locality), &intmask); >> if (rc < 0) >> intmask = 0; >> >> intmask &= ~TPM_GLOBAL_INT_ENABLE; >> rc = tpm_tis_write32(priv, TPM_INT_ENABLE(priv->locality), intmask); >> + chip->flags &= ~TPM_CHIP_FLAG_IRQ; >> +} >> + >> +static void disable_interrupts(struct tpm_chip *chip) >> +{ >> + struct tpm_tis_data *priv = dev_get_drvdata(&chip->dev); >> >> + if (priv->irq == 0) >> + return; >> + >> + __disable_interrupts(chip); >> devm_free_irq(chip->dev.parent, priv->irq, chip); >> priv->irq = 0; >> - chip->flags &= ~TPM_CHIP_FLAG_IRQ; >> } >> >> /* >> @@ -528,6 +539,12 @@ static int tpm_tis_send(struct tpm_chip *chip, u8 *buf, size_t len) >> int rc, irq; >> struct tpm_tis_data *priv = dev_get_drvdata(&chip->dev); >> >> + if (unlikely(storm_killed)) { >> + devm_free_irq(chip->dev.parent, priv->irq, chip); >> + priv->irq = 0; >> + storm_killed = false; >> + } > > OK this kind of bad solution because if tpm_tis_send() is not called, > then IRQ is never freed. AFAIK, devres_* do not sleep but use spin > lock, i.e. you could render out both storm_check and storm_killed. > Is there a way to flag it for freeing later while in an interrupt context? I'm not sure where to clean it up since devm_free_irq can't be called in tis_int_handler. Before diving further into that though, does anyone else have an opinion on ripping out the irq code, and just using polling? We've been only polling since 2015 anyways. >> + >> if (!(chip->flags & TPM_CHIP_FLAG_IRQ) || priv->irq_tested) >> return tpm_tis_send_main(chip, buf, len); >> >> @@ -748,6 +765,21 @@ static irqreturn_t tis_int_handler(int dummy, void *dev_id) >> u32 interrupt; >> int i, rc; >> >> + if (storm_check) { >> + irqs_fired++; >> + >> + if (!time_start) { >> + time_start = jiffies_to_msecs(jiffies); >> + } else if ((irqs_fired > 1000) && (jiffies_to_msecs(jiffies) - jiffies < 500)) { >> + __disable_interrupts(chip); >> + storm_check = false; >> + storm_killed = true; >> + return IRQ_HANDLED; >> + } else if ((jiffies_to_msecs(jiffies) - time_start > 500) && (irqs_fired < 1000)) { >> + storm_check = false; >> + } >> + } >> + >> rc = tpm_tis_read32(priv, TPM_INT_STATUS(priv->locality), &interrupt); >> if (rc < 0) >> return IRQ_NONE; >> >> > > /Jarkko