Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp2742444pxu; Sun, 29 Nov 2020 03:38:05 -0800 (PST) X-Google-Smtp-Source: ABdhPJxM/rYZQ+ylENdzICIoj6+3PFFGqYAkUzCZc1Xk9xduvOxvbEtRvmmX2tbwy+tPW4zmdzW6 X-Received: by 2002:a17:906:6713:: with SMTP id a19mr16880572ejp.468.1606649885051; Sun, 29 Nov 2020 03:38:05 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1606649885; cv=none; d=google.com; s=arc-20160816; b=Hm7osKCwW0vMJB6+FUi5D1o93f9L2itiWOTvW8phEVqbs9mZg9coIVodYzsJ4TewVW RHiqHrwxZRYtmUtu1Dg+wMvtT8qcKz0Bq9pkiNKfHdeVJOIFWjftFc+W3IGtzUGA2D3C ukcCa0RH4L3X8pIv/XctEeKoaD62R8vI7EBeSQXa9MF3wbtfIQJKqhm1SN/GA54LkeMh vLGYMQMRRyLQCMcB1cr6y6Xvj8BgvFxv7Ht1YuEU0tah0dHVPc0RJef++9D2GRGfVPfw 5SZqYoQtDRoAMEl2VDIttD7hZXnhgzCtc4DtaUgkR9wcerDnf4T9n19zQBl+JvguAN0x Ovkg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject:dkim-signature; bh=a7pdivYwmuluzLuX4DQHw7DgTDhJNY4YIm2K0L4xD34=; b=w/sZTv9oLOKKnQqrfSABngjh7IKgteBWoS60nKuT2HFauEAA9fdVzHWn00cBTYYM4v 6oWoVpbpJ1EdDDdAZCvy2+VW/5unHec7l58QvMFsscyOu+/HuLYj89zFBgNjwWqNPQt2 rYLRW9qYMr7VligZSI0yLn4fT5wGh6tRdkdYspim5jynNrHxwMjsdyQE5NUD6/A0uJ/s b2aTE0IFOFjWv8k+672q+vRha8h4JMVyrXiNqgajQjNaRUJ7kksdd+hBrUDNIvgUMvZa 4gIdJWgeVvznN5nHbOXh4N0t14GKxUxCtaQQPsi7fEOS8MGYZKQRjJz6WzQZzwCc7yAN e7qw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=SDVdsMYI; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id r19si5978604ejs.1.2020.11.29.03.37.42; Sun, 29 Nov 2020 03:38:05 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=SDVdsMYI; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726635AbgK2LgJ (ORCPT + 99 others); Sun, 29 Nov 2020 06:36:09 -0500 Received: from us-smtp-delivery-124.mimecast.com ([63.128.21.124]:46781 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725984AbgK2LgH (ORCPT ); Sun, 29 Nov 2020 06:36:07 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1606649679; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=a7pdivYwmuluzLuX4DQHw7DgTDhJNY4YIm2K0L4xD34=; b=SDVdsMYI7mcyGCynUvv0EM0AuYiXLctlYl21M3l+eBCaN7vgDrAJq9zJf809wAjW5JQ+zf 1H1jo0tg89T4iAeUUUWto8/d72bj46L/1nkI97gpAVvXVfa3OExdo3aJ90v5bn0I17KFEZ 5o0pSrCP7OOIFN8YFSOt9qdW/zNemy8= Received: from mail-ej1-f70.google.com (mail-ej1-f70.google.com [209.85.218.70]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-388-4cs6oE4uN8O8B_vbGiF2ow-1; Sun, 29 Nov 2020 06:34:37 -0500 X-MC-Unique: 4cs6oE4uN8O8B_vbGiF2ow-1 Received: by mail-ej1-f70.google.com with SMTP id p5so527762eji.20 for ; Sun, 29 Nov 2020 03:34:37 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=a7pdivYwmuluzLuX4DQHw7DgTDhJNY4YIm2K0L4xD34=; b=P2vnN1ebQr/3ObbYOx0aZODOs1vSjO1SqS5xwQ1Z8HlkRFoY24pPyY5UJnBLwxSwxE aQeAjkrdP6djq1vDt9NbWFrR8mwC12UWS4Yy0Dq5Gsw9Rdhn7wLqw0fCtgKt7VOUlwbN StRqfqntOoANBUeGFSoHPn8scGmdD+T5zt/lOZMnRfVqTNYDp3RHzprAFGt1JH0SHM82 kcmPuMzEM+QUejSWRowgxQf3S5FdKZ7ranX9cy7WL3POlSJpFhrm4azCZvyVc6Ha00rF iacwRDZm4sAIgMA3Ow+cpU4iMr9SNx0xXl/7mql/IDDjGycB9aRo//dtDLLtFTvkpTfr Ja8Q== X-Gm-Message-State: AOAM532dKwfOfqBXiSXFo3129FXm/8jK4n4S6ctkiEB6FHDMhpxjEiBS sANYQRYL9GqAk0HGqztESaDeUqZsDtoqk1GbegooCQ02pVj6V3D8W23bjUdVg19xPhLAq/K+/OS O7ePEyc9eCqq5Eq6rPI2f+Oea X-Received: by 2002:a05:6402:1714:: with SMTP id y20mr16976167edu.306.1606649676193; Sun, 29 Nov 2020 03:34:36 -0800 (PST) X-Received: by 2002:a05:6402:1714:: with SMTP id y20mr16976156edu.306.1606649675985; Sun, 29 Nov 2020 03:34:35 -0800 (PST) Received: from x1.localdomain (2001-1c00-0c0c-fe00-d2ea-f29d-118b-24dc.cable.dynamic.v6.ziggo.nl. [2001:1c00:c0c:fe00:d2ea:f29d:118b:24dc]) by smtp.gmail.com with ESMTPSA id i13sm7100763ejc.57.2020.11.29.03.34.35 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Sun, 29 Nov 2020 03:34:35 -0800 (PST) Subject: Re: [PATCH] tpm_tis: Disable interrupts on ThinkPad T490s To: Jarkko Sakkinen Cc: Jerry Snitselaar , Matthew Garrett , linux-integrity , Linux Kernel Mailing List , Peter Huewe , Jason Gunthorpe , James Bottomley References: <20201015214430.17937-1-jsnitsel@redhat.com> <87d009c0pn.fsf@redhat.com> <20201124032623.GA40007@kernel.org> <871rgiod53.fsf@redhat.com> <7779bfbc-f96b-dd81-313f-36f451ce9c32@redhat.com> <20201129032306.GD39488@kernel.org> From: Hans de Goede Message-ID: <7811f4fd-934b-e9f1-5712-7490409d6a7f@redhat.com> Date: Sun, 29 Nov 2020 12:34:34 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.4.0 MIME-Version: 1.0 In-Reply-To: <20201129032306.GD39488@kernel.org> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi All, On 11/29/20 4:23 AM, Jarkko Sakkinen wrote: > On Tue, Nov 24, 2020 at 10:45:01PM +0100, Hans de Goede wrote: >> Hi, >> >> On 11/24/20 6:52 PM, Jerry Snitselaar wrote: >>> >>> Jarkko Sakkinen @ 2020-11-23 20:26 MST: >>> >>>> On Wed, Nov 18, 2020 at 11:36:20PM -0700, Jerry Snitselaar wrote: >>>>> >>>>> Matthew Garrett @ 2020-10-15 15:39 MST: >>>>> >>>>>> On Thu, Oct 15, 2020 at 2:44 PM Jerry Snitselaar wrote: >>>>>>> >>>>>>> There is a misconfiguration in the bios of the gpio pin used for the >>>>>>> interrupt in the T490s. When interrupts are enabled in the tpm_tis >>>>>>> driver code this results in an interrupt storm. This was initially >>>>>>> reported when we attempted to enable the interrupt code in the tpm_tis >>>>>>> driver, which previously wasn't setting a flag to enable it. Due to >>>>>>> the reports of the interrupt storm that code was reverted and we went back >>>>>>> to polling instead of using interrupts. Now that we know the T490s problem >>>>>>> is a firmware issue, add code to check if the system is a T490s and >>>>>>> disable interrupts if that is the case. This will allow us to enable >>>>>>> interrupts for everyone else. If the user has a fixed bios they can >>>>>>> force the enabling of interrupts with tpm_tis.interrupts=1 on the >>>>>>> kernel command line. >>>>>> >>>>>> I think an implication of this is that systems haven't been >>>>>> well-tested with interrupts enabled. In general when we've found a >>>>>> firmware issue in one place it ends up happening elsewhere as well, so >>>>>> it wouldn't surprise me if there are other machines that will also be >>>>>> unhappy with interrupts enabled. Would it be possible to automatically >>>>>> detect this case (eg, if we get more than a certain number of >>>>>> interrupts in a certain timeframe immediately after enabling the >>>>>> interrupt) and automatically fall back to polling in that case? It >>>>>> would also mean that users with fixed firmware wouldn't need to pass a >>>>>> parameter. >>>>> >>>>> I believe Matthew is correct here. I found another system today >>>>> with completely different vendor for both the system and the tpm chip. >>>>> In addition another Lenovo model, the L490, has the issue. >>>>> >>>>> This initial attempt at a solution like Matthew suggested works on >>>>> the system I found today, but I imagine it is all sorts of wrong. >>>>> In the 2 systems where I've seen it, there are about 100000 interrupts >>>>> in around 1.5 seconds, and then the irq code shuts down the interrupt >>>>> because they aren't being handled. >>>>> >>>>> >>>>> diff --git a/drivers/char/tpm/tpm_tis_core.c b/drivers/char/tpm/tpm_tis_core.c >>>>> index 49ae09ac604f..478e9d02a3fa 100644 >>>>> --- a/drivers/char/tpm/tpm_tis_core.c >>>>> +++ b/drivers/char/tpm/tpm_tis_core.c >>>>> @@ -27,6 +27,11 @@ >>>>> #include "tpm.h" >>>>> #include "tpm_tis_core.h" >>>>> >>>>> +static unsigned int time_start = 0; >>>>> +static bool storm_check = true; >>>>> +static bool storm_killed = false; >>>>> +static u32 irqs_fired = 0; >>>> >>>> Maybe kstat_irqs() would be a better idea than ad hoc stats. >>>> >>> >>> Thanks, yes that would be better. >>> >>>>> + >>>>> static void tpm_tis_clkrun_enable(struct tpm_chip *chip, bool value); >>>>> >>>>> static void tpm_tis_enable_interrupt(struct tpm_chip *chip, u8 mask) >>>>> @@ -464,25 +469,31 @@ static int tpm_tis_send_data(struct tpm_chip *chip, const u8 *buf, size_t len) >>>>> return rc; >>>>> } >>>>> >>>>> -static void disable_interrupts(struct tpm_chip *chip) >>>>> +static void __disable_interrupts(struct tpm_chip *chip) >>>>> { >>>>> struct tpm_tis_data *priv = dev_get_drvdata(&chip->dev); >>>>> u32 intmask; >>>>> int rc; >>>>> >>>>> - if (priv->irq == 0) >>>>> - return; >>>>> - >>>>> rc = tpm_tis_read32(priv, TPM_INT_ENABLE(priv->locality), &intmask); >>>>> if (rc < 0) >>>>> intmask = 0; >>>>> >>>>> intmask &= ~TPM_GLOBAL_INT_ENABLE; >>>>> rc = tpm_tis_write32(priv, TPM_INT_ENABLE(priv->locality), intmask); >>>>> + chip->flags &= ~TPM_CHIP_FLAG_IRQ; >>>>> +} >>>>> + >>>>> +static void disable_interrupts(struct tpm_chip *chip) >>>>> +{ >>>>> + struct tpm_tis_data *priv = dev_get_drvdata(&chip->dev); >>>>> >>>>> + if (priv->irq == 0) >>>>> + return; >>>>> + >>>>> + __disable_interrupts(chip); >>>>> devm_free_irq(chip->dev.parent, priv->irq, chip); >>>>> priv->irq = 0; >>>>> - chip->flags &= ~TPM_CHIP_FLAG_IRQ; >>>>> } >>>>> >>>>> /* >>>>> @@ -528,6 +539,12 @@ static int tpm_tis_send(struct tpm_chip *chip, u8 *buf, size_t len) >>>>> int rc, irq; >>>>> struct tpm_tis_data *priv = dev_get_drvdata(&chip->dev); >>>>> >>>>> + if (unlikely(storm_killed)) { >>>>> + devm_free_irq(chip->dev.parent, priv->irq, chip); >>>>> + priv->irq = 0; >>>>> + storm_killed = false; >>>>> + } >>>> >>>> OK this kind of bad solution because if tpm_tis_send() is not called, >>>> then IRQ is never freed. AFAIK, devres_* do not sleep but use spin >>>> lock, i.e. you could render out both storm_check and storm_killed. >>>> >>> >>> Is there a way to flag it for freeing later while in an interrupt >>> context? I'm not sure where to clean it up since devm_free_irq can't be >>> called in tis_int_handler. >> >> You could add a workqueue work-struct just for this and queue that up >> to do the free when you detect the storm. That will then run pretty much >> immediately, avoiding the storm going on for (much) longer. > > That's sounds feasible. > >>> Before diving further into that though, does anyone else have an opinion >>> on ripping out the irq code, and just using polling? We've been only >>> polling since 2015 anyways. >> >> Given James Bottomley's reply I guess it would be worthwhile to get the >> storm detection to work. > > OK, agreed. I take my words back from a response few minutes ago :-) :) To be clear, I think we should give the storm detection a go. Especially given the problems which James has seen with polling on some TPMs. But if that turns out to not be feasible I agree we should just either disable IRQs by default on standard x86 platforms, or just remove the IRQ support all together. Regards, Hans