Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp984092pxu; Wed, 2 Dec 2020 08:12:15 -0800 (PST) X-Google-Smtp-Source: ABdhPJx4K4kT1C0+F0fE0sdPM+dI/wyq/yTX6nvPdO1NzVwnovl3ltc1yXhj8CNRP3HW6EuNTYUJ X-Received: by 2002:a17:906:134f:: with SMTP id x15mr507175ejb.278.1606925535336; Wed, 02 Dec 2020 08:12:15 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1606925535; cv=none; d=google.com; s=arc-20160816; b=lT3nBp6IB4LkTWlY8YBo3ft6GGejKnMS1DVQhN3GA3jw0fKGP8VqBpKp9jmk5LxK1Z Tqo4VAooasbxsAOqGY/bBCn5bEMW/DVlNHsVMAek7aDoDosoGtnPRVdlr2fP74Clmhst UCExGEI1HSJNMS66hJgqnPuAtwVzStO3iG4OosfJOHIlaYxWtjdhMzV9j1eFaZjZM3Ke 9bee7Qa1swMBADE1DHINyH9byp7MdjNtRodJyyHL4lIcp/mcn58LL70htphsf1XZFRsg sJBQVvJFrDzZEXpn519DTsJyjH04OwTQV8SzbWPEoOhZdDPBU4+S1uVqCUz2mT9JipG1 +y2A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:dkim-signature:date; bh=4hecuwaoniIFFhQdcPv2OXJAXzIrTyBBMctx6jydbko=; b=f2tdJUwdD+PchvbiZm3qMeqSaoxNUVtqu/+ds2JmHeTExWCLEZ003c7pWWltWnkQ1Z YzjY1aK/r1BgL8dbpHQAudJ/3mNtKZ7/hCIo/U87DDl/ZQHWAJu2fzO+eoPVO6697bVz NPyJSFr5texf8yVJZt6xpNc2gI8OWhgbDP4gpYd9+O6Th5NZRdho5yGKvJTnng+QWWzG Vt2Ooq1GKXYMTb43PTpkD+fWXf/B5hHiISwQtSOkk5N0DVhHPbrKZFvE54OGI+0EUkKW Qsv7SCR0Eaoa3mzj3X8lxxMh5TGBuvyzFJ3NOWevrqeA7exty1fPTGH1PGFLV7DGs5gx rvUA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=XBCpBc41; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id m1si202582ejr.515.2020.12.02.08.11.51; Wed, 02 Dec 2020 08:12:15 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=XBCpBc41; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730555AbgLBQIS (ORCPT + 99 others); Wed, 2 Dec 2020 11:08:18 -0500 Received: from mail.kernel.org ([198.145.29.99]:41768 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726507AbgLBQIS (ORCPT ); Wed, 2 Dec 2020 11:08:18 -0500 Date: Wed, 2 Dec 2020 18:07:30 +0200 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1606925256; bh=m0B4hqCmVP5ioXQ59O+oGLVtK09+12KaEmJZX1yQyQc=; h=From:To:Cc:Subject:References:In-Reply-To:From; b=XBCpBc41VEeMesPZ5up25cDfsp09/qdSp4hRTRwbm+GZef5OlaOq+qt/vMgKAmoC0 aJRWs0jzES9tmKU4UJ3PlWj/LJU76ANOt8OUdtADGWqyLgfSDXNbJZ+L7ufM+h1C9c +ZGgMQSoo/Zr+d57qOZWlgCxWJz0ZZVBr+vLSN6Y= From: Jarkko Sakkinen To: Hans de Goede Cc: Jerry Snitselaar , Matthew Garrett , linux-integrity , Linux Kernel Mailing List , Peter Huewe , Jason Gunthorpe , James Bottomley Subject: Re: [PATCH] tpm_tis: Disable interrupts on ThinkPad T490s Message-ID: <20201202160730.GA87890@kernel.org> References: <20201015214430.17937-1-jsnitsel@redhat.com> <87d009c0pn.fsf@redhat.com> <20201124032623.GA40007@kernel.org> <871rgiod53.fsf@redhat.com> <7779bfbc-f96b-dd81-313f-36f451ce9c32@redhat.com> <20201129032306.GD39488@kernel.org> <7811f4fd-934b-e9f1-5712-7490409d6a7f@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <7811f4fd-934b-e9f1-5712-7490409d6a7f@redhat.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, Nov 29, 2020 at 12:34:34PM +0100, Hans de Goede wrote: > Hi All, > > On 11/29/20 4:23 AM, Jarkko Sakkinen wrote: > > On Tue, Nov 24, 2020 at 10:45:01PM +0100, Hans de Goede wrote: > >> Hi, > >> > >> On 11/24/20 6:52 PM, Jerry Snitselaar wrote: > >>> > >>> Jarkko Sakkinen @ 2020-11-23 20:26 MST: > >>> > >>>> On Wed, Nov 18, 2020 at 11:36:20PM -0700, Jerry Snitselaar wrote: > >>>>> > >>>>> Matthew Garrett @ 2020-10-15 15:39 MST: > >>>>> > >>>>>> On Thu, Oct 15, 2020 at 2:44 PM Jerry Snitselaar wrote: > >>>>>>> > >>>>>>> There is a misconfiguration in the bios of the gpio pin used for the > >>>>>>> interrupt in the T490s. When interrupts are enabled in the tpm_tis > >>>>>>> driver code this results in an interrupt storm. This was initially > >>>>>>> reported when we attempted to enable the interrupt code in the tpm_tis > >>>>>>> driver, which previously wasn't setting a flag to enable it. Due to > >>>>>>> the reports of the interrupt storm that code was reverted and we went back > >>>>>>> to polling instead of using interrupts. Now that we know the T490s problem > >>>>>>> is a firmware issue, add code to check if the system is a T490s and > >>>>>>> disable interrupts if that is the case. This will allow us to enable > >>>>>>> interrupts for everyone else. If the user has a fixed bios they can > >>>>>>> force the enabling of interrupts with tpm_tis.interrupts=1 on the > >>>>>>> kernel command line. > >>>>>> > >>>>>> I think an implication of this is that systems haven't been > >>>>>> well-tested with interrupts enabled. In general when we've found a > >>>>>> firmware issue in one place it ends up happening elsewhere as well, so > >>>>>> it wouldn't surprise me if there are other machines that will also be > >>>>>> unhappy with interrupts enabled. Would it be possible to automatically > >>>>>> detect this case (eg, if we get more than a certain number of > >>>>>> interrupts in a certain timeframe immediately after enabling the > >>>>>> interrupt) and automatically fall back to polling in that case? It > >>>>>> would also mean that users with fixed firmware wouldn't need to pass a > >>>>>> parameter. > >>>>> > >>>>> I believe Matthew is correct here. I found another system today > >>>>> with completely different vendor for both the system and the tpm chip. > >>>>> In addition another Lenovo model, the L490, has the issue. > >>>>> > >>>>> This initial attempt at a solution like Matthew suggested works on > >>>>> the system I found today, but I imagine it is all sorts of wrong. > >>>>> In the 2 systems where I've seen it, there are about 100000 interrupts > >>>>> in around 1.5 seconds, and then the irq code shuts down the interrupt > >>>>> because they aren't being handled. > >>>>> > >>>>> > >>>>> diff --git a/drivers/char/tpm/tpm_tis_core.c b/drivers/char/tpm/tpm_tis_core.c > >>>>> index 49ae09ac604f..478e9d02a3fa 100644 > >>>>> --- a/drivers/char/tpm/tpm_tis_core.c > >>>>> +++ b/drivers/char/tpm/tpm_tis_core.c > >>>>> @@ -27,6 +27,11 @@ > >>>>> #include "tpm.h" > >>>>> #include "tpm_tis_core.h" > >>>>> > >>>>> +static unsigned int time_start = 0; > >>>>> +static bool storm_check = true; > >>>>> +static bool storm_killed = false; > >>>>> +static u32 irqs_fired = 0; > >>>> > >>>> Maybe kstat_irqs() would be a better idea than ad hoc stats. > >>>> > >>> > >>> Thanks, yes that would be better. > >>> > >>>>> + > >>>>> static void tpm_tis_clkrun_enable(struct tpm_chip *chip, bool value); > >>>>> > >>>>> static void tpm_tis_enable_interrupt(struct tpm_chip *chip, u8 mask) > >>>>> @@ -464,25 +469,31 @@ static int tpm_tis_send_data(struct tpm_chip *chip, const u8 *buf, size_t len) > >>>>> return rc; > >>>>> } > >>>>> > >>>>> -static void disable_interrupts(struct tpm_chip *chip) > >>>>> +static void __disable_interrupts(struct tpm_chip *chip) > >>>>> { > >>>>> struct tpm_tis_data *priv = dev_get_drvdata(&chip->dev); > >>>>> u32 intmask; > >>>>> int rc; > >>>>> > >>>>> - if (priv->irq == 0) > >>>>> - return; > >>>>> - > >>>>> rc = tpm_tis_read32(priv, TPM_INT_ENABLE(priv->locality), &intmask); > >>>>> if (rc < 0) > >>>>> intmask = 0; > >>>>> > >>>>> intmask &= ~TPM_GLOBAL_INT_ENABLE; > >>>>> rc = tpm_tis_write32(priv, TPM_INT_ENABLE(priv->locality), intmask); > >>>>> + chip->flags &= ~TPM_CHIP_FLAG_IRQ; > >>>>> +} > >>>>> + > >>>>> +static void disable_interrupts(struct tpm_chip *chip) > >>>>> +{ > >>>>> + struct tpm_tis_data *priv = dev_get_drvdata(&chip->dev); > >>>>> > >>>>> + if (priv->irq == 0) > >>>>> + return; > >>>>> + > >>>>> + __disable_interrupts(chip); > >>>>> devm_free_irq(chip->dev.parent, priv->irq, chip); > >>>>> priv->irq = 0; > >>>>> - chip->flags &= ~TPM_CHIP_FLAG_IRQ; > >>>>> } > >>>>> > >>>>> /* > >>>>> @@ -528,6 +539,12 @@ static int tpm_tis_send(struct tpm_chip *chip, u8 *buf, size_t len) > >>>>> int rc, irq; > >>>>> struct tpm_tis_data *priv = dev_get_drvdata(&chip->dev); > >>>>> > >>>>> + if (unlikely(storm_killed)) { > >>>>> + devm_free_irq(chip->dev.parent, priv->irq, chip); > >>>>> + priv->irq = 0; > >>>>> + storm_killed = false; > >>>>> + } > >>>> > >>>> OK this kind of bad solution because if tpm_tis_send() is not called, > >>>> then IRQ is never freed. AFAIK, devres_* do not sleep but use spin > >>>> lock, i.e. you could render out both storm_check and storm_killed. > >>>> > >>> > >>> Is there a way to flag it for freeing later while in an interrupt > >>> context? I'm not sure where to clean it up since devm_free_irq can't be > >>> called in tis_int_handler. > >> > >> You could add a workqueue work-struct just for this and queue that up > >> to do the free when you detect the storm. That will then run pretty much > >> immediately, avoiding the storm going on for (much) longer. > > > > That's sounds feasible. > > > >>> Before diving further into that though, does anyone else have an opinion > >>> on ripping out the irq code, and just using polling? We've been only > >>> polling since 2015 anyways. > >> > >> Given James Bottomley's reply I guess it would be worthwhile to get the > >> storm detection to work. > > > > OK, agreed. I take my words back from a response few minutes ago :-) > > :) > > To be clear, I think we should give the storm detection a go. Especially > given the problems which James has seen with polling on some TPMs. > > But if that turns out to not be feasible I agree we should just either > disable IRQs by default on standard x86 platforms, or just remove the > IRQ support all together. Just for completeness: one option is also to whitelist IRQ's. > Regards, > > Hans /Jarkko