Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp2641409pxu; Mon, 7 Dec 2020 11:31:31 -0800 (PST) X-Google-Smtp-Source: ABdhPJziARIC/r+M+QUg4A3HwcxS/DM8Nl2E1YhTBlMIdYAqlAmw7sn+XdDbjobfm5vdNYI6q2cS X-Received: by 2002:aa7:c058:: with SMTP id k24mr21530663edo.263.1607369490840; Mon, 07 Dec 2020 11:31:30 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1607369490; cv=none; d=google.com; s=arc-20160816; b=Cq7apOEZJgspG0sga6XwOSCgpCGkgrFIUX/iI5MD59AD4ZpjNAiv2Q53UEvZ7+WeGW /JZt32E1mCO/GrQL8sxvhWxZUpd2s2r2t/82Lr3wV7fociNk9XGnqH3bfFBBHOVsHKxy wMF22Sjp+oB1QSYXOoy+kpgwcXkjh9lxoucbbIWFIDaVtBMepzEVn9gkjTjnlild8vg1 I6ISRSEkhLjIhxKu7EqnJT7C1gJjioY6i+nt748X25KhjBNsP/1UphNfV4y2WRmEphNq WO9VtE+8CG67d9hDa+48vAdeh3dtZ9oIifphtc/lVmCabsTYicegXcZ8CPE4Yq7WiynE dHTg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=v3QgAlPsbwF8UgttG1BQwndoXM5UWF7rYLhDWgqTcAo=; b=XHdH7QZG+q51YTIUVa1PAnZe9/UjeuNQye8oawWxCyjy6NRxcaBiz28Y5hMXf5B8X6 pqH7DcZe2IBfDwTS3EEJza30jhQkB39r6TOLIq0LA71240EHdf7jpBymz2RzsxDr2coN iL48zLODezhDcQvMMcfA1T0G4J78TN/xuCdlEgodkRFGvQ1vltNIX39CdMLBxPkTb7oO 10By3AQmsPArryRlC0TPQYBIktR1NfVA72Wu5bEMxulTrYxS81g7C4GuDUWESWnDnbcq R+WYgWGgOvEfE1dqUGKmwdQ6zv3GNTguqpSkADpTPBLdqTjvpboily50xk0GVgMJwbtT wx2g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ziepe.ca header.s=google header.b="YrX/hht9"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id 6si5236254edx.355.2020.12.07.11.31.04; Mon, 07 Dec 2020 11:31:30 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@ziepe.ca header.s=google header.b="YrX/hht9"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726661AbgLGT2w (ORCPT + 99 others); Mon, 7 Dec 2020 14:28:52 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58660 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726645AbgLGT2v (ORCPT ); Mon, 7 Dec 2020 14:28:51 -0500 Received: from mail-qt1-x842.google.com (mail-qt1-x842.google.com [IPv6:2607:f8b0:4864:20::842]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B0DC1C061749 for ; Mon, 7 Dec 2020 11:28:05 -0800 (PST) Received: by mail-qt1-x842.google.com with SMTP id z9so10259671qtn.4 for ; Mon, 07 Dec 2020 11:28:05 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ziepe.ca; s=google; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to; bh=v3QgAlPsbwF8UgttG1BQwndoXM5UWF7rYLhDWgqTcAo=; b=YrX/hht9Lmvjo/zfsC6XKDCBN4R4gbKwzoAKOilZlQhn7HDa3NQXQkL0b3oGSDsy4k pH++h4TpKxJPVTjCNUS/9QmRYfNnI7uCN9sFYEGwZPyCy7EMySg6GzEm0lh6h0uTxE7Q 09i7UgLqD7gseDt8hmiUybWLpjfzlqc4CXRsblOzx4HC27ikvmDt6oAo/N8mnvlg6vLS TzibuoaOix1cE3FWRCoVtfaMnbQgveRZZsGjo454qEFfbgf6ujUxS92NCrl3mkxiP6Ar mXTT6P3aASuSwn7ShD7r9SLifwe3PIiAzb3QeLL1UX2tNH/ECVzziHkFAI0t51cFB2wl FiGA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=v3QgAlPsbwF8UgttG1BQwndoXM5UWF7rYLhDWgqTcAo=; b=rpFvMLgWq1LIP1Y/5SKbAbbrnIhmV/PsKmgLwBW7u4h/dKv/kncK9ImqfKRLqYStiV ZiLljObhkymeLhgSSSu6FTx/ZFPN/H0p0t7ZlGLi410zkrEsi1VZLju8rJdTwAP6QR78 DdaFxO6LUl9GFmUpp9ovdQ1iUwxBSmcsxxonpym9b/u6yWPM1VnuKbBtdp5vPDGNLWUZ fbZcUi/6mvGG2vVa/j9N+pilpgO3NOFLJdnJKmvin6EGuCDBEhnKS1UkezgSBYmx/r2i HVgocUnJMGa9nHAm45wkcj68LzHQpMAwk7+RyIOVb+tjoVDBckbAsukwkln9NaCJBQ/5 LDRw== X-Gm-Message-State: AOAM530SR9QRqm6OXThRrPeJovsYAiQe2R05/vlwzrBDbQzzSzc/sV1y 89NRbaHXzRUa/cBsZtXN68U5mw== X-Received: by 2002:ac8:6b54:: with SMTP id x20mr25374730qts.170.1607369284968; Mon, 07 Dec 2020 11:28:04 -0800 (PST) Received: from ziepe.ca (hlfxns017vw-142-162-115-133.dhcp-dynamic.fibreop.ns.bellaliant.net. [142.162.115.133]) by smtp.gmail.com with ESMTPSA id v5sm5648146qkv.64.2020.12.07.11.28.03 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 07 Dec 2020 11:28:03 -0800 (PST) Received: from jgg by mlx with local (Exim 4.94) (envelope-from ) id 1kmMB1-007OGx-1k; Mon, 07 Dec 2020 15:28:03 -0400 Date: Mon, 7 Dec 2020 15:28:03 -0400 From: Jason Gunthorpe To: Thomas Gleixner Cc: Jerry Snitselaar , linux-kernel@vger.kernel.org, linux-integrity@vger.kernel.org, intel-gfx@lists.freedesktop.org, dri-devel@lists.freedesktop.org, Jarkko Sakkinen , Peter Huewe , James Bottomley , Matthew Garrett , Hans de Goede Subject: Re: [PATCH v3 3/4] tpm_tis: Disable interrupts if interrupt storm detected Message-ID: <20201207192803.GH5487@ziepe.ca> References: <20201205014340.148235-1-jsnitsel@redhat.com> <20201205014340.148235-4-jsnitsel@redhat.com> <87tusy7n3b.fsf@nanos.tec.linutronix.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <87tusy7n3b.fsf@nanos.tec.linutronix.de> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, Dec 06, 2020 at 08:26:16PM +0100, Thomas Gleixner wrote: > Just as a side note. I was looking at tpm_tis_probe_irq_single() and > that function is leaking the interrupt request if any of the checks > afterwards fails, except for the final interrupt probe check which does > a cleanup. That means on fail before that the interrupt handler stays > requested up to the point where the module is removed. If that's a > shared interrupt and some other device is active on the same line, then > each interrupt from that device will call into the TPM code. Something > like the below is needed. > > Also the X86 autoprobe mechanism is interesting: > > if (IS_ENABLED(CONFIG_X86)) > for (i = 3; i <= 15; i++) > if (!tpm_tis_probe_irq_single(chip, intmask, 0, i)) > return; > > The third argument is 'flags' which is handed to request_irq(). So that > won't ever be able to probe a shared interrupt. But if an interrupt > number > 0 is handed to tpm_tis_core_init() the interrupt is requested > with IRQF_SHARED. Same issue when the chip has an interrupt number in > the register. It's also requested exclusive which is pretty likely > to fail on ancient x86 machines. It is very likely none of this works any more, it has been repeatedly reworked over the years and just left behind out of fear someone needs it. I've thought it should be deleted for a while now. I suppose the original logic was to try and probe without SHARED because a probe would need exclusive access to the interrupt to tell if the TPM was actually the source, not some other device. It is all very old and very out of step with current thinking, IMHO. I skeptical that TPM interrupts were ever valuable enough to deserve this in the first place. Jason