Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp3353553pxu; Tue, 8 Dec 2020 09:46:54 -0800 (PST) X-Google-Smtp-Source: ABdhPJw+kcRuUCNTktHAJ4Ju2kFbITEP74zlQcV8fYqtE0e11TyuAV7LRoaYdiIPi5gmboIWGqv2 X-Received: by 2002:a50:d6dc:: with SMTP id l28mr25166516edj.286.1607449614679; Tue, 08 Dec 2020 09:46:54 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1607449614; cv=none; d=google.com; s=arc-20160816; b=VqmQs3bYVFOx1mJ+/TG+8rcX2koltqsyY8n4c7QSDup6atmxWizW2oE3wfpqf7WLqA UFKoqJ0Sn+cptNBK2hzYj3RQxLRPHh5X3l1BQu5Q/7tJH47bKM6kX6Xz5cmkCSAejmEh Rv4qTN5d//KKlGpkD3F8Iim38RAK/dXOujM9RnRbdrjwkHc1wVZaZRe3MKP3Tgo1NntK 05vk8qhoWXWwRczPxuwecKTIjx2xl7KIwXT3+d+5vSqmUuObKPmh8y8iNTIkV31t/l8q cHGsNwHH8WG+9QgS+CxLg4QucDqVStbmKZnEmsMyHZVwGoTE8+PjHO5HlCowiM0zKbfk NJaQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:dkim-signature:date; bh=vdkXdLA3qOEVoE+vAZkKLwypyswo28AwC/vI1pNMHiQ=; b=PDt6pjydE+rxo2aFAL8NKTBo7VY+USVW1M2uUT2/rwB0lt48FgHYAJ7LhX0UhNDMt0 hEM9iSAyzzdNW13tyTiUZEs5y3rZFANyuzHqBnEYnRtBqTI65QeiFXOxurOaMMXP2uvS WECl8bzFMVS4Hi836tUxiVGWJW9FYY2jeT5JaEZ7qjOLqeSskTNIyLu1f5tuTXu+X/La tStJPlLMl6wDKsdKQ+KgAnAhCiD3IaevPWWjBK+z6EvOrKAvSGyTSgi9AgHwdgSyspBG pjZGFg+S65QvMhHmyavy4sILH66fAbyeqauXNZ28Tc5yqxs/2FZpbvHRjwXCyhfSm66h +w/A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=CboFcSX9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id j23si8432916ejb.158.2020.12.08.09.46.31; Tue, 08 Dec 2020 09:46:54 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=CboFcSX9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730803AbgLHRnd (ORCPT + 99 others); Tue, 8 Dec 2020 12:43:33 -0500 Received: from mail.kernel.org ([198.145.29.99]:37090 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730732AbgLHRnd (ORCPT ); Tue, 8 Dec 2020 12:43:33 -0500 Date: Tue, 8 Dec 2020 19:42:46 +0200 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1607449372; bh=BftUl2M64lQHtLnTxOiHMi7sfSYR5CWaxkC+KmCM7iA=; h=From:To:Cc:Subject:References:In-Reply-To:From; b=CboFcSX9DF/ccKwCw3g3G7AMkHU6RwGXd6EhUwYLarUVQmQqkTTu1hVbbYLlT9Pu4 6ol3agoXGVmewMw36lEqKoJV2CxCo7MeHPX6SQIZt76KJ4zyKEtJBRPW/dPshNI1r5 OIKqh783vTlDFY1ymcE4sZNQ+/omhudZi2YeZJlsOTyERbDfj/+SjNI7ixm/dNByUS LV0ahU5geeb5mURgtpNiMSdgO6HExtXNo8W5419tfGmGseHd8v5j9k3Ps0NBsH3SAe LoGGh7Ckb8QT9z461GlIqQ9Gxy8zvmI5g2vRz+3KXv5BXZcFOjLKSHU8bpHY1QlW7/ CU+tRnzAJpCRQ== From: Jarkko Sakkinen To: Jason Gunthorpe Cc: Thomas Gleixner , Jerry Snitselaar , linux-kernel@vger.kernel.org, linux-integrity@vger.kernel.org, intel-gfx@lists.freedesktop.org, dri-devel@lists.freedesktop.org, Peter Huewe , James Bottomley , Matthew Garrett , Hans de Goede Subject: Re: [PATCH v3 3/4] tpm_tis: Disable interrupts if interrupt storm detected Message-ID: <20201208174246.GB58213@kernel.org> References: <20201205014340.148235-1-jsnitsel@redhat.com> <20201205014340.148235-4-jsnitsel@redhat.com> <87tusy7n3b.fsf@nanos.tec.linutronix.de> <20201207192803.GH5487@ziepe.ca> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20201207192803.GH5487@ziepe.ca> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Dec 07, 2020 at 03:28:03PM -0400, Jason Gunthorpe wrote: > On Sun, Dec 06, 2020 at 08:26:16PM +0100, Thomas Gleixner wrote: > > Just as a side note. I was looking at tpm_tis_probe_irq_single() and > > that function is leaking the interrupt request if any of the checks > > afterwards fails, except for the final interrupt probe check which does > > a cleanup. That means on fail before that the interrupt handler stays > > requested up to the point where the module is removed. If that's a > > shared interrupt and some other device is active on the same line, then > > each interrupt from that device will call into the TPM code. Something > > like the below is needed. > > > > Also the X86 autoprobe mechanism is interesting: > > > > if (IS_ENABLED(CONFIG_X86)) > > for (i = 3; i <= 15; i++) > > if (!tpm_tis_probe_irq_single(chip, intmask, 0, i)) > > return; > > > > The third argument is 'flags' which is handed to request_irq(). So that > > won't ever be able to probe a shared interrupt. But if an interrupt > > number > 0 is handed to tpm_tis_core_init() the interrupt is requested > > with IRQF_SHARED. Same issue when the chip has an interrupt number in > > the register. It's also requested exclusive which is pretty likely > > to fail on ancient x86 machines. > > It is very likely none of this works any more, it has been repeatedly > reworked over the years and just left behind out of fear someone needs > it. I've thought it should be deleted for a while now. > > I suppose the original logic was to try and probe without SHARED > because a probe would need exclusive access to the interrupt to tell > if the TPM was actually the source, not some other device. > > It is all very old and very out of step with current thinking, IMHO. I > skeptical that TPM interrupts were ever valuable enough to deserve > this in the first place. > > Jason +1 for removing it. /Jarkko