Received: by 2002:a05:6358:16cc:b0:ea:6187:17c9 with SMTP id r12csp1057127rwl; Thu, 5 Jan 2023 08:08:23 -0800 (PST) X-Google-Smtp-Source: AMrXdXs1YDRrU3l/wimT7vfJs8uYJdTN9tt1PJaGQfpPxRoNcAvl451PVZ7u+hwr/lOxHgxk+Czg X-Received: by 2002:a17:906:65a:b0:7c1:7045:1a53 with SMTP id t26-20020a170906065a00b007c170451a53mr41061911ejb.15.1672934903708; Thu, 05 Jan 2023 08:08:23 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1672934903; cv=none; d=google.com; s=arc-20160816; b=OkjmNROkaDYGvLglQS7dT3Rtse6zdgvzqZvQTck7Np6sVxBcyXZsgRNgWZ1yMm704e qDafk5RWvInpoWfTAGRGAno+PegXLEPzSj9pKcNXe6nf8ooMYD+5il/TErW9tgauiSXU 54Et9IEHQnto6KqwiquzOxk2qT3IfY8RDEBfQcSnkAH/FIm6Lkv7wra8hDC9WdjzmAlQ ZgXLDEjF9dUSbuUfDRV6hY7xqqzfYatZGxiwxPpguGu/quD3EXIR4cyHOoeDWYRe1vef M/79BzArBCciskfYwG1xjMLBoUoTpjCPp0NvdQJ9WObsKvB91Ko8q7usYdBY9Iz46HMC lflA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:date:cc:to:from:subject :message-id:dkim-signature:dkim-signature; bh=Y44Ppm+X+uiTCul7bE0iOZdYdUa68q28m0XUzGgxCX8=; b=KCv7BmSNABP4SOUzvbtQ/IFuIbBPi+PUAN1864etYnAvELExn68svNEXAM9y6JPIPU NEId+dDv93+E7dPiZwxiAbp70cwQp7ioZXrdxkjig+hz0534fxgsd3CUZ2tePGBhrgbo bmVCqUAqxuRR9tWLfWXupuQU1net9asgO+mZ+2fuxw6n322T+1NqfWpUfhdPX6h9rL+c PAbhc2MqUne8TMo4mVWRP0OFZzf0VeqMWPO6x4JXWr2MjduM5fP1lYLGl+fOwr0xPflW kb4UoZBxJfaH26ue5GROGCrQjqdDQa8ABlzDLl0Y+8+0WcGTZ8DfZEhJesUorPWLujnB n0cw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@hansenpartnership.com header.s=20151216 header.b=A2aIKmog; dkim=pass header.i=@hansenpartnership.com header.s=20151216 header.b="M1/zSBx8"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=hansenpartnership.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id ww13-20020a170907084d00b0084cb872d3a0si14518000ejb.328.2023.01.05.08.08.10; Thu, 05 Jan 2023 08:08:23 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@hansenpartnership.com header.s=20151216 header.b=A2aIKmog; dkim=pass header.i=@hansenpartnership.com header.s=20151216 header.b="M1/zSBx8"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=hansenpartnership.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232849AbjAEPTA (ORCPT + 55 others); Thu, 5 Jan 2023 10:19:00 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41470 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234421AbjAEPSP (ORCPT ); Thu, 5 Jan 2023 10:18:15 -0500 Received: from bedivere.hansenpartnership.com (bedivere.hansenpartnership.com [IPv6:2607:fcd0:100:8a00::2]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 121575C912; Thu, 5 Jan 2023 07:18:05 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=hansenpartnership.com; s=20151216; t=1672931884; bh=SpKViO9KKGPQsDvTqPuWi6tYm/odcCiu/A949QhiGJ0=; h=Message-ID:Subject:From:To:Date:In-Reply-To:References:From; b=A2aIKmogTcyzNm7tjuP+lhTI3Gp+YPwcqoEOg2TP1fVpLMndKdaau7uVzbj+2ZBfI EBogZ6fwCmIS2kR9PjLE+GJZK6glENFoQloIshif5/NItnGKTdjlj5eqI/7LtqIN3P PftGPoyMSAbvcdZEL9RYdxkUWB8yMRn6Jpv/viMc= Received: from localhost (localhost [127.0.0.1]) by bedivere.hansenpartnership.com (Postfix) with ESMTP id 438571286048; Thu, 5 Jan 2023 10:18:04 -0500 (EST) Received: from bedivere.hansenpartnership.com ([127.0.0.1]) by localhost (bedivere.hansenpartnership.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VTRp5QcrKI60; Thu, 5 Jan 2023 10:18:04 -0500 (EST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=hansenpartnership.com; s=20151216; t=1672931883; bh=SpKViO9KKGPQsDvTqPuWi6tYm/odcCiu/A949QhiGJ0=; h=Message-ID:Subject:From:To:Date:In-Reply-To:References:From; b=M1/zSBx8nbMV6uqcavEg8XMD/PmEJijFlvKEsjZoLhxtz5gKtIWcTos8g4nwaOrBj rIYCrvu+sbfcmELu6UWOLHb66Jwaob5iJ3pp2t9Z0I5GXbb9lgZo7GK32E4NhHVGpa lz75UgDjBt3EMqIdrmW5io7mQ0jcbKx1zG9liDrU= Received: from lingrow.int.hansenpartnership.com (unknown [IPv6:2601:5c4:4302:c21::c14]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (prime256v1) server-signature RSA-PSS (2048 bits) server-digest SHA256) (Client did not present a certificate) by bedivere.hansenpartnership.com (Postfix) with ESMTPSA id 56F66128603E; Thu, 5 Jan 2023 10:17:59 -0500 (EST) Message-ID: <2d07d185384ed444bef46648316354ef5afd481a.camel@HansenPartnership.com> Subject: Re: [REGRESSION] suspend to ram fails in 6.2-rc1 due to tpm errors From: James Bottomley To: Thorsten Leemhuis Cc: Vlastimil Babka , Peter Huewe , Jarkko Sakkinen , Jason Gunthorpe , Jan Dabros , regressions@lists.linux.dev, LKML , linux-integrity@vger.kernel.org, Dominik Brodowski , Herbert Xu , Linus Torvalds , "Jason A. Donenfeld" , Johannes Altmanninger Date: Thu, 05 Jan 2023 10:17:57 -0500 In-Reply-To: <7ebab1ff-48f1-2737-f0d3-25c72666d041@leemhuis.info> References: <7cbe96cf-e0b5-ba63-d1b4-f63d2e826efa@suse.cz> <7ebab1ff-48f1-2737-f0d3-25c72666d041@leemhuis.info> Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.42.4 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,SPF_HELO_PASS,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 2023-01-05 at 14:59 +0100, Thorsten Leemhuis wrote: > On 29.12.22 05:03, Jason A. Donenfeld wrote: > > On Wed, Dec 28, 2022 at 06:07:25PM -0500, James Bottomley wrote: > > > On Wed, 2022-12-28 at 21:22 +0100, Vlastimil Babka wrote: > > > > Ugh, while the problem [1] was fixed in 6.1, it's now happening > > > > again on the T460 with 6.2-rc1. Except I didn't see any oops > > > > message or "tpm_try_transmit" error this time. The first > > > > indication of a problem is this during a resume from suspend to > > > > ram: > > > > > > > > tpm tpm0: A TPM error (28) occurred continue selftest > > > > > > > > and then periodically > > > > > > > > tpm tpm0: A TPM error (28) occurred attempting get random > > > > > > That's a TPM 1.2 error which means the TPM failed the selftest.  > > > The original problem was reported against TPM 2.0  because of a > > > missing try_get_ops(). > > > > No, I'm pretty sure the original bug, which was fixed by "char: > > tpm: Protect tpm_pm_suspend with locks" regards 1.2 as well, > > especially considering it's the same hardware from Vlastimil > > causing this. I also recall seeing this in 1.2 when I ran this with > > the TPM emulator. So that's not correct. > > James, are you or some other TPM developer looking into this? Or is > this deadlocked now? Not really: TPM 1.2 way predates my interest in the TPM subsystem, and I've only ever done patches to 2.0. I can look at the paths theoretically, but I don't have any hardware. Self Test failures tend to be hardware specific, so even poking around in the emulator is unlikely to give what might be the cause. > And if so: how can we get this unstuck to get this regression > solved? One of the TPM maintainers with hardware (possibly the specific TPM ... what is it, by the way?) needs to get involved. James