Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 7EE3BC61DA4 for ; Thu, 2 Feb 2023 12:57:55 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232048AbjBBM5y (ORCPT ); Thu, 2 Feb 2023 07:57:54 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57982 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230375AbjBBM5t (ORCPT ); Thu, 2 Feb 2023 07:57:49 -0500 Received: from bedivere.hansenpartnership.com (bedivere.hansenpartnership.com [IPv6:2607:fcd0:100:8a00::2]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B26226C11F; Thu, 2 Feb 2023 04:57:45 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=hansenpartnership.com; s=20151216; t=1675342664; bh=b0+JBu7+hicXZS/ZVb10lf4TBhXVyuFoDEk7dU9kzZU=; h=Message-ID:Subject:From:To:Date:In-Reply-To:References:From; b=F3z58H/Vxe98tjskmvHl2JnlqqmFVq6LnScVUrplDkbVaHFkOjr5DqPQNIRp7+CIo aSp20BVPLsyhliD2kwMIXy1RbP+Zf9SqT2iMR7o40pYwwquTcC5QCZJd1hQbIuPqxc KjepfFAftyq2FuMYt0ZChd0F3+SWNvcQ9GMUSjVo= Received: from localhost (localhost [127.0.0.1]) by bedivere.hansenpartnership.com (Postfix) with ESMTP id A51961280C9A; Thu, 2 Feb 2023 07:57:44 -0500 (EST) Received: from bedivere.hansenpartnership.com ([127.0.0.1]) by localhost (bedivere.hansenpartnership.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YBosZ22p1qzS; Thu, 2 Feb 2023 07:57:44 -0500 (EST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=hansenpartnership.com; s=20151216; t=1675342664; bh=b0+JBu7+hicXZS/ZVb10lf4TBhXVyuFoDEk7dU9kzZU=; h=Message-ID:Subject:From:To:Date:In-Reply-To:References:From; b=F3z58H/Vxe98tjskmvHl2JnlqqmFVq6LnScVUrplDkbVaHFkOjr5DqPQNIRp7+CIo aSp20BVPLsyhliD2kwMIXy1RbP+Zf9SqT2iMR7o40pYwwquTcC5QCZJd1hQbIuPqxc KjepfFAftyq2FuMYt0ZChd0F3+SWNvcQ9GMUSjVo= Received: from lingrow.int.hansenpartnership.com (unknown [IPv6:2601:5c4:4302:c21::c14]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (prime256v1) server-signature RSA-PSS (2048 bits) server-digest SHA256) (Client did not present a certificate) by bedivere.hansenpartnership.com (Postfix) with ESMTPSA id 8E09C1280A87; Thu, 2 Feb 2023 07:57:43 -0500 (EST) Message-ID: <8a7775912f31394944b43db12adc78efd84b1fad.camel@HansenPartnership.com> Subject: Re: [regression] Bug 216989 - since 6.1 systems with AMD Ryzen stutter when fTPM is enabled From: James Bottomley To: Linux regressions mailing list , Peter Huewe , Jarkko Sakkinen , Jason Gunthorpe Cc: linux-integrity@vger.kernel.org, LKML , reach622@mailcuk.com, 1138267643@qq.com, "Jason A. Donenfeld" Date: Thu, 02 Feb 2023 07:57:37 -0500 In-Reply-To: <3a196414-68d8-29c9-24cc-2b8cb4c9d358@leemhuis.info> References: <3a196414-68d8-29c9-24cc-2b8cb4c9d358@leemhuis.info> Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.42.4 MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 2023-02-02 at 11:28 +0100, Linux kernel regression tracking (Thorsten Leemhuis) wrote: [...] > So it's a firmware problem, but apparently one that Linux only > triggers since 6.1. > > Jason, could the hwrng changes have anything to do with this? > > A bisection really would be helpful, but I guess that is not easy as > the problem apparently only shows up after some time... the problem description says the fTPM causes system stutter when it writes to NVRAM. Since an fTPM is a proprietary implementation, we don't know what it does. The ms TPM implementation definitely doesn't trigger NV writes on rng requests, but it is plausible this fTPM does ... particularly if they have a time based input to the DRNG. Even if this speculation is true, there's not much we can do about it, since it's a firmware bug and AMD should have delivered the BIOS update that fixes it. The way to test this would be to set the config option CONFIG_HW_RANDOM_TPM=n and see if the stutter goes away. I suppose if someone could quantify the bad bioses, we could warn, but that's about it. James