Re: Recent tpm_tis IRQ handling changes are causing kernel backtraces]

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, Jun 29, 2021 at 09:14:39PM +0200, Hans de Goede wrote:
> Hi,
> 
> On 6/29/21 8:04 PM, Jarkko Sakkinen wrote:
> > On Wed, Jun 23, 2021 at 03:54:59PM +0200, Hans de Goede wrote:
> >> Hi,
> >>
> >> On 6/23/21 3:40 PM, Jarkko Sakkinen wrote:
> >>> On Mon, Jun 21, 2021 at 02:04:52PM +0200, Hans de Goede wrote:
> >>>> Hi,
> >>>>
> >>>> On 6/14/21 3:33 PM, Hans de Goede wrote:
> >>>>> Hi,
> >>>>>
> >>>>> On 6/1/21 6:04 PM, Hans de Goede wrote:
> >>>>>> Hi,
> >>>>>>
> >>>>>> On 5/31/21 6:36 AM, Jarkko Sakkinen wrote:
> >>>>>>>> Interestingly enough the first backtrace is also happening on a:
> >>>>>>>> "Dell Inc. XPS 13 9310/0MRT12, BIOS 2.2.0 04/06/2021"
> >>>>>>>>
> >>>>>>>> So it seems that at least with 5.12.6 (which has the last 2 fixes)
> >>>>>>>> all reports are about the XPS 13 9310. I wonder if there is an
> >>>>>>>> issue with the TPM interrupt line on the XPS 13 9310; I've asked the
> >>>>>>>> reporters to try adding tpm_tis.interrupts=0 to their kernel commandline.
> >>>>>>>
> >>>>>>> This is helpful for sure that these all are happening on matching hardware.
> >>>>>>
> >>>>>> So our kernel-backtrace tracking info (ABRT) just recorded a third backtrace
> >>>>>> with a kernel >= 5.12.6, again on the XPS 13 9310, so now we have 3 variants:
> >>>>>>
> >>>>>> 1. Backtrace starting with a call to ima_add_boot_aggregate
> >>>>>> https://bugzilla.redhat.com/show_bug.cgi?id=1963712
> >>>>>>
> >>>>>> 2. Backtrace starting with a call to tpm_dev_async_work:
> >>>>>> https://bugzilla.redhat.com/show_bug.cgi?id=1964974
> >>>>>> (note this one is not easily reproducible)
> >>>>>>
> >>>>>> 3. Backtrace starting with a call to rng_dev_read:
> >>>>>> https://bugzilla.redhat.com/show_bug.cgi?id=1920510
> >>>>>>
> >>>>>> 3. is the new one. All bugs linked above are public, all 3 backtraces
> >>>>>> so far have only been reported on the XPS 13 9310 (with kernel >= 5.12.6)
> >>>>>> and I've asked all the reporters to check if tpm_tis.interrupts=0 helps.
> >>>>>
> >>>>> Quick status update, I've got a response from a XPS 13 9310 user in:
> >>>>>
> >>>>> https://bugzilla.redhat.com/show_bug.cgi?id=1920510
> >>>>>
> >>>>> Indicating that a. he can reproduce this with the latest >= 5.12.6 kernels;
> >>>>> and b. it goes away when specifying tpm_tis.interrupts=0 as I expected
> >>>>> (I expected this because all the bug-reports started when the interrupt
> >>>>> code got fixed/re-enabled a while ago).
> >>>>
> >>>> One more status update.
> >>>>
> >>>> - A new 4th variant of the backtrace has been spotted, where the problem hits
> >>>> when called from probe() -> tpm2_auto_startup -> tpm2_do_selftest, see:
> >>>> https://bugzilla.redhat.com/show_bug.cgi?id=1958381
> >>>>
> >>>> - So far all reports with kernel >= 5.12.6 have been on a Dell XPS 13 9310
> >>>> models. But the new variant is happening on a Dell XPS 15 9500 and the
> >>>> backtrace starting at ima_add_boot_aggregate is also being reported on
> >>>> a Dell XPS 15 9500 (as well as on the XPS 13 9310).
> >>>>
> >>>> Regards,
> >>>>
> >>>> Hans
> >>>
> >>> OK, I'll have to query if I could borrow that laptop from someone. It's
> >>> fairly common laptop, i.e. might be possible.
> >>
> >> In the mean time I've also got a report that this variant of the backtrace:
> >>
> >> 1. Backtrace starting with a call to ima_add_boot_aggregate
> >> https://bugzilla.redhat.com/show_bug.cgi?id=1963712
> >>
> >> Is also still happening with recent 5.12.y kernels on
> >> Dell Precision 7750 laptops. Both the Precision 7750 and the XPS 9500 use
> >> 10th gen comet lake processors (i7-10750H), where as the XPS 9310 is using
> >> an icelake processor. So the common denominator seems to be that they are
> >> all 2020 Dell laptop models using the latest Intel CPUs.
> >>
> >> FYI the complete list of models on which some of the 4 backtrace variants
> >> are still seen on recent 5.12.y kernels is now:
> >>
> >> Dell XPS 13 9310
> >> Dell XPS 15 9500
> >> Dell Precision 7750
> >>
> >> Regards,
> >>
> >> Hans
> > 
> > Does "tpm_tis.interrupts=0" uniformly workaround the issue?
> 
> I unfortunately have not gotten much replies to my request to test with
> tpm_tis.interrupts=0, but for those people who have bothered to test
> (2 reporters IIRC) using tpm_tis.interrupts=0 does avoid the issue.

So we see this in dmesg as first anything from TPM:

[    0.904572] tpm_tis STM0125:00: 2.0 TPM (device-id 0x0, rev-id 78)

This means that one command is successfully processed by the TPM, i.e.
tpm2_probe() in tpm_tis_core_init().

My first *guess*  was that IRQ is given by ACPI, would need ACPI dump to
confirm (e.g. sudo acpidump > acpi.dump). It cannot be so because otherwise
this code path would be executed:

        if (!(chip->flags & TPM_CHIP_FLAG_IRQ)) {
                dev_err(&chip->dev, FW_BUG
                        "TPM interrupt not working, polling instead\n");

                disable_interrupts(chip);
        }

TPM_CHIP_FLAG_IRQ is never set, so you should see this message in dmesg if
a legit value is given to IRQ by ACPI.  We are probably planning re-enable
IRQ code after these type of issues are fully resolved, but right now you
should not end up having it enabled (see tpm_tis_send() function).

To put this together "if (irq != -1) {" path in tpm_tis_core_init() is
never executed. And early in the same function the interrupt hardware is
*explicitly* disabled.

For me this looks like a hardware bug right now: interrupts stay enabled
for some reason.

ACPI dump would be useful to verify some of the assumptions in this.

/Jarkko



[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Linux Kernel]     [Linux Kernel Hardening]     [Linux NFS]     [Linux NILFS]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux SCSI]

  Powered by Linux