On Fri Aug 18, 2023 at 4:58 AM EEST, Limonciello, Mario wrote:
On 8/17/2023 5:33 PM, Jarkko Sakkinen wrote:
On Fri Aug 18, 2023 at 1:25 AM EEST, Todd Brandt wrote:
On Fri, 2023-08-18 at 00:47 +0300, Jarkko Sakkinen wrote:
On Fri Aug 18, 2023 at 12:09 AM EEST, Todd Brandt wrote:
While testing S3 on 6.5.0-rc6 we've found that 5 systems are seeing
a
crash and reboot situation when S3 suspend is initiated. To
reproduce
it, this call is all that's required "sudo sleepgraph -m mem
-rtcwake
15".
1. Are there logs available?
2. Is this the test case: https://pypi.org/project/sleepgraph/ (never
used it before).
There are no dmesg logs because the S3 crash wipes them out. Sleepgraph
isn't actually necessary to activate it, just an S3 suspend "echo mem >
/sys/power/state".
So far it appears to only have affected test systems, not production
hardware, and none of them have TPM chips, so I'm beginning to wonder
if this patch just inadvertently activated a bug somewhere else in the
kernel that happens to affect test hardware.
I'll continue to debug it, this isn't an emergency as so far I haven't
seen it in production hardware.
OK, I'll still see if I could reproduce it just in case.
BR, Jarkko
I'd like to better understand what kind of TPM initialization path has
run. Does the machine have some sort of TPM that failed to fully
initialize perhaps?
If you can't share a full bootup dmesg, can you at least share
# dmesg | grep -i tpm
It would be more useful perhaps to get full dmesg output after power on
and before going into suspend.
Also ftrace filter could be added to the kernel command-line:
ftrace=function ftrace_filter=tpm*
After bootup:
mount -t tracefs nodev /sys/kernel/tracing
cat /sys/kernel/tracing/trace
BR, Jarkko