Received: by 2002:a05:6520:1682:b0:147:d1a0:b502 with SMTP id ck2csp5597868lkb; Mon, 11 Oct 2021 09:40:28 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzzUunICI0ao9rINkWWuhBeDHoiD78U1sGFKmlX+6bMa1uah5bOpsIiqC+oNxmnOwhEeF1N X-Received: by 2002:a50:cfcb:: with SMTP id i11mr42850900edk.347.1633970428230; Mon, 11 Oct 2021 09:40:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1633970428; cv=none; d=google.com; s=arc-20160816; b=MZ1oQaLrPuJhsCTiv65OGD8qOVVrgGR1SVlDgyimkXbP9wIe0IYR6Cu7zHYcVlZmQg V6SmsjSVi7zIKx3OvdScLvcns5eRs//ypGXumYZKfvY10upCN0+3iMJUXQHVD7yvAzNt DXPrwdCDO5evEhYUpmG/9GGUfVBbanGJdTOyQph9zsU7ZeqCCndThhm2DSVnY65arghz 1UJtHtMMN3DpakVAU4BVZ6UqWZFqqjzQ52HfQ9TevpwFTGPp6habXw1sVogwc8IuxERo ivPVqr0PYPfvgJTSesJVFj0ajCxgvama+cCisYcQH35AuUHXGUsr/HQ6PWWa+W32bg3l NCNQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=cRcXK6ISlm1SM0oyuHHScFrXSDd0VLQNuDhKbrdCMyY=; b=ZS9wrfV3UvAZeTy/XCGZFcAUr34yD7CIu7jPYHQF3H+RGUcBz3TQO80fliM3FhpUhR zdKHYdmTt/FBrolH/wM8JMbkm+8bN9yRm7iebx71MLQFBKmynkZOyRotcupFMuIV/9td fLd2vMuEO/aWp50j/Px/vGtHM7crkup7w/m4IaaLicmYNXE0I9xdiQ63oaNugmD2ZUsU RJBqwtYzqF1v2trCbmUbEcvAb73f1Ve82cVbWE+cjICbiWzHtpDz3sC1Pyi/QMJLEqXM twkBdnEz4SMaioLsluovltW/7BhyqyyCyRBG3g6vkqIjc5qPYrN0G3m38bn28ByeckGm NsBw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b13si11341106ejv.694.2021.10.11.09.40.04; Mon, 11 Oct 2021 09:40:28 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233434AbhJKPMl (ORCPT + 99 others); Mon, 11 Oct 2021 11:12:41 -0400 Received: from out30-56.freemail.mail.aliyun.com ([115.124.30.56]:43573 "EHLO out30-56.freemail.mail.aliyun.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231608AbhJKPMk (ORCPT ); Mon, 11 Oct 2021 11:12:40 -0400 X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R131e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=e01e01424;MF=zhangliguang@linux.alibaba.com;NM=1;PH=DS;RN=9;SR=0;TI=SMTPD_---0UrTfT3z_1633965030; Received: from localhost(mailfrom:zhangliguang@linux.alibaba.com fp:SMTPD_---0UrTfT3z_1633965030) by smtp.aliyun-inc.com(127.0.0.1); Mon, 11 Oct 2021 23:10:38 +0800 From: Liguang Zhang To: "Rafael J. Wysocki" , Len Brown , James Morse , Tony Luck , Borislav Petkov Cc: linux-acpi@vger.kernel.org, linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, Liguang Zhang Subject: [PATCH] ACPI / APEI: restore interrupt before panic in sdei flow Date: Mon, 11 Oct 2021 23:10:28 +0800 Message-Id: <20211011151028.105215-1-zhangliguang@linux.alibaba.com> X-Mailer: git-send-email 2.19.1.6.gb485710b MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org We use ACPI_HEST_NOTIFY_SOFTWARE_DELEGATED Notify type for ras event. In ATF: ehf_activate_priority() dispatch sdei() ehf_deactivate_priority() If ras error severity is fatal, panic was called in sdei(), ehf_deactivate_priority was not called. we should restore interrupt before panic otherwise kdump will trigger error. Signed-off-by: Liguang Zhang --- drivers/acpi/apei/ghes.c | 25 +++++++++++++++++++++---- drivers/firmware/arm_sdei.c | 14 ++++++++++++++ include/linux/arm_sdei.h | 2 ++ 3 files changed, 37 insertions(+), 4 deletions(-) diff --git a/drivers/acpi/apei/ghes.c b/drivers/acpi/apei/ghes.c index 0c8330ed1ffd..4f734c60987c 100644 --- a/drivers/acpi/apei/ghes.c +++ b/drivers/acpi/apei/ghes.c @@ -141,6 +141,7 @@ static unsigned long ghes_estatus_pool_size_request; static struct ghes_estatus_cache *ghes_estatus_caches[GHES_ESTATUS_CACHES_SIZE]; static atomic_t ghes_estatus_cache_alloced; +static bool ghes_sdei_callback; static int ghes_panic_timeout __read_mostly = 30; static void __iomem *ghes_map(u64 pfn, enum fixed_addresses fixmap_idx) @@ -837,18 +838,30 @@ static void ghes_estatus_cache_add( rcu_read_unlock(); } +static void sdei_api_restore_ras(void) +{ + /* reboot to log the error! */ + if (!panic_timeout) + panic_timeout = ghes_panic_timeout; + panic("Fatal hardware error!"); +} + static void __ghes_panic(struct ghes *ghes, struct acpi_hest_generic_status *estatus, u64 buf_paddr, enum fixed_addresses fixmap_idx) { + int err; + __ghes_print_estatus(KERN_EMERG, ghes->generic, estatus); ghes_clear_estatus(ghes, estatus, buf_paddr, fixmap_idx); - /* reboot to log the error! */ - if (!panic_timeout) - panic_timeout = ghes_panic_timeout; - panic("Fatal hardware error!"); + if (ghes_sdei_callback) { + err = sdei_api_event_complete_and_resume((unsigned long)sdei_api_restore_ras); + if (err) + sdei_api_restore_ras(); + } else + sdei_api_restore_ras(); } static int ghes_proc(struct ghes *ghes) @@ -1224,7 +1237,9 @@ static int ghes_sdei_normal_callback(u32 event_num, struct pt_regs *regs, int err; raw_spin_lock(&ghes_notify_lock_sdei_normal); + ghes_sdei_callback = true; err = __ghes_sdei_callback(ghes, FIX_APEI_GHES_SDEI_NORMAL); + ghes_sdei_callback = false; raw_spin_unlock(&ghes_notify_lock_sdei_normal); return err; @@ -1238,7 +1253,9 @@ static int ghes_sdei_critical_callback(u32 event_num, struct pt_regs *regs, int err; raw_spin_lock(&ghes_notify_lock_sdei_critical); + ghes_sdei_callback = true; err = __ghes_sdei_callback(ghes, FIX_APEI_GHES_SDEI_CRITICAL); + ghes_sdei_callback = false; raw_spin_unlock(&ghes_notify_lock_sdei_critical); return err; diff --git a/drivers/firmware/arm_sdei.c b/drivers/firmware/arm_sdei.c index a7e762c352f9..1af6b6b55c57 100644 --- a/drivers/firmware/arm_sdei.c +++ b/drivers/firmware/arm_sdei.c @@ -473,6 +473,20 @@ static int sdei_api_event_unregister(u32 event_num) 0, 0, 0, NULL); } +int sdei_api_event_complete_and_resume(u64 addr) +{ + int err; + + err = invoke_sdei_fn(SDEI_1_0_FN_SDEI_EVENT_COMPLETE_AND_RESUME, addr, + 0, 0, 0, 0, NULL); + if (err && err != -EIO) { + pr_warn_once("failed to restore CPU[%u]: %d\n", smp_processor_id(), err); + return err; + } + + return 0; +} + /* Called directly by the hotplug callbacks */ static void _local_event_unregister(void *data) { diff --git a/include/linux/arm_sdei.h b/include/linux/arm_sdei.h index 0a241c5c911d..b6d347085834 100644 --- a/include/linux/arm_sdei.h +++ b/include/linux/arm_sdei.h @@ -46,9 +46,11 @@ int sdei_unregister_ghes(struct ghes *ghes); /* For use by arch code when CPU hotplug notifiers are not appropriate. */ int sdei_mask_local_cpu(void); int sdei_unmask_local_cpu(void); +int sdei_api_event_complete_and_resume(u64 addr); #else static inline int sdei_mask_local_cpu(void) { return 0; } static inline int sdei_unmask_local_cpu(void) { return 0; } +int sdei_api_event_complete_and_resume(u64 addr) { return 0; } #endif /* CONFIG_ARM_SDE_INTERFACE */ -- 2.19.1.6.gb485710b