Received: by 2002:a05:6358:bb9e:b0:b9:5105:a5b4 with SMTP id df30csp4578081rwb; Tue, 6 Sep 2022 09:22:45 -0700 (PDT) X-Google-Smtp-Source: AA6agR7CHbwK5N+qNxoYpzCfYOgpIYz1Mu3tQ5Wh/UTkFtrZ1rsEDhj09tlhO+4TWcBsLX/jGyCv X-Received: by 2002:a17:90b:b06:b0:200:aff0:2e68 with SMTP id bf6-20020a17090b0b0600b00200aff02e68mr989883pjb.159.1662481365239; Tue, 06 Sep 2022 09:22:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1662481365; cv=none; d=google.com; s=arc-20160816; b=0RNq3uAyEpi0bI1Vh20A/OX9m6uRULhqJ9fJDBO+h1Z9vEZUbH8ObGfLMcUSFVVjJ6 g3AlOlvIiqKacyuHXIJN+ww9kdc7/JUz3tkpccV+ExlZw0G1wCBtKU5XOhIi35WXyAb6 Fi13wX9HyT2dOPy6/6U03VseoEuKRt/KvISSRA23WP8MsXKwRFGbmpbgCd4kPo1ivx1d flC2WvGlAVIxpNuxocgSlUAjAHJFpAz5mdEASy8+CAbyhaYPEGaIjA6VzvEhyaXxwgWk pb/JOkXXN/Knt2OuSq/O/tSSipK2oKrw1Qac6U6Odsht+ZLKI2OHXn8EzDQeV6I3PpCg 1nCg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=n9gK6v8a7GQ3TOMqWKjrtAvZjsIH1MMsyRbJOU4kJOc=; b=ga4rJeR15t1w0o4+jssjJMmMTn+IpqrCC6KzT9TobFFdV8+y7TufpPuq21uCSvgPfd gASJzDUGpt0dg+vcGt4THt8Lhd1Rao7LvJDawClxnnlmeHns59e1f9fgwXfqMOVjuk7d 2SAwjf7H/cRBfmxzjFOY8tsPjxvQCNk2Fj3vUgdwckSHEAwbtbrWVj58voyVq3SGaTfx BswIvSW0C1S9vAMgeZ14uBydZLxZDBfgQmmpCLlYwK303hyoa9TEzwlLJu9gv9JREKNy 9ivP3X1RR7Jf2eHe/rqMJipq89+1cECSDxu8xma3X6cjAxoFwCfVwqEwiTNytNqiKy8n YNoQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@canonical.com header.s=20210705 header.b="i8wUTA7/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=canonical.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id ca10-20020a056a00418a00b00528d101d6e0si12762895pfb.288.2022.09.06.09.22.33; Tue, 06 Sep 2022 09:22:45 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@canonical.com header.s=20210705 header.b="i8wUTA7/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=canonical.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232728AbiIFPkT (ORCPT + 99 others); Tue, 6 Sep 2022 11:40:19 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48994 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234163AbiIFPjq (ORCPT ); Tue, 6 Sep 2022 11:39:46 -0400 Received: from smtp-relay-canonical-1.canonical.com (smtp-relay-canonical-1.canonical.com [185.125.188.121]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3B1F893534 for ; Tue, 6 Sep 2022 07:50:03 -0700 (PDT) Received: from localhost.localdomain (unknown [10.101.196.174]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by smtp-relay-canonical-1.canonical.com (Postfix) with ESMTPSA id 27AEB4157F; Tue, 6 Sep 2022 14:31:53 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com; s=20210705; t=1662474717; bh=n9gK6v8a7GQ3TOMqWKjrtAvZjsIH1MMsyRbJOU4kJOc=; h=From:To:Cc:Subject:Date:Message-Id:MIME-Version; b=i8wUTA7/J1TExbccWiaIZUkbBhyzqPjCLucDuDxfKL7zuEn0EzPRReiNbnwNM1oiJ YCx2Ja/xXQW3691DrH+d+cu/n1LY1jubJxFWTEBiAUteS8+vXHxOMhisVzB8i2rkOR 1HcaGjgMDSRPqfVieu7L8TkzTAI9vMzHVGZcf6DYLjoLtmybQCqOBLVTBALy/iXvvH SMPflEbVhYbTsZcb2IUEhZ8nxGhvRWLDjRD47gFyk91BBoKXxSIZ6lWqXXNzN9kHvX DRhpSYy4xMkztcZvQKpOAJXahNVxEocNyFJTDWaUXhwzlX6ZnxTDDuOmBWqqHmWW2v VU3SqrueCadLA== From: Kai-Heng Feng To: rafael.j.wysocki@intel.com Cc: Kai-Heng Feng , Josef Bacik , Dmitry Osipenko , Petr Mladek , Luis Chamberlain , tangmeng , YueHaibing , linux-kernel@vger.kernel.org Subject: [PATCH v2] PM: ACPI: reboot: Reinstate S5 for reboot Date: Tue, 6 Sep 2022 22:31:07 +0800 Message-Id: <20220906143108.1749183-1-kai.heng.feng@canonical.com> X-Mailer: git-send-email 2.36.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Commit d60cd06331a3 ("PM: ACPI: reboot: Use S5 for reboot") caused Dell PowerEdge r440 hangs at boot. The issue is fixed by commit 2ca1c94ce0b6 ("tg3: Disable tg3 device on system reboot to avoid triggering AER"), so reinstate the patch again. Cc: Josef Bacik Signed-off-by: Kai-Heng Feng --- v2: - Use do_kernel_power_off_prepare() instead. kernel/reboot.c | 55 +++++++++++++++++++++++++------------------------ 1 file changed, 28 insertions(+), 27 deletions(-) diff --git a/kernel/reboot.c b/kernel/reboot.c index 3c35445bf5ad3..39cbb45afc54a 100644 --- a/kernel/reboot.c +++ b/kernel/reboot.c @@ -243,28 +243,6 @@ void migrate_to_reboot_cpu(void) set_cpus_allowed_ptr(current, cpumask_of(cpu)); } -/** - * kernel_restart - reboot the system - * @cmd: pointer to buffer containing command to execute for restart - * or %NULL - * - * Shutdown everything and perform a clean reboot. - * This is not safe to call in interrupt context. - */ -void kernel_restart(char *cmd) -{ - kernel_restart_prepare(cmd); - migrate_to_reboot_cpu(); - syscore_shutdown(); - if (!cmd) - pr_emerg("Restarting system\n"); - else - pr_emerg("Restarting system with command '%s'\n", cmd); - kmsg_dump(KMSG_DUMP_SHUTDOWN); - machine_restart(cmd); -} -EXPORT_SYMBOL_GPL(kernel_restart); - static void kernel_shutdown_prepare(enum system_states state) { blocking_notifier_call_chain(&reboot_notifier_list, @@ -301,6 +279,34 @@ static BLOCKING_NOTIFIER_HEAD(power_off_prep_handler_list); */ static ATOMIC_NOTIFIER_HEAD(power_off_handler_list); +static void do_kernel_power_off_prepare(void) +{ + blocking_notifier_call_chain(&power_off_prep_handler_list, 0, NULL); +} + +/** + * kernel_restart - reboot the system + * @cmd: pointer to buffer containing command to execute for restart + * or %NULL + * + * Shutdown everything and perform a clean reboot. + * This is not safe to call in interrupt context. + */ +void kernel_restart(char *cmd) +{ + kernel_restart_prepare(cmd); + do_kernel_power_off_prepare(); + migrate_to_reboot_cpu(); + syscore_shutdown(); + if (!cmd) + pr_emerg("Restarting system\n"); + else + pr_emerg("Restarting system with command '%s'\n", cmd); + kmsg_dump(KMSG_DUMP_SHUTDOWN); + machine_restart(cmd); +} +EXPORT_SYMBOL_GPL(kernel_restart); + static int sys_off_notify(struct notifier_block *nb, unsigned long mode, void *cmd) { @@ -606,11 +612,6 @@ static int legacy_pm_power_off(struct sys_off_data *data) return NOTIFY_DONE; } -static void do_kernel_power_off_prepare(void) -{ - blocking_notifier_call_chain(&power_off_prep_handler_list, 0, NULL); -} - /** * do_kernel_power_off - Execute kernel power-off handler call chain * -- 2.36.1