From nobody Sun Feb 8 05:37:19 2026 Received: from SJ2PR03CU001.outbound.protection.outlook.com (mail-westusazon11012037.outbound.protection.outlook.com [52.101.43.37]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 5AC5D21CC44; Thu, 16 Oct 2025 16:38:03 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=fail smtp.client-ip=52.101.43.37 ARC-Seal: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1760632686; cv=fail; b=buFnmfTjHp3m3I6L1Haa2QcK+o9v2Z09kCP8XpKSxxFNwKU1dnDtLALY6gzNwHLgwOdmHH0naajyMzCx9fDRpKjyvegG/jAThKqX44CDyK74GmarLRcmdMt0+9mzHuJOD1Pqcimlw2Gso8W11sLhzchGslCygr/GnRGC7aHAC5s= ARC-Message-Signature: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1760632686; c=relaxed/simple; bh=pTzoJzkcTP9ZQ6qFbxXhkZe/V0ZcBuypKIgEype06hE=; h=From:Date:Subject:MIME-Version:Content-Type:Message-ID:References: In-Reply-To:To:CC; b=hPxpW9aekCc0yjQJgtIi57huXu32o6rNXF8omwPkoquNHyUoWpEB+GdZAHj3bcQoUbQYg9h6toTL2su3JQ0Ijxu62zf/T2xbvfn6yXNkBcDNEZLug+lJmxOcvszj9QXmFQXvsXGJfGzCOE/qU6TXBfwuTlOFZMAxYnQi4F9hPBw= ARC-Authentication-Results: i=2; smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=amd.com; spf=fail smtp.mailfrom=amd.com; dkim=pass (1024-bit key) header.d=amd.com header.i=@amd.com header.b=1kfbaOti; arc=fail smtp.client-ip=52.101.43.37 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=amd.com Authentication-Results: smtp.subspace.kernel.org; spf=fail smtp.mailfrom=amd.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=amd.com header.i=@amd.com header.b="1kfbaOti" ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=uzcDdG3qSl8RTBK40QRRm2+acInCPL87/7vpu5khsc1ekLSmSFKx+U08NIr44kasjoWhJF5imUBc740P1Ov+DgFmcIxIDJIw71+3tYGoXNAEkoT1rKTyc3dA6XEpOCjt16Sp3CrjarMB8rhObWR/oVK+54jNOnSxl7LySwAfeHPwTT41B+/5F3s0KiofFteXcgJJilDHLlyp5W4UqWPaCAfB5IS/n5r4Bovwt1fvut1lOELr6rNjM0m5sIzr1lqJFBzjNrj0y6YHw/e31ZJeEJu9ZE4CbIW4GHQ4yM90T3ZehTQOHzcJL5hWhSeWxwaeh/C3ZVp48pxgO/SvHw54tA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=NONmXt9ywsXOTDhm0J44NaWeeOnPMLGZNkvW++/A0w0=; b=IP+1vSn9d7sPez/QeK27RbP/X0hDlQ6dGfQn9wn2Y40dia0WiJMBCh1xgcZcu+T1gN/h+Drpp3EjkETNxrKJhvQXRDe6VlyXvbY7GCRHUu4nSNvvHSjnf1yJzS4/BjoUsNa7xDm/dsT9yLzHp7BvQNzSuAHZfvN0CotzNLi1Hj9t95u1P2x91DvjgnqRojLZgn4Uoej93kO8gItNUlfduoovujXE8Eg7gQjICU6EE/LvxUy8EPXKL0jyCk61Zm7168GQtBz3eH5aNPc5K5yk0Fij7phPMNn3Xf6uLTEKvX6sXUDLbP9PlQ2u5IGUyBUWwlaPBJVtgpUPie0EcAQVhQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=vger.kernel.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=NONmXt9ywsXOTDhm0J44NaWeeOnPMLGZNkvW++/A0w0=; b=1kfbaOtiUBQS2CFrH4sHlo2ZWcuT/7IHI5G4i7qEHv32Jaebqgexz7OPdPUqiEoTLspgm+p1BsGxb1bYAGiZ5EDjVZHNcZWX/H2XyxVcMykT5xJ/rKzJXMcKCd0jAsOMjvIywtQJJEKIZeVo2aZtTnWrhSAUyYPKTpu7Nso+dW0= Received: from BLAP220CA0011.NAMP220.PROD.OUTLOOK.COM (2603:10b6:208:32c::16) by PH8PR12MB6699.namprd12.prod.outlook.com (2603:10b6:510:1ce::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9228.10; Thu, 16 Oct 2025 16:38:00 +0000 Received: from BL02EPF0001A105.namprd05.prod.outlook.com (2603:10b6:208:32c:cafe::73) by BLAP220CA0011.outlook.office365.com (2603:10b6:208:32c::16) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9228.13 via Frontend Transport; Thu, 16 Oct 2025 16:38:00 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=satlexmb07.amd.com; pr=C Received: from satlexmb07.amd.com (165.204.84.17) by BL02EPF0001A105.mail.protection.outlook.com (10.167.241.137) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9228.7 via Frontend Transport; Thu, 16 Oct 2025 16:38:00 +0000 Received: from [127.0.1.1] (10.180.168.240) by satlexmb07.amd.com (10.181.42.216) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.17; Thu, 16 Oct 2025 09:37:59 -0700 From: Yazen Ghannam Date: Thu, 16 Oct 2025 16:37:46 +0000 Subject: [PATCH v7 1/8] x86/mce: Unify AMD THR handler with MCA Polling Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Message-ID: <20251016-wip-mca-updates-v7-1-5c139a4062cb@amd.com> References: <20251016-wip-mca-updates-v7-0-5c139a4062cb@amd.com> In-Reply-To: <20251016-wip-mca-updates-v7-0-5c139a4062cb@amd.com> To: , Tony Luck , "Rafael J. Wysocki" , Len Brown CC: , , , Qiuxu Zhuo , Nikolay Borisov , Bert Karwatzki , , Yazen Ghannam X-Mailer: b4 0.15-dev-9b767 X-ClientProxiedBy: satlexmb07.amd.com (10.181.42.216) To satlexmb07.amd.com (10.181.42.216) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: BL02EPF0001A105:EE_|PH8PR12MB6699:EE_ X-MS-Office365-Filtering-Correlation-Id: 22d417f2-73bf-4b13-5500-08de0cd25edf X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|82310400026|7416014|376014|36860700013; X-Microsoft-Antispam-Message-Info: =?utf-8?B?TWY4aERtT2UvZmdaZDl0Mit5allUV251RnRTSVRZWjRuaVBuWlE2a2JVeFhr?= =?utf-8?B?YjkxY2Z3QUtRZjNoQkp3MURrU2M1ZXFoWE9mVXZyYmRIOFBBQXU1Yk5vUWJT?= =?utf-8?B?ZW5nUG9oUHZZZ2F3Ykw3MUNxMi9qK0MvTjgvKzIrK2F6dDRwU1lOV2ZBWmpk?= =?utf-8?B?b0hOY2krcGZTd1NXUkZUNWtTM2dGNWtMSS9Tc3laMTlyTXB6cWV3UE9HRm5N?= =?utf-8?B?VERlVGJFMkJzY2lzNVFTbUY0SGVTRVF3Y3ZCei8wdnY5R3lhUkxtOURiODJv?= =?utf-8?B?L203L3hjenIzMEthd2F6SkNQcGpYbVhTUWRiY1RhdzZkQWhsNzQ1aXNINGtC?= =?utf-8?B?cGdVNXVJblJQRUFuU2N4czZmQTVnVE84cVphMzZPTGUvaGRJYjZ3dUZySzg1?= =?utf-8?B?dHFnQ2h0TjRPNzBsYncwM3Y0UDlBTHBqWGlLQUNqVGd5bTZweGZGUTEwajYv?= =?utf-8?B?MElnZmx4TFJ6T2RhTzAwODVWVlBaakVvK1RQVTJRREVUMDZ1Yml5TkZMOWcv?= =?utf-8?B?Qk1ORXhhckQzS2pITkVhQUJXbEptRWFWcW1mcktFY0R0SWdjODV2d1BiOVNJ?= =?utf-8?B?WXRHN3NYMTliYUdtcmN2K3FwOGZZNEhNRmNnUk9JMk82QW0vM2U4bFhCRHdB?= =?utf-8?B?Y1pkNVlmQmdEajZ6Zjg4MXZyYUR3NVF4TjhjK2R3Z2w3ampybE85eVEvMFgr?= =?utf-8?B?M0RQcW41TUFlb1orOXhacW9VMVdQN3pRQTRUUDFkeFp1V2g5RFl5WXYvYzk4?= =?utf-8?B?eFBIZEpzT1MzTkxteEthOHZyd25qTmZuZHJWdzd2cEUxVmxsMXVNMzZCZVN2?= =?utf-8?B?SjVxdnR6ZDhvSnM5KzFFOTY1b3o0bmpYb2puYUhCR0VlY2ZOWWlPeDdFUitN?= =?utf-8?B?ZTdoK3VLN3pvRlQ5U0ZGaUJWcW04Rm5DOHVJVzVRcGtqSEIyNDFoSUQyaHpB?= =?utf-8?B?dWw2V0RsM3lXMXQ3dHRSMDlmN2pjUkVSRWVDVUNRc2dTY0JrUmhlVlhDUWFS?= =?utf-8?B?NnVIaC82Y2VES3JYTWdHT3IxSkg2MHZmaUF6WEhCbVZXQWtwOEJJVXFBeXMv?= =?utf-8?B?ZVRWR0VCRi9pQ1kzN05QQ1JhQVlZUG9LLzNXR0FpbjhuMDZOQ29udmsrQlpF?= =?utf-8?B?R05QcysyS1RxNEdZa2RNY1FlKzE0VGg5RXhuM1RON1lUOGVuSkNRUjY3TDRv?= =?utf-8?B?ZHExM3UrSjNLMHI3aHczSmtaeFhabVVCZ3dnRVNjcG9RRzVsb0N4U0dxRDZa?= =?utf-8?B?Mm94Vm04WDNtLzFKVzZ0ZWdZemgxL1R6c3U3bFZyRTRRZVBIOUJFT1lGZHN2?= =?utf-8?B?U3loNG9leVQwWVhFTjlHTmJkUGZlTVlyck9idGN4dVRvN0Q4T0dsbTBJTlAw?= =?utf-8?B?dmY2TE44OElBaEZxSnRXM1NBbS83SG1BKzVrYjBxL012WCszYkUxSC9sVjNo?= =?utf-8?B?T21FTFIySWd3Z0JIcS8zbzhPcmpJYzM0T2U3VWxmYVkveFpKVU01ZG04QS9L?= =?utf-8?B?SkxjZEZOeTNHU1pxR3ptNXhKTjEvN0p5WWU0WU1veHFjQnZRTC9iWnBwbnU1?= =?utf-8?B?UVJkbTNkZ0Y1T1BGS201U0ZMbDYvaDRQakllZTFZaGRYZlpDQlZtYnZ5SlRQ?= =?utf-8?B?WjVtZmhoOHJZaE12Unlxa2R6UVhRdm9idGtXWks0MGZYMjVOcXQ5UHZxUXJj?= =?utf-8?B?VUlVb3JKNkRab1duaXJCbEdxVnc4SG9TdWJMb1dnZEsxTy8yanB4eEJvN2dp?= =?utf-8?B?WEkzOG5rY0JHektieHRENGRQRDBNUWtOQnFhdnVWcDdKb3FZZmVSMzZFaURH?= =?utf-8?B?TzJhQndMSXJvT2xyNUxCbmlSVmJ5bGgwNmd6RjlkSGNnQ1FERENVRVJlT25j?= =?utf-8?B?dnBaK1lobmJ1MUwvdldJWDlQK0hoU3kxUURDWEdpNllkSW54MkQyaWRkSzM5?= =?utf-8?B?Vm9WMGxSNWoxWFUvcXFGS3Y0aUkrLzc3aU04MVBDQy9rNXdvcitOWWhxM3o0?= =?utf-8?B?a1Q4L0pwUFVNV3M4M2Q5VzduU04yVitGam1pTWZVZFBFRUxjYkVUQWtWMU1U?= =?utf-8?B?RUtlckhCcGo3cmxJc0VaTFN1UysvVkNKY0ZjRjhMTkE0RDY4K3NTUVhXSkEx?= =?utf-8?Q?Lf60=3D?= X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:satlexmb07.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(1800799024)(82310400026)(7416014)(376014)(36860700013);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 16 Oct 2025 16:38:00.7109 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 22d417f2-73bf-4b13-5500-08de0cd25edf X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[satlexmb07.amd.com] X-MS-Exchange-CrossTenant-AuthSource: BL02EPF0001A105.namprd05.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH8PR12MB6699 AMD systems optionally support an MCA thresholding interrupt. The interrupt should be used as another signal to trigger MCA polling. This is similar to how the Intel Corrected Machine Check interrupt (CMCI) is handled. AMD MCA thresholding is managed using the MCA_MISC registers within an MCA bank. The OS will need to modify the hardware error count field in order to reset the threshold limit and rearm the interrupt. Management of the MCA_MISC register should be done as a follow up to the basic MCA polling flow. It should not be the main focus of the interrupt handler. Furthermore, future systems will have the ability to send an MCA thresholding interrupt to the OS even when the OS does not manage the feature, i.e. MCA_MISC registers are Read-as-Zero/Locked. Call the common MCA polling function when handling the MCA thresholding interrupt. This will allow the OS to find any valid errors whether or not the MCA thresholding feature is OS-managed. Also, this allows the common MCA polling options and kernel parameters to apply to AMD systems. Add a callback to the MCA polling function to check and reset any threshold blocks that have reached their threshold limit. Signed-off-by: Yazen Ghannam --- Notes: Link: https://lore.kernel.org/r/20250908-wip-mca-updates-v6-8-eef5d6c74b9c@am= d.com =20 v6->v7: * No change. =20 v5->v6: * Move bank/block reset code to new helper. =20 v4->v5: * No change. =20 v3->v4: * No change. =20 v2->v3: * Add tags from Qiuxu and Tony. =20 v1->v2: * Start collecting per-CPU items in a struct. * Keep and use mce_flags.amd_threshold. arch/x86/kernel/cpu/mce/amd.c | 51 +++++++++++++++++++--------------------= ---- 1 file changed, 23 insertions(+), 28 deletions(-) diff --git a/arch/x86/kernel/cpu/mce/amd.c b/arch/x86/kernel/cpu/mce/amd.c index d6906442f49b..ac6a98aa7bc2 100644 --- a/arch/x86/kernel/cpu/mce/amd.c +++ b/arch/x86/kernel/cpu/mce/amd.c @@ -54,6 +54,12 @@ =20 static bool thresholding_irq_en; =20 +struct mce_amd_cpu_data { + mce_banks_t thr_intr_banks; +}; + +static DEFINE_PER_CPU_READ_MOSTLY(struct mce_amd_cpu_data, mce_amd_data); + static const char * const th_names[] =3D { "load_store", "insn_fetch", @@ -556,6 +562,7 @@ prepare_threshold_block(unsigned int bank, unsigned int= block, u32 addr, if (!b.interrupt_capable) goto done; =20 + __set_bit(bank, this_cpu_ptr(&mce_amd_data)->thr_intr_banks); b.interrupt_enable =3D 1; =20 if (!mce_flags.smca) { @@ -896,12 +903,7 @@ static void amd_deferred_error_interrupt(void) log_error_deferred(bank); } =20 -static void log_error_thresholding(unsigned int bank, u64 misc) -{ - _log_error_deferred(bank, misc); -} - -static void log_and_reset_block(struct threshold_block *block) +static void reset_block(struct threshold_block *block) { struct thresh_restart tr; u32 low =3D 0, high =3D 0; @@ -915,23 +917,14 @@ static void log_and_reset_block(struct threshold_bloc= k *block) if (!(high & MASK_OVERFLOW_HI)) return; =20 - /* Log the MCE which caused the threshold event. */ - log_error_thresholding(block->bank, ((u64)high << 32) | low); - - /* Reset threshold block after logging error. */ memset(&tr, 0, sizeof(tr)); tr.b =3D block; threshold_restart_block(&tr); } =20 -/* - * Threshold interrupt handler will service THRESHOLD_APIC_VECTOR. The int= errupt - * goes off when error_count reaches threshold_limit. - */ -static void amd_threshold_interrupt(void) +static void amd_reset_thr_limit(unsigned int bank) { - struct threshold_bank **bp =3D this_cpu_read(threshold_banks), *thr_bank; - unsigned int bank, cpu =3D smp_processor_id(); + struct threshold_bank **bp =3D this_cpu_read(threshold_banks); struct threshold_block *block, *tmp; =20 /* @@ -939,24 +932,26 @@ static void amd_threshold_interrupt(void) * handler is installed at boot time, but on a hotplug event the * interrupt might fire before the data has been initialized. */ - if (!bp) + if (!bp || !bp[bank]) return; =20 - for (bank =3D 0; bank < this_cpu_read(mce_num_banks); ++bank) { - if (!(per_cpu(bank_map, cpu) & BIT_ULL(bank))) - continue; - - thr_bank =3D bp[bank]; - if (!thr_bank) - continue; + list_for_each_entry_safe(block, tmp, &bp[bank]->miscj, miscj) + reset_block(block); +} =20 - list_for_each_entry_safe(block, tmp, &thr_bank->miscj, miscj) - log_and_reset_block(block); - } +/* + * Threshold interrupt handler will service THRESHOLD_APIC_VECTOR. The int= errupt + * goes off when error_count reaches threshold_limit. + */ +static void amd_threshold_interrupt(void) +{ + machine_check_poll(MCP_TIMESTAMP, &this_cpu_ptr(&mce_amd_data)->thr_intr_= banks); } =20 void amd_clear_bank(struct mce *m) { + amd_reset_thr_limit(m->bank); + mce_wrmsrq(mca_msr_reg(m->bank, MCA_STATUS), 0); } =20 --=20 2.51.0 From nobody Sun Feb 8 05:37:19 2026 Received: from DM5PR21CU001.outbound.protection.outlook.com (mail-centralusazon11011008.outbound.protection.outlook.com [52.101.62.8]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 3988332D0CA; Thu, 16 Oct 2025 16:38:03 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=fail smtp.client-ip=52.101.62.8 ARC-Seal: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1760632687; cv=fail; b=AFcdotmUMUIP+oAwkvxpJD37TKYgF9xVn5rSuYWbpF6uHH20gvdc2L5pd+krqZnCZCmLg/NmO/wpoIp8oQcbiAo8WHRc6T65VnypW8at6/vS52YTWsh5CJf4CaZ3Lk7cIHWjc2YEFfYRKAlcum6fUn8x1BNjgztdFyHj1MonUeo= ARC-Message-Signature: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1760632687; c=relaxed/simple; bh=KHgYAKI4we+RN9HtXnc6x17A4JDbZIq+4OuL0pKZk9E=; h=From:Date:Subject:MIME-Version:Content-Type:Message-ID:References: In-Reply-To:To:CC; b=qXVmOpIYj0syvwiM3sRtUYhh+q2su1g3iDCPQZfNb1Cx8KdN2EFdGyZXf03J43HmeEFTbbX/HUnIi1CuHpQE1t0W1B6wa5E+sB/6iz8T/9SOdJc6ESusgDKdWyH5JReNn0hLLMmKSYYytGvMGVP3BboyvpnTcDJ6Ajs/MtNCkS0= ARC-Authentication-Results: i=2; smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=amd.com; spf=fail smtp.mailfrom=amd.com; dkim=pass (1024-bit key) header.d=amd.com header.i=@amd.com header.b=GawmQvhD; arc=fail smtp.client-ip=52.101.62.8 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=amd.com Authentication-Results: smtp.subspace.kernel.org; spf=fail smtp.mailfrom=amd.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=amd.com header.i=@amd.com header.b="GawmQvhD" ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=FKoFAF7sK7YBAebmaBjXPDG5QB7r+GnWnpac9JgAUpoqWeTFLaEOtRE9siD7cO2MTlMMcHhT+xkL2V8mK1etfgp9lFGWk9XvAxXrDh20plDpI0CTNcmduAvh+fn0YQtOOYt73ekeMSaHHWb0M//68f9QfbvOleoj5Y4b2na7PtqW8HK5A9GY2WVbhw/h4uIJIxAQZS613aTDiZu428BZyy7lxQEWroMeoKunwrw+17fPWzOsJi9R1iFQypS3E078CRw4h/k1QGxopHIZyJMH23iEJcE0Drd7ZU/AoW6wHAmMHxL4ObjQwstvoAFua/Kuq/8bcimRCLrw5SRhmJp02w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=E78O4XquwnWmm16dyR6dP4max9ZdsN//avOxQwMqqis=; b=GFOPVIMg8pgWqvCIoiVKB5ocV3FSA0yrorqfsXMO844bNfayLX9lsxXBa7j6ugKQFFkK6Uo91UPSNHOxeN4NndUBPJJW5fdAOQGg60xRX5PLfYj/m5oSj70V+2Tgze8ZK22JsE1aTCqPSfTvhDv+7a3z755Dh/S0aqwojUo/I33+3PDu1lMdZnN4GEHF6yB/8JFgUp4yy4l4uYWoenXWlcyONQ0wwywqsICcl5rXHB008SjWvJ6wkSVK+mjEQ9QUXRFClyvh/MpXXIeG2zYHmodYguGuIGdURWmf0qXxXnkHUaSmOSV9EDtUnvlpLg2qJRkYhTycPb6ptujLqJem+g== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=vger.kernel.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=E78O4XquwnWmm16dyR6dP4max9ZdsN//avOxQwMqqis=; b=GawmQvhDnQ5WcmvVJLmIvG9kjhj+bay+Rr9qVtedLt1uM91QZH2DSLRObTFQjaM1+PWVi1VA7SG1ttjnh+XMCStdV6sVdBKi9sIeKO7Dv2cO/1DZERA41ibFG9JeNl+UMEDqzmjLxeObFOX5EN7F0QaOtoBDTrqk4VTlEqDn2ro= Received: from BLAP220CA0001.NAMP220.PROD.OUTLOOK.COM (2603:10b6:208:32c::6) by SN7PR12MB7130.namprd12.prod.outlook.com (2603:10b6:806:2a2::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9228.11; Thu, 16 Oct 2025 16:38:01 +0000 Received: from BL02EPF0001A105.namprd05.prod.outlook.com (2603:10b6:208:32c:cafe::2a) by BLAP220CA0001.outlook.office365.com (2603:10b6:208:32c::6) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9228.12 via Frontend Transport; Thu, 16 Oct 2025 16:37:58 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=satlexmb07.amd.com; pr=C Received: from satlexmb07.amd.com (165.204.84.17) by BL02EPF0001A105.mail.protection.outlook.com (10.167.241.137) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9228.7 via Frontend Transport; Thu, 16 Oct 2025 16:38:01 +0000 Received: from [127.0.1.1] (10.180.168.240) by satlexmb07.amd.com (10.181.42.216) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.17; Thu, 16 Oct 2025 09:38:00 -0700 From: Yazen Ghannam Date: Thu, 16 Oct 2025 16:37:47 +0000 Subject: [PATCH v7 2/8] x86/mce: Unify AMD DFR handler with MCA Polling Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Message-ID: <20251016-wip-mca-updates-v7-2-5c139a4062cb@amd.com> References: <20251016-wip-mca-updates-v7-0-5c139a4062cb@amd.com> In-Reply-To: <20251016-wip-mca-updates-v7-0-5c139a4062cb@amd.com> To: , Tony Luck , "Rafael J. Wysocki" , Len Brown CC: , , , Qiuxu Zhuo , Nikolay Borisov , Bert Karwatzki , , Yazen Ghannam X-Mailer: b4 0.15-dev-9b767 X-ClientProxiedBy: satlexmb07.amd.com (10.181.42.216) To satlexmb07.amd.com (10.181.42.216) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: BL02EPF0001A105:EE_|SN7PR12MB7130:EE_ X-MS-Office365-Filtering-Correlation-Id: b0c927d3-28fc-4b3a-31ac-08de0cd25f34 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|82310400026|36860700013|376014|1800799024|7416014; X-Microsoft-Antispam-Message-Info: =?utf-8?B?cFhxcno5eVdobzNTZzFCUUVzeEVlSEM5K1RFYXVxRkdLOWVMUHhZUXdmV3Jk?= =?utf-8?B?RzV6dEU1aVJ4N0xYbXFIWUp1V2crclhCOWNGN0pSWDdoQnpRQ0s5dWpZV0x1?= =?utf-8?B?MVEzeEoxOElJamxlL2J2eHNQVFdkQ0dRM1VaclRYTUoxZzJ1SytOTllmemVZ?= =?utf-8?B?REFaZ3Rrd004MWI2U1VpcnZQUkdnQ0RpVVVVZEFxV1NiL2c3b1gzSUQ5L3hy?= =?utf-8?B?R0NUbVV3dnFBRGxSNElWbDlUUE1xanQydG9xK3Q1K3NxS0pzdldoczRuN0gv?= =?utf-8?B?Y0ZGYWpPYUIwQnZncFZQMWFwRG5jRG0rM2ZCM2VrRUtYMWxPTGtudHUwYnpY?= =?utf-8?B?b0xsdVc0bFl5SUVUdCtvU3JreXdDdGtMb3NOa3ZWcHI0ZXFRb3RNbkxNcFR0?= =?utf-8?B?TW5JNnF2cGgvSGc5RjNDRHdjMU9EVnVPb0p4SVdWTjFlUEpnYVB4a0lPTThy?= =?utf-8?B?Rnk5SVVqVGhZV2pnVkNQU1Rzazc0dHZqV2h5M1k1Zy9DWEVaL1BNRGNvQ3F6?= =?utf-8?B?U1lsY1hRNzFsMDhabjZIay9NaE9WOTZzMmdqNkVrSDNDL0ZvRDU4ckt3SG0x?= =?utf-8?B?R0dHdDAyMXdDaTZVTlpRYmpIY2txaTR4RDRyS2N5bjZkTG9WWVllZ0tzNklr?= =?utf-8?B?V1ZoK3QzZjQ5bXJvK3BCUExCamo4TVZVbFBpSnZNQk5QbDRvY0NxRnZ4cmR5?= =?utf-8?B?M250SkN6L2liOGJqOGJkMTBFMnI4d21Pakc0YmI1RXRvUVRzdzdrN1d2aHJQ?= =?utf-8?B?dzNBY2tnYzFmcEhVYis2R09TYXhia3l3WTBYRnFLTzFzVVNzd3dRQUI3MCt3?= =?utf-8?B?ZGZPb2xUWkZKVUFXN2hUeTNiMk1yVmF0OHhyTHhCVGhNeVY5WWtGVytwNDVH?= =?utf-8?B?clFPZU5idTdTUjd6aHlhMmVieUI3ZEtOZ21qZUlDd01oN2JVOU1tSTQvdWFm?= =?utf-8?B?ckdRNCttS3ZWaUlZY2pXTGdkSVM4RndqcG1qd0NJd0xLMjlMOWl4UC9jTi9Q?= =?utf-8?B?TndVbTdyK3Z2WFJkQXVTSUFmNW81ckpwdWNJU2xvUDBXMGtZMnBJUDhPSUdD?= =?utf-8?B?Z0phS1Fuc1hYNkNjdDc0MkhiZmp0STFUK1dkMGw5N1AwR1dsUzBUeVRHdkRa?= =?utf-8?B?Wk94NGthSnpmdFZkamZhRmZXYlk4aUwrVWY1R0RPNzJBZlVtVDFiOHZqWnRV?= =?utf-8?B?Um1PR2JTOUJ6Q0Y1TlQ2RjY2TWRSQjJMdDBTOUdrRk9yZkVaVWxhL0hIWGtE?= =?utf-8?B?SlBobE1qcVdvNTEvV2V0amNmWWI0R1A1RXNRYUJmMm84andvNzRVVFk5alFK?= =?utf-8?B?VTJhUnhnc29Hc2tnamJFWmZRZERCcFJyQklGSk52QkRBYWtkZHNHZXBNOFl5?= =?utf-8?B?RmxCMjFHY0tHcnpBdXEyT3VUNzR5cHJBeGxROEVzR1JyTGFmNGNwTEZQTWxU?= =?utf-8?B?ZUl6SkFhYnVqSG5FaFYwM2FWUzFWQ201ZkxZaFdkaWpuUEp2RlJCdzhHWkg0?= =?utf-8?B?ZVp6MUpvK1FoUUNLVDQ3ME5qb2hzaFVQc1ZrbitkTXFtZ2I1TTVLOHYvV0Ey?= =?utf-8?B?dHl5Mk5aT3FDVzhRajBBVUd5dllBV3kwYUFFR3g3QjJBSTdsRU5raFFIQUNl?= =?utf-8?B?TmtiVzg1V0RIL1JUUWV3NmFzMWNnTG92VitWK0VzN1Y5L3R4cHBzbzNaS0Jm?= =?utf-8?B?YVFVUjF6Qi9zdGFNQzlFanFLNmpVUnY2LzNPMGUzUVNlMEVXZDdQWm9JNjVt?= =?utf-8?B?OGdoQTY0UkJXdVMxRVBqclJPNVVJN1owRVg2bG0yUTI4T3JaU3p4dHA1eUNJ?= =?utf-8?B?L1UzQVB3MGhMcGo2WHVKQldDdE04UlQ2Tko2VHA1bWNzMFZXOWlrK0VlYUJE?= =?utf-8?B?T0svT09TZE5OZXBXRTlmZUo3b0NhT3IzSGRoZTZrWXhPVVhCUDcxRFNabEJ4?= =?utf-8?B?bXpOL1YvNUZkL3F2ZVI4d1llc3JQWWZnZTNWOFgyZHJSY00vUjB5VkJPTDZW?= =?utf-8?B?RlJLdGJlTC9pTmdzNVFtWGhvYUk2Um1uMmw5dzNFcEg1SURzRGlLOHQ3YmhZ?= =?utf-8?B?WU1DRno2L293S0tIcUVlQ1QwcWVnT0ZPcGhJVHFhKytSVUtaalhjZFF5MXVK?= =?utf-8?Q?tKxVuByCje7hehOK60T2w5BY3?= X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:satlexmb07.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(82310400026)(36860700013)(376014)(1800799024)(7416014);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 16 Oct 2025 16:38:01.2672 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: b0c927d3-28fc-4b3a-31ac-08de0cd25f34 X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[satlexmb07.amd.com] X-MS-Exchange-CrossTenant-AuthSource: BL02EPF0001A105.namprd05.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN7PR12MB7130 AMD systems optionally support a deferred error interrupt. The interrupt should be used as another signal to trigger MCA polling. This is similar to how other MCA interrupts are handled. Deferred errors do not require any special handling related to the interrupt, e.g. resetting or rearming the interrupt, etc. However, Scalable MCA systems include a pair of registers, MCA_DESTAT and MCA_DEADDR, that should be checked for valid errors. This check should be done whenever MCA registers are polled. Currently, the deferred error interrupt does this check, but the MCA polling function does not. Call the MCA polling function when handling the deferred error interrupt. This keeps all "polling" cases in a common function. Call the polling function only for banks that have the deferred error interrupt enabled. Add an SMCA status check helper. This will do the same status check and register clearing that the interrupt handler has done. And it extends the common polling flow to find AMD deferred errors. Add a flag to poll for Deferred errors similar to MCP_UC for uncorrectable errors. This will do checks specific to deferred errors and fallback to common UC/CE checks otherwise. Also, clear the MCA_DESTAT register at the end of the handler rather than the beginning. This maintains the procedure that the 'status' register must be cleared as the final step. Remove old code whose functionality is already covered in the common MCA code. Reviewed-by: Qiuxu Zhuo Tested-by: Tony Luck Reviewed-by: Tony Luck Signed-off-by: Yazen Ghannam --- Notes: Link: https://lore.kernel.org/r/20250908-wip-mca-updates-v6-9-eef5d6c74b9c@am= d.com =20 v6->v7: * Rework DFR error handling to avoid reporting bogus errors. * Clear MCA_DESTAT at the end of handler. (Nikolay) * Link: https://lore.kernel.org/r/20250915010010.3547-1-spasswolf@web.de =20 v5->v6: * Move status clearing code to new helper. =20 v4->v5: * No change. =20 v3->v4: * Add kflag for checking DFR registers. =20 v2->v3: * Add tags from Qiuxu and Tony. =20 v1->v2: * Keep code comment. * Log directly from helper function rather than pass values. =20 Link: https://lore.kernel.org/r/20250213-wip-mca-updates-v2-13-3636547fe05f@a= md.com =20 v2->v3: * Add tags from Qiuxu and Tony. =20 v1->v2: * Keep code comment. * Log directly from helper function rather than pass values. arch/x86/include/asm/mce.h | 7 +++ arch/x86/kernel/cpu/mce/amd.c | 111 +++++--------------------------------= ---- arch/x86/kernel/cpu/mce/core.c | 51 ++++++++++++++++++- 3 files changed, 70 insertions(+), 99 deletions(-) diff --git a/arch/x86/include/asm/mce.h b/arch/x86/include/asm/mce.h index 31e3cb550fb3..1482648c8508 100644 --- a/arch/x86/include/asm/mce.h +++ b/arch/x86/include/asm/mce.h @@ -165,6 +165,12 @@ */ #define MCE_IN_KERNEL_COPYIN BIT_ULL(7) =20 +/* + * Indicates that handler should check and clear Deferred error registers + * rather than common ones. + */ +#define MCE_CHECK_DFR_REGS BIT_ULL(8) + /* * This structure contains all data related to the MCE log. Also * carries a signature to make it easier to find from external @@ -293,6 +299,7 @@ enum mcp_flags { MCP_TIMESTAMP =3D BIT(0), /* log time stamp */ MCP_UC =3D BIT(1), /* log uncorrected errors */ MCP_QUEUE_LOG =3D BIT(2), /* only queue to genpool */ + MCP_DFR =3D BIT(3), /* log deferred errors */ }; =20 void machine_check_poll(enum mcp_flags flags, mce_banks_t *b); diff --git a/arch/x86/kernel/cpu/mce/amd.c b/arch/x86/kernel/cpu/mce/amd.c index ac6a98aa7bc2..64aa7ecfd332 100644 --- a/arch/x86/kernel/cpu/mce/amd.c +++ b/arch/x86/kernel/cpu/mce/amd.c @@ -56,6 +56,7 @@ static bool thresholding_irq_en; =20 struct mce_amd_cpu_data { mce_banks_t thr_intr_banks; + mce_banks_t dfr_intr_banks; }; =20 static DEFINE_PER_CPU_READ_MOSTLY(struct mce_amd_cpu_data, mce_amd_data); @@ -300,8 +301,10 @@ static void smca_configure(unsigned int bank, unsigned= int cpu) * APIC based interrupt. First, check that no interrupt has been * set. */ - if ((low & BIT(5)) && !((high >> 5) & 0x3)) + if ((low & BIT(5)) && !((high >> 5) & 0x3)) { + __set_bit(bank, this_cpu_ptr(&mce_amd_data)->dfr_intr_banks); high |=3D BIT(5); + } =20 this_cpu_ptr(mce_banks_array)[bank].lsb_in_status =3D !!(low & BIT(8)); =20 @@ -792,37 +795,6 @@ bool amd_mce_usable_address(struct mce *m) return false; } =20 -static void __log_error(unsigned int bank, u64 status, u64 addr, u64 misc) -{ - struct mce_hw_err err; - struct mce *m =3D &err.m; - - mce_prep_record(&err); - - m->status =3D status; - m->misc =3D misc; - m->bank =3D bank; - m->tsc =3D rdtsc(); - - if (m->status & MCI_STATUS_ADDRV) { - m->addr =3D addr; - - smca_extract_err_addr(m); - } - - if (mce_flags.smca) { - rdmsrq(MSR_AMD64_SMCA_MCx_IPID(bank), m->ipid); - - if (m->status & MCI_STATUS_SYNDV) { - rdmsrq(MSR_AMD64_SMCA_MCx_SYND(bank), m->synd); - rdmsrq(MSR_AMD64_SMCA_MCx_SYND1(bank), err.vendor.amd.synd1); - rdmsrq(MSR_AMD64_SMCA_MCx_SYND2(bank), err.vendor.amd.synd2); - } - } - - mce_log(&err); -} - DEFINE_IDTENTRY_SYSVEC(sysvec_deferred_error) { trace_deferred_error_apic_entry(DEFERRED_ERROR_VECTOR); @@ -832,75 +804,10 @@ DEFINE_IDTENTRY_SYSVEC(sysvec_deferred_error) apic_eoi(); } =20 -/* - * Returns true if the logged error is deferred. False, otherwise. - */ -static inline bool -_log_error_bank(unsigned int bank, u32 msr_stat, u32 msr_addr, u64 misc) -{ - u64 status, addr =3D 0; - - rdmsrq(msr_stat, status); - if (!(status & MCI_STATUS_VAL)) - return false; - - if (status & MCI_STATUS_ADDRV) - rdmsrq(msr_addr, addr); - - __log_error(bank, status, addr, misc); - - wrmsrq(msr_stat, 0); - - return status & MCI_STATUS_DEFERRED; -} - -static bool _log_error_deferred(unsigned int bank, u32 misc) -{ - if (!_log_error_bank(bank, mca_msr_reg(bank, MCA_STATUS), - mca_msr_reg(bank, MCA_ADDR), misc)) - return false; - - /* - * Non-SMCA systems don't have MCA_DESTAT/MCA_DEADDR registers. - * Return true here to avoid accessing these registers. - */ - if (!mce_flags.smca) - return true; - - /* Clear MCA_DESTAT if the deferred error was logged from MCA_STATUS. */ - wrmsrq(MSR_AMD64_SMCA_MCx_DESTAT(bank), 0); - return true; -} - -/* - * We have three scenarios for checking for Deferred errors: - * - * 1) Non-SMCA systems check MCA_STATUS and log error if found. - * 2) SMCA systems check MCA_STATUS. If error is found then log it and also - * clear MCA_DESTAT. - * 3) SMCA systems check MCA_DESTAT, if error was not found in MCA_STATUS,= and - * log it. - */ -static void log_error_deferred(unsigned int bank) -{ - if (_log_error_deferred(bank, 0)) - return; - - /* - * Only deferred errors are logged in MCA_DE{STAT,ADDR} so just check - * for a valid error. - */ - _log_error_bank(bank, MSR_AMD64_SMCA_MCx_DESTAT(bank), - MSR_AMD64_SMCA_MCx_DEADDR(bank), 0); -} - /* APIC interrupt handler for deferred errors */ static void amd_deferred_error_interrupt(void) { - unsigned int bank; - - for (bank =3D 0; bank < this_cpu_read(mce_num_banks); ++bank) - log_error_deferred(bank); + machine_check_poll(MCP_TIMESTAMP | MCP_DFR, &this_cpu_ptr(&mce_amd_data)-= >dfr_intr_banks); } =20 static void reset_block(struct threshold_block *block) @@ -952,6 +859,14 @@ void amd_clear_bank(struct mce *m) { amd_reset_thr_limit(m->bank); =20 + /* Clear MCA_DESTAT for all deferred errors even those logged in MCA_STAT= US. */ + if (m->status & MCI_STATUS_DEFERRED) + mce_wrmsrq(MSR_AMD64_SMCA_MCx_DESTAT(m->bank), 0); + + /* Don't clear MCA_STATUS if MCA_DESTAT was used exclusively. */ + if (m->kflags & MCE_CHECK_DFR_REGS) + return; + mce_wrmsrq(mca_msr_reg(m->bank, MCA_STATUS), 0); } =20 diff --git a/arch/x86/kernel/cpu/mce/core.c b/arch/x86/kernel/cpu/mce/core.c index 460e90a1a0b1..39725df7d35c 100644 --- a/arch/x86/kernel/cpu/mce/core.c +++ b/arch/x86/kernel/cpu/mce/core.c @@ -687,7 +687,10 @@ static noinstr void mce_read_aux(struct mce_hw_err *er= r, int i) m->misc =3D mce_rdmsrq(mca_msr_reg(i, MCA_MISC)); =20 if (m->status & MCI_STATUS_ADDRV) { - m->addr =3D mce_rdmsrq(mca_msr_reg(i, MCA_ADDR)); + if (m->kflags & MCE_CHECK_DFR_REGS) + m->addr =3D mce_rdmsrq(MSR_AMD64_SMCA_MCx_DEADDR(i)); + else + m->addr =3D mce_rdmsrq(mca_msr_reg(i, MCA_ADDR)); =20 /* * Mask the reported address by the reported granularity. @@ -714,6 +717,42 @@ static noinstr void mce_read_aux(struct mce_hw_err *er= r, int i) =20 DEFINE_PER_CPU(unsigned, mce_poll_count); =20 +/* + * We have three scenarios for checking for Deferred errors: + * + * 1) Non-SMCA systems check MCA_STATUS and log error if found. + * 2) SMCA systems check MCA_STATUS. If error is found then log it and also + * clear MCA_DESTAT. + * 3) SMCA systems check MCA_DESTAT, if error was not found in MCA_STATUS,= and + * log it. + */ +static bool smca_should_log_poll_error(enum mcp_flags flags, struct mce_hw= _err *err) +{ + struct mce *m =3D &err->m; + + /* + * If the MCA_STATUS register has a deferred error, then continue using i= t as + * the status register. + * + * MCA_DESTAT will be cleared at the end of the handler. + */ + if ((m->status & MCI_STATUS_VAL) && (m->status & MCI_STATUS_DEFERRED)) + return true; + + /* + * If the MCA_DESTAT register has a deferred error, then use it instead. + * + * MCA_STATUS will not be cleared at the end of the handler. + */ + m->status =3D mce_rdmsrq(MSR_AMD64_SMCA_MCx_DESTAT(m->bank)); + if ((m->status & MCI_STATUS_VAL) && (m->status & MCI_STATUS_DEFERRED)) { + m->kflags |=3D MCE_CHECK_DFR_REGS; + return true; + } + + return false; +} + /* * Newer Intel systems that support software error * recovery need to make additional checks. Other @@ -740,10 +779,17 @@ static bool should_log_poll_error(enum mcp_flags flag= s, struct mce_hw_err *err) { struct mce *m =3D &err->m; =20 + if (flags & MCP_DFR) + return smca_should_log_poll_error(flags, err); + /* If this entry is not valid, ignore it. */ if (!(m->status & MCI_STATUS_VAL)) return false; =20 + /* Ignore deferred errors if not looking for them (MCP_DFR not set). */ + if (m->status & MCI_STATUS_DEFERRED) + return false; + /* * If we are logging everything (at CPU online) or this * is a corrected error, then we must log it. @@ -1878,6 +1924,9 @@ static void __mcheck_cpu_init_prepare_banks(void) =20 bitmap_fill(all_banks, MAX_NR_BANKS); machine_check_poll(MCP_UC | MCP_QUEUE_LOG, &all_banks); + + if (mce_flags.smca) + machine_check_poll(MCP_DFR | MCP_QUEUE_LOG, &all_banks); } =20 for (i =3D 0; i < this_cpu_read(mce_num_banks); i++) { --=20 2.51.0 From nobody Sun Feb 8 05:37:19 2026 Received: from BYAPR05CU005.outbound.protection.outlook.com (mail-westusazon11010034.outbound.protection.outlook.com [52.101.85.34]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 627BA32AAC2; Thu, 16 Oct 2025 16:38:06 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=fail smtp.client-ip=52.101.85.34 ARC-Seal: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1760632688; cv=fail; b=iW8DcZ8WGw558VR8K8ZYnSgkbWXBPyxGc9w2oud//Nokbw/J5OKZLUQuIaShRTw+H8ikBPzcMlteNYzYLfzBNZfC7wg8E3ODy8G0mJhFdybDGP0O6yO7bPjXzOiFhuWpy8TInp9hinNSllQmiv2FWmzDqTdph+FAQ5Wde/NQ2uU= ARC-Message-Signature: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1760632688; c=relaxed/simple; bh=KLvtPEUfsxP06mlslzVz/8RZkIVZyf3GOGzeUYM7giY=; h=From:Date:Subject:MIME-Version:Content-Type:Message-ID:References: In-Reply-To:To:CC; b=N45khpLdEWpsxgkrY/O996ohfqv56bBl/UFO2clsgtDmxHhCn75xNFTPHDHgMZ5zYFGNmuHXkLp1i0hLrepNE/7O0e8t0IsZiwOPO03v1E2PI85nTBlT1aSZoYR1UMF6lERLFpMX3Rk2GIgXiMsnb8Miq8KJEsck4UAqhFaM2IA= ARC-Authentication-Results: i=2; smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=amd.com; spf=fail smtp.mailfrom=amd.com; dkim=pass (1024-bit key) header.d=amd.com header.i=@amd.com header.b=BFLkcwe/; arc=fail smtp.client-ip=52.101.85.34 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=amd.com Authentication-Results: smtp.subspace.kernel.org; spf=fail smtp.mailfrom=amd.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=amd.com header.i=@amd.com header.b="BFLkcwe/" ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=YrGOpF+rJS0PAPT3BtHlw4uPeKndNXwjEthyRHZ4c2bydgFRn91ZsJ0+26Tot/KlVcC5UV+MjUFxN1bB/Wot8J9boJ2CTCd1lN0PDPs2eXmM1nHvuUIz16zwGMZ+bcvP3+o0bkKKHUZbhFkmuggwS+iWsf9qTlZ/hi6It6msYy8uM9vkdmNrJyenHeLOdDR5tnKkxcKc2ddDpOhTHb+T6KdBrOmU7rxZvZS+NVR8TbxcHsE3FUColoMELpjMj++FGyoYHOQwkK1hUCZx1kUKg37GHB7GHZCNmBgxpOqb54yPnGCYozp7zBNWCtVC0udPi3d8ojBgFrocfWEHhiYSWQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=E1fQbv0v7C6w08aG1aZJGuvZeNkVQOFZVCIHG5Vc63I=; b=G9C4JkvZst6qSys1kCncA/GySTGJKAWeh6wykwU33Ur9R3x9GP/18JjEkh0PXbix7R5ce1x8jh1IBbo3mvr/Jny0nBw0JSO2B/xHokORzjt7ib85RurHUB+YhiZThNUEFxL0pLG8lCJLkyluLK6yaLda6MQllaZ8aogcp8J0liTUWiNMZK9SP0ij9ONmd8rZ8FbumMDjKoGRUhqAJrhr3gvMd5uO2djFjK2I5iozGfq8m5/KIHO5W0kZfJzukio9bORS3TfqQl8UjqpqnAocy1ymDOv9w/Xz3L2dFnW69VxRexNDh7U9PHfx4elFYHsjznJmvzXZSpJ9drXr7ODtgA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=vger.kernel.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=E1fQbv0v7C6w08aG1aZJGuvZeNkVQOFZVCIHG5Vc63I=; b=BFLkcwe/dUm6Opc/G55dAPE9+chS0pANvAl1oO7ap0FVJtC6HuZdDZ8h+5qASWn8X8wrHb5dMjprvxGcpftOzkJBwAUhM03Vz0ezepYu+ZHIwEDHJ8P71lk32VkkWD155XHRzC8iLmRck8RN/+pI8iFN1u2hhbEGHepg5q3RYYs= Received: from BL1PR13CA0134.namprd13.prod.outlook.com (2603:10b6:208:2bb::19) by LV8PR12MB9716.namprd12.prod.outlook.com (2603:10b6:408:2a1::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9228.11; Thu, 16 Oct 2025 16:38:02 +0000 Received: from BL02EPF0001A104.namprd05.prod.outlook.com (2603:10b6:208:2bb:cafe::83) by BL1PR13CA0134.outlook.office365.com (2603:10b6:208:2bb::19) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9253.5 via Frontend Transport; Thu, 16 Oct 2025 16:38:01 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=satlexmb07.amd.com; pr=C Received: from satlexmb07.amd.com (165.204.84.17) by BL02EPF0001A104.mail.protection.outlook.com (10.167.241.135) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9228.7 via Frontend Transport; Thu, 16 Oct 2025 16:38:01 +0000 Received: from [127.0.1.1] (10.180.168.240) by satlexmb07.amd.com (10.181.42.216) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.17; Thu, 16 Oct 2025 09:38:00 -0700 From: Yazen Ghannam Date: Thu, 16 Oct 2025 16:37:48 +0000 Subject: [PATCH v7 3/8] x86/mce/amd: Enable interrupt vectors once per-CPU on SMCA systems Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Message-ID: <20251016-wip-mca-updates-v7-3-5c139a4062cb@amd.com> References: <20251016-wip-mca-updates-v7-0-5c139a4062cb@amd.com> In-Reply-To: <20251016-wip-mca-updates-v7-0-5c139a4062cb@amd.com> To: , Tony Luck , "Rafael J. Wysocki" , Len Brown CC: , , , Qiuxu Zhuo , Nikolay Borisov , Bert Karwatzki , , Yazen Ghannam X-Mailer: b4 0.15-dev-9b767 X-ClientProxiedBy: satlexmb07.amd.com (10.181.42.216) To satlexmb07.amd.com (10.181.42.216) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: BL02EPF0001A104:EE_|LV8PR12MB9716:EE_ X-MS-Office365-Filtering-Correlation-Id: 9e714a80-3fd7-45d5-97eb-08de0cd25f7a X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|82310400026|376014|7416014|36860700013|1800799024; X-Microsoft-Antispam-Message-Info: =?utf-8?B?dllUN015elMvUzdmamtXeVQwWUUvcXZpb2JBZWtOMnF2WHFGT2Q4OGlpRmUw?= =?utf-8?B?VW4vZnZXVmhCZXJQY0FVUzZCcmZZN0k5T0sySmI2WHozcXZ5cnJBOElZb21S?= =?utf-8?B?dllTNUlOV08yS3JpVERvajJFejJHcjZRVTE5VUM1enFYcUU1UDZZV3RJS3l3?= =?utf-8?B?ZU56NWN0TDlsekNFRE1GZmc4eWhOSWJIdWFMZWkveWtkVHM2dncrWkxEVDVK?= =?utf-8?B?T0xZU0ZXVjVPTDBIRHZGWWxuK2NubDh0cGlpZm95TFhoV2tXMFk4WGVvenQ2?= =?utf-8?B?MUM3KzNkb0tsYkVJZ1NGTzJnK1NBNEdOa2FqbEVDSlhUdWVoNlp3Z3ZDaHEz?= =?utf-8?B?dkdMZXVsajl5RXJhelBYOG03QWs0Y0dEMmo0ZWM2c0gyY1RTeTl6UEJwM0pZ?= =?utf-8?B?N0prTTZJQnpjSkw3SVFVMDhaOG9oeUNFOW8zUUpoaWd1a1hrNnpZU3ZITVR4?= =?utf-8?B?QldwNDlTUWIvdlhjOXowVEFmbG9HYmVaZGJTd1FJa0E2c2ZrRlZEaUZHRVdi?= =?utf-8?B?Sm9BOElIc2xValBQQ0dxei93SW5memhQKy9LQmVzamp4cFpHZ0Jkdy9nRy9y?= =?utf-8?B?QTFFN3pkUGpnV0R6TGhaN3FjSGJaL1J0MHRVb2pSWmEwN3hZY256amxLd3gz?= =?utf-8?B?Qm1XWDRWNnJYOTNoZXh2UDNUYmUwNlRpZE1FV0FZZzNpdVJMbzUxaG9CNVJO?= =?utf-8?B?bitaZDRDUzBCOS9GVGdhOEZ1d2lDbFE2anhaRGJNUFVWdHZNS1ljNDhNRk5z?= =?utf-8?B?ejdHRTNQb2hWUkQrM3AwVVpOMzNONHJycW13ZnNBSmVrL3IwZU9BSWpaQ3F2?= =?utf-8?B?N2wrQVlGdDkzL3FmZnlXV3ZIczRtcHA1MDFvdDFtWU1JaS9qZUpkblkvcDNu?= =?utf-8?B?SUtFeWFwNGh6V29TTFFZMWxnMk9MUHgrLzlxNlBCb2swVjlZQ0dFOGJKMUFM?= =?utf-8?B?MTFpUnpCaVN1R1U1WUF3S09jU2lEQWlMRUszWHpYL3huTm8xdzF6SVRSQzVC?= =?utf-8?B?NU91TDhnNmRRR0lCNklpeUgvOGJqSmd5bVlEMVNQRDNSYzlGSWZLQnc5My9r?= =?utf-8?B?dk1Bc3c0MEpRVk5oSm9sdExvdUlJT1FlcGJrS3BIWWx5eS9jd01sRnluQTBG?= =?utf-8?B?WFVzTWpXK2lZS05WMDlsY1hiRXdlU0VOMzdhY1VHcWxSWDM0ekx2Tng4MXd1?= =?utf-8?B?T1dQQU9qOVZhQ0ExWU5KWTRrVnQ0akw1TE5NR1l1QUllUVVyRXpkS0JIK0Fm?= =?utf-8?B?NlBPUXRXZ3EwTE1MSHB1S3RJVDZOU0N6ekxwQnZ3UVNTd3NSQ3dUMGlPdWF3?= =?utf-8?B?d0lJSExlWHZrYzlMT0wyVjQ3ekVmMEJZaW80bndrWmZLK0k0ZVBsMUI4UUtU?= =?utf-8?B?ZTA5QktEbm4zNGpFZnczMGdSOG9oZjk1OVpoSms4REJUZG5zY29meElCa1lH?= =?utf-8?B?djVaUXR5WTViRVcxNkFqT05pSlZxQTRaZ0g5elhDQXNrbjQvNWozTDUrUWtS?= =?utf-8?B?WmRja3RqU2R0eHk4ZU1LK0NHS0piRkczSEdBY1BKcDcwMGFIWnE4Wjc4V2xE?= =?utf-8?B?YkdSNDJZTmZoWmpBUDE1TGNmdkprT29pdkVBbTdKaC96d2JWTFpwc2Zrc1J1?= =?utf-8?B?dXY4b05RMXY1eWtKMFlmN1Uxc1NPLy9nMWovR2JpR3hnT0lXK2w5NjRyamdy?= =?utf-8?B?bUZ6aTkvUXo4R0ZEUWZNWVZocnJNcEtMZmdjVkwwSTA5ZldpTnJDOXluRUVP?= =?utf-8?B?OUt0d1ZEUnVkY28wTzkyUFdETW9abnpBcm8xWVBFWmNacmFGNGxraTFHVEVJ?= =?utf-8?B?RWVkblllOFU2dVdnb2lDNWZVSnd5T2JPdlIzVHRtQjN4eDNaR2JxMHFpYzlU?= =?utf-8?B?TGw3ZExtN1pERDFOSEhMdERPWTQ0ZzBRVm5uMGJJOXB2U2ZlWjdQMXZFUExG?= =?utf-8?B?WVU0L243bk04aXhqOVRScW9QWEpZdG1oSG4wNEdNdkFvNjVWWEpHc2xXT0VH?= =?utf-8?B?V1A1OE1iV1V0RUpwcnFEMm40NGxjV0JSVE1icFV3Q3JzOW9VUnJUa3FmT1JN?= =?utf-8?B?c1phUGVMMVdDRHpZcG54MXhuMDVVaVJmTmdHRkFiVDhsVFpLc01zeTI4NXZE?= =?utf-8?Q?wU7c=3D?= X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:satlexmb07.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(82310400026)(376014)(7416014)(36860700013)(1800799024);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 16 Oct 2025 16:38:01.7285 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 9e714a80-3fd7-45d5-97eb-08de0cd25f7a X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[satlexmb07.amd.com] X-MS-Exchange-CrossTenant-AuthSource: BL02EPF0001A104.namprd05.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: LV8PR12MB9716 Scalable MCA systems have a per-CPU register that gives the APIC LVT offset for the thresholding and deferred error interrupts. Currently, this register is read once to set up the deferred error interrupt and then read again for each thresholding block. Furthermore, the APIC LVT registers are configured each time, but they only need to be configured once per-CPU. Move the APIC LVT setup to the early part of CPU init, so that the registers are set up once. Also, this ensures that the kernel is ready to service the interrupts before the individual error sources (each MCA bank) are enabled. Apply this change only to SMCA systems to avoid breaking any legacy behavior. The deferred error interrupt is technically advertised by the SUCCOR feature. However, this was first made available on SMCA systems. Therefore, only set up the deferred error interrupt on SMCA systems and simplify the code. Guidance from hardware designers is that the LVT offsets provided from the platform should be used. The kernel should not try to enforce specific values. However, the kernel should check that an LVT offset is not reused for multiple sources. Therefore, remove the extra checking and value enforcement from the MCE code. The "reuse/conflict" case is already handled in setup_APIC_eilvt(). Tested-by: Tony Luck Reviewed-by: Tony Luck Signed-off-by: Yazen Ghannam --- Notes: Link: https://lore.kernel.org/r/20250908-wip-mca-updates-v6-10-eef5d6c74b9c@a= md.com =20 v6->v7: * No change. =20 v5->v6: * Applied "bools to flags" and other fixups from Boris. =20 v4->v5: * Added back to set. * Updated commit message with more details. =20 v3->v4: * Dropped from set. =20 v2->v3: * Add tags from Tony. =20 v1->v2: * Use new per-CPU struct. * Don't set up interrupt vectors. arch/x86/kernel/cpu/mce/amd.c | 121 ++++++++++++++++++--------------------= ---- 1 file changed, 53 insertions(+), 68 deletions(-) diff --git a/arch/x86/kernel/cpu/mce/amd.c b/arch/x86/kernel/cpu/mce/amd.c index 64aa7ecfd332..3bbf2ecf71b6 100644 --- a/arch/x86/kernel/cpu/mce/amd.c +++ b/arch/x86/kernel/cpu/mce/amd.c @@ -43,9 +43,6 @@ /* Deferred error settings */ #define MSR_CU_DEF_ERR 0xC0000410 #define MASK_DEF_LVTOFF 0x000000F0 -#define MASK_DEF_INT_TYPE 0x00000006 -#define DEF_LVT_OFF 0x2 -#define DEF_INT_TYPE_APIC 0x2 =20 /* Scalable MCA: */ =20 @@ -57,6 +54,10 @@ static bool thresholding_irq_en; struct mce_amd_cpu_data { mce_banks_t thr_intr_banks; mce_banks_t dfr_intr_banks; + + u32 thr_intr_en: 1, + dfr_intr_en: 1, + __resv: 30; }; =20 static DEFINE_PER_CPU_READ_MOSTLY(struct mce_amd_cpu_data, mce_amd_data); @@ -271,6 +272,7 @@ void (*deferred_error_int_vector)(void) =3D default_def= erred_error_interrupt; =20 static void smca_configure(unsigned int bank, unsigned int cpu) { + struct mce_amd_cpu_data *data =3D this_cpu_ptr(&mce_amd_data); u8 *bank_counts =3D this_cpu_ptr(smca_bank_counts); const struct smca_hwid *s_hwid; unsigned int i, hwid_mcatype; @@ -301,8 +303,8 @@ static void smca_configure(unsigned int bank, unsigned = int cpu) * APIC based interrupt. First, check that no interrupt has been * set. */ - if ((low & BIT(5)) && !((high >> 5) & 0x3)) { - __set_bit(bank, this_cpu_ptr(&mce_amd_data)->dfr_intr_banks); + if ((low & BIT(5)) && !((high >> 5) & 0x3) && data->dfr_intr_en) { + __set_bit(bank, data->dfr_intr_banks); high |=3D BIT(5); } =20 @@ -377,6 +379,14 @@ static bool lvt_off_valid(struct threshold_block *b, i= nt apic, u32 lo, u32 hi) { int msr =3D (hi & MASK_LVTOFF_HI) >> 20; =20 + /* + * On SMCA CPUs, LVT offset is programmed at a different MSR, and + * the BIOS provides the value. The original field where LVT offset + * was set is reserved. Return early here: + */ + if (mce_flags.smca) + return false; + if (apic < 0) { pr_err(FW_BUG "cpu %d, failed to setup threshold interrupt " "for bank %d, block %d (MSR%08X=3D0x%x%08x)\n", b->cpu, @@ -385,14 +395,6 @@ static bool lvt_off_valid(struct threshold_block *b, i= nt apic, u32 lo, u32 hi) } =20 if (apic !=3D msr) { - /* - * On SMCA CPUs, LVT offset is programmed at a different MSR, and - * the BIOS provides the value. The original field where LVT offset - * was set is reserved. Return early here: - */ - if (mce_flags.smca) - return false; - pr_err(FW_BUG "cpu %d, invalid threshold interrupt offset %d " "for bank %d, block %d (MSR%08X=3D0x%x%08x)\n", b->cpu, apic, b->bank, b->block, b->address, hi, lo); @@ -473,41 +475,6 @@ static int setup_APIC_mce_threshold(int reserved, int = new) return reserved; } =20 -static int setup_APIC_deferred_error(int reserved, int new) -{ - if (reserved < 0 && !setup_APIC_eilvt(new, DEFERRED_ERROR_VECTOR, - APIC_EILVT_MSG_FIX, 0)) - return new; - - return reserved; -} - -static void deferred_error_interrupt_enable(struct cpuinfo_x86 *c) -{ - u32 low =3D 0, high =3D 0; - int def_offset =3D -1, def_new; - - if (rdmsr_safe(MSR_CU_DEF_ERR, &low, &high)) - return; - - def_new =3D (low & MASK_DEF_LVTOFF) >> 4; - if (!(low & MASK_DEF_LVTOFF)) { - pr_err(FW_BUG "Your BIOS is not setting up LVT offset 0x2 for deferred e= rror IRQs correctly.\n"); - def_new =3D DEF_LVT_OFF; - low =3D (low & ~MASK_DEF_LVTOFF) | (DEF_LVT_OFF << 4); - } - - def_offset =3D setup_APIC_deferred_error(def_offset, def_new); - if ((def_offset =3D=3D def_new) && - (deferred_error_int_vector !=3D amd_deferred_error_interrupt)) - deferred_error_int_vector =3D amd_deferred_error_interrupt; - - if (!mce_flags.smca) - low =3D (low & ~MASK_DEF_INT_TYPE) | DEF_INT_TYPE_APIC; - - wrmsr(MSR_CU_DEF_ERR, low, high); -} - static u32 get_block_address(u32 current_addr, u32 low, u32 high, unsigned int bank, unsigned int block, unsigned int cpu) @@ -543,12 +510,10 @@ static u32 get_block_address(u32 current_addr, u32 lo= w, u32 high, return addr; } =20 -static int -prepare_threshold_block(unsigned int bank, unsigned int block, u32 addr, - int offset, u32 misc_high) +static int prepare_threshold_block(unsigned int bank, unsigned int block, = u32 addr, + int offset, u32 misc_high) { unsigned int cpu =3D smp_processor_id(); - u32 smca_low, smca_high; struct threshold_block b; int new; =20 @@ -568,18 +533,10 @@ prepare_threshold_block(unsigned int bank, unsigned i= nt block, u32 addr, __set_bit(bank, this_cpu_ptr(&mce_amd_data)->thr_intr_banks); b.interrupt_enable =3D 1; =20 - if (!mce_flags.smca) { - new =3D (misc_high & MASK_LVTOFF_HI) >> 20; - goto set_offset; - } - - /* Gather LVT offset for thresholding: */ - if (rdmsr_safe(MSR_CU_DEF_ERR, &smca_low, &smca_high)) - goto out; - - new =3D (smca_low & SMCA_THR_LVT_OFF) >> 12; + if (mce_flags.smca) + goto done; =20 -set_offset: + new =3D (misc_high & MASK_LVTOFF_HI) >> 20; offset =3D setup_APIC_mce_threshold(offset, new); if (offset =3D=3D new) thresholding_irq_en =3D true; @@ -587,7 +544,6 @@ prepare_threshold_block(unsigned int bank, unsigned int= block, u32 addr, done: mce_threshold_block_init(&b, offset); =20 -out: return offset; } =20 @@ -678,6 +634,32 @@ static void amd_apply_cpu_quirks(struct cpuinfo_x86 *c) mce_banks[0].ctl =3D 0; } =20 +/* + * Enable the APIC LVT interrupt vectors once per-CPU. This should be done= before hardware is + * ready to send interrupts. + * + * Individual error sources are enabled later during per-bank init. + */ +static void smca_enable_interrupt_vectors(void) +{ + struct mce_amd_cpu_data *data =3D this_cpu_ptr(&mce_amd_data); + u64 mca_intr_cfg, offset; + + if (!mce_flags.smca || !mce_flags.succor) + return; + + if (rdmsrq_safe(MSR_CU_DEF_ERR, &mca_intr_cfg)) + return; + + offset =3D (mca_intr_cfg & SMCA_THR_LVT_OFF) >> 12; + if (!setup_APIC_eilvt(offset, THRESHOLD_APIC_VECTOR, APIC_EILVT_MSG_FIX, = 0)) + data->thr_intr_en =3D 1; + + offset =3D (mca_intr_cfg & MASK_DEF_LVTOFF) >> 4; + if (!setup_APIC_eilvt(offset, DEFERRED_ERROR_VECTOR, APIC_EILVT_MSG_FIX, = 0)) + data->dfr_intr_en =3D 1; +} + /* cpu init entry point, called from mce.c with preempt off */ void mce_amd_feature_init(struct cpuinfo_x86 *c) { @@ -689,10 +671,16 @@ void mce_amd_feature_init(struct cpuinfo_x86 *c) =20 mce_flags.amd_threshold =3D 1; =20 + smca_enable_interrupt_vectors(); + for (bank =3D 0; bank < this_cpu_read(mce_num_banks); ++bank) { - if (mce_flags.smca) + if (mce_flags.smca) { smca_configure(bank, cpu); =20 + if (!this_cpu_ptr(&mce_amd_data)->thr_intr_en) + continue; + } + disable_err_thresholding(c, bank); =20 for (block =3D 0; block < NR_BLOCKS; ++block) { @@ -713,9 +701,6 @@ void mce_amd_feature_init(struct cpuinfo_x86 *c) offset =3D prepare_threshold_block(bank, block, address, offset, high); } } - - if (mce_flags.succor) - deferred_error_interrupt_enable(c); } =20 void smca_bsp_init(void) --=20 2.51.0 From nobody Sun Feb 8 05:37:19 2026 Received: from SA9PR02CU001.outbound.protection.outlook.com (mail-southcentralusazon11013013.outbound.protection.outlook.com [40.93.196.13]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id B6B3132AAAD; Thu, 16 Oct 2025 16:38:05 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=fail smtp.client-ip=40.93.196.13 ARC-Seal: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1760632687; cv=fail; b=DdzJv4C+Y8PvTzllhbiqZFbve8zGRBg4qan9xWdt5dufX/q9HDxT7tCFkD11Uj8fDJGMEMIAlEWM3Koh/M3uZznkBrgPqhOLvoL8HJxvprvbkogKWKjUxZtzOOxrrnvxi0zm8Lc3uf9EE428+qKlTf65YQmIhh1+WHLgFsOcpUE= ARC-Message-Signature: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1760632687; c=relaxed/simple; bh=R34cqNHE4rX7qCZrPiN7gBocI06kV11GF2HTnXu3g1o=; h=From:Date:Subject:MIME-Version:Content-Type:Message-ID:References: In-Reply-To:To:CC; b=i+hMFqBtTwtQJdMnPBX4e8/ssOuODCxl9yS7WwHjMIb7Ylsb19jKbddUdQW41aM/DgfwzZ/TWdpwXYskDPXjkWBAdnFOXgizO23SvvmgBsTE3R5ker3qZXOSv7AyuT76CWjHNsuL6ceZm4ZgiSOOWoPT5yh5DGhf15KoaLvsxaI= ARC-Authentication-Results: i=2; smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=amd.com; spf=fail smtp.mailfrom=amd.com; dkim=pass (1024-bit key) header.d=amd.com header.i=@amd.com header.b=z19BZhxG; arc=fail smtp.client-ip=40.93.196.13 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=amd.com Authentication-Results: smtp.subspace.kernel.org; spf=fail smtp.mailfrom=amd.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=amd.com header.i=@amd.com header.b="z19BZhxG" ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=av2tVzqxXMbvI3pbY+0aBn5SMUjzC9DfbsDIxe8S8cLNDYYfJNKn8onKcDbRGZUGsVnSQCiTNNJtB0fYelIIKe8R6hU7yCcgRz8lAxG8KJppoZse0EYv/EO56bW3UqmdDjV8EK1lPC3XyqdUY4AQRFtb3SM0coXvBFL83iBvGzCyATJxBK2jnEXfYc1a6oOzEukw8T4zUqNyHh2Lf7VeEccPiF0xm9M4wAgEHp1mxC3nhMOXDrkT2Gv/+/dFQEgN/YtILYGtzJuXvrAUne1ubuS6xOwHw0trszxH6agnSWkAS+9G0GNd/7R+GoGsm1CQgaHved3R0cFIjNnyONUjTA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=EOCovX8z27LQrNRB50CFyp4ikHrxwkG0y+AK1Y9BV30=; b=NfgXbKnPFP5xgf12RFx44E8wU2DOIM3tc4iTj6BB6yw8XpEpMHjsQz8BwNSY2tk+9QTOB2c8zvKOPgFq6y1R0TFcrXE1Cd8ZceS1Y89xz6ZjUD/JfINSoLEK8V7ViXPBL6cSzHkoTLZ2HwbESKoTL93uWwWBLnscfXbqEs+6fjvE975qzxS0WXLz8weFXyC0fl424o9keeaYifVgVTRzJtt3TaYqOvqbaPx/Wv/0n12LzNThIPyBITJlcRhMmMj3QK4pC7XcBNm9e1FAEInqy7LL6EBzXwYlX5d6xuFUH6qpkkli7Hzt+7S3j0lcb0/6taYNvWEu0TFQFZeGt6PTOA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=vger.kernel.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=EOCovX8z27LQrNRB50CFyp4ikHrxwkG0y+AK1Y9BV30=; b=z19BZhxGrXonZO6HEY9crSfY26xPuo+fwwb9gD2QJ3w+mhQPbjTLNOJa18D303pADSaSnf4WZvKjB/fB5A7puIrLfRQlv1FFPEWC5K3z1wBqY57kjsPoOY4hQjLUvqPxtmWnMG1eiGyODrZAd+CnkM2LTjYZ/M+u+3Mj/VOnrng= Received: from BL1PR13CA0138.namprd13.prod.outlook.com (2603:10b6:208:2bb::23) by LV2PR12MB5821.namprd12.prod.outlook.com (2603:10b6:408:17a::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9228.13; Thu, 16 Oct 2025 16:38:03 +0000 Received: from BL02EPF0001A104.namprd05.prod.outlook.com (2603:10b6:208:2bb:cafe::86) by BL1PR13CA0138.outlook.office365.com (2603:10b6:208:2bb::23) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9253.5 via Frontend Transport; Thu, 16 Oct 2025 16:38:03 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=satlexmb07.amd.com; pr=C Received: from satlexmb07.amd.com (165.204.84.17) by BL02EPF0001A104.mail.protection.outlook.com (10.167.241.135) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9228.7 via Frontend Transport; Thu, 16 Oct 2025 16:38:02 +0000 Received: from [127.0.1.1] (10.180.168.240) by satlexmb07.amd.com (10.181.42.216) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.17; Thu, 16 Oct 2025 09:38:01 -0700 From: Yazen Ghannam Date: Thu, 16 Oct 2025 16:37:49 +0000 Subject: [PATCH v7 4/8] x86/mce/amd: Support SMCA Corrected Error Interrupt Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Message-ID: <20251016-wip-mca-updates-v7-4-5c139a4062cb@amd.com> References: <20251016-wip-mca-updates-v7-0-5c139a4062cb@amd.com> In-Reply-To: <20251016-wip-mca-updates-v7-0-5c139a4062cb@amd.com> To: , Tony Luck , "Rafael J. Wysocki" , Len Brown CC: , , , Qiuxu Zhuo , Nikolay Borisov , Bert Karwatzki , , Yazen Ghannam X-Mailer: b4 0.15-dev-9b767 X-ClientProxiedBy: satlexmb07.amd.com (10.181.42.216) To satlexmb07.amd.com (10.181.42.216) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: BL02EPF0001A104:EE_|LV2PR12MB5821:EE_ X-MS-Office365-Filtering-Correlation-Id: 84ab72cb-034a-4584-9258-08de0cd2603b X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|36860700013|7416014|82310400026|376014; X-Microsoft-Antispam-Message-Info: =?utf-8?B?bUJXbXhhdExCMXFxQ2ZuQXJXVWNSVFlrTXJ3eExOaFR4enRVOXRtZ05kOVhU?= =?utf-8?B?VzRjS1pCSmVMYWJwWXExRmtIK01RRS8zaklLMW5rR25neCtLbENJZnFqUGdN?= =?utf-8?B?d2paVWNxbE1xTXhMaXVFT3pRck1SeGRhcWJRRXk4KzlBUXRHY21meDZVYkht?= =?utf-8?B?WGZpYzJsZTdCVFVYRndXK1dpbXF1YU01WWtCSW9nZ2pNWkNXVW5HVlF3a1RJ?= =?utf-8?B?alI0dUxJd3QyUmVEbUwySW9nYVJ6MjhtVkpablRFVEZSUFU4STdEdkNZNEtz?= =?utf-8?B?ak1wWmFuQUNBZTRVbGt0eGNLUEFKejBsV2hWaExubG5pRWYrS04rZzFOV2l1?= =?utf-8?B?ejJCNFcvS0FUczJ4SDVRTGpuZlFQRWNPd2l3bjAzZkpZVU1RZi9ZZDRHOHNT?= =?utf-8?B?VnR6UzFsRzlPd0tKNkIrb2dEOGUwME55a2lUTkJ6WllQbFhHUStMb3NwdTlm?= =?utf-8?B?dXUzK1EwTnBGVTZHWTBjM2JNN1pxcXpLZVlHZ09iMzUzdm9zK0NRWGpxeFNk?= =?utf-8?B?RnNvRk14SDI4cU56V29ZYVVPNG9LZUJyU09tU0ZtY2dwNVZpSW43Y1Iyay9B?= =?utf-8?B?azVYNkVLUHpwY0dTWFhVenVUcFBSU2hDc1ZVMEJqRk9yS09MNkw3Njhub2ZK?= =?utf-8?B?amlkVUtsZUxjdW1LKzFMVi92Uis0VDAzeGVTS3pGTFhsd0ZpUWthK1d0M0Ji?= =?utf-8?B?bGNpV0dodHhIbExjQVJ3VGd5RVVVQi9rMnFEN1Y0K1h3Um1jdFRmMDJNQXVY?= =?utf-8?B?blhqaXJwczVXbzhnall6V1lmaDNoYmlhWHIzUGk0dTJZaFJwVnZzb0dKT1dx?= =?utf-8?B?Undmcy9hei9XMzlScTZLWkdwcGhKN29Za0NWNUhnajJ5VmNORUlkcXQzaUIz?= =?utf-8?B?Vm0vd3M1c2tXUlA3TjMxVVA5eTFjczM4VUZQMFE5R0wzS3FZT1NPbm4ybHRt?= =?utf-8?B?TkhKc2FZdlk4Q2kwaDcxN1ZCdVppeCtNR1NlOXBOaU5nYnFqaWRjQ29VZDc0?= =?utf-8?B?ZFRLNlZxV2IwZmJoeGd0aE02TzVleXJJU0VIOUl0YmpsQjkvVFJRTVZGbDNY?= =?utf-8?B?S09yVFFPYnN0TXp5a0NGVDlVZGhLYkcxNnUxZmtYbURBZE5PeWlZVFhDNWpu?= =?utf-8?B?Ulg2TzlSTDJCQWdoWW9pWmZxcW5KdmhPVlRkUU9LNGRGZkpiMVVRL1MzU3A5?= =?utf-8?B?eE81RWFUNmFlSTU5cHA3eSt4dC9SQUFsdFBJNmdOT0ltN1NkUk9XWCtVQmlF?= =?utf-8?B?cTNqZmtwTjlmSkVEbm9ndG91TDArOEdOV09YS3BqMTRXUnRGYktGY1BFMUZj?= =?utf-8?B?R240SmNZOXhTeFFYdFBzaXNtazEveWlPWjg3T2xVMVdaNmZGeGpwbzhjUzRL?= =?utf-8?B?UkE5MDNSWE5IRjZrbHBjMWtUS2VwZlEwZTc5Mld4VUVubGlLSjNhTWQvamRE?= =?utf-8?B?V21icDVCQXZGMEx4aCtJWnB2UHQrM3B5d2UyY3JnUzBKTWlPSzgyb1lYeG8y?= =?utf-8?B?VnMwRTdycGYzMVhLS2JKK0J2SzhmMEpkQ0hqMmloeTN0MGd2dXh2b0oyeUhK?= =?utf-8?B?MVFrdG8wQTcvUmR5YW43cjh4YkJxOGlEa2JCNHNIcmlWbzVEZng3UWlxQjh2?= =?utf-8?B?Sk04eDV2NnpBL2t6TWRIalRhU3pPUXAvTDNyYTdwNUd6bzZiNHR4dUNFZUtP?= =?utf-8?B?T1ZmVkJrd2tiMEd0OGJoZ1lBVU1xcEVDZU8wS2QybjEwL1JQNXB3c1hFdnBy?= =?utf-8?B?V0RMOGZVMVR2Wi8vRmxZU3JBTk9JMjErRXo5L3NkQnVaUTRBTjFFa2FrT1Z5?= =?utf-8?B?emR6QkdTVDU5aDR3TFRLZE00ZU1wdG1rdFZZcFo3YVh3alNMYkJOb2pLenBq?= =?utf-8?B?by9OYVlPbnkxQ2szMmp4ekx6UTk0ZzI3d3JFbGt0VEtGT0ZsVjU1cWFQR2F2?= =?utf-8?B?WXJZOThXcHRqazY5ZkNZV3RSNmIvZFlKUmIreFFIdWI4c2h4N2ZwaGQ4K2Mv?= =?utf-8?B?T09MemFLMnFobERPZnF4K3hPdTUrK2prcFRNYVh3dTRyWjZER2pNTmFkTXND?= =?utf-8?B?VW1zU2FPSkloQzNMMUw1ZWtVVXFtVjErU1UwT3dnK0lHaTVQaVRPRU4wS3hx?= =?utf-8?Q?lAbQ=3D?= X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:satlexmb07.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(1800799024)(36860700013)(7416014)(82310400026)(376014);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 16 Oct 2025 16:38:02.9942 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 84ab72cb-034a-4584-9258-08de0cd2603b X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[satlexmb07.amd.com] X-MS-Exchange-CrossTenant-AuthSource: BL02EPF0001A104.namprd05.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: LV2PR12MB5821 AMD systems optionally support MCA thresholding which provides the ability for hardware to send an interrupt when a set error threshold is reached. This feature counts errors of all severities, but it is commonly used to report correctable errors with an interrupt rather than polling. Scalable MCA systems allow the Platform to take control of this feature. In this case, the OS will not see the feature configuration and control bits in the MCA_MISC* registers. The OS will not receive the MCA thresholding interrupt, and it will need to poll for correctable errors. A "corrected error interrupt" will be available on Scalable MCA systems. This will be used in the same configuration where the Platform controls MCA thresholding. However, the Platform will now be able to send the MCA thresholding interrupt to the OS. Check for, and enable, this feature during per-CPU SMCA init. Tested-by: Tony Luck Reviewed-by: Tony Luck Signed-off-by: Yazen Ghannam --- Notes: Link: https://lore.kernel.org/r/20250908-wip-mca-updates-v6-11-eef5d6c74b9c@a= md.com =20 v6->v7: * No change. =20 v5->v6: * No change. =20 v4->v5: * No change. =20 v3->v4: * Add code comment describing bits. =20 v2->v3: * Add tags from Tony. =20 v1->v2: * Use new per-CPU struct. arch/x86/kernel/cpu/mce/amd.c | 17 +++++++++++++++++ 1 file changed, 17 insertions(+) diff --git a/arch/x86/kernel/cpu/mce/amd.c b/arch/x86/kernel/cpu/mce/amd.c index 3bbf2ecf71b6..91af769b9d8a 100644 --- a/arch/x86/kernel/cpu/mce/amd.c +++ b/arch/x86/kernel/cpu/mce/amd.c @@ -308,6 +308,23 @@ static void smca_configure(unsigned int bank, unsigned= int cpu) high |=3D BIT(5); } =20 + /* + * SMCA Corrected Error Interrupt + * + * MCA_CONFIG[IntPresent] is bit 10, and tells us if the bank can + * send an MCA Thresholding interrupt without the OS initializing + * this feature. This can be used if the threshold limit is managed + * by the platform. + * + * MCA_CONFIG[IntEn] is bit 40 (8 in the high portion of the MSR). + * The OS should set this to inform the platform that the OS is ready + * to handle the MCA Thresholding interrupt. + */ + if ((low & BIT(10)) && data->thr_intr_en) { + __set_bit(bank, data->thr_intr_banks); + high |=3D BIT(8); + } + this_cpu_ptr(mce_banks_array)[bank].lsb_in_status =3D !!(low & BIT(8)); =20 wrmsr(smca_config, low, high); --=20 2.51.0 From nobody Sun Feb 8 05:37:19 2026 Received: from DM1PR04CU001.outbound.protection.outlook.com (mail-centralusazon11010006.outbound.protection.outlook.com [52.101.61.6]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 6064133CEAA; Thu, 16 Oct 2025 16:38:08 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=fail smtp.client-ip=52.101.61.6 ARC-Seal: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1760632690; cv=fail; b=L+Qccela3zRXxiFav0MW9WPVK6FlLvSbWxcyH2ApVsiX5wQHKuUFKKQhGWEFPaGueWApOiAD8zoL9TRoOhuiMLeQLhGLxaS18h1DF9WGDn/d/rGyYz1M1HHgKYKXxsWhXQlgh5RCTimizFcEEU2Tl+3Wlb4nXBulVoUircKRUYA= ARC-Message-Signature: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1760632690; c=relaxed/simple; bh=EobZeXEAx1PiiwOFEZg+/0X8qSDffgEZ5emtp1aSke4=; h=From:Date:Subject:MIME-Version:Content-Type:Message-ID:References: In-Reply-To:To:CC; b=cX+e1zWfYmhkaNznliDF8lH/nU5ckyJvxJKbvST1OlGS8KoZkt/ZLth1FzFQifS5RhR44h9wo9WP1x0+ze2yzVUd2pc/MxHAcGW/3InpxxMjRWIJE92cQw3RpuRrTYdmIgz6/cX3NS84Iv51yM/rDXxodNqx4Ho9uoG3OWBwOYE= ARC-Authentication-Results: i=2; smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=amd.com; spf=fail smtp.mailfrom=amd.com; dkim=pass (1024-bit key) header.d=amd.com header.i=@amd.com header.b=Z+txOkVW; arc=fail smtp.client-ip=52.101.61.6 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=amd.com Authentication-Results: smtp.subspace.kernel.org; spf=fail smtp.mailfrom=amd.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=amd.com header.i=@amd.com header.b="Z+txOkVW" ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=Y9vV4Ng6TeC3eVdjRdgwOJeMtx3FrwupODBkC8REJiZ6ACdva00r8SvsUGD6bRcJYQMNH017XCCMFRp2aAAAYJ7D1W81uCXBKthE5wIRK37e9DCOhS7G16VDoVUGS3bXaAV02+PvoDDHIQi6GaTj+ML2uc8FwiwlsNglEDh0YeXZvGKvy+T3DjvIBjKHB6IqZFBR3thLPv8e+CnhPOrxCJV39PWGBaN67f4YgwjtQYmsl6EN1DnHbiRcoDe43PcZ9aiJW64VaUpukYwHLFbVefBd5H17/g1Vc5sI3MSl0Tp3kcZW8eTndf2N7ianNX2i5Nb0uM8LGhQw3aav5+mlqg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=qv6kccuNvP0eij3y7nnLuGNKXsVguh14uIXc3WrxfRY=; b=mK1QJB0TowtiQsQTokRLroEDNlzOiRmbHtDNABXZ4+SxAmibVKpGOTYhcGC4JGeeq7L05Nj7AIeXlc4UFrVcXWwGOYP59xhO4Wg2dc/yc89eAZbtOQKD0wMODElKKxRATxbCMUUxKKJIIurgmfyF7YiMhl6cNagAfIsA/xQF6ObLm1dCWBosg0cMRdpuG3/AH4VbEFdLAzG1H6yjwN40+PAx5f3Nz96jUb6eCh9naPho7SOqp16z/o9HpDN03LyC7N1kPCNK2sB+st7+uHatikBCP/5Oz7etoc6q7OpxrTQSpNMCf6K9WwuX96BvY90I01T5umZMD5tR3yR3EZAxsw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=vger.kernel.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=qv6kccuNvP0eij3y7nnLuGNKXsVguh14uIXc3WrxfRY=; b=Z+txOkVWLL1sImr395tre8IJ6/dV09TgUy8YBn6L/gezJq4EGmVhlsLsl0hQc0WG2weXSAy+wLzLnBMcXo7V5En4HsFvG9DQuUSjsN1Xa6T8ph8Pb2SxvxYWxUbH1K3wynMw2q5W+5K/OiMzgPAcAkHxz8YF8g7E3YzsHHJVvoo= Received: from BLAP220CA0013.NAMP220.PROD.OUTLOOK.COM (2603:10b6:208:32c::18) by DS2PR12MB9663.namprd12.prod.outlook.com (2603:10b6:8:27a::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9228.10; Thu, 16 Oct 2025 16:38:05 +0000 Received: from BL02EPF0001A105.namprd05.prod.outlook.com (2603:10b6:208:32c:cafe::c1) by BLAP220CA0013.outlook.office365.com (2603:10b6:208:32c::18) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9228.11 via Frontend Transport; Thu, 16 Oct 2025 16:38:05 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=satlexmb07.amd.com; pr=C Received: from satlexmb07.amd.com (165.204.84.17) by BL02EPF0001A105.mail.protection.outlook.com (10.167.241.137) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9228.7 via Frontend Transport; Thu, 16 Oct 2025 16:38:05 +0000 Received: from [127.0.1.1] (10.180.168.240) by satlexmb07.amd.com (10.181.42.216) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.17; Thu, 16 Oct 2025 09:38:02 -0700 From: Yazen Ghannam Date: Thu, 16 Oct 2025 16:37:50 +0000 Subject: [PATCH v7 5/8] x86/mce/amd: Remove redundant reset_block() Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Message-ID: <20251016-wip-mca-updates-v7-5-5c139a4062cb@amd.com> References: <20251016-wip-mca-updates-v7-0-5c139a4062cb@amd.com> In-Reply-To: <20251016-wip-mca-updates-v7-0-5c139a4062cb@amd.com> To: , Tony Luck , "Rafael J. Wysocki" , Len Brown CC: , , , Qiuxu Zhuo , Nikolay Borisov , Bert Karwatzki , , Yazen Ghannam X-Mailer: b4 0.15-dev-9b767 X-ClientProxiedBy: satlexmb07.amd.com (10.181.42.216) To satlexmb07.amd.com (10.181.42.216) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: BL02EPF0001A105:EE_|DS2PR12MB9663:EE_ X-MS-Office365-Filtering-Correlation-Id: ae7bdca9-17e2-4cec-6534-08de0cd26184 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|82310400026|376014|7416014|1800799024|36860700013; X-Microsoft-Antispam-Message-Info: =?utf-8?B?S29TU2NrOVJaNVpOV3ViYjRaUll3ZGFzYW1aMHQzMlE1Vnp6SmxMT1Z4a2Ra?= =?utf-8?B?Njh5VW10TmpCOWc0WWJSNHN5L05JTkpoaGxpVy9LOUszTTRhSVArdTJwQTU4?= =?utf-8?B?Ky9NaWp5dWJiUVlKUEE0V0Zsc3JJdTBKcXVtc3NPWkhGcDBsdFB2UDFBSGYx?= =?utf-8?B?WlptSkRhL0ZhSm9tdFRVRzBTaUR6RjczbFlLN0pCdjdoZmUzNk1NaENPR1Jt?= =?utf-8?B?QUxLNkNNdTRyUlJvNlJlUlFoQTc0T1JHOEUxMjZYL2hKamNrMXlsUGtkTjFj?= =?utf-8?B?aXY1L0g4dlpWNWhvbHpxaHVJemovTDVRL0c5OUc2VjZzb2RHUTU1NDcydyth?= =?utf-8?B?aFV6T0R6UXhFa09hSjUvdEpDQW81TXh1SFpvUWIyT0xNNXl5VTYxQWV5VHZC?= =?utf-8?B?Y29Ra05jdUErWmJwU01WZ1FwNVNiRWdLVXMvbFhERUF5ZXNVd1FmSHptZk9W?= =?utf-8?B?cmJvYjF4NkIyTXZ6MUN6MmVKeEVwckJJZzdYVzEwRmdjV1B5eG9iZXNFbGQ1?= =?utf-8?B?ZWtOczRCekVaWVRLWG45WjAzWjdtZk5JRDI0aUJrMENSc0RlTlBHeHVUd2gx?= =?utf-8?B?WFZWa2N5dHdXcUJYVW81ZS92cTJKWVNPUlBjRllpcWs1KzF2V3E2Y2JnSHhi?= =?utf-8?B?N0lQTDNyU1BINnplRU5qVnR1c2llRU1lK1RacDJOQWNaYzA5aE5ybW1EQVps?= =?utf-8?B?a3pQNmxldnpFMnMyN0U4TWpKbm9vc2lYUnE3d2lweXRSaUR4bGJkQkVXc2lB?= =?utf-8?B?YnRpY0JrNmJUVmh2ZHJabnFBL0hzRDU3WFdROHJ0c2RuaURDbWlwT004SHZR?= =?utf-8?B?ZXdCcFlyKy9oaEJDdlltOFpWMDE4b29pc3craTU1dWhmU0M0VHFrS1pPbjU2?= =?utf-8?B?eDJjMVU4SllLOFdjK3lvSTBNQU9RcDlMRm56V0xWTi93YjV5TVBxTHVKbHdG?= =?utf-8?B?UmNKZGh2eEZyKzBMZldyVnViYVhzUFA5cmF6N1BOd3BxdWxQVnpEcXB6U3RL?= =?utf-8?B?OEY4dlF2R3hXc0E4N0hOSHUybVM5QkRiTnZCTTdDZDdpb3V0cHJKLzdoM2Fa?= =?utf-8?B?eUlXUisrTlVWR1pYWkoyam4zcmFFeXhZV2t4eXlJYlFrcXlPRDJ3V1VCS1VE?= =?utf-8?B?SFBNdDNHdlRCUUN0d21STUZtTlpFSytneEhzOS94UGJsb0loZUVmYW9SVnpF?= =?utf-8?B?NmJ3RExBOGFEODZKcnk2eFMvcXJLTFZTd0dvL1FCVGp0dmwxRFpzd01mSnpy?= =?utf-8?B?TlVIOWhLTjVGQWFXcDlhR3B5eHRUVjJvSzJqd0xXdXFqSUNhYzdtV3dJVkRC?= =?utf-8?B?blBpQS9GRWFMMUhGNDhzZmMrM0gxSVpMTHdmcDFlZmkyQ3VBNlZuSzU2VTJY?= =?utf-8?B?RHkrR1RUV3BYb2piOWVyL1VuU0lwY0thZ3NIWGYzZ2w2ZTF3ZXJYdzFXV1NC?= =?utf-8?B?TlhDeVN5emR1bzdOemJjbFZPMDFicVdQbEhXV3l0Tis2YmxlY3ZpVGtaZFpp?= =?utf-8?B?aEJtVkU4QzM1aXgvajB3bUNkay9iMDRQTW1CeWJLZGlYcy9xTVR3b1hqWENG?= =?utf-8?B?SEU1ayswTjlvOXgzbm1hUDNnZUl1OWs4WFJraWhrRE1ESTBUTFUvYzZnWTRR?= =?utf-8?B?YnNzRU5GdE5Jc2pYeU9YWFZCdWZsZ3NZTndGOWhkM0ttR01kNnZrRUFhLzR6?= =?utf-8?B?cHREajZscERRUmZ0SUNyeW92NEsxYTR4NnBpM1ljeVp4S3lTUE9oc2x2V3hs?= =?utf-8?B?dElQTmwwaVd4SzRCeGJraGNyTlVIWGU3ajVwYTkvSlljbS84Uzg0Si9laFo3?= =?utf-8?B?RjJKbTJOcWwwQnhnQ1d4L1VnT0tBVDBHRHFQTjBkM1dwWnJOSTZwZkpIY0w3?= =?utf-8?B?MzBXWmJXaFBVcUpTMzI0V2dXZ0YrL0dHcWpPSUI1ZFRROWlpTWE0L3ZBcmx4?= =?utf-8?B?bnRyMXU2MVdJK1YwTk5XTUVOclNqTHR3dk40ZjA3WE42allLTjN1dGdWcmJD?= =?utf-8?B?ME5YU0JiNndaWnhXR3g2cXlMNzBrQ1pRVHliU2o0VDJQNHRJSnhNbTJPbU5Z?= =?utf-8?B?Rk5WeEk2Vzk3dTB2eFVyWWI4MWEyR080d2VrM2tCY1JnTmhQSndmTEk3dzE0?= =?utf-8?Q?ZEyM=3D?= X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:satlexmb07.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(82310400026)(376014)(7416014)(1800799024)(36860700013);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 16 Oct 2025 16:38:05.1472 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: ae7bdca9-17e2-4cec-6534-08de0cd26184 X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[satlexmb07.amd.com] X-MS-Exchange-CrossTenant-AuthSource: BL02EPF0001A105.namprd05.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: DS2PR12MB9663 Many of the checks in reset_block() are done again in the block reset function. So drop the redundant checks. Signed-off-by: Yazen Ghannam --- Notes: Link: https://lore.kernel.org/r/20250908-wip-mca-updates-v6-12-eef5d6c74b9c@a= md.com =20 v6->v7: * No change. =20 v5->v6: * No change. =20 v4->v5: * No change. =20 v3->v4: * New in v4. arch/x86/kernel/cpu/mce/amd.c | 28 +++++++--------------------- 1 file changed, 7 insertions(+), 21 deletions(-) diff --git a/arch/x86/kernel/cpu/mce/amd.c b/arch/x86/kernel/cpu/mce/amd.c index 91af769b9d8a..29f777b404cc 100644 --- a/arch/x86/kernel/cpu/mce/amd.c +++ b/arch/x86/kernel/cpu/mce/amd.c @@ -812,29 +812,11 @@ static void amd_deferred_error_interrupt(void) machine_check_poll(MCP_TIMESTAMP | MCP_DFR, &this_cpu_ptr(&mce_amd_data)-= >dfr_intr_banks); } =20 -static void reset_block(struct threshold_block *block) -{ - struct thresh_restart tr; - u32 low =3D 0, high =3D 0; - - if (!block) - return; - - if (rdmsr_safe(block->address, &low, &high)) - return; - - if (!(high & MASK_OVERFLOW_HI)) - return; - - memset(&tr, 0, sizeof(tr)); - tr.b =3D block; - threshold_restart_block(&tr); -} - static void amd_reset_thr_limit(unsigned int bank) { struct threshold_bank **bp =3D this_cpu_read(threshold_banks); struct threshold_block *block, *tmp; + struct thresh_restart tr; =20 /* * Validate that the threshold bank has been initialized already. The @@ -844,8 +826,12 @@ static void amd_reset_thr_limit(unsigned int bank) if (!bp || !bp[bank]) return; =20 - list_for_each_entry_safe(block, tmp, &bp[bank]->miscj, miscj) - reset_block(block); + memset(&tr, 0, sizeof(tr)); + + list_for_each_entry_safe(block, tmp, &bp[bank]->miscj, miscj) { + tr.b =3D block; + threshold_restart_block(&tr); + } } =20 /* --=20 2.51.0 From nobody Sun Feb 8 05:37:19 2026 Received: from PH7PR06CU001.outbound.protection.outlook.com (mail-westus3azon11010026.outbound.protection.outlook.com [52.101.201.26]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 33612350D4D; Thu, 16 Oct 2025 16:38:11 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=fail smtp.client-ip=52.101.201.26 ARC-Seal: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1760632694; cv=fail; b=kSVDqyHXXdtk4x3Wh7DjfUUQ3TDmlmCCt9d/zCXttPJexnwHxMwQFoIvhdvAn2CsC6r98g+onNSQIGz2S5lEDu0ghVZu0RoiiGJSeqVqat2HaG7SxntKMALAK2FZNGW+ENwt8hg+cTZbxHPyf7IhwC7iVMJ3cpsVIEG0MBn2m2E= ARC-Message-Signature: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1760632694; c=relaxed/simple; bh=JRSYONUSXjIFywywzO+jRT+mjhkOb97BfE2cu/PFytg=; h=From:Date:Subject:MIME-Version:Content-Type:Message-ID:References: In-Reply-To:To:CC; b=MBeysnVrv845PSLYblN0yefsj1/XXatGlKX+V/+uTHAkUAOxEchq5KLJg2rzMW22xypTQOS0Eg705Eql8s34Fs3xvLHfSFGKGmb/6yuqwNPtqa8pfuttwDbJWGUVHviVM3ioaKQA07pysZIJut0zWsMhC/+DvUsbf488/Toykzg= ARC-Authentication-Results: i=2; smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=amd.com; spf=fail smtp.mailfrom=amd.com; dkim=pass (1024-bit key) header.d=amd.com header.i=@amd.com header.b=gseazm1G; arc=fail smtp.client-ip=52.101.201.26 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=amd.com Authentication-Results: smtp.subspace.kernel.org; spf=fail smtp.mailfrom=amd.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=amd.com header.i=@amd.com header.b="gseazm1G" ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=JWzN64tX5DClKV2V62F9WrZzMKITJY1jjaTowWGzDkSP90uxf1vH4h230ww8xup6VlOwM0DHy2VZ6Oz1YD4vNScb96W1fB/xwc4l2c4x8Mq0vxWah7UJSDcExjLzS9ig2vtoBN8U5knmzgBM/3YaiooNLMO3lKF2qoEvVyMWUp9xXoTadTM2ceULmhLpZ5g/PcruCU9WSyS2aSjz98bPJ5QWU55w9agFomL5X5EQxgqSZwSiy7awJCt7NrC+W+LADpMowdlAP92lGxFoJe/hk7ICm8xY7cP+ancASP0qin2V2EPZuygrDFzOd/mn83OOlyzlU4DqaUJ4cjU/h/4UuA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=ijMGDdtQchtOZrygvEiIEgxiMFVDsd+BzpUYraYFQ3o=; b=OrQEpa7pL28r3BMESL6zpUnSs6WcniFmuzmyxxbIbVXS+lUZfRZikzjWUbXY80F4ERV0Fh3AhrbMm8eHvnEVlr8fmloQyDffFvJ2s9wH+PEt6iV86a9awGYxmVVpuBa8aN91ZaLs0EhTJ3X1Bmc2tfphXfAfhdjolg/9puxRzAveVOiC3sMDUvXhsfBTQS91QaDgS6IOhISPOBvIFLgmkWJ8UU2p9Q2QOXt0By6olBEMsjbhyeBOoZJc5NZ63EmY38DRAguuJOw3Ip1x2G9M4a9F+Rgb2gO0EdXpXR/l3kSytjoSGKo/i8daLhQxG5dDGSI658u/keUjS8Ea1MT83Q== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=vger.kernel.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ijMGDdtQchtOZrygvEiIEgxiMFVDsd+BzpUYraYFQ3o=; b=gseazm1G2D68DhTdaSp8sj8YGNqCqdYg5M5Qze9HM2Qvg7puE00FD9LZ0mPtWZOsK5wQo9Ed5BC6QTJ5SJB1vbBGZbD/9qaIpl/LbXA0OuuV3oc+0zpYPFBtUZrs3MNxxujZ4q/iwSNHeHSA9296xlqDYYA6ckgjH/PBSGuVj7Y= Received: from BLAP220CA0025.NAMP220.PROD.OUTLOOK.COM (2603:10b6:208:32c::30) by SA1PR12MB8700.namprd12.prod.outlook.com (2603:10b6:806:388::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9228.10; Thu, 16 Oct 2025 16:38:08 +0000 Received: from BL02EPF0001A105.namprd05.prod.outlook.com (2603:10b6:208:32c:cafe::22) by BLAP220CA0025.outlook.office365.com (2603:10b6:208:32c::30) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9228.12 via Frontend Transport; Thu, 16 Oct 2025 16:38:07 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=satlexmb07.amd.com; pr=C Received: from satlexmb07.amd.com (165.204.84.17) by BL02EPF0001A105.mail.protection.outlook.com (10.167.241.137) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9228.7 via Frontend Transport; Thu, 16 Oct 2025 16:38:07 +0000 Received: from [127.0.1.1] (10.180.168.240) by satlexmb07.amd.com (10.181.42.216) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.17; Thu, 16 Oct 2025 09:38:03 -0700 From: Yazen Ghannam Date: Thu, 16 Oct 2025 16:37:51 +0000 Subject: [PATCH v7 6/8] x86/mce/amd: Define threshold restart function for banks Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Message-ID: <20251016-wip-mca-updates-v7-6-5c139a4062cb@amd.com> References: <20251016-wip-mca-updates-v7-0-5c139a4062cb@amd.com> In-Reply-To: <20251016-wip-mca-updates-v7-0-5c139a4062cb@amd.com> To: , Tony Luck , "Rafael J. Wysocki" , Len Brown CC: , , , Qiuxu Zhuo , Nikolay Borisov , Bert Karwatzki , , Yazen Ghannam X-Mailer: b4 0.15-dev-9b767 X-ClientProxiedBy: satlexmb07.amd.com (10.181.42.216) To satlexmb07.amd.com (10.181.42.216) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: BL02EPF0001A105:EE_|SA1PR12MB8700:EE_ X-MS-Office365-Filtering-Correlation-Id: 51648ba0-ac14-4ab5-676e-08de0cd2632f X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|36860700013|7416014|376014|82310400026; X-Microsoft-Antispam-Message-Info: =?utf-8?B?a0dBbW54cHJSd2poY2o5TEZKSVdOakxUSXNRYnlpNlY2c250cTFSOVR5Z09q?= =?utf-8?B?eStZelVIOW1QUlZEeko3dWpuMmxPelpNWFo1d1JWcWJYRnQ1SXY1L2hkV0cx?= =?utf-8?B?UGpjRjNOZmdXVno5NXBsVlY4WWhady8rZG9ROUsxKzhGL3pZckVhcHgxbHRm?= =?utf-8?B?VUF5WUxFaWlrUHZid0xBd1ZGc3l6bXl5MGlMMzdOdHB5UHFicmowMFVCbFZZ?= =?utf-8?B?eXZXd3huelNRMzNJOVhzSGtCZlNuclR1d2pmNVdlSUQ2WXA4bnZKemxLelhy?= =?utf-8?B?cHVrTXc2TWI3MjFtZkJVSUFUYXI4THdWYmpFSHE2U0Q3YU1WbEhhRFJ4S25T?= =?utf-8?B?M0ZHNHE0c2N4VU4zdzFCV21VSDBELzV4MmJzMnpIT2F4Rmp4STNKOWxSMG5t?= =?utf-8?B?eUgveERBdDNLdlBRajNSY09RR0YyOTB0UG4reEhEcVh1S0lGbXNmTXdMamtJ?= =?utf-8?B?NXNzVVgvUThZQ1kwUzhkaS95d25hYWFaTXZlenI0dkhXbEdOWGlMaVJMcTVI?= =?utf-8?B?WDVPTTVFR3Rua2IvV1ZkZjRWUkt1UHM2UlNKcFJ5L1BsZFVBb1BQNFRWbEt6?= =?utf-8?B?YWRFL0l3Mmd0TmQ1VXZ3bW5vdGx0NXp2Qi9Ia0dPbDJFWjZaWW1nR2NsWVAr?= =?utf-8?B?SzkvK1RsbFVPR3B2b24xQ0taRGYxaDUxT1JScExLakw2NFVaMjlzaHp1MDlQ?= =?utf-8?B?ZkRIMlpyS2RUajlSSG5UQys3SDJtVDA0WDdJdy92QThlSVQzbHBCcHh2SkpG?= =?utf-8?B?S21iTUNReWdBbnFLK1dLWHZzS3M4NWQ3bzcweWxqT3BuTERBOXRyeURHb3hJ?= =?utf-8?B?WmFjWUhpay84a2hhVFQrbWhTVkhEV3RwKzdqa2FCcjF4RTB6QUZjWUNIaUdL?= =?utf-8?B?TXk0cWNpQzJydVRpZGovaVViay9zSFp4N1dvU0ZFSzRyWmVnQ1VLZ0ROTFdV?= =?utf-8?B?NFMrV3hiVGtWYW1DOGx4eGFiZzdwWWxLTkhlOTZQamdaRW5DMWtCcHRTMjZG?= =?utf-8?B?WnQ0MGFjdnAvZm1tN3h1Z3hpaVhBSWhPbGVWcmVaM1FEemZKR3FDTE5PNUZR?= =?utf-8?B?R1pZTHorYUJSaXptSU9QNlhHc1VlaENYRHhJYzdwM2s4cGJHdEFBNkJndS83?= =?utf-8?B?NVFSV0FMa1RldHgzMjBUUENFUXlOYWNvVzZKSU5kV25lcUdKYi82VWZSRGJT?= =?utf-8?B?Z3VtYy9RVWtBT1B4YSsyblhLR1hPQzl4UDlPKys1dkpKSEgydVpNVk9BSDBx?= =?utf-8?B?c2lieWU4MnpKTHc2VHFuWGlnM2EvR1ZXbWk5YVRoa00yWVpOUHJlOW1Scms5?= =?utf-8?B?UWdKOEN5dzVQOENGRU5HV0pVeTlsSm5POWc4U2Z3amgxYW5VWTlXcXpHd3A2?= =?utf-8?B?MGt6NXdSdVNYaWFYNzJkLysyK3YwcG9xdlVTak5jMzZsREV5dzJkSXBwOHBI?= =?utf-8?B?QmZrV1FZM0dUN3plTEdKQjJXTk1FOVh4TGpwSjJYaEc3UFJHSy9uYncrZU9y?= =?utf-8?B?V3UwYmNsZkJUd0t6TGRLeUJ0WlptcC96VlBVV2J0Sm1tRkQ3VXFuLzlwOER3?= =?utf-8?B?S09GZlh3ZEo2YTl5WDBUUG0rc1hyVC82YVp4SE5ZTTZ1MGZGOVkzM0JwNmZK?= =?utf-8?B?TzdiVlZEVncycmJvT2Ruck9ROUplQTdyMjFZSGErejVycWV1NGt4SzdjVlZW?= =?utf-8?B?RmFNcU5wa05FN25rQTN0K2h5UGxIUUsyMytYZEFXYjUvdUE0aTBSa2JBM0hz?= =?utf-8?B?eUJZZUVCbnAyZC9WT3NvUml5RGZTMnRYT2dEN2NWb3J6RlB1bXoxbys5eXpV?= =?utf-8?B?NXA1VUQzVGoyVTExaGdwUFZNcWUwKzc2MTd1aFFvNWhheUxkbmRHY3NmdDl4?= =?utf-8?B?Z2N3VVRiQ3BRcm5MMk5iVWpxNlZieEZCakdxY3FkekplSERIeFBjdjM4SUxB?= =?utf-8?B?RVF0L243YjRoUHpIQ09qZ1cvak1hQVpYMi9PaDJGeXJtM0dsdGsycHdqZjVw?= =?utf-8?B?dzgxZ2lSaDR5WFIzSXdwTVV1bkdoRjg1Z2s2aFc5eFh2RUZUQmNOVCtyYXhx?= =?utf-8?B?L250UGsxSDlaYlM3OXU3QW43c2tqeUc4cVBGNUFxVlVoRGgwWlNXR0VBL0Qy?= =?utf-8?Q?Klzs=3D?= X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:satlexmb07.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(1800799024)(36860700013)(7416014)(376014)(82310400026);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 16 Oct 2025 16:38:07.8999 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 51648ba0-ac14-4ab5-676e-08de0cd2632f X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[satlexmb07.amd.com] X-MS-Exchange-CrossTenant-AuthSource: BL02EPF0001A105.namprd05.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA1PR12MB8700 Prepare for CMCI storm support by moving the common bank/block iterator code to a helper function. Include a parameter to switch the interrupt enable. This will be used by the CMCI storm handling function. Reviewed-by: Nikolay Borisov Signed-off-by: Yazen Ghannam --- Notes: Link: https://lore.kernel.org/r/20250908-wip-mca-updates-v6-13-eef5d6c74b9c@a= md.com =20 v6->v7: * Add tag from Nikolay. =20 v5->v6: * No change. =20 v4->v5: * No change. =20 v3->v4: * New in v4. arch/x86/kernel/cpu/mce/amd.c | 37 +++++++++++++++++++------------------ 1 file changed, 19 insertions(+), 18 deletions(-) diff --git a/arch/x86/kernel/cpu/mce/amd.c b/arch/x86/kernel/cpu/mce/amd.c index 29f777b404cc..dd485ebae267 100644 --- a/arch/x86/kernel/cpu/mce/amd.c +++ b/arch/x86/kernel/cpu/mce/amd.c @@ -471,6 +471,24 @@ static void threshold_restart_block(void *_tr) wrmsr(tr->b->address, lo, hi); } =20 +static void threshold_restart_bank(unsigned int bank, bool intr_en) +{ + struct threshold_bank **thr_banks =3D this_cpu_read(threshold_banks); + struct threshold_block *block, *tmp; + struct thresh_restart tr; + + if (!thr_banks || !thr_banks[bank]) + return; + + memset(&tr, 0, sizeof(tr)); + + list_for_each_entry_safe(block, tmp, &thr_banks[bank]->miscj, miscj) { + tr.b =3D block; + tr.b->interrupt_enable =3D intr_en; + threshold_restart_block(&tr); + } +} + static void mce_threshold_block_init(struct threshold_block *b, int offset) { struct thresh_restart tr =3D { @@ -814,24 +832,7 @@ static void amd_deferred_error_interrupt(void) =20 static void amd_reset_thr_limit(unsigned int bank) { - struct threshold_bank **bp =3D this_cpu_read(threshold_banks); - struct threshold_block *block, *tmp; - struct thresh_restart tr; - - /* - * Validate that the threshold bank has been initialized already. The - * handler is installed at boot time, but on a hotplug event the - * interrupt might fire before the data has been initialized. - */ - if (!bp || !bp[bank]) - return; - - memset(&tr, 0, sizeof(tr)); - - list_for_each_entry_safe(block, tmp, &bp[bank]->miscj, miscj) { - tr.b =3D block; - threshold_restart_block(&tr); - } + threshold_restart_bank(bank, true); } =20 /* --=20 2.51.0 From nobody Sun Feb 8 05:37:19 2026 Received: from CY3PR05CU001.outbound.protection.outlook.com (mail-westcentralusazon11013042.outbound.protection.outlook.com [40.93.201.42]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 8CEA63570A8; Thu, 16 Oct 2025 16:38:14 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=fail smtp.client-ip=40.93.201.42 ARC-Seal: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1760632696; cv=fail; b=ukXWSmSeLHlDZhiNOuC69N629aqSaDxhv8mDobK0hDTCSKYwMGJAz5YiWUDmcxmJFW6OEim0DhnAITOHLJSnKPMyOR001SIF/7aO41Qd5GAafDf49GFM7OJFV31vllp/lHln0rJySh9MGkz1SA52TEzzgaj3HrN5/vtzdycg9iQ= ARC-Message-Signature: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1760632696; c=relaxed/simple; bh=Cuw2W5NwkF2apjF9NSlMRtmhKI/Wt/FfKutq7NkQS8g=; h=From:Date:Subject:MIME-Version:Content-Type:Message-ID:References: In-Reply-To:To:CC; b=hlRAqBgeUatJ0t7+1mhNeFFoe09WUxUb+EELh4pylXMNvM/+8ifDXgXvg+Jg3a9D7Xz4L/UyqymtBRB/qv1A7WEwsB84L4EMVbPx/HB+iyK4nPq1R0s+xfm1ILjbXIZYxtS7LTXTmcKNngEJMD0Ymf/CXLwPKzIGaSNGq6xduaQ= ARC-Authentication-Results: i=2; smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=amd.com; spf=fail smtp.mailfrom=amd.com; dkim=pass (1024-bit key) header.d=amd.com header.i=@amd.com header.b=YQYAqq5v; arc=fail smtp.client-ip=40.93.201.42 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=amd.com Authentication-Results: smtp.subspace.kernel.org; spf=fail smtp.mailfrom=amd.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=amd.com header.i=@amd.com header.b="YQYAqq5v" ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=NsssZsCF2vrRMz43OkkD2yt0HAXkHReEkP4f0FQZBDrJw5VlboJxAGswnkROMLbBm7WkjbNo+X+MC8nr2ED5yplTKVl88qqyBhoQVyqwpkmkdf8C2hAyDaIy0k7rqrBVSyY6oysGNFG+Gw/jk7v71L84Y469x2f8jEm1Xu2wPuxlo0sZYm+uiMKZduxX7XQu+/4K2ZhOKn3G+ehPQCG8apTA22hpOzd7x4fk2yJeK/lZG8PNs+M9JMJuhh71zTOmMwfvhNQs/QFuT9qPMTzflFEq5fEVLybQ37cwu53bQRNy6vUytCVqVck5L+N6HoZ9EAFkU0pNtdvFGx7jg6G+Ww== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=B+WYcjqNBgZOeQiXCL0KmcD9fwUq2cdb5M8IAO+O0VE=; b=IGXJvjF773ML+OBLScA6IMCZkeM3vKjpy/kHxEiir/Q5uFg5Cuz6vJDUpQUYOK4sRViO3UhuiyBWM0QwDgoRuqneq4xvuS2uhcCnIrL5ua1OhrEpndzvH24YemTAUVtojB3LdyJp5fRNQxZaF4qiTGAMIj7Q/iQ+eRnwYHagT+WSKKwgxJrn3S/dKjtODbmrZk4Yi3QBCI1IrOvgswQFHhJMXtEjfnCqzuYwuoY/BmwlvtZQdpLMwdUw2HMmu+ekjkrF7sRtOwLyTWrjhc/sjOhwzeZbm4GlXk+r0Suyv7G7+2hP3/l4IzvoxZUfMCQtd9rdICwJgcEKlYFM+K7Lyg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=vger.kernel.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=B+WYcjqNBgZOeQiXCL0KmcD9fwUq2cdb5M8IAO+O0VE=; b=YQYAqq5vdPYG/M2hnjzGn/2kWnhs4hi4xhpEN7Smqt5QaVU/zVh/1elndTMgeP7OxR31KCwMiY9ljkX/7dUOMkerrKc1AudjwsItobKytAbawZiH//jtOC9W/sDynHmZmeG9kzi3MNO2Hz1janmz1+ihX5ofqVSSAqkW9qcY1k0= Received: from BL1PR13CA0146.namprd13.prod.outlook.com (2603:10b6:208:2bb::31) by IA1PR12MB6258.namprd12.prod.outlook.com (2603:10b6:208:3e6::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9228.11; Thu, 16 Oct 2025 16:38:08 +0000 Received: from BL02EPF0001A104.namprd05.prod.outlook.com (2603:10b6:208:2bb:cafe::ef) by BL1PR13CA0146.outlook.office365.com (2603:10b6:208:2bb::31) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9253.5 via Frontend Transport; Thu, 16 Oct 2025 16:38:08 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=satlexmb07.amd.com; pr=C Received: from satlexmb07.amd.com (165.204.84.17) by BL02EPF0001A104.mail.protection.outlook.com (10.167.241.135) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9228.7 via Frontend Transport; Thu, 16 Oct 2025 16:38:07 +0000 Received: from [127.0.1.1] (10.180.168.240) by satlexmb07.amd.com (10.181.42.216) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.17; Thu, 16 Oct 2025 09:38:03 -0700 From: Yazen Ghannam Date: Thu, 16 Oct 2025 16:37:52 +0000 Subject: [PATCH v7 7/8] x86/mce: Handle AMD threshold interrupt storms Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Message-ID: <20251016-wip-mca-updates-v7-7-5c139a4062cb@amd.com> References: <20251016-wip-mca-updates-v7-0-5c139a4062cb@amd.com> In-Reply-To: <20251016-wip-mca-updates-v7-0-5c139a4062cb@amd.com> To: , Tony Luck , "Rafael J. Wysocki" , Len Brown CC: , , , Qiuxu Zhuo , Nikolay Borisov , Bert Karwatzki , , Yazen Ghannam X-Mailer: b4 0.15-dev-9b767 X-ClientProxiedBy: satlexmb07.amd.com (10.181.42.216) To satlexmb07.amd.com (10.181.42.216) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: BL02EPF0001A104:EE_|IA1PR12MB6258:EE_ X-MS-Office365-Filtering-Correlation-Id: 93013b30-22c0-4251-5ab7-08de0cd26333 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|376014|7416014|1800799024|82310400026|36860700013; X-Microsoft-Antispam-Message-Info: =?utf-8?B?dTV2ZXpiZXNyNWhyL0xGRVV0K0tWZm9OOUdXOXkvRHpoOVRaRitQaGYvYTFN?= =?utf-8?B?TmVEaG1jNVNnaHRuUlhoMmxtRG5EUWVScElHVWMzbXFiSGZnOVF1NENnckZQ?= =?utf-8?B?L3FHL2hFdkp4UTk4WlZBVkl1c2xzcUdZN25uUXI1Q2NINjQ1UFhhRm9GV0M3?= =?utf-8?B?RGRoa2dPTWY2N2ZDRDZhVkNETGFYV3prVWRyY0lheEhIck5OMG1MS21VTHNi?= =?utf-8?B?ZlpCaEc1SEFNcm5xclJ3Z0hmM1Q2bU9Nc0xDZHhHQ0s0WU5FbldlQkMwUzky?= =?utf-8?B?SDBSWlRHWUNKbXl2Y2hlRmEzQXV4VEh4SUZXT21pc0krYVNSTVl5eG1GUTBU?= =?utf-8?B?NVAvVkpvY3JwR2tkK3FBRS85VFpidloxcUtGLzhsd1U1a29pemc2L2NDL1dm?= =?utf-8?B?b3llWVhSVlVOM09BL0dvc2dZYXJReEJ6Z1FXUlJzZ1BUTnFhTGdGSDVXd2hz?= =?utf-8?B?MU50aWNuTmVBTzBTYTNLNUwwUjZhVzFPZzc1WmZmaU4yT1lVdnNoOXpqM1Np?= =?utf-8?B?dHR2S0VacElINE0xdHR2L0RlUUlkZ0NvUXIvNXE4TEZaTmd2NWRqN0lGVE16?= =?utf-8?B?eUoyY2NSS29CazFFdjAzYk42VHRyN01FbXR4SHJhcFVmekxyMk0yL1c3Sm5T?= =?utf-8?B?d1k2enRYWE5nU1pHUDUyT1o5Q2VucHpQeEtNWlpqZjRqTjBwVEV0VjA5RTZJ?= =?utf-8?B?L2grZXNXNVhBUUEvcDZDMVdEUVZEZWNVVlI4Snh1ZngzQnp3blROUXNsQmQ5?= =?utf-8?B?Z2srOHprL2hpR05QMjNWSjhMNzg4NXNBT0MyL214MDN1WWNIWkhKbVRSREgw?= =?utf-8?B?czJ1bFJjcVQxNVhJVjVvUmUxcnJnS3cvUy9QOGJiako3NWFiaGRCMkdscmU5?= =?utf-8?B?WEtIWTV6VTFYaDNCYmx2MjVsbzZCZmd2MlNMVzg3OXRFcXJQMHVXMXFQbFZK?= =?utf-8?B?RmVVUkNyZ0NSa0Jhc1dKZkxicWc2NzNveVVmanJQMFV3dlpaWDlDY3phYVlI?= =?utf-8?B?emNIS3B4RmpuNit6VUlQK2dnVDFjR3pXNUl3dWxkTkVJUFcyWXRTalpOOFQ1?= =?utf-8?B?YkE3b1p4YVVQZzZlSWdQVnlubDkvOFUvbGN2Y3kxanB2Vm5BVmFHLzRWUy94?= =?utf-8?B?WGdJeEtXNmkvblR4WFpXejJJUUJBVVFMNVIvQnd4WEJjdG1SZ2xxUHRaNmN5?= =?utf-8?B?MkRyZVRORUwweE1pWU1EOFZEQ3k3NDl1Q2o5N3ZPbkFGQzNSKzRTZnFhZDEy?= =?utf-8?B?cEZCK3ppb3hHQjB4ODZtVkplc2dIajVGRC9lRmJjTGVwbktUV0dORWxXU2tD?= =?utf-8?B?MXhyYyt0NXZYUGpzL21CamU0YkJBVFFYMzYyc1FKUHo5M0NZRFd6RWcrK1Mr?= =?utf-8?B?MFlRT0pXVzRFZEFPQkpJbXBuYjNndFFVQkFaUDgxWURna1EzRlpYMnhVWW1Y?= =?utf-8?B?NHBnZDBSVWV1c2xXYVNHeC9tUHVKcFZhYTZ1OUdYVVFzT2pUM05DVElWUDN0?= =?utf-8?B?WFVjcFhhcGthN01YOUQ5amJRdU4wblAxaDNRREZ3ajlQZ3orWDRVb3E1OFNj?= =?utf-8?B?MFJld3ZyK2pCRDg4Uzl0MGw2aktFWExObEhkaXV0dXdyN1hHV1FLYVlmQ2Ns?= =?utf-8?B?M0RZYlBIaEt3b2VBc3dtRFFGdzliNTNhR0x2TDBBYUhpOVR0M255VUI3T05W?= =?utf-8?B?alE5SEVUN3ZXZWEreFdCRU83NEE2dkcwVGVHajh3VkxxbXJEMEV3UjFwTThC?= =?utf-8?B?VzNVZHVOeE8ydENiSTQ4ZHU4QjBQaEJSSVo0RTNDNXdIYmYvdFNWWG94NUJR?= =?utf-8?B?eUQ0c0JrdHE5dlQ3bkJKbThsdTdWK2pITHkzVFl1YlhUQWVxeHd2Y3cxK2FQ?= =?utf-8?B?VGJ5cjJRYS9BNFRoMW8wd29sUTEvaU04Vy8rSS9jakFzLzlsaDN6QW1aR084?= =?utf-8?B?RG1oWU5iNHIzL09NSmU5enhDL2RPVlRoOU1rSVgzZTVjVEcrOHIrODY2SUVk?= =?utf-8?B?MzF1c2UyN1VFcVVFTFEvQkc0WGVqWUhWMS9MMmhMK0xwZ1RqS2VHVXlNS2xR?= =?utf-8?B?RjFqRHZ3U1ZCZTlvMUF2QTU1SENWam5oL2hVbjdpRjdFc2tSQ1g5UDExN0Rh?= =?utf-8?Q?a2XU=3D?= X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:satlexmb07.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(376014)(7416014)(1800799024)(82310400026)(36860700013);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 16 Oct 2025 16:38:07.9550 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 93013b30-22c0-4251-5ab7-08de0cd26333 X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[satlexmb07.amd.com] X-MS-Exchange-CrossTenant-AuthSource: BL02EPF0001A104.namprd05.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: IA1PR12MB6258 From: Smita Koralahalli Extend the logic of handling CMCI storms to AMD threshold interrupts. Rely on the similar approach as of Intel's CMCI to mitigate storms per CPU and per bank. But, unlike CMCI, do not set thresholds and reduce interrupt rate on a storm. Rather, disable the interrupt on the corresponding CPU and bank. Re-enable back the interrupts if enough consecutive polls of the bank show no corrected errors (30, as programmed by Intel). Turning off the threshold interrupts would be a better solution on AMD systems as other error severities will still be handled even if the threshold interrupts are disabled. Also, AMD systems currently allow banks to be managed by both polling and interrupts. So don't modify the polling banks set after a storm ends. [Tony: Small tweak because mce_handle_storm() isn't a pointer now] [Yazen: Rebase and simplify] Reviewed-by: Qiuxu Zhuo Signed-off-by: Smita Koralahalli Signed-off-by: Tony Luck Signed-off-by: Yazen Ghannam --- Notes: Link: https://lore.kernel.org/r/20250908-wip-mca-updates-v6-14-eef5d6c74b9c@a= md.com =20 v6->v7: * Don't modify polling banks. =20 v5->v6: * No change. =20 v4->v5: * No change. =20 v3->v4: * Simplify based on new patches in this set. =20 v2->v3: * Add tag from Qiuxu. =20 v1->v2: * New in v2, but based on older patch. * Rebased on current set and simplified. * Kept old tags. arch/x86/kernel/cpu/mce/amd.c | 5 +++++ arch/x86/kernel/cpu/mce/internal.h | 2 ++ arch/x86/kernel/cpu/mce/threshold.c | 6 +++++- 3 files changed, 12 insertions(+), 1 deletion(-) diff --git a/arch/x86/kernel/cpu/mce/amd.c b/arch/x86/kernel/cpu/mce/amd.c index dd485ebae267..7020c5ad4c74 100644 --- a/arch/x86/kernel/cpu/mce/amd.c +++ b/arch/x86/kernel/cpu/mce/amd.c @@ -830,6 +830,11 @@ static void amd_deferred_error_interrupt(void) machine_check_poll(MCP_TIMESTAMP | MCP_DFR, &this_cpu_ptr(&mce_amd_data)-= >dfr_intr_banks); } =20 +void mce_amd_handle_storm(unsigned int bank, bool on) +{ + threshold_restart_bank(bank, on); +} + static void amd_reset_thr_limit(unsigned int bank) { threshold_restart_bank(bank, true); diff --git a/arch/x86/kernel/cpu/mce/internal.h b/arch/x86/kernel/cpu/mce/i= nternal.h index b0e00ec5cc8c..9920ee5fb34c 100644 --- a/arch/x86/kernel/cpu/mce/internal.h +++ b/arch/x86/kernel/cpu/mce/internal.h @@ -267,6 +267,7 @@ void mce_prep_record_per_cpu(unsigned int cpu, struct m= ce *m); #ifdef CONFIG_X86_MCE_AMD void mce_threshold_create_device(unsigned int cpu); void mce_threshold_remove_device(unsigned int cpu); +void mce_amd_handle_storm(unsigned int bank, bool on); extern bool amd_filter_mce(struct mce *m); bool amd_mce_usable_address(struct mce *m); void amd_clear_bank(struct mce *m); @@ -299,6 +300,7 @@ void smca_bsp_init(void); #else static inline void mce_threshold_create_device(unsigned int cpu) { } static inline void mce_threshold_remove_device(unsigned int cpu) { } +static inline void mce_amd_handle_storm(unsigned int bank, bool on) { } static inline bool amd_filter_mce(struct mce *m) { return false; } static inline bool amd_mce_usable_address(struct mce *m) { return false; } static inline void amd_clear_bank(struct mce *m) { } diff --git a/arch/x86/kernel/cpu/mce/threshold.c b/arch/x86/kernel/cpu/mce/= threshold.c index f4a007616468..22930a8fcf9e 100644 --- a/arch/x86/kernel/cpu/mce/threshold.c +++ b/arch/x86/kernel/cpu/mce/threshold.c @@ -63,6 +63,9 @@ static void mce_handle_storm(unsigned int bank, bool on) case X86_VENDOR_INTEL: mce_intel_handle_storm(bank, on); break; + case X86_VENDOR_AMD: + mce_amd_handle_storm(bank, on); + break; } } =20 @@ -85,7 +88,8 @@ void cmci_storm_end(unsigned int bank) { struct mca_storm_desc *storm =3D this_cpu_ptr(&storm_desc); =20 - __clear_bit(bank, this_cpu_ptr(mce_poll_banks)); + if (!mce_flags.amd_threshold) + __clear_bit(bank, this_cpu_ptr(mce_poll_banks)); storm->banks[bank].history =3D 0; storm->banks[bank].in_storm_mode =3D false; =20 --=20 2.51.0 From nobody Sun Feb 8 05:37:19 2026 Received: from SJ2PR03CU001.outbound.protection.outlook.com (mail-westusazon11012042.outbound.protection.outlook.com [52.101.43.42]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 4A75A3570A1; Thu, 16 Oct 2025 16:38:14 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=fail smtp.client-ip=52.101.43.42 ARC-Seal: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1760632696; cv=fail; b=hPrVfIWFvCkIoQaMcWWljrNTuU0q8uC1pm+gZZ0FPDg0yWUjRyITEeNZgsnwDlYas5YvRUGPGlS+2TZq7nFZF7Mho0CuAg/NbYrG7eM3ocPV84+PG7PAU1z63XjaJqzWGCtcmsE4I3dbGM23OE3hONyb6tEW1tj+m4hBJZSRQoA= ARC-Message-Signature: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1760632696; c=relaxed/simple; bh=SoVE4yowg55cmVkEzip3CHbbj//sKTSawmYPq02Srlk=; h=From:Date:Subject:MIME-Version:Content-Type:Message-ID:References: In-Reply-To:To:CC; b=STUCzBYv0nSVIlz8+aSDAlM82Gvtp5ualloi7TaYDfPhTHg/eujDPfAUJ371J6dpxhTGatRcREjzNQ5BLvBj4BaDSAm9Dlu6AYxYhWL3YxkyUnzo3E0LMoOrmBlB4ZpZe3U5OXRJFwviR6dGu+NUaIuhgUHHYzK1JEB0OLLSkN8= ARC-Authentication-Results: i=2; smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=amd.com; spf=fail smtp.mailfrom=amd.com; dkim=pass (1024-bit key) header.d=amd.com header.i=@amd.com header.b=ycRUAkB5; arc=fail smtp.client-ip=52.101.43.42 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=amd.com Authentication-Results: smtp.subspace.kernel.org; spf=fail smtp.mailfrom=amd.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=amd.com header.i=@amd.com header.b="ycRUAkB5" ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=Y4mK3jOwFzRHSVpOnisiPuz7tkhWlB30/P6kwIqWBZrcn0Mc0mVOhHQXBWvo5CdvJEQANKYJIbZJR2DKxkEWd9nqpJx81RoTQSz4DoUs3PTNGrIDXRxQhgKuMgkFsq+1AkbuNbinV7d/dfGoTjUhe+1AwyTJl7Ve8iL3LlU6vZPHN4sVwb/+btFze5E6VKOk2mJDdjXVrsipO3E9ULEsjvz65U3dD+kWUKkbS5YKShUsOXcQ6GRMpvWa4JtiDIJNT1ctXoE/1jHwMfFD6fzRZiaAKf76bK6prgTHugA8WohyXHNxsC8n8NuTjSXHrhAWPKhCj5ebdd3b6Q2Q5cnyHg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=ZFA4GWGiwqxAAslG5gXRD25P/3iZzSuEFIrhQewPRVc=; b=ZJTryON6E4kTsxPOecal1YzZbT0yENzjpQ96qmqgGKT7qPcbgZhFxWpDJztPgEmao546xX1yhcghDmXkV2Yi5K47JgmiFXQcBZJ4aJ/zIyuBw9SzCWHhfELu6pkHAwiG0JTO6DLC8tl5eXQdDUE5/5Z1jyOJyQ2k0EZiICZ2owcoxdTxqeddAPFlhkNssY9YcZhfeEKr6FWNzZlBkMyjR0g2hoy4In11S/QrCryntoPxRRvKQeIpzhZvX2nSzafhhoQrL6M1dQH/LSis5vReEowzMKKFzKZD9/1JgfEHusDRQPVODjcMHY0xrmUGfQhLPk24bieM9Imp5CzDLOLQCA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=vger.kernel.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ZFA4GWGiwqxAAslG5gXRD25P/3iZzSuEFIrhQewPRVc=; b=ycRUAkB5lMh4emZNyfRyCGhaamjQsS9e5XR7RjbW+mRchAPGa6QdtgsFGN+2pQLnOHmSVdvD3/mdzO7OBD0NK+298/Y6yLf6l6q4RtVU1FvmlMhZr00M0DV9qk0xVNh5st7lP8i2MBnBdkgwPyUTgL3v2M8ZfLYwVOBZIwa0l2w= Received: from BLAP220CA0028.NAMP220.PROD.OUTLOOK.COM (2603:10b6:208:32c::33) by BL1PR12MB5804.namprd12.prod.outlook.com (2603:10b6:208:394::5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9228.13; Thu, 16 Oct 2025 16:38:08 +0000 Received: from BL02EPF0001A105.namprd05.prod.outlook.com (2603:10b6:208:32c:cafe::26) by BLAP220CA0028.outlook.office365.com (2603:10b6:208:32c::33) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9203.10 via Frontend Transport; Thu, 16 Oct 2025 16:37:53 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=satlexmb07.amd.com; pr=C Received: from satlexmb07.amd.com (165.204.84.17) by BL02EPF0001A105.mail.protection.outlook.com (10.167.241.137) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9228.7 via Frontend Transport; Thu, 16 Oct 2025 16:38:08 +0000 Received: from [127.0.1.1] (10.180.168.240) by satlexmb07.amd.com (10.181.42.216) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.17; Thu, 16 Oct 2025 09:38:04 -0700 From: Yazen Ghannam Date: Thu, 16 Oct 2025 16:37:53 +0000 Subject: [PATCH v7 8/8] x86/mce: Save and use APEI corrected threshold limit Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Message-ID: <20251016-wip-mca-updates-v7-8-5c139a4062cb@amd.com> References: <20251016-wip-mca-updates-v7-0-5c139a4062cb@amd.com> In-Reply-To: <20251016-wip-mca-updates-v7-0-5c139a4062cb@amd.com> To: , Tony Luck , "Rafael J. Wysocki" , Len Brown CC: , , , Qiuxu Zhuo , Nikolay Borisov , Bert Karwatzki , , Yazen Ghannam X-Mailer: b4 0.15-dev-9b767 X-ClientProxiedBy: satlexmb07.amd.com (10.181.42.216) To satlexmb07.amd.com (10.181.42.216) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: BL02EPF0001A105:EE_|BL1PR12MB5804:EE_ X-MS-Office365-Filtering-Correlation-Id: fdd60ba1-09c5-4279-2d01-08de0cd26379 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|82310400026|376014|7416014|1800799024|36860700013|13003099007; X-Microsoft-Antispam-Message-Info: =?utf-8?B?OTYvTlRINCs3TU9COWtpMGVuYUZ0TVhtTFpwVTZTeHZiWC9QSzdnQU1QT2pv?= =?utf-8?B?Q2hYbnR3WVVIdUVoMkozeFdJOWRob2dMUStYTmpTNmVobUVwKzVVeUsxM3J3?= =?utf-8?B?eGZpeWZnUVdOeXBCVkJkZmdjUzBJQXRTT3VvWUdab3BvZytrRDVQWTE1ci8x?= =?utf-8?B?cmtQWC9PQVFmSUVzV2JIWXF2QW4vZ2hRMEh6NndrY2g3RVQ0cWhGY3VWWU52?= =?utf-8?B?M0xkRUlIaDJpSys4ajRxZUloNWxZYnJ4c0ZUQ01sUm1RTlpvcURwZGg0MFEz?= =?utf-8?B?Vk9SMUo1WFdBVVdGOUxnb215cjFuaHJMWi9uaTlETWlYdTBYN1I5Q1JQR0xy?= =?utf-8?B?aHBMNzdVT0RsZnE4Nk9vcUJqZ1NJdWhjMWJQeVNjNlFmeUN1Zy9Cay9xaTVX?= =?utf-8?B?NGYwZWhkS28rOWgwYVFLODBlVHpCUU9DaFhlbWczcnVQSVZBclJTREluZDh1?= =?utf-8?B?cWFzWXFmVC9kYmVpZ05mcm00Qmx3b0NPOXR2L0tyN2hBQnU1dk51NUpUS1cy?= =?utf-8?B?STdsTkJrcWt4OUY5bGlTSmRqTXZhbjFxVndYVTh4K2dCVDlYcG5wdFNFaXQw?= =?utf-8?B?RTNVV01BTVhDYmd5aEdwSUxWQUJuL2VXUzhkaXhJZVZpZmtFTUNkTjNob0F5?= =?utf-8?B?bGdQSnh5ZXpQbk5BVStqTkpJbGVmU0p1dWVqLzZqazVoQlEvNXVQcFlNVTZz?= =?utf-8?B?SC9sRVFtaUNMR0hCMGU4UGxMRk00ZXZoREZoZ2EvT1JXQkFhWWN2UjAyYXB0?= =?utf-8?B?OFFhZkp5TGJqVHFnYktjSmdSRVJ6cWd3NTBLYjdteU1STU1Majk1bm9ycVRt?= =?utf-8?B?Wks1UjM3bGdOZk12aCtCR0g4aVNXTGxqQ01rU0J6eC9HWVh4S0JsVDRKaEo5?= =?utf-8?B?cjRiaUdFa3NoZW9LQ1FFNG9jdWtiVkhhTEJJWmhRcW1aYlVkTkxEVHZEbUky?= =?utf-8?B?RVZUVSs0Si9zRHpNY0lmLzR1eWI0VmROZ0hzTFBMK1NQWXVPNUhSM0JMR1pl?= =?utf-8?B?RzNqZGRnVG5qSW1scTZJZEg1WVZiT3p0QmtIaUlwQm5mbFU2K2ppbEs2YkxQ?= =?utf-8?B?WE1KUFlsSUJ0MVNZMytKZkZWWG42QkpZZHFNencxbjk2bExrNDYwVlZ0bUhw?= =?utf-8?B?RWF1LzR1NmdoNGhoeFBUeXlnWXRpL2Q4M3dWaFNNRG05Q054Y1hyLzhTY2U2?= =?utf-8?B?aDg5S1NOVE95SG5JNnhadGw2NzY5d0VJWkRxNy9nM00wYi9QWGZmMnBTcmc1?= =?utf-8?B?ekhPR08rSkFNQUNlc2E3aStTZUlMVkh0bUttNG1lUWl6azlvakNLbmRBcjBk?= =?utf-8?B?b3QxQWFHRGxRWDFhZVlhMHZpb1ptWC9iM2VXL3VWNU9aVDR6S3c3TkpNL2li?= =?utf-8?B?K0ZPYngvME9ySG1hc3ZsQnlsMlplNVBjS3ZYWDJ0S3c2WVlRUWM2UFArR3RX?= =?utf-8?B?RW1qUnZkL0I0Zi9JK2V5dStCZm5kRGFxQnVXU3l1V2lRUE5VcjR4Z01UbnRQ?= =?utf-8?B?eG55b1JPbUZyV1pZanZPeDdSNFhzbGMvME1tZzdTSmlNN2tBNmtrdEdPbFYz?= =?utf-8?B?K1Y4RWhiOGxyL1hkWGl4czdidFNYZjJIQUVVTnU5eW8wZTM4a0MxditLbEo2?= =?utf-8?B?MFpCTzJaL1lrekpSQ3pDVGIxb1E1L3Q0b1QxTjYzeXhhbHZxcTlXWnpJaUhX?= =?utf-8?B?V2NDVkJ5UVMwMVAzZDRrRzQ0MDNJRlZLb2NlWmRqWVdTQXNEY2pnK0ppWFlC?= =?utf-8?B?MXFES0Rvakg0ZG9jVmNleDEyZjBESXZJNkxWclJNZW1JVVhwc1RzNkNRQlll?= =?utf-8?B?MjRlaUlobExxRE5YWEJQd0lOZXZqZVZwWXVDQlA5cTJ3cTJpbFhHM3JZOS9B?= =?utf-8?B?d2d1T1JzMHZ0cEtSbDVzdVBxRmZyZThiOTQrNk9PcjBBL2EwWDgwMWRFZldY?= =?utf-8?B?RjhqU2RxNjJFaDhzckNlMGg3VDJ4dXB1L0JXdVorOGhBZnc0L1k4cDBVMnZ0?= =?utf-8?B?SGhLUWRaUXJjV1lrNitSQnVZVi95NlRRM2NKYStvV1poSVdTTFBWMTRjNTJa?= =?utf-8?B?SGFkdjB0dGJaYzNKL0dNVEJHaFpsVVAxd3VMN0FZUVlyTUhKQWwrck9Bb0Vp?= =?utf-8?Q?3BdQ=3D?= X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:satlexmb07.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(82310400026)(376014)(7416014)(1800799024)(36860700013)(13003099007);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 16 Oct 2025 16:38:08.4282 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: fdd60ba1-09c5-4279-2d01-08de0cd26379 X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[satlexmb07.amd.com] X-MS-Exchange-CrossTenant-AuthSource: BL02EPF0001A105.namprd05.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL1PR12MB5804 The MCA threshold limit generally is not something that needs to change during runtime. It is common for a system administrator to decide on a policy for their managed systems. If MCA thresholding is OS-managed, then the threshold limit must be set at every boot. However, many systems allow the user to set a value in their BIOS. And this is reported through an APEI HEST entry even if thresholding is not in FW-First mode. Use this value, if available, to set the OS-managed threshold limit. Users can still override it through sysfs if desired for testing or debug. APEI is parsed after MCE is initialized. So reset the thresholding blocks later to pick up the threshold limit. Signed-off-by: Yazen Ghannam --- Notes: Link: https://lore.kernel.org/r/20250908-wip-mca-updates-v6-15-eef5d6c74b9c@a= md.com =20 v6->v7: * No change. =20 v5->v6: * No change. =20 v4->v5: * No change. =20 v3->v4: * New in v4. arch/x86/include/asm/mce.h | 6 ++++++ arch/x86/kernel/acpi/apei.c | 2 ++ arch/x86/kernel/cpu/mce/amd.c | 18 ++++++++++++++++-- arch/x86/kernel/cpu/mce/internal.h | 2 ++ arch/x86/kernel/cpu/mce/threshold.c | 13 +++++++++++++ 5 files changed, 39 insertions(+), 2 deletions(-) diff --git a/arch/x86/include/asm/mce.h b/arch/x86/include/asm/mce.h index 1482648c8508..9652fc11860d 100644 --- a/arch/x86/include/asm/mce.h +++ b/arch/x86/include/asm/mce.h @@ -309,6 +309,12 @@ DECLARE_PER_CPU(struct mce, injectm); /* Disable CMCI/polling for MCA bank claimed by firmware */ extern void mce_disable_bank(int bank); =20 +#ifdef CONFIG_X86_MCE_THRESHOLD +void mce_save_apei_thr_limit(u32 thr_limit); +#else +static inline void mce_save_apei_thr_limit(u32 thr_limit) { } +#endif /* CONFIG_X86_MCE_THRESHOLD */ + /* * Exception handler */ diff --git a/arch/x86/kernel/acpi/apei.c b/arch/x86/kernel/acpi/apei.c index 0916f00a992e..e21419e686eb 100644 --- a/arch/x86/kernel/acpi/apei.c +++ b/arch/x86/kernel/acpi/apei.c @@ -19,6 +19,8 @@ int arch_apei_enable_cmcff(struct acpi_hest_header *hest_= hdr, void *data) if (!cmc->enabled) return 0; =20 + mce_save_apei_thr_limit(cmc->notify.error_threshold_value); + /* * We expect HEST to provide a list of MC banks that report errors * in firmware first mode. Otherwise, return non-zero value to diff --git a/arch/x86/kernel/cpu/mce/amd.c b/arch/x86/kernel/cpu/mce/amd.c index 7020c5ad4c74..83fad4503b1c 100644 --- a/arch/x86/kernel/cpu/mce/amd.c +++ b/arch/x86/kernel/cpu/mce/amd.c @@ -489,6 +489,18 @@ static void threshold_restart_bank(unsigned int bank, = bool intr_en) } } =20 +/* Try to use the threshold limit reported through APEI. */ +static u16 get_thr_limit(void) +{ + u32 thr_limit =3D mce_get_apei_thr_limit(); + + /* Fallback to old default if APEI limit is not available. */ + if (!thr_limit) + return THRESHOLD_MAX; + + return min(thr_limit, THRESHOLD_MAX); +} + static void mce_threshold_block_init(struct threshold_block *b, int offset) { struct thresh_restart tr =3D { @@ -497,7 +509,7 @@ static void mce_threshold_block_init(struct threshold_b= lock *b, int offset) .lvt_off =3D offset, }; =20 - b->threshold_limit =3D THRESHOLD_MAX; + b->threshold_limit =3D get_thr_limit(); threshold_restart_block(&tr); }; =20 @@ -1076,7 +1088,7 @@ static int allocate_threshold_blocks(unsigned int cpu= , struct threshold_bank *tb b->address =3D address; b->interrupt_enable =3D 0; b->interrupt_capable =3D lvt_interrupt_supported(bank, high); - b->threshold_limit =3D THRESHOLD_MAX; + b->threshold_limit =3D get_thr_limit(); =20 if (b->interrupt_capable) { default_attrs[2] =3D &interrupt_enable.attr; @@ -1087,6 +1099,8 @@ static int allocate_threshold_blocks(unsigned int cpu= , struct threshold_bank *tb =20 list_add(&b->miscj, &tb->miscj); =20 + mce_threshold_block_init(b, (high & MASK_LVTOFF_HI) >> 20); + err =3D kobject_init_and_add(&b->kobj, &threshold_ktype, tb->kobj, get_na= me(cpu, bank, b)); if (err) goto out_free; diff --git a/arch/x86/kernel/cpu/mce/internal.h b/arch/x86/kernel/cpu/mce/i= nternal.h index 9920ee5fb34c..a31cf984619c 100644 --- a/arch/x86/kernel/cpu/mce/internal.h +++ b/arch/x86/kernel/cpu/mce/internal.h @@ -67,6 +67,7 @@ void mce_track_storm(struct mce *mce); void mce_inherit_storm(unsigned int bank); bool mce_get_storm_mode(void); void mce_set_storm_mode(bool storm); +u32 mce_get_apei_thr_limit(void); #else static inline void cmci_storm_begin(unsigned int bank) {} static inline void cmci_storm_end(unsigned int bank) {} @@ -74,6 +75,7 @@ static inline void mce_track_storm(struct mce *mce) {} static inline void mce_inherit_storm(unsigned int bank) {} static inline bool mce_get_storm_mode(void) { return false; } static inline void mce_set_storm_mode(bool storm) {} +static inline u32 mce_get_apei_thr_limit(void) { return 0; } #endif =20 /* diff --git a/arch/x86/kernel/cpu/mce/threshold.c b/arch/x86/kernel/cpu/mce/= threshold.c index 22930a8fcf9e..ae27911de26d 100644 --- a/arch/x86/kernel/cpu/mce/threshold.c +++ b/arch/x86/kernel/cpu/mce/threshold.c @@ -13,6 +13,19 @@ =20 #include "internal.h" =20 +static u32 mce_apei_thr_limit; + +void mce_save_apei_thr_limit(u32 thr_limit) +{ + mce_apei_thr_limit =3D thr_limit; + pr_info("HEST: Corrected error threshold limit =3D %u\n", thr_limit); +} + +u32 mce_get_apei_thr_limit(void) +{ + return mce_apei_thr_limit; +} + static void default_threshold_interrupt(void) { pr_err("Unexpected threshold interrupt at vector %x\n", --=20 2.51.0