From nobody Tue Apr 30 00:55:56 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=pass(p=none dis=none) header.from=suse.com ARC-Seal: i=1; a=rsa-sha256; t=1601042897; cv=none; d=zohomail.com; s=zohoarc; b=MRhCWVzbgq84+DPs17Sy3Fqp+D66orN2DVZxd8LREpxpTprxn/lJ9XBNasaBlViKCNtbjsa/mrzAJVam+FTJS/1xCs2gjFlf1FMQP+Hxudq0w7pYDWNfGzPHGtRztVgrT3lw2nHf5QwRWTIRO3RVjxXeLcAf9QxS74v6VYP5h/0= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1601042897; h=Content-Transfer-Encoding:Cc:Date:From:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:Sender:Subject:To; bh=0bb+VXJKXkSVXRXN2wKoX5N5IGTNG4/vY2hQ3WdHPGU=; b=EHEJdi+jqE9vurQn8MubbeS+lWZUZNVHQQvbLS2bvu+a60ezZwr72rZiCTdpjHW3hV6bkYPghr9RFPSq899hdTM2OyAOw9DejQBH8TAxfVM+5+imst3hSD7ttStzrDWWWKv9c9hxppEEreuqm3Ow+8b1t7RPnh7UOS9sMV2RDf0= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=pass header.from= (p=none dis=none) header.from= Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1601042897882893.7300446421697; Fri, 25 Sep 2020 07:08:17 -0700 (PDT) Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1kLoOC-0003En-5S; Fri, 25 Sep 2020 14:07:56 +0000 Received: from all-amaz-eas1.inumbo.com ([34.197.232.57] helo=us1-amaz-eas2.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1kLoOB-0003Ei-5K for xen-devel@lists.xenproject.org; Fri, 25 Sep 2020 14:07:55 +0000 Received: from mx2.suse.de (unknown [195.135.220.15]) by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS id bd84f0c4-f706-4d43-bf6a-d36b84af56ee; Fri, 25 Sep 2020 14:07:54 +0000 (UTC) Received: from relay2.suse.de (unknown [195.135.221.27]) by mx2.suse.de (Postfix) with ESMTP id 6D7CEAB9F; Fri, 25 Sep 2020 14:07:53 +0000 (UTC) X-Inumbo-ID: bd84f0c4-f706-4d43-bf6a-d36b84af56ee X-Virus-Scanned: by amavisd-new at test-mx.suse.de DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1; t=1601042873; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=0bb+VXJKXkSVXRXN2wKoX5N5IGTNG4/vY2hQ3WdHPGU=; b=H77nb9nX7Qdrnb3iOVjCM9C8IVwWrAAIuFH1DoigveWlnZ4h7SeOrwfJZFjEEJhbrxwber y5jPfft4BcbP02YB9F+c/pMRaqdzOF/1JG8x/+DgH64b5tauF2YN22y/kS8iXdRj0gt0V7 O3r4xW2P0fzvI+ftL48ZVrU3d5shVgY= From: Juergen Gross To: xen-devel@lists.xenproject.org, x86@kernel.org, linux-kernel@vger.kernel.org Cc: Juergen Gross , Boris Ostrovsky , Stefano Stabellini , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H. Peter Anvin" , stable@vger.kernel.org Subject: [PATCH v2] x86/xen: disable Firmware First mode for correctable memory errors Date: Fri, 25 Sep 2020 16:07:51 +0200 Message-Id: <20200925140751.31381-1-jgross@suse.com> X-Mailer: git-send-email 2.26.2 MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-BeenThere: xen-devel@lists.xenproject.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Sender: "Xen-devel" X-ZohoMail-DKIM: pass (identity @suse.com) Content-Type: text/plain; charset="utf-8" When running as Xen dom0 the kernel isn't responsible for selecting the error handling mode, this should be handled by the hypervisor. So disable setting FF mode when running as Xen pv guest. Not doing so might result in boot splats like: [ 7.509696] HEST: Enabling Firmware First mode for corrected errors. [ 7.510382] mce: [Firmware Bug]: Ignoring request to disable invalid MCA= bank 2. [ 7.510383] mce: [Firmware Bug]: Ignoring request to disable invalid MCA= bank 3. [ 7.510384] mce: [Firmware Bug]: Ignoring request to disable invalid MCA= bank 4. [ 7.510384] mce: [Firmware Bug]: Ignoring request to disable invalid MCA= bank 5. [ 7.510385] mce: [Firmware Bug]: Ignoring request to disable invalid MCA= bank 6. [ 7.510386] mce: [Firmware Bug]: Ignoring request to disable invalid MCA= bank 7. [ 7.510386] mce: [Firmware Bug]: Ignoring request to disable invalid MCA= bank 8. Reason is that the HEST ACPI table contains the real number of MCA banks, while the hypervisor is emulating only 2 banks for guests. Cc: stable@vger.kernel.org Signed-off-by: Juergen Gross Reviewed-by: Boris Ostrovsky --- arch/x86/xen/enlighten_pv.c | 9 +++++++++ 1 file changed, 9 insertions(+) diff --git a/arch/x86/xen/enlighten_pv.c b/arch/x86/xen/enlighten_pv.c index 22e741e0b10c..351ac1a9a119 100644 --- a/arch/x86/xen/enlighten_pv.c +++ b/arch/x86/xen/enlighten_pv.c @@ -1376,6 +1376,15 @@ asmlinkage __visible void __init xen_start_kernel(vo= id) x86_init.mpparse.get_smp_config =3D x86_init_uint_noop; =20 xen_boot_params_init_edd(); + +#ifdef CONFIG_ACPI + /* + * Disable selecting "Firmware First mode" for correctable + * memory errors, as this is the duty of the hypervisor to + * decide. + */ + acpi_disable_cmcff =3D 1; +#endif } =20 if (!boot_params.screen_info.orig_video_isVGA) --=20 2.26.2