Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp821869pxb; Tue, 3 Nov 2020 13:31:15 -0800 (PST) X-Google-Smtp-Source: ABdhPJyrLgnwVoWQXnc3Ewqf2T9+iWGukhVNopz5BJvX/Sr3YInag2V6pDaNzfz4MXXHYpjKnNA5 X-Received: by 2002:a17:906:5604:: with SMTP id f4mr10265687ejq.411.1604439074970; Tue, 03 Nov 2020 13:31:14 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1604439074; cv=none; d=google.com; s=arc-20160816; b=PEXKGKB1/pkIU3hDE9TYVxD6LA/+jK9vneJ9SnAwWeKS2fR2vTbEjNfARUf9E425wi NbbFh5z70XP+SFahsPJZrXg+zJmI5sFSuTAAJfXJg2GHNes075XsL0khzD7BfSD8xOp5 QEUB/UBYG+HcKscuHvwDISU65xwADsFEwyv+SEGkrC1QdTz5gsDO++Qkf8MyNZe9WkcK mQvGqRHkb8AFDgq/kWmVJjwxqc/WAwdHBQpvGHh99ib9OxQI7PVcxyNEvcSfChCHTVCh 3D3nJkh8U2lW7m2kFoFcantzazJzLjKLcZcf3JWzBUoUUb8zXSk567l9Im2sna2g0/eP q93Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=1hOV+P5dIINSehRBvEvcwihJDNVv51FilYmpDeT4KRE=; b=kQOWXrbDMTX1ar5qxpE0sEVn7N7UZoJvOE132a8lRwkYVwgFWIML9qSWEl3FgEd0Gb gcnAwu1vTSGHsaYLJYACYRt2B79ZRr433Yz+BazCTjkAQ+C2Zn/sTcEOa6RxWFuUI2/3 7w68lR6sTV/8vA24+QekhGvL1VSTzG1vr22x44QXyL8H1PZSXx2goYm3l1TgwHbF0smO kko/5tgI/v+7gf9Ae9MB9QNV3gRe+KUVbP9loZSuZs1UvvrTWcwemA8F6MRmjTGqmdiC AyubHhL+eSJbFr8HZ91y2fwrShr25QmWqeH6fW4xNj2oyQtwrd7l9hj50WEr7RBl4tZL FMAw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=MXnPLMUY; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id t26si5418ejr.336.2020.11.03.13.30.50; Tue, 03 Nov 2020 13:31:14 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=MXnPLMUY; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387516AbgKCVBr (ORCPT + 99 others); Tue, 3 Nov 2020 16:01:47 -0500 Received: from mail.kernel.org ([198.145.29.99]:38454 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731068AbgKCVBn (ORCPT ); Tue, 3 Nov 2020 16:01:43 -0500 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id B9DF620757; Tue, 3 Nov 2020 21:01:42 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1604437303; bh=qoNFdR949SAk67fHkLcz4zmS5MAph+w0wkiEwieyGS0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=MXnPLMUYGTmcB4kHUah3omGMR03YZWA1sKMr+cJMqszSbQ27N5k69iolJ2kGxI7VN qaif/NsEU2KOZr4bS0ayG+rFCrj70RqbYJVw7Kqe6uSHR0yU+qHpdfM7pr85ArcGCm gdpjBfQcDuvOJOsDZNtuPSAzH2ZrQS7juiPhUSSM= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Juergen Gross , Boris Ostrovsky Subject: [PATCH 4.19 019/191] x86/xen: disable Firmware First mode for correctable memory errors Date: Tue, 3 Nov 2020 21:35:11 +0100 Message-Id: <20201103203235.166657602@linuxfoundation.org> X-Mailer: git-send-email 2.29.2 In-Reply-To: <20201103203232.656475008@linuxfoundation.org> References: <20201103203232.656475008@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Juergen Gross commit d759af38572f97321112a0852353613d18126038 upstream. When running as Xen dom0 the kernel isn't responsible for selecting the error handling mode, this should be handled by the hypervisor. So disable setting FF mode when running as Xen pv guest. Not doing so might result in boot splats like: [ 7.509696] HEST: Enabling Firmware First mode for corrected errors. [ 7.510382] mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 2. [ 7.510383] mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 3. [ 7.510384] mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 4. [ 7.510384] mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 5. [ 7.510385] mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 6. [ 7.510386] mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 7. [ 7.510386] mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 8. Reason is that the HEST ACPI table contains the real number of MCA banks, while the hypervisor is emulating only 2 banks for guests. Cc: stable@vger.kernel.org Signed-off-by: Juergen Gross Reviewed-by: Boris Ostrovsky Link: https://lore.kernel.org/r/20200925140751.31381-1-jgross@suse.com Signed-off-by: Boris Ostrovsky Signed-off-by: Greg Kroah-Hartman --- arch/x86/xen/enlighten_pv.c | 9 +++++++++ 1 file changed, 9 insertions(+) --- a/arch/x86/xen/enlighten_pv.c +++ b/arch/x86/xen/enlighten_pv.c @@ -1383,6 +1383,15 @@ asmlinkage __visible void __init xen_sta x86_init.mpparse.get_smp_config = x86_init_uint_noop; xen_boot_params_init_edd(); + +#ifdef CONFIG_ACPI + /* + * Disable selecting "Firmware First mode" for correctable + * memory errors, as this is the duty of the hypervisor to + * decide. + */ + acpi_disable_cmcff = 1; +#endif } if (!boot_params.screen_info.orig_video_isVGA)