From patchwork Mon Jul 3 03:46:19 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Haozhong Zhang X-Patchwork-Id: 9821907 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id AB2936035F for ; Mon, 3 Jul 2017 03:50:00 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 945AE283C7 for ; Mon, 3 Jul 2017 03:50:00 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 884432851E; Mon, 3 Jul 2017 03:50:00 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-4.2 required=2.0 tests=BAYES_00, RCVD_IN_DNSWL_MED autolearn=ham version=3.3.1 Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.wl.linuxfoundation.org (Postfix) with ESMTPS id 194CC283C7 for ; Mon, 3 Jul 2017 03:50:00 +0000 (UTC) Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from ) id 1dRsKj-0006Va-QZ; Mon, 03 Jul 2017 03:47:33 +0000 Received: from mail6.bemta5.messagelabs.com ([195.245.231.135]) by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from ) id 1dRsKi-0006Ui-TS for xen-devel@lists.xen.org; Mon, 03 Jul 2017 03:47:33 +0000 Received: from [85.158.139.211] by server-17.bemta-5.messagelabs.com id 7D/13-01735-45EB9595; Mon, 03 Jul 2017 03:47:32 +0000 X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFvrNLMWRWlGSWpSXmKPExsVywNykWDd4X2S kwetWRYslHxezODB6HN39mymAMYo1My8pvyKBNePSov3MBT3aFftuLGRuYLyn0MXIxSEkMJ1R YsqxPrYuRk4OCQFeiSPLZrBC2AESv+6sY4Eo6mWUmL3pLgtIgk1AX2LF44NgRSIC0hLXPl9mB LGZBaolJk6fA2YLC/hKHLo7mxnEZhFQlbh1fBdYPa+AjcTuM0tZIBbIS+xquwgW5xSwlbg5dS cTiC0EVLNn0j/GCYy8CxgZVjFqFKcWlaUW6RpZ6CUVZaZnlOQmZuboGhqY6uWmFhcnpqfmJCY V6yXn525iBAZEPQMD4w7GvlV+hxglOZiURHlXXguNFOJLyk+pzEgszogvKs1JLT7EKMPBoSTB y7s3MlJIsCg1PbUiLTMHGJowaQkOHiUR3ms+QGne4oLE3OLMdIjUKUZdjlcT/n9jEmLJy89Ll RLnFQOZIQBSlFGaBzcCFieXGGWlhHkZGRgYhHgKUotyM0tQ5V8xinMwKgnz6uwBmsKTmVcCt+ kV0BFMQEc09ESAHFGSiJCSamC0On/WNbN1rox/1j2mXW7sZufs2B9u25wo+aG8+O39Fgn7lAX L5npx6/wQjRZbKFUZeSptRfCfK6bPA+rUepfeU15/8SaLbuaqENkvap3v1pk7VtQ32u/99GLj 4+i/jMYvjXfHZh1vtprfu/79KpmCIwqvvVp75H2N4+tk9ppqH9VwV7yZ9kqJpTgj0VCLuag4E QDJJHrvjgIAAA== X-Env-Sender: haozhong.zhang@intel.com X-Msg-Ref: server-6.tower-206.messagelabs.com!1499053645!100869672!4 X-Originating-IP: [192.55.52.115] X-SpamReason: No, hits=0.0 required=7.0 tests= X-StarScan-Received: X-StarScan-Version: 9.4.25; banners=-,-,- X-VirusChecked: Checked Received: (qmail 22973 invoked from network); 3 Jul 2017 03:47:31 -0000 Received: from mga14.intel.com (HELO mga14.intel.com) (192.55.52.115) by server-6.tower-206.messagelabs.com with DHE-RSA-AES256-GCM-SHA384 encrypted SMTP; 3 Jul 2017 03:47:31 -0000 Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by fmsmga103.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 02 Jul 2017 20:47:30 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos; i="5.40,301,1496127600"; d="scan'208"; a="1189835633" Received: from hz-desktop.sh.intel.com (HELO localhost) ([10.239.159.142]) by fmsmga002.fm.intel.com with ESMTP; 02 Jul 2017 20:47:29 -0700 From: Haozhong Zhang To: xen-devel@lists.xen.org Date: Mon, 3 Jul 2017 11:46:19 +0800 Message-Id: <20170703034626.9429-5-haozhong.zhang@intel.com> X-Mailer: git-send-email 2.11.0 In-Reply-To: <20170703034626.9429-1-haozhong.zhang@intel.com> References: <20170703034626.9429-1-haozhong.zhang@intel.com> Cc: Haozhong Zhang , Jan Beulich , Andrew Cooper Subject: [Xen-devel] [PATCH v5 04/11] x86/mce_intel: detect and enable LMCE on Intel host X-BeenThere: xen-devel@lists.xen.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Errors-To: xen-devel-bounces@lists.xen.org Sender: "Xen-devel" X-Virus-Scanned: ClamAV using ClamSMTP Enable LMCE if it's supported by the host CPU. If Xen boot parameter "mce_fb = 1" is present, LMCE will be disabled forcibly. Signed-off-by: Haozhong Zhang Reviewed-by: Jan Beulich --- Cc: Jan Beulich Cc: Andrew Cooper --- xen/arch/x86/cpu/mcheck/mce_intel.c | 46 ++++++++++++++++++++++++++++++++----- xen/arch/x86/cpu/mcheck/x86_mca.h | 5 ++++ xen/include/asm-x86/msr-index.h | 2 ++ 3 files changed, 47 insertions(+), 6 deletions(-) diff --git a/xen/arch/x86/cpu/mcheck/mce_intel.c b/xen/arch/x86/cpu/mcheck/mce_intel.c index 4e976c45f8..020b02deff 100644 --- a/xen/arch/x86/cpu/mcheck/mce_intel.c +++ b/xen/arch/x86/cpu/mcheck/mce_intel.c @@ -29,6 +29,9 @@ boolean_param("mce_fb", mce_force_broadcast); static int __read_mostly nr_intel_ext_msrs; +/* If mce_force_broadcast == 1, lmce_support will be disabled forcibly. */ +static bool __read_mostly lmce_support; + /* Intel SDM define bit15~bit0 of IA32_MCi_STATUS as the MC error code */ #define INTEL_MCCOD_MASK 0xFFFF @@ -698,10 +701,34 @@ static bool mce_is_broadcast(struct cpuinfo_x86 *c) return false; } +static bool intel_enable_lmce(void) +{ + uint64_t msr_content; + + /* + * Section "Enabling Local Machine Check" in Intel SDM Vol 3 + * requires software must ensure the LOCK bit and LMCE_ON bit + * of MSR_IA32_FEATURE_CONTROL are set before setting + * MSR_IA32_MCG_EXT_CTL.LMCE_EN. + */ + + if ( rdmsr_safe(MSR_IA32_FEATURE_CONTROL, msr_content) ) + return false; + + if ( (msr_content & IA32_FEATURE_CONTROL_LOCK) && + (msr_content & IA32_FEATURE_CONTROL_LMCE_ON) ) + { + wrmsrl(MSR_IA32_MCG_EXT_CTL, MCG_EXT_CTL_LMCE_EN); + return true; + } + + return false; +} + /* Check and init MCA */ static void intel_init_mca(struct cpuinfo_x86 *c) { - bool broadcast, cmci = false, ser = false; + bool broadcast, cmci = false, ser = false, lmce = false; int ext_num = 0, first; uint64_t msr_content; @@ -721,33 +748,40 @@ static void intel_init_mca(struct cpuinfo_x86 *c) first = mce_firstbank(c); + if (!mce_force_broadcast && (msr_content & MCG_LMCE_P)) + lmce = intel_enable_lmce(); + #define CAP(enabled, name) ((enabled) ? ", " name : "") if (smp_processor_id() == 0) { dprintk(XENLOG_INFO, - "MCA capability: firstbank %d, %d ext MSRs%s%s%s\n", + "MCA Capability: firstbank %d, extended MCE MSR %d%s%s%s%s\n", first, ext_num, CAP(broadcast, "BCAST"), CAP(ser, "SER"), - CAP(cmci, "CMCI")); + CAP(cmci, "CMCI"), + CAP(lmce, "LMCE")); mce_broadcast = broadcast; cmci_support = cmci; ser_support = ser; + lmce_support = lmce; nr_intel_ext_msrs = ext_num; firstbank = first; } else if (cmci != cmci_support || ser != ser_support || broadcast != mce_broadcast || - first != firstbank || ext_num != nr_intel_ext_msrs) + first != firstbank || ext_num != nr_intel_ext_msrs || + lmce != lmce_support) dprintk(XENLOG_WARNING, "CPU%u has different MCA capability " - "(firstbank %d, %d ext MSRs%s%s%s)" + "(firstbank %d, extended MCE MSR %d%s%s%s%s)" " than BSP, may cause undetermined result!!!\n", smp_processor_id(), first, ext_num, CAP(broadcast, "BCAST"), CAP(ser, "SER"), - CAP(cmci, "CMCI")); + CAP(cmci, "CMCI"), + CAP(lmce, "LMCE")); #undef CAP } diff --git a/xen/arch/x86/cpu/mcheck/x86_mca.h b/xen/arch/x86/cpu/mcheck/x86_mca.h index de03f829c3..0f87bcf63e 100644 --- a/xen/arch/x86/cpu/mcheck/x86_mca.h +++ b/xen/arch/x86/cpu/mcheck/x86_mca.h @@ -36,6 +36,7 @@ #define MCG_TES_P (1ULL<<11) /* Intel specific */ #define MCG_EXT_CNT 16 /* Intel specific */ #define MCG_SER_P (1ULL<<24) /* Intel specific */ +#define MCG_LMCE_P (1ULL<<27) /* Intel specific */ /* Other bits are reserved */ /* Bitfield of the MSR_IA32_MCG_STATUS register */ @@ -46,6 +47,10 @@ /* Bits 3-63 are reserved on CPU not supporting LMCE */ /* Bits 4-63 are reserved on CPU supporting LMCE */ +/* Bitfield of MSR_IA32_MCG_EXT_CTL register (Intel Specific) */ +#define MCG_EXT_CTL_LMCE_EN (1ULL<<0) +/* Other bits are reserved */ + /* Bitfield of MSR_K8_MCi_STATUS registers */ /* MCA error code */ #define MCi_STATUS_MCA 0x000000000000ffffULL diff --git a/xen/include/asm-x86/msr-index.h b/xen/include/asm-x86/msr-index.h index 771e7500af..756b23d19e 100644 --- a/xen/include/asm-x86/msr-index.h +++ b/xen/include/asm-x86/msr-index.h @@ -51,6 +51,7 @@ #define MSR_IA32_MCG_CAP 0x00000179 #define MSR_IA32_MCG_STATUS 0x0000017a #define MSR_IA32_MCG_CTL 0x0000017b +#define MSR_IA32_MCG_EXT_CTL 0x000004d0 #define MSR_IA32_PEBS_ENABLE 0x000003f1 #define MSR_IA32_DS_AREA 0x00000600 @@ -296,6 +297,7 @@ #define IA32_FEATURE_CONTROL_SENTER_PARAM_CTL 0x7f00 #define IA32_FEATURE_CONTROL_ENABLE_SENTER 0x8000 #define IA32_FEATURE_CONTROL_SGX_ENABLE 0x40000 +#define IA32_FEATURE_CONTROL_LMCE_ON 0x100000 #define MSR_IA32_TSC_ADJUST 0x0000003b