Received: by 2002:ac0:950c:0:0:0:0:0 with SMTP id f12csp2276076imc; Tue, 12 Mar 2019 10:23:58 -0700 (PDT) X-Google-Smtp-Source: APXvYqy1VkbC9BYYoc1HTDB7uhe9hwRA0cAkFHVmaBxMpEjd1qi6MPR+96sNqacQbeUcHdHsvlFg X-Received: by 2002:a17:902:2ac9:: with SMTP id j67mr29899939plb.166.1552411437979; Tue, 12 Mar 2019 10:23:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1552411437; cv=none; d=google.com; s=arc-20160816; b=0d+j/vLwcVl0+vbZQZKj2E08AxDpsxmrYG2XJ34inFsRkpYYkmIAjFa8uUjd2C5nA1 WJ7zsjpS7rbTQQ5NMl1g5D2RRxJkpMNGdZxMCKEW62xsZY0UQgOidVmBQfJgVIPtSWGM c7WkcdZQbD+4rlJG/fLKCiyev4pmzUh8Vk7i7vU+LFyJ16uJ+1OdGzi8MUKGBFmSyN5F YL2uyp+FJHFsYJfLiqiGhtaYjTnJzZVhWau2jrVLZgqWVtbLFc5fRdlxoYUI+84zEQMP nNxzGg9aRDYCSiiIGVsBODYGh2tS+YAYZ7SZ4Gxm3SXFkdatvErTmzEKQqjgvV5ukVU3 Ixpg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=WxvVY3Jk5q5Ck69Emt33c+mHi7J12mNv3fscpQ+V/gs=; b=TPRRU2eZ+ZzCt92IX3LzcGLmIZcpQI4PYHNPetK/zwoqoNhPjsDNBrveClmsji8aWg pfHgwXVc6K9FZ7zo8ElEZtqt44ExQ8LI1ZECm4Qbd6SF27GJKkYDUhQH2yX/F3Xncj6c EsxugWyx2aSAY+VZ4mjY3157enw2LqKv0yfQ3dYreTV2f7JRkY31nP2MUIDaYdm8odvu 8WoaFENgVnb/we+Y2z7cKv6vf0Rg0Dg5egWw9JEvPUQ7edWS0oxFXhlFziEBrhXcAZGd vskW39Dx5ymWKqkCCkBKEk1rtN/viQVUoSxrQ550EHoic4IL1UkStDKvPuQWxxP4+N/x 62yg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=NEwMFxt7; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p91si2165346plb.61.2019.03.12.10.23.42; Tue, 12 Mar 2019 10:23:57 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=NEwMFxt7; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729411AbfCLRVV (ORCPT + 99 others); Tue, 12 Mar 2019 13:21:21 -0400 Received: from mail.kernel.org ([198.145.29.99]:35688 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730005AbfCLRSP (ORCPT ); Tue, 12 Mar 2019 13:18:15 -0400 Received: from localhost (unknown [104.133.8.98]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id D1D7A21850; Tue, 12 Mar 2019 17:18:14 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1552411094; bh=oQVO3L0PISIl3bBHAsLS8w6s+eIj5Wc55DmY+ki32jM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=NEwMFxt7VGCwbCRu51KtewgVPYsADFmuxXVqWvZbx7MBiBCULEKtMiQ8XW0hDRkSg r7CjY/TXUTXHUnAlQV6RZFC+hAXNKB6GFxQRO4cj1L1YqLeqGIW5M50KvRgPAqhvCg TAKFUexgc6TmSNmB0WZlyzrZ4bB8EDT7bOEhziRM= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, "Peter Zijlstra (Intel)" , Thomas Gleixner Subject: [PATCH 4.9 96/96] x86: Add TSX Force Abort CPUID/MSR Date: Tue, 12 Mar 2019 10:10:54 -0700 Message-Id: <20190312171041.690853959@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190312171034.530434962@linuxfoundation.org> References: <20190312171034.530434962@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.9-stable review patch. If anyone has any objections, please let me know. ------------------ From: "Peter Zijlstra (Intel)" commit 52f64909409c17adf54fcf5f9751e0544ca3a6b4 upstream Skylake systems will receive a microcode update to address a TSX errata. This microcode will (by default) clobber PMC3 when TSX instructions are (speculatively or not) executed. It also provides an MSR to cause all TSX transaction to abort and preserve PMC3. Add the CPUID enumeration and MSR definition. Signed-off-by: Peter Zijlstra (Intel) Signed-off-by: Thomas Gleixner Signed-off-by: Greg Kroah-Hartman --- arch/x86/include/asm/cpufeatures.h | 1 + arch/x86/include/asm/msr-index.h | 6 ++++++ 2 files changed, 7 insertions(+) --- a/arch/x86/include/asm/cpufeatures.h +++ b/arch/x86/include/asm/cpufeatures.h @@ -314,6 +314,7 @@ /* Intel-defined CPU features, CPUID level 0x00000007:0 (EDX), word 18 */ #define X86_FEATURE_AVX512_4VNNIW (18*32+ 2) /* AVX-512 Neural Network Instructions */ #define X86_FEATURE_AVX512_4FMAPS (18*32+ 3) /* AVX-512 Multiply Accumulation Single precision */ +#define X86_FEATURE_TSX_FORCE_ABORT (18*32+13) /* "" TSX_FORCE_ABORT */ #define X86_FEATURE_PCONFIG (18*32+18) /* Intel PCONFIG */ #define X86_FEATURE_SPEC_CTRL (18*32+26) /* "" Speculation Control (IBRS + IBPB) */ #define X86_FEATURE_INTEL_STIBP (18*32+27) /* "" Single Thread Indirect Branch Predictors */ --- a/arch/x86/include/asm/msr-index.h +++ b/arch/x86/include/asm/msr-index.h @@ -575,6 +575,12 @@ #define MSR_IA32_TSC_DEADLINE 0x000006E0 + +#define MSR_TSX_FORCE_ABORT 0x0000010F + +#define MSR_TFA_RTM_FORCE_ABORT_BIT 0 +#define MSR_TFA_RTM_FORCE_ABORT BIT_ULL(MSR_TFA_RTM_FORCE_ABORT_BIT) + /* P4/Xeon+ specific */ #define MSR_IA32_MCG_EAX 0x00000180 #define MSR_IA32_MCG_EBX 0x00000181