Received: by 2002:ac0:950c:0:0:0:0:0 with SMTP id f12csp2277767imc; Tue, 12 Mar 2019 10:26:02 -0700 (PDT) X-Google-Smtp-Source: APXvYqxe+KHGOh8iCexEle1YmITSDKV3UFrq0BPUEE8VDjJCXr1X+fjsXD7TtmTrbtyuWRFKxzuQ X-Received: by 2002:aa7:8390:: with SMTP id u16mr39049828pfm.63.1552411562838; Tue, 12 Mar 2019 10:26:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1552411562; cv=none; d=google.com; s=arc-20160816; b=cWvn40dl+HhFFUsOUunIBUaCi2JFQztmXen4/yTfHz5PATmb2oA6o6hA6/DriPvfVl wEiGhd6WNSLIvzFnzT7dna5ec77hsbrmKTz27vGUJtWvrbwwKFJM2QBPy2Q1Kg+Fq9nf JWc/3nZAjEZgIF7BqM34aK5FQPG9sgm5scfyA15cTgqj62aip+zWoJ4kAf1pVUkw7Lv0 ghHhut31UMlJ+0TvV2fW8Vfe+injA5clgYc06hCClRr5uNbF+ByORrCHsiGn7AISY2Rk njYp+dZwXg9FK7OEvZgAggQXhbZdGe+xGA1HKbAdfnYEX7g062XgNJQI3/yTGcEVQoS0 WShw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=/MQmsWsDY2xcTTMlKf2k4eUpaeda89nb4xByw2NGliw=; b=nugfSPh2uFbaa9Y01hFJxru8fsUVrswRsF0Od3Mu1asgUshqEF36vEZRhhH55E6ayX OR94foOOa+qkkAPkFje3IV45C5IjNuHw6TWZRQ0ExL5WTVK7VviuMgSiknXlJChB6zkP i/0nhvLCea+On2EE/Yb9un7jQNOUm+47X1hV6TFaOCqRxqrqy6mORKSBsMAxwLjNWBSc bgP5CyDE6oRaUGlMT8G0Rr1B+qEKUxH918TpKXWfNGrQ49bR8aNYkxWMcbvNqsOxU72S HJgIRaZfNDvNqqv/gLQfd/gy/cvt0z7woymv5GOWSZnxrGesf8qyCBJKxl+BaCAGD5Ix Ja7A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=QGF3aBgl; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b3si6592629pgt.254.2019.03.12.10.25.47; Tue, 12 Mar 2019 10:26:02 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=QGF3aBgl; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729884AbfCLRSC (ORCPT + 99 others); Tue, 12 Mar 2019 13:18:02 -0400 Received: from mail.kernel.org ([198.145.29.99]:60568 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729475AbfCLRRL (ORCPT ); Tue, 12 Mar 2019 13:17:11 -0400 Received: from localhost (unknown [104.133.8.98]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id A11CC217F5; Tue, 12 Mar 2019 17:17:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1552411030; bh=A11wx1lZwFNCs24hY/mpPhBVBVHdrRfo1KWQth4Uw+I=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=QGF3aBgliPUORIkOI35ehKeev4gn/yRPCQ3VP7KSEwMbgzUEcu0qDZCcjbc8yYlIv 2YhE7vGqaPG3uo+9HRGy+nURgyjE9vmxRJJHP6JqJhy9KZOrIjjPwUmJCRBzdyzy4z RCzxMFWWzV7kwl1AQLdOEoT8kZUvM5L1ni90XRew= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, "Peter Zijlstra (Intel)" , Thomas Gleixner Subject: [PATCH 4.14 134/135] x86: Add TSX Force Abort CPUID/MSR Date: Tue, 12 Mar 2019 10:09:41 -0700 Message-Id: <20190312170353.516068574@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190312170341.127810985@linuxfoundation.org> References: <20190312170341.127810985@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: "Peter Zijlstra (Intel)" commit 52f64909409c17adf54fcf5f9751e0544ca3a6b4 upstream Skylake systems will receive a microcode update to address a TSX errata. This microcode will (by default) clobber PMC3 when TSX instructions are (speculatively or not) executed. It also provides an MSR to cause all TSX transaction to abort and preserve PMC3. Add the CPUID enumeration and MSR definition. Signed-off-by: Peter Zijlstra (Intel) Signed-off-by: Thomas Gleixner Signed-off-by: Greg Kroah-Hartman --- arch/x86/include/asm/cpufeatures.h | 1 + arch/x86/include/asm/msr-index.h | 6 ++++++ 2 files changed, 7 insertions(+) --- a/arch/x86/include/asm/cpufeatures.h +++ b/arch/x86/include/asm/cpufeatures.h @@ -339,6 +339,7 @@ /* Intel-defined CPU features, CPUID level 0x00000007:0 (EDX), word 18 */ #define X86_FEATURE_AVX512_4VNNIW (18*32+ 2) /* AVX-512 Neural Network Instructions */ #define X86_FEATURE_AVX512_4FMAPS (18*32+ 3) /* AVX-512 Multiply Accumulation Single precision */ +#define X86_FEATURE_TSX_FORCE_ABORT (18*32+13) /* "" TSX_FORCE_ABORT */ #define X86_FEATURE_PCONFIG (18*32+18) /* Intel PCONFIG */ #define X86_FEATURE_SPEC_CTRL (18*32+26) /* "" Speculation Control (IBRS + IBPB) */ #define X86_FEATURE_INTEL_STIBP (18*32+27) /* "" Single Thread Indirect Branch Predictors */ --- a/arch/x86/include/asm/msr-index.h +++ b/arch/x86/include/asm/msr-index.h @@ -610,6 +610,12 @@ #define MSR_IA32_TSC_DEADLINE 0x000006E0 + +#define MSR_TSX_FORCE_ABORT 0x0000010F + +#define MSR_TFA_RTM_FORCE_ABORT_BIT 0 +#define MSR_TFA_RTM_FORCE_ABORT BIT_ULL(MSR_TFA_RTM_FORCE_ABORT_BIT) + /* P4/Xeon+ specific */ #define MSR_IA32_MCG_EAX 0x00000180 #define MSR_IA32_MCG_EBX 0x00000181