Received: by 2002:ac0:950c:0:0:0:0:0 with SMTP id f12csp2304847imc; Tue, 12 Mar 2019 11:01:09 -0700 (PDT) X-Google-Smtp-Source: APXvYqy4N+zdBPy2ekiEIqj3dXw5fXOk30QEYg5GSdI7DtHA8KBYHWlEdEjfCZvN030pPWqMeXU2 X-Received: by 2002:a17:902:8697:: with SMTP id g23mr41754449plo.30.1552413669220; Tue, 12 Mar 2019 11:01:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1552413669; cv=none; d=google.com; s=arc-20160816; b=nLB3pX/oi/VKWKITexf1r+ZwLcF4W9LF1RwoyMdAszi6sRAis4MOn45nKt9NqrQaih BwiwI7KIjQS6Y8Qam4T5sZ3CxI/B4vX4+KY7VcBjRffM8TbXGmwq8KAzxbuRhDHAmFJU GkF+sUJXJQiM7GZ3O3whPMKM0jSGdPGvYEeB+o4XslRsV0lzsMLTRlll81Aj4VD9uLwq 2D4Lsq8cGx9KQph/tyMUrXuFhjyawQiY4ZPfnbo9nXI6z8n8A/af/Wu/J2q3+GTe1UZP 34RlrOlEL3F7dxOhvaKKjSE7H9g8yHuPRAOSzi+cJSle/tU13kOrVj3s2T0huT+zZa/h hTbQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=z2qEU1+Wk0qLvvCEcNDa1ZPaoI/93+isOtVzopd0tts=; b=i0JlVU4WrDyTGO2y0ODEPL7CGImPVJhtT/KuWkDB46khVxW/J6hunkAWsW/7LBkDSQ XAPKgSfPclBIjhgvPB6KDmUL055R7MCdNcI4g0jXVyeW2YpjF/I89zipca+YZ4QeScNZ vLrJTnxcAvQGn5kInc9uoNmjsCbAV5x/ruw9BtviLwsxELQ6GK8NOXuAHiwyFPIC4mlc le8tv2TgZLiXLQodEXCnaWtUqt1B5uutJlYYL+Fi6CXM3aJSeixKVmqTjPC3L7X/Rrks JR+RFS1crRUAuBO6hmFJdABtCossMTdD8RZosieIS8QhVqfKUjPG4yYyFLkcHNy5hpbW 3ypw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=XXeptlXy; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q4si7542338pgv.338.2019.03.12.11.00.53; Tue, 12 Mar 2019 11:01:09 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=XXeptlXy; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728183AbfCLR65 (ORCPT + 99 others); Tue, 12 Mar 2019 13:58:57 -0400 Received: from mail.kernel.org ([198.145.29.99]:50916 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726751AbfCLRNi (ORCPT ); Tue, 12 Mar 2019 13:13:38 -0400 Received: from localhost (unknown [104.133.8.98]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 5E186217D4; Tue, 12 Mar 2019 17:13:37 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1552410817; bh=FjmCkKZ16Hg1X95ZGnLaYg/lTPG5HNCiqe0tCD7NQgA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=XXeptlXy0PncEB/+9idSKbjbroxhvV9iDO3PuH9rSLu+B9GVtt0SVM2q3Gn+rUCcn OFiH1W3DrByVC4jkKCbNOCZLAbsx6JFK6fAHGPdUAHsaJl6qqj/O8ABFFDYttxhftU J9B/YDj+yazrzF3AeR+fZNb5ytkYSTPtYJPadmzk= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, "Peter Zijlstra (Intel)" , Thomas Gleixner Subject: [PATCH 4.20 170/171] x86: Add TSX Force Abort CPUID/MSR Date: Tue, 12 Mar 2019 10:09:10 -0700 Message-Id: <20190312170402.156905134@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190312170347.868927101@linuxfoundation.org> References: <20190312170347.868927101@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.20-stable review patch. If anyone has any objections, please let me know. ------------------ From: "Peter Zijlstra (Intel)" commit 52f64909409c17adf54fcf5f9751e0544ca3a6b4 upstream Skylake systems will receive a microcode update to address a TSX errata. This microcode will (by default) clobber PMC3 when TSX instructions are (speculatively or not) executed. It also provides an MSR to cause all TSX transaction to abort and preserve PMC3. Add the CPUID enumeration and MSR definition. Signed-off-by: Peter Zijlstra (Intel) Signed-off-by: Thomas Gleixner Signed-off-by: Greg Kroah-Hartman --- arch/x86/include/asm/cpufeatures.h | 1 + arch/x86/include/asm/msr-index.h | 6 ++++++ 2 files changed, 7 insertions(+) --- a/arch/x86/include/asm/cpufeatures.h +++ b/arch/x86/include/asm/cpufeatures.h @@ -342,6 +342,7 @@ /* Intel-defined CPU features, CPUID level 0x00000007:0 (EDX), word 18 */ #define X86_FEATURE_AVX512_4VNNIW (18*32+ 2) /* AVX-512 Neural Network Instructions */ #define X86_FEATURE_AVX512_4FMAPS (18*32+ 3) /* AVX-512 Multiply Accumulation Single precision */ +#define X86_FEATURE_TSX_FORCE_ABORT (18*32+13) /* "" TSX_FORCE_ABORT */ #define X86_FEATURE_PCONFIG (18*32+18) /* Intel PCONFIG */ #define X86_FEATURE_SPEC_CTRL (18*32+26) /* "" Speculation Control (IBRS + IBPB) */ #define X86_FEATURE_INTEL_STIBP (18*32+27) /* "" Single Thread Indirect Branch Predictors */ --- a/arch/x86/include/asm/msr-index.h +++ b/arch/x86/include/asm/msr-index.h @@ -630,6 +630,12 @@ #define MSR_IA32_TSC_DEADLINE 0x000006E0 + +#define MSR_TSX_FORCE_ABORT 0x0000010F + +#define MSR_TFA_RTM_FORCE_ABORT_BIT 0 +#define MSR_TFA_RTM_FORCE_ABORT BIT_ULL(MSR_TFA_RTM_FORCE_ABORT_BIT) + /* P4/Xeon+ specific */ #define MSR_IA32_MCG_EAX 0x00000180 #define MSR_IA32_MCG_EBX 0x00000181