Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp4577264ybb; Tue, 14 Apr 2020 09:58:06 -0700 (PDT) X-Google-Smtp-Source: APiQypLfmEppWw+/MtJB6DGhlIawsOcLQk9FwuOyJOT/L78j6tOsjWEegZ+aCx5vp++3Qd7Bo7m6 X-Received: by 2002:a17:906:7804:: with SMTP id u4mr1100022ejm.328.1586883485945; Tue, 14 Apr 2020 09:58:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1586883485; cv=none; d=google.com; s=arc-20160816; b=dSc4WDFRNns2527CcwoG9pPYwoTEcnEP33gOEkmBVfPk2+8fU4BSo1q2/rcukWj/yG ZI9BsIwx2WVdkymc69sKgQ5yp/lZq5XjOr1009hCnb/2RV/BAy7HqXN0j8X7tAuA1BM4 MU2tt61yOc6BGhDXWppBxH7B3N89mL433ILOD35SW8hZ4YN2Sqm8prQxneHJbb4Ns288 ftLiviK8T1aP6uDTHFk0z4QK0Q6FxTYGuwOPbkG7TF2p+OSold3WJ6qhcuam340e0SoI r058Tooz0Ic1MLIs5rARksr3NAHB5ig9Xpb8Hrs7XG/5jsCniJR2X2BvS0PXrSFLymfI mo4A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=06enTWIzaZmFhyGQkjp0ywBpzr83u5KDVElG21F6T9I=; b=DOla5xh/1fGDpJICKwBtlZayEZjjr8lQKE6NUuJV+TjA4oa8Jnk4BBTK2xAemFNuFp XzMVToIWAIwyGo1G9hnVtev4vux3x+HGhijnsp4SxJzP/lsEKEghOx9SfUqb95iIbxQd fhi8gTqXC6har8l+8LzgjOvwRxShTFx8Bld2JKptFHn4JfcSQUotgznNmVZPMGkaQsUy rBJAnf6V4xu6NlswPXOJvkqLOIBCaPMgMDbM+7/5LeyEPb1gkNjoSp+lG1FRw2gFUdkB UjQaBFd/oJYbhAtnBSjxxXzHnuSf/7D870Q/o4ut/vL8Ke+JIO5ZgLDad5/4YX29cmkC XEuA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=SwzT+qMd; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id j5si9535418edn.417.2020.04.14.09.57.42; Tue, 14 Apr 2020 09:58:05 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=SwzT+qMd; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2440428AbgDNQvH (ORCPT + 99 others); Tue, 14 Apr 2020 12:51:07 -0400 Received: from mail.kernel.org ([198.145.29.99]:55674 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2440407AbgDNQtX (ORCPT ); Tue, 14 Apr 2020 12:49:23 -0400 Received: from quaco.ghostprotocols.net (unknown [179.97.37.151]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id E8CAF20774; Tue, 14 Apr 2020 16:49:19 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1586882963; bh=oDW7UtguMEDm6JDyp+2IcYm+CR8RJnA70uLdL5FN+z8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=SwzT+qMdJPCN2fxj6p+tinUTL2fmA21DsaAzuUESzETsMv+H16UUa1IyBq8EBrEas yuwoBtVJ3c3IqbQHCfhs6ZslEglcMJ5fyPZVHBDqqFvKKBCU8jyhAdEf3wN895qnyB EHddyQ2dD3At6aPQrC3P3pzxTUav1IuLYdCnH2wk= From: Arnaldo Carvalho de Melo To: Ingo Molnar , Thomas Gleixner Cc: Jiri Olsa , Namhyung Kim , Clark Williams , linux-kernel@vger.kernel.org, linux-perf-users@vger.kernel.org, Arnaldo Carvalho de Melo , Adrian Hunter , Borislav Petkov , Kim Phillips , Peter Zijlstra , Wei Huang Subject: [PATCH 07/15] tools arch x86: Sync asm/cpufeatures.h with the kernel sources Date: Tue, 14 Apr 2020 13:48:46 -0300 Message-Id: <20200414164854.26026-8-acme@kernel.org> X-Mailer: git-send-email 2.21.1 In-Reply-To: <20200414164854.26026-1-acme@kernel.org> References: <20200414164854.26026-1-acme@kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Arnaldo Carvalho de Melo To pick up the changes from: 077168e241ec ("x86/mce/amd: Add PPIN support for AMD MCE") 753039ef8b2f ("x86/cpu/amd: Call init_amd_zn() om Family 19h processors too") 6650cdd9a8cc ("x86/split_lock: Enable split lock detection by kernel") These don't cause any changes in tooling, just silences this perf build warning: Warning: Kernel ABI header at 'tools/arch/x86/include/asm/cpufeatures.h' differs from latest version at 'arch/x86/include/asm/cpufeatures.h' diff -u tools/arch/x86/include/asm/cpufeatures.h arch/x86/include/asm/cpufeatures.h Cc: Adrian Hunter Cc: Jiri Olsa Cc: Namhyung Kim Cc: Borislav Petkov Cc: Kim Phillips Cc: Peter Zijlstra (Intel) Cc: Wei Huang Signed-off-by: Arnaldo Carvalho de Melo --- tools/arch/x86/include/asm/cpufeatures.h | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/tools/arch/x86/include/asm/cpufeatures.h b/tools/arch/x86/include/asm/cpufeatures.h index f3327cb56edf..db189945e9b0 100644 --- a/tools/arch/x86/include/asm/cpufeatures.h +++ b/tools/arch/x86/include/asm/cpufeatures.h @@ -217,7 +217,7 @@ #define X86_FEATURE_IBRS ( 7*32+25) /* Indirect Branch Restricted Speculation */ #define X86_FEATURE_IBPB ( 7*32+26) /* Indirect Branch Prediction Barrier */ #define X86_FEATURE_STIBP ( 7*32+27) /* Single Thread Indirect Branch Predictors */ -#define X86_FEATURE_ZEN ( 7*32+28) /* "" CPU is AMD family 0x17 (Zen) */ +#define X86_FEATURE_ZEN ( 7*32+28) /* "" CPU is AMD family 0x17 or above (Zen) */ #define X86_FEATURE_L1TF_PTEINV ( 7*32+29) /* "" L1TF workaround PTE inversion */ #define X86_FEATURE_IBRS_ENHANCED ( 7*32+30) /* Enhanced IBRS */ #define X86_FEATURE_MSR_IA32_FEAT_CTL ( 7*32+31) /* "" MSR IA32_FEAT_CTL configured */ @@ -285,6 +285,7 @@ #define X86_FEATURE_CQM_MBM_LOCAL (11*32+ 3) /* LLC Local MBM monitoring */ #define X86_FEATURE_FENCE_SWAPGS_USER (11*32+ 4) /* "" LFENCE in user entry SWAPGS path */ #define X86_FEATURE_FENCE_SWAPGS_KERNEL (11*32+ 5) /* "" LFENCE in kernel entry SWAPGS path */ +#define X86_FEATURE_SPLIT_LOCK_DETECT (11*32+ 6) /* #AC for split lock */ /* Intel-defined CPU features, CPUID level 0x00000007:1 (EAX), word 12 */ #define X86_FEATURE_AVX512_BF16 (12*32+ 5) /* AVX512 BFLOAT16 instructions */ @@ -299,6 +300,7 @@ #define X86_FEATURE_AMD_IBRS (13*32+14) /* "" Indirect Branch Restricted Speculation */ #define X86_FEATURE_AMD_STIBP (13*32+15) /* "" Single Thread Indirect Branch Predictors */ #define X86_FEATURE_AMD_STIBP_ALWAYS_ON (13*32+17) /* "" Single Thread Indirect Branch Predictors always-on preferred */ +#define X86_FEATURE_AMD_PPIN (13*32+23) /* Protected Processor Inventory Number */ #define X86_FEATURE_AMD_SSBD (13*32+24) /* "" Speculative Store Bypass Disable */ #define X86_FEATURE_VIRT_SSBD (13*32+25) /* Virtualized Speculative Store Bypass Disable */ #define X86_FEATURE_AMD_SSB_NO (13*32+26) /* "" Speculative Store Bypass is fixed in hardware. */ @@ -367,6 +369,7 @@ #define X86_FEATURE_INTEL_STIBP (18*32+27) /* "" Single Thread Indirect Branch Predictors */ #define X86_FEATURE_FLUSH_L1D (18*32+28) /* Flush L1D cache */ #define X86_FEATURE_ARCH_CAPABILITIES (18*32+29) /* IA32_ARCH_CAPABILITIES MSR (Intel) */ +#define X86_FEATURE_CORE_CAPABILITIES (18*32+30) /* "" IA32_CORE_CAPABILITIES MSR */ #define X86_FEATURE_SPEC_CTRL_SSBD (18*32+31) /* "" Speculative Store Bypass Disable */ /* -- 2.21.1