Received: by 2002:a05:6a10:413:0:0:0:0 with SMTP id 19csp4104347pxp; Wed, 23 Mar 2022 11:18:22 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyJbDOVyXINiFS3xVpVo+whmLc56vERXEyB1T/8tFalJQbdYafS9lAaSnO37ONotIZZRAjE X-Received: by 2002:a05:6402:40c9:b0:419:4b81:162e with SMTP id z9-20020a05640240c900b004194b81162emr1845907edb.380.1648059502569; Wed, 23 Mar 2022 11:18:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1648059502; cv=none; d=google.com; s=arc-20160816; b=i2E53e98CrTBui9OskCx5LvZ9KdlXss1sudY69RXbi4wu2jKiNKZzAY6U3iN3EScVp qDUe4oPVNFIfwT3lCDubI/Nwrdrc1MusOUhw7vqZJKvTpFWyA3dX5SiSLZ2dqMoB5vfQ x9hHp1zJlXMAFTsexwYR+xijAtbO4xwVqWpjF//FFMwLgs09V7f75f2XCjvmYqCmy7cy kf+fGa0oCLKrH3rAIr+YZyN1b9QTRHYT6iogGZZzOr24gf117s8K6nzIet3znxTwSBQC DebXyBgWN4Fnl3ii6YTs+gMod7NNIBQWXQlqRcrOXtA97RLV9puhI/m/UDW6PLzH0M+m AcwA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=XiNnFapfaMYmfrrKP3p3e5lvZBCib6HioPjpOdOoTr8=; b=zcJ3qRzrFdbQpzxB2LEWFXFyvyKrJFvInok6MOMqqMaeMgkpgKDbTgoPI0/Kr24DWD lJiCBZU6oGU6UJo+YDkG2EOrjjknXIEvGiV+Ip43MEYC2eP4jMofzgnUGyW1uSQozL4j D7e5ds+qSKijnhHwBfMNozlalqvaIW1X3TYGqlpH28wZoYsgqVI5XkJtvMXY6i5qpLhu Avwlhcwp/pu9GcPD/LEeB+mYg95o/W783OjM+FzpVhvmwxuOTlSI05kqLHJRvVdTmBxt rBpXudZe6kVxx7YeV+VfKV6XM+ND1ERxmKmF3qVlYRSZ+XYKepZ1RD14pLtaYhIYmQqP qiWQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=BxdOQ5bU; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id y5-20020a50ce05000000b004191860a1cdsi11856863edi.224.2022.03.23.11.17.55; Wed, 23 Mar 2022 11:18:22 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=BxdOQ5bU; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240498AbiCVXeb (ORCPT + 99 others); Tue, 22 Mar 2022 19:34:31 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54034 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239543AbiCVXea (ORCPT ); Tue, 22 Mar 2022 19:34:30 -0400 Received: from mga05.intel.com (mga05.intel.com [192.55.52.43]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id DA334D95; Tue, 22 Mar 2022 16:33:00 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1647991980; x=1679527980; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=XwlEgxZx+biSuXUGcY7iQ2dLxTEwH6VqQm6lQR1IWEM=; b=BxdOQ5bUi5RZrD05EdU/xwQjnJhwSkHFo8CZ1v9Y23zc+clMuWFzGw4d fjQ8vAjGYNvy/Qk/0SgQypQnf2W3Ms9Nija0kPyYTiBGxiZ6Xzi6DGXnU uVlBpeotNJs+HsSrDCUslgqDJt1tyHjLHr5QetHWl+jsevU+4TRjUQB8p rfyj70WkIohxwX96zotOSLKSNhOAeHql9s7TteAW9WpW3Krh5yM0PagwA 4FdhaNaNUFVyRi+tLlk5AXfbavNFUZTUSOt4nmYxMsMQvWywEQKP7blh5 1UfFQE7t5lduzkpfTYT2Z8RixXW60P0GKrIQgeCM1bIuSWdEESVUf8Cfy w==; X-IronPort-AV: E=McAfee;i="6200,9189,10294"; a="344411960" X-IronPort-AV: E=Sophos;i="5.90,203,1643702400"; d="scan'208";a="344411960" Received: from fmsmga001.fm.intel.com ([10.253.24.23]) by fmsmga105.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 22 Mar 2022 16:33:00 -0700 X-IronPort-AV: E=Sophos;i="5.90,203,1643702400"; d="scan'208";a="692749730" Received: from rtgarci1-mobl2.amr.corp.intel.com (HELO guptapa-desk) ([10.212.228.140]) by fmsmga001-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 22 Mar 2022 16:32:58 -0700 Date: Tue, 22 Mar 2022 16:32:42 -0700 From: Pawan Gupta To: Borislav Petkov , Thomas Gleixner Cc: Ingo Molnar , Dave Hansen , x86@kernel.org, "H. Peter Anvin" , Andi Kleen , Tony Luck , linux-kernel@vger.kernel.org, antonio.gomez.iglesias@linux.intel.com, neelima.krishnan@intel.com, stable@vger.kernel.org, Andrew Cooper , Josh Poimboeuf Subject: Re: [PATCH v2 0/2] TSX update Message-ID: <20220322233242.mlslvnucjb5sjyk2@guptapa-desk> References: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8; format=flowed Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-5.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_EF,RCVD_IN_DNSWL_MED,SPF_HELO_NONE, SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Boris and others, On Thu, Mar 10, 2022 at 01:59:47PM -0800, Pawan Gupta wrote: >v2: >- Added patch to disable TSX development mode (Andrew, Boris) >- Rebased to v5.17-rc7 > >v1: https://lore.kernel.org/lkml/5bd785a1d6ea0b572250add0c6617b4504bc24d1.1644440311.git.pawan.kumar.gupta@linux.intel.com/ > >Hi, > >After a recent microcode update some Intel processors will always abort >Transactional Synchronization Extensions (TSX) transactions [*]. On >these processors a new CPUID bit, >CPUID.07H.0H.EDX[11](RTM_ALWAYS_ABORT), will be enumerated to indicate >that the loaded microcode is forcing Restricted Transactional Memory >(RTM) abort. If the processor enumerated support for RTM previously, the >CPUID enumeration bits for TSX (CPUID.RTM and CPUID.HLE) continue to be >set by default after the microcode update. > >First patch in this series clears CPUID.RTM and CPUID.HLE so that >userspace doesn't enumerate TSX feature. > >Microcode also added support to re-enable TSX for development purpose, >doing so is not recommended for production deployments, because MD_CLEAR >flows for the mitigation of TSX Asynchronous Abort (TAA) may not be >effective on these processors when TSX is enabled with updated >microcode. > >Second patch unconditionally disables this TSX development mode, in case >it was enabled by the software running before kernel boot. > >Thanks, >Pawan > >[*] Intel Transactional Synchronization Extension (Intel TSX) Disable Update for Selected Processors > https://cdrdv2.intel.com/v1/dl/getContent/643557 > >Pawan Gupta (2): > x86/tsx: Use MSR_TSX_CTRL to clear CPUID bits > x86/tsx: Disable TSX development mode at boot I am hoping to get some feedback on v2. Are these patches looking okay? Thanks, Pawan