[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <cover.b592910a3829c87c83cf5605718c415c80c0c4a9.1623704845.git-series.pawan.kumar.gupta@linux.intel.com>
Date: Mon, 14 Jun 2021 14:11:21 -0700
From: Pawan Gupta <pawan.kumar.gupta@...ux.intel.com>
To: Thomas Gleixner <tglx@...utronix.de>,
Borislav Petkov <bp@...en8.de>
Cc: Jonathan Corbet <corbet@....net>,
Peter Zijlstra <peterz@...radead.org>,
Ingo Molnar <mingo@...hat.com>,
Arnaldo Carvalho de Melo <acme@...nel.org>,
Mark Rutland <mark.rutland@....com>,
Alexander Shishkin <alexander.shishkin@...ux.intel.com>,
Jiri Olsa <jolsa@...hat.com>,
Namhyung Kim <namhyung@...nel.org>, x86@...nel.org,
"H. Peter Anvin" <hpa@...or.com>,
"Paul E. McKenney" <paulmck@...nel.org>,
Randy Dunlap <rdunlap@...radead.org>,
Andrew Morton <akpm@...ux-foundation.org>,
"Maciej W. Rozycki" <macro@...am.me.uk>,
Viresh Kumar <viresh.kumar@...aro.org>,
Vlastimil Babka <vbabka@...e.cz>,
Tony Luck <tony.luck@...el.com>,
Paolo Bonzini <pbonzini@...hat.com>,
Sean Christopherson <seanjc@...gle.com>,
Kyung Min Park <kyung.min.park@...el.com>,
Fenghua Yu <fenghua.yu@...el.com>,
Ricardo Neri <ricardo.neri-calderon@...ux.intel.com>,
Tom Lendacky <thomas.lendacky@....com>,
Juergen Gross <jgross@...e.com>,
Krish Sadhukhan <krish.sadhukhan@...cle.com>,
Kan Liang <kan.liang@...ux.intel.com>,
Joerg Roedel <jroedel@...e.de>,
Victor Ding <victording@...gle.com>,
Srinivas Pandruvada <srinivas.pandruvada@...ux.intel.com>,
Pawan Gupta <pawan.kumar.gupta@...ux.intel.com>,
Brijesh Singh <brijesh.singh@....com>,
Dave Hansen <dave.hansen@...el.com>,
Mike Rapoport <rppt@...nel.org>,
Anthony Steinhauser <asteinhauser@...gle.com>,
Anand K Mistry <amistry@...gle.com>,
Andi Kleen <ak@...ux.intel.com>,
Miguel Ojeda <ojeda@...nel.org>, Joe Perches <joe@...ches.com>,
linux-doc@...r.kernel.org, linux-kernel@...r.kernel.org,
linux-perf-users@...r.kernel.org
Subject: [PATCH v2 0/3] TSX force abort
v1->v2:
- Avoid Reading TSX_FORCE_ABORT MSR for detecting new microcode.
- In tsx_init() move force abort detection before cmdline parsing.
- Drop tsx=fake patch, not enough use cases to justify the patch.
- Rebase to v5.13-rc6.
Introduction
============
On some Intel processors [1] a microcode update will always abort
Transactional Synchronization Extensions (TSX) transactions by default. These
CPUs were previously affected by the TSX memory ordering issue [2]. A
workaround was earlier added to perf related to memory ordering which is no
longer required(because TSX is defeatured on these systems). This series adds
support for new bits added to TSX_FORCE_ABORT MSR and CPUID to enumerate new
abort behavior and to bypass the workaround.
Roadmap to this series
======================
0001: Define new CPUID and MSR bits that are added by the microcode update.
(The new CPUID.RTM_ALWAYS_ABORT is not shown in /proc/cpuinfo)
0002: When new microcode is enumerated bypass perf counter workaround for [1].
Perf workaround is no longer required after the microcode update.
0003: Clear CPUID.RTM and CPUID.HLE when TSX is defeatured, so that software
does not enumerate and try to use TSX.
Thanks,
Pawan
[1] Intel® TSX Memory and Performance Monitoring Update for Intel® Processors
https://www.intel.com/content/www/us/en/support/articles/000059422/processors.html
[2] Performance Monitoring Impact of Intel® Transactional Synchronization Extension Memory
http://cdrdv2.intel.com/v1/dl/getContent/604224 (Document ID 604224)
Pawan Gupta (3):
x86/msr: Define new bits in TSX_FORCE_ABORT MSR
perf/x86/intel: Do not deploy workaround when TSX is deprecated
x86/tsx: Clear CPUID bits when TSX always force aborts
arch/x86/events/intel/core.c | 10 +++++++-
arch/x86/include/asm/cpufeatures.h | 1 +-
arch/x86/include/asm/msr-index.h | 4 +++-
arch/x86/kernel/cpu/cpu.h | 2 ++-
arch/x86/kernel/cpu/intel.c | 4 ++-
arch/x86/kernel/cpu/tsx.c | 37 +++++++++++++++++++++++++++++--
6 files changed, 54 insertions(+), 4 deletions(-)
base-commit: 009c9aa5be652675a06d5211e1640e02bbb1c33d
--
git-series 0.9.1
Powered by blists - more mailing lists