[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [xen stable-4.14] x86/tsx: Cope with TSX deprecation on SKL/KBL/CFL/WHL
commit 45710c02563602343261b690787bb1c76a676bef Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> AuthorDate: Wed Sep 16 16:15:52 2020 +0100 Commit: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> CommitDate: Thu Jun 17 14:49:05 2021 +0100 x86/tsx: Cope with TSX deprecation on SKL/KBL/CFL/WHL The June 2021 microcode is formally de-featuring TSX on the older Skylake client CPUs. The workaround from the March 2019 microcode is being dropped, and replaced with additions to MSR_TSX_FORCE_ABORT to hide the HLE/RTM CPUID bits. With this microcode in place, TSX is disabled by default on these CPUs. Backwards compatibility is provided in the same way as for TAA - RTM force aborts, rather than suffering #UD, and the CPUID bits can be hidden to recover performance. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> (cherry picked from commit 3e09045991cde360432bc7437103f8f8a6699359) --- docs/misc/xen-command-line.pandoc | 13 +++++ tools/misc/xen-cpuid.c | 2 +- xen/arch/x86/tsx.c | 76 +++++++++++++++++++++++++++-- xen/include/asm-x86/cpufeature.h | 1 + xen/include/asm-x86/msr-index.h | 2 + xen/include/public/arch-x86/cpufeatureset.h | 1 + 6 files changed, 89 insertions(+), 6 deletions(-) diff --git a/docs/misc/xen-command-line.pandoc b/docs/misc/xen-command-line.pandoc index 6c4e340824..a889c23c64 100644 --- a/docs/misc/xen-command-line.pandoc +++ b/docs/misc/xen-command-line.pandoc @@ -2244,6 +2244,12 @@ Several microcode updates are relevant: and formally retiring HLE from the architecture. The user can disable TSX to mitigate TAA, and elect to hide the HLE/RTM CPUID bits. + * June 2021, removing the workaround for March 2019 on client CPUs and + formally de-featured TSX on SKL/KBL/WHL/CFL (Note: SKX still retains the + March 2019 fix). Introduced the ability to hide the HLE/RTM CPUID bits. + PCR3 works fine, and TSX is disabled by default, but the user can re-enable + TSX at their own risk, accepting that the memory order erratum is unfixed. + On systems with the ability to configure TSX, this boolean offers system wide control of whether TSX is enabled or disabled. @@ -2261,6 +2267,13 @@ control of whether TSX is enabled or disabled. ordering errata default to `true` to enable working TSX. Alternatively, selecting `tsx=0` will disable TSX and restore PCR3 to a working state. + SKX and SKL/KBL/WHL/CFL on pre-June 2021 microcode default to `true`. + Alternatively, selecting `tsx=0` will disable TSX and restore PCR3 to a + working state. + + SKL/KBL/WHL/CFL on the June 2021 microcode or later default to `false`. + Alternatively, selecting `tsx=1` will re-enable TSX at the users own risk. + ### ucode > `= List of [ <integer> | scan=<bool>, nmi=<bool> ]` diff --git a/tools/misc/xen-cpuid.c b/tools/misc/xen-cpuid.c index 8d8f3532a2..a231d96e13 100644 --- a/tools/misc/xen-cpuid.c +++ b/tools/misc/xen-cpuid.c @@ -161,7 +161,7 @@ static const char *const str_7d0[32] = [ 4] = "fsrm", /* 8 */ [ 9] = "srbds-ctrl", - [10] = "md-clear", + [10] = "md-clear", [11] = "rtm-always-abort", /* 12 */ [13] = "tsx-force-abort", [14] = "serialize", diff --git a/xen/arch/x86/tsx.c b/xen/arch/x86/tsx.c index 338191df7f..88adf08c49 100644 --- a/xen/arch/x86/tsx.c +++ b/xen/arch/x86/tsx.c @@ -59,6 +59,38 @@ void tsx_init(void) * ordering erratum, with at least the March 2019 microcode. */ + /* + * Probe for the June 2021 microcode which de-features TSX on + * client parts. (Note - this is a subset of parts impacted by + * the memory ordering errata.) + * + * RTM_ALWAYS_ABORT enumerates the new functionality, but is also + * read as zero if TSX_FORCE_ABORT.ENABLE_RTM has been set before + * we run. + * + * Undo this behaviour in Xen's view of the world. + */ + bool has_rtm_always_abort = cpu_has_rtm_always_abort; + + if ( !has_rtm_always_abort ) + { + uint64_t val; + + rdmsrl(MSR_TSX_FORCE_ABORT, val); + + if ( val & TSX_ENABLE_RTM ) + has_rtm_always_abort = true; + } + + /* + * Always force RTM_ALWAYS_ABORT, even if it currently visible. + * If the user explicitly opts to enable TSX, we'll set + * TSX_FORCE_ABORT.ENABLE_RTM and cause RTM_ALWAYS_ABORT to be + * hidden from the general CPUID scan later. + */ + if ( has_rtm_always_abort ) + setup_force_cpu_cap(X86_FEATURE_RTM_ALWAYS_ABORT); + /* * If no explicit tsx= option is provided, pick a default. * @@ -67,9 +99,16 @@ void tsx_init(void) * - parse_spec_ctrl() ran before any CPU details where know. * - We now know we're running on a CPU not affected by TAA (as * TSX_FORCE_ABORT is enumerated). + * - When RTM_ALWAYS_ABORT is enumerated, TSX malfunctions, so we + * only ever want it enabled by explicit user choice. + * + * Without RTM_ALWAYS_ABORT, leave TSX active. In particular, + * this includes SKX where TSX is still supported. + * + * With RTM_ALWAYS_ABORT, disable TSX. */ if ( opt_tsx < 0 ) - opt_tsx = 1; + opt_tsx = !cpu_has_rtm_always_abort; } /* @@ -90,7 +129,7 @@ void tsx_init(void) * Force the features to be visible in Xen's view if we see any of the * infrastructure capable of hiding them. */ - if ( cpu_has_tsx_ctrl ) + if ( cpu_has_tsx_ctrl || cpu_has_tsx_force_abort ) { setup_force_cpu_cap(X86_FEATURE_HLE); setup_force_cpu_cap(X86_FEATURE_RTM); @@ -131,9 +170,36 @@ void tsx_init(void) /* Check bottom bit only. Higher bits are various sentinels. */ rtm_disabled = !(opt_tsx & 1); - lo &= ~TSX_FORCE_ABORT_RTM; - if ( rtm_disabled ) - lo |= TSX_FORCE_ABORT_RTM; + lo &= ~(TSX_FORCE_ABORT_RTM | TSX_CPUID_CLEAR | TSX_ENABLE_RTM); + + if ( cpu_has_rtm_always_abort ) + { + /* + * June 2021 microcode, on a client part with TSX de-featured: + * - There are no mitigations for the TSX memory ordering errata. + * - Performance counter 3 works. (I.e. it isn't being used by + * microcode to work around the memory ordering errata.) + * - TSX_FORCE_ABORT.FORCE_ABORT_RTM is fixed read1/write-discard. + * - TSX_FORCE_ABORT.TSX_CPUID_CLEAR can be used to hide the + * HLE/RTM CPUID bits. + * - TSX_FORCE_ABORT.ENABLE_RTM may be used to opt in to + * re-enabling RTM, at the users own risk. + */ + lo |= rtm_disabled ? TSX_CPUID_CLEAR : TSX_ENABLE_RTM; + } + else + { + /* + * Either a server part where TSX isn't de-featured, or pre-June + * 2021 microcode: + * - By default, the TSX memory ordering errata is worked around + * in microcode at the cost of Performance Counter 3. + * - "Working TSX" vs "Working PCR3" can be selected by way of + * setting TSX_FORCE_ABORT.FORCE_ABORT_RTM. + */ + if ( rtm_disabled ) + lo |= TSX_FORCE_ABORT_RTM; + } wrmsr(MSR_TSX_FORCE_ABORT, lo, hi); } diff --git a/xen/include/asm-x86/cpufeature.h b/xen/include/asm-x86/cpufeature.h index 9c31032436..80eff688d4 100644 --- a/xen/include/asm-x86/cpufeature.h +++ b/xen/include/asm-x86/cpufeature.h @@ -128,6 +128,7 @@ /* CPUID level 0x00000007:0.edx */ #define cpu_has_avx512_4vnniw boot_cpu_has(X86_FEATURE_AVX512_4VNNIW) #define cpu_has_avx512_4fmaps boot_cpu_has(X86_FEATURE_AVX512_4FMAPS) +#define cpu_has_rtm_always_abort boot_cpu_has(X86_FEATURE_RTM_ALWAYS_ABORT) #define cpu_has_tsx_force_abort boot_cpu_has(X86_FEATURE_TSX_FORCE_ABORT) #define cpu_has_serialize boot_cpu_has(X86_FEATURE_SERIALIZE) #define cpu_has_arch_caps boot_cpu_has(X86_FEATURE_ARCH_CAPS) diff --git a/xen/include/asm-x86/msr-index.h b/xen/include/asm-x86/msr-index.h index d66c92b946..80764266bf 100644 --- a/xen/include/asm-x86/msr-index.h +++ b/xen/include/asm-x86/msr-index.h @@ -61,6 +61,8 @@ #define MSR_TSX_FORCE_ABORT 0x0000010f #define TSX_FORCE_ABORT_RTM (_AC(1, ULL) << 0) +#define TSX_CPUID_CLEAR (_AC(1, ULL) << 1) +#define TSX_ENABLE_RTM (_AC(1, ULL) << 2) #define MSR_TSX_CTRL 0x00000122 #define TSX_CTRL_RTM_DISABLE (_AC(1, ULL) << 0) diff --git a/xen/include/public/arch-x86/cpufeatureset.h b/xen/include/public/arch-x86/cpufeatureset.h index 02b3a2a265..d2422386c0 100644 --- a/xen/include/public/arch-x86/cpufeatureset.h +++ b/xen/include/public/arch-x86/cpufeatureset.h @@ -261,6 +261,7 @@ XEN_CPUFEATURE(AVX512_4VNNIW, 9*32+ 2) /*A AVX512 Neural Network Instructions * XEN_CPUFEATURE(AVX512_4FMAPS, 9*32+ 3) /*A AVX512 Multiply Accumulation Single Precision */ XEN_CPUFEATURE(SRBDS_CTRL, 9*32+ 9) /* MSR_MCU_OPT_CTRL and RNGDS_MITG_DIS. */ XEN_CPUFEATURE(MD_CLEAR, 9*32+10) /*A VERW clears microarchitectural buffers */ +XEN_CPUFEATURE(RTM_ALWAYS_ABORT, 9*32+11) /*! June 2021 TSX defeaturing in microcode. */ XEN_CPUFEATURE(TSX_FORCE_ABORT, 9*32+13) /* MSR_TSX_FORCE_ABORT.RTM_ABORT */ XEN_CPUFEATURE(SERIALIZE, 9*32+14) /*a SERIALIZE insn */ XEN_CPUFEATURE(CET_IBT, 9*32+20) /* CET - Indirect Branch Tracking */ -- generated by git-patchbot for /home/xen/git/xen.git#stable-4.14
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |