~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

TOMOYO Linux Cross Reference
Linux/arch/x86/kernel/cpu/tsx.c

Version: ~ [ linux-6.11-rc3 ] ~ [ linux-6.10.4 ] ~ [ linux-6.9.12 ] ~ [ linux-6.8.12 ] ~ [ linux-6.7.12 ] ~ [ linux-6.6.45 ] ~ [ linux-6.5.13 ] ~ [ linux-6.4.16 ] ~ [ linux-6.3.13 ] ~ [ linux-6.2.16 ] ~ [ linux-6.1.104 ] ~ [ linux-6.0.19 ] ~ [ linux-5.19.17 ] ~ [ linux-5.18.19 ] ~ [ linux-5.17.15 ] ~ [ linux-5.16.20 ] ~ [ linux-5.15.164 ] ~ [ linux-5.14.21 ] ~ [ linux-5.13.19 ] ~ [ linux-5.12.19 ] ~ [ linux-5.11.22 ] ~ [ linux-5.10.223 ] ~ [ linux-5.9.16 ] ~ [ linux-5.8.18 ] ~ [ linux-5.7.19 ] ~ [ linux-5.6.19 ] ~ [ linux-5.5.19 ] ~ [ linux-5.4.281 ] ~ [ linux-5.3.18 ] ~ [ linux-5.2.21 ] ~ [ linux-5.1.21 ] ~ [ linux-5.0.21 ] ~ [ linux-4.20.17 ] ~ [ linux-4.19.319 ] ~ [ linux-4.18.20 ] ~ [ linux-4.17.19 ] ~ [ linux-4.16.18 ] ~ [ linux-4.15.18 ] ~ [ linux-4.14.336 ] ~ [ linux-4.13.16 ] ~ [ linux-4.12.14 ] ~ [ linux-4.11.12 ] ~ [ linux-4.10.17 ] ~ [ linux-4.9.337 ] ~ [ linux-4.4.302 ] ~ [ linux-3.10.108 ] ~ [ linux-2.6.32.71 ] ~ [ linux-2.6.0 ] ~ [ linux-2.4.37.11 ] ~ [ unix-v6-master ] ~ [ ccs-tools-1.8.9 ] ~ [ policy-sample ] ~
Architecture: ~ [ i386 ] ~ [ alpha ] ~ [ m68k ] ~ [ mips ] ~ [ ppc ] ~ [ sparc ] ~ [ sparc64 ] ~

Diff markup

Differences between /arch/x86/kernel/cpu/tsx.c (Architecture sparc64) and /arch/m68k/kernel/cpu/tsx.c (Architecture m68k)


  1 // SPDX-License-Identifier: GPL-2.0                 1 
  2 /*                                                
  3  * Intel Transactional Synchronization Extensi    
  4  *                                                
  5  * Copyright (C) 2019-2021 Intel Corporation      
  6  *                                                
  7  * Author:                                        
  8  *      Pawan Gupta <pawan.kumar.gupta@linux.i    
  9  */                                               
 10                                                   
 11 #include <linux/cpufeature.h>                     
 12                                                   
 13 #include <asm/cmdline.h>                          
 14 #include <asm/cpu.h>                              
 15                                                   
 16 #include "cpu.h"                                  
 17                                                   
 18 #undef pr_fmt                                     
 19 #define pr_fmt(fmt) "tsx: " fmt                   
 20                                                   
 21 enum tsx_ctrl_states tsx_ctrl_state __ro_after    
 22                                                   
 23 static void tsx_disable(void)                     
 24 {                                                 
 25         u64 tsx;                                  
 26                                                   
 27         rdmsrl(MSR_IA32_TSX_CTRL, tsx);           
 28                                                   
 29         /* Force all transactions to immediate    
 30         tsx |= TSX_CTRL_RTM_DISABLE;              
 31                                                   
 32         /*                                        
 33          * Ensure TSX support is not enumerate    
 34          * This is visible to userspace and wi    
 35          * do not waste resources trying TSX t    
 36          * will always abort.                     
 37          */                                       
 38         tsx |= TSX_CTRL_CPUID_CLEAR;              
 39                                                   
 40         wrmsrl(MSR_IA32_TSX_CTRL, tsx);           
 41 }                                                 
 42                                                   
 43 static void tsx_enable(void)                      
 44 {                                                 
 45         u64 tsx;                                  
 46                                                   
 47         rdmsrl(MSR_IA32_TSX_CTRL, tsx);           
 48                                                   
 49         /* Enable the RTM feature in the cpu *    
 50         tsx &= ~TSX_CTRL_RTM_DISABLE;             
 51                                                   
 52         /*                                        
 53          * Ensure TSX support is enumerated in    
 54          * This is visible to userspace and wi    
 55          * can enumerate and use the TSX featu    
 56          */                                       
 57         tsx &= ~TSX_CTRL_CPUID_CLEAR;             
 58                                                   
 59         wrmsrl(MSR_IA32_TSX_CTRL, tsx);           
 60 }                                                 
 61                                                   
 62 static enum tsx_ctrl_states x86_get_tsx_auto_m    
 63 {                                                 
 64         if (boot_cpu_has_bug(X86_BUG_TAA))        
 65                 return TSX_CTRL_DISABLE;          
 66                                                   
 67         return TSX_CTRL_ENABLE;                   
 68 }                                                 
 69                                                   
 70 /*                                                
 71  * Disabling TSX is not a trivial business.       
 72  *                                                
 73  * First of all, there's a CPUID bit: X86_FEAT    
 74  * which says that TSX is practically disabled    
 75  * aborted by default). When that bit is set,     
 76  * disables TSX.                                  
 77  *                                                
 78  * In order to do that, however, it needs to d    
 79  *                                                
 80  * 1. The first method to disable it is throug    
 81  * the MSR is present only when *two* CPUID bi    
 82  *                                                
 83  * - X86_FEATURE_RTM_ALWAYS_ABORT                 
 84  * - X86_FEATURE_TSX_FORCE_ABORT                  
 85  *                                                
 86  * 2. The second method is for CPUs which do n    
 87  * MSR: those use a different MSR - MSR_IA32_T    
 88  * through that one. Those CPUs can also have     
 89  * CPUID bit X86_FEATURE_RTM_ALWAYS_ABORT set     
 90  * applies: TSX gets disabled unconditionally.    
 91  *                                                
 92  * When either of the two methods are present,    
 93  * clears the respective RTM and HLE feature f    
 94  *                                                
 95  * An additional twist in the whole thing pres    
 96  * which, when done, may cause for the X86_FEA    
 97  * bit to be set after the update.                
 98  *                                                
 99  * A subsequent hotplug operation on any logic    
100  * cause for the supported CPUID feature bits     
101  * RTM and HLE get cleared all of a sudden, bu    
102  * them before the update, then funny explosio    
103  * short: the kernel doesn't modify CPUID feat    
104  *                                                
105  * That's why, this function's call in init_in    
106  * feature flags.                                 
107  */                                               
108 static void tsx_clear_cpuid(void)                 
109 {                                                 
110         u64 msr;                                  
111                                                   
112         /*                                        
113          * MSR_TFA_TSX_CPUID_CLEAR bit is only    
114          * bits RTM_ALWAYS_ABORT and TSX_FORCE    
115          */                                       
116         if (boot_cpu_has(X86_FEATURE_RTM_ALWAY    
117             boot_cpu_has(X86_FEATURE_TSX_FORCE    
118                 rdmsrl(MSR_TSX_FORCE_ABORT, ms    
119                 msr |= MSR_TFA_TSX_CPUID_CLEAR    
120                 wrmsrl(MSR_TSX_FORCE_ABORT, ms    
121         } else if (cpu_feature_enabled(X86_FEA    
122                 rdmsrl(MSR_IA32_TSX_CTRL, msr)    
123                 msr |= TSX_CTRL_CPUID_CLEAR;      
124                 wrmsrl(MSR_IA32_TSX_CTRL, msr)    
125         }                                         
126 }                                                 
127                                                   
128 /*                                                
129  * Disable TSX development mode                   
130  *                                                
131  * When the microcode released in Feb 2022 is     
132  * default on some processors. MSR 0x122 (TSX_    
133  * (IA32_MCU_OPT_CTRL) can be used to re-enabl    
134  * not recommended for production deployments.    
135  * flows for mitigation of the Intel TSX Async    
136  * execution attack may not be effective on th    
137  * enabled with updated microcode.                
138  */                                               
139 static void tsx_dev_mode_disable(void)            
140 {                                                 
141         u64 mcu_opt_ctrl;                         
142                                                   
143         /* Check if RTM_ALLOW exists */           
144         if (!boot_cpu_has_bug(X86_BUG_TAA) ||     
145             !cpu_feature_enabled(X86_FEATURE_M    
146             !cpu_feature_enabled(X86_FEATURE_S    
147                 return;                           
148                                                   
149         rdmsrl(MSR_IA32_MCU_OPT_CTRL, mcu_opt_    
150                                                   
151         if (mcu_opt_ctrl & RTM_ALLOW) {           
152                 mcu_opt_ctrl &= ~RTM_ALLOW;       
153                 wrmsrl(MSR_IA32_MCU_OPT_CTRL,     
154                 setup_force_cpu_cap(X86_FEATUR    
155         }                                         
156 }                                                 
157                                                   
158 void __init tsx_init(void)                        
159 {                                                 
160         char arg[5] = {};                         
161         int ret;                                  
162                                                   
163         tsx_dev_mode_disable();                   
164                                                   
165         /*                                        
166          * Hardware will always abort a TSX tr    
167          * RTM_ALWAYS_ABORT is set. In this ca    
168          * CPUID.RTM and CPUID.HLE bits. Clear    
169          */                                       
170         if (boot_cpu_has(X86_FEATURE_RTM_ALWAY    
171                 tsx_ctrl_state = TSX_CTRL_RTM_    
172                 tsx_clear_cpuid();                
173                 setup_clear_cpu_cap(X86_FEATUR    
174                 setup_clear_cpu_cap(X86_FEATUR    
175                 return;                           
176         }                                         
177                                                   
178         /*                                        
179          * TSX is controlled via MSR_IA32_TSX_    
180          * MSR is enumerated by ARCH_CAP_TSX_M    
181          *                                        
182          * TSX control (aka MSR_IA32_TSX_CTRL)    
183          * microcode update on CPUs that have     
184          * bit MDS_NO=1. CPUs with MDS_NO=0 ar    
185          * MSR_IA32_TSX_CTRL support even afte    
186          * tsx= cmdline requests will do nothi    
187          * MSR_IA32_TSX_CTRL support.             
188          */                                       
189         if (x86_read_arch_cap_msr() & ARCH_CAP    
190                 setup_force_cpu_cap(X86_FEATUR    
191         } else {                                  
192                 tsx_ctrl_state = TSX_CTRL_NOT_    
193                 return;                           
194         }                                         
195                                                   
196         ret = cmdline_find_option(boot_command    
197         if (ret >= 0) {                           
198                 if (!strcmp(arg, "on")) {         
199                         tsx_ctrl_state = TSX_C    
200                 } else if (!strcmp(arg, "off")    
201                         tsx_ctrl_state = TSX_C    
202                 } else if (!strcmp(arg, "auto"    
203                         tsx_ctrl_state = x86_g    
204                 } else {                          
205                         tsx_ctrl_state = TSX_C    
206                         pr_err("invalid option    
207                 }                                 
208         } else {                                  
209                 /* tsx= not provided */           
210                 if (IS_ENABLED(CONFIG_X86_INTE    
211                         tsx_ctrl_state = x86_g    
212                 else if (IS_ENABLED(CONFIG_X86    
213                         tsx_ctrl_state = TSX_C    
214                 else                              
215                         tsx_ctrl_state = TSX_C    
216         }                                         
217                                                   
218         if (tsx_ctrl_state == TSX_CTRL_DISABLE    
219                 tsx_disable();                    
220                                                   
221                 /*                                
222                  * tsx_disable() will change t    
223                  * bits. Clear them here since    
224                  * set.                           
225                  */                               
226                 setup_clear_cpu_cap(X86_FEATUR    
227                 setup_clear_cpu_cap(X86_FEATUR    
228         } else if (tsx_ctrl_state == TSX_CTRL_    
229                                                   
230                 /*                                
231                  * HW defaults TSX to be enabl    
232                  * We may still need the TSX e    
233                  * during init for special cas    
234                  * kexec after TSX is disabled    
235                  */                               
236                 tsx_enable();                     
237                                                   
238                 /*                                
239                  * tsx_enable() will change th    
240                  * bits. Force them here since    
241                  */                               
242                 setup_force_cpu_cap(X86_FEATUR    
243                 setup_force_cpu_cap(X86_FEATUR    
244         }                                         
245 }                                                 
246                                                   
247 void tsx_ap_init(void)                            
248 {                                                 
249         tsx_dev_mode_disable();                   
250                                                   
251         if (tsx_ctrl_state == TSX_CTRL_ENABLE)    
252                 tsx_enable();                     
253         else if (tsx_ctrl_state == TSX_CTRL_DI    
254                 tsx_disable();                    
255         else if (tsx_ctrl_state == TSX_CTRL_RT    
256                 /* See comment over that funct    
257                 tsx_clear_cpuid();                
258 }                                                 
259                                                   

~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

kernel.org | git.kernel.org | LWN.net | Project Home | SVN repository | Mail admin

Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.

sflogo.php