public inbox for libc-stable@sourceware.org
 help / color / mirror / Atom feed
* Re: [PATCH v2] x86: Black list more Intel CPUs for TSX [BZ #27398]
       [not found] ` <CAFUsyfL4Tw=KZUSdmGLDBsDW7aOaSFC2RmJd58SxxpXxh2Ef8Q@mail.gmail.com>
@ 2022-02-01 13:42   ` H.J. Lu
  0 siblings, 0 replies; only message in thread
From: H.J. Lu @ 2022-02-01 13:42 UTC (permalink / raw)
  To: Noah Goldstein
  Cc: GNU C Library, Carlos O'Donell, Libc-stable Mailing List

On Tue, Jan 18, 2022 at 1:51 PM Noah Goldstein <goldstein.w.n@gmail.com> wrote:
>
> On Tue, Jan 18, 2022 at 3:29 PM H.J. Lu <hjl.tools@gmail.com> wrote:
> >
> > Disable TSX and enable RTM_ALWAYS_ABORT for Intel CPUs listed in:
> >
> > https://www.intel.com/content/www/us/en/support/articles/000059422/processors.html
> >
> > This fixes BZ #27398.
> > ---
> >  sysdeps/x86/cpu-features.c | 34 +++++++++++++++++++++++++++++++---
> >  1 file changed, 31 insertions(+), 3 deletions(-)
> >
> > diff --git a/sysdeps/x86/cpu-features.c b/sysdeps/x86/cpu-features.c
> > index 772ccf8e91..514226b378 100644
> > --- a/sysdeps/x86/cpu-features.c
> > +++ b/sysdeps/x86/cpu-features.c
> > @@ -507,11 +507,39 @@ init_cpu_features (struct cpu_features *cpu_features)
> >               break;
> >             }
> >
> > -        /* Disable TSX on some Haswell processors to avoid TSX on kernels that
> > -           weren't updated with the latest microcode package (which disables
> > -           broken feature by default).  */
> > +        /* Disable TSX on some processors to avoid TSX on kernels that
> > +           weren't updated with the latest microcode package (which
> > +           disables broken feature by default).  */
> >          switch (model)
> >             {
> > +           case 0x55:
> > +             if (stepping <= 5)
> > +               goto disable_tsx;
> > +             break;
> > +           case 0x8e:
> > +             /* NB: Although the errata documents that for model == 0x8e,
> > +                only 0xb stepping or lower are impacted, the intention of
> > +                the errata was to disable TSX on all client processors on
> > +                all steppings.  Include 0xc stepping which is an Intel
> > +                Core i7-8665U, a client mobile processor.  */
> > +           case 0x9e:
> > +             if (stepping > 0xc)
> > +               break;
> > +             /* Fall through.  */
> > +           case 0x4e:
> > +           case 0x5e:
> > +             {
> > +               /* Disable Intel TSX and enable RTM_ALWAYS_ABORT for
> > +                  processors listed in:
> > +
> > +https://www.intel.com/content/www/us/en/support/articles/000059422/processors.html
> > +                */
> > +disable_tsx:
> > +               CPU_FEATURE_UNSET (cpu_features, HLE);
> > +               CPU_FEATURE_UNSET (cpu_features, RTM);
> > +               CPU_FEATURE_SET (cpu_features, RTM_ALWAYS_ABORT);
> > +             }
> > +             break;
> >             case 0x3f:
> >               /* Xeon E7 v3 with stepping >= 4 has working TSX.  */
> >               if (stepping >= 4)
> > --
> > 2.34.1
> >
>
> LGTM.

I am backporting this to release branches.

-- 
H.J.

^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2022-02-01 13:43 UTC | newest]

Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
     [not found] <20220118212940.2051376-1-hjl.tools@gmail.com>
     [not found] ` <CAFUsyfL4Tw=KZUSdmGLDBsDW7aOaSFC2RmJd58SxxpXxh2Ef8Q@mail.gmail.com>
2022-02-01 13:42   ` [PATCH v2] x86: Black list more Intel CPUs for TSX [BZ #27398] H.J. Lu

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).