x86/tsx: Implement controls for RTM force-abort mode
authorAndrew Cooper <andrew.cooper3@citrix.com>
Mon, 18 Mar 2019 16:08:25 +0000 (17:08 +0100)
committerJan Beulich <jbeulich@suse.com>
Mon, 18 Mar 2019 16:08:25 +0000 (17:08 +0100)
commitfc46e159a6b1c379a0dac918120267b606d4defd
treefd5f2f612ffaf2aa562f805bba0b528e908883dd
parent4db8fddf7770b2c55bce8b98e37503c2d2a3c8c9
x86/tsx: Implement controls for RTM force-abort mode

The CPUID bit and MSR are deliberately not exposed to guests, because they
won't exist on newer processors.  As vPMU isn't security supported, the
misbehaviour of PCR3 isn't expected to impact production deployments.

Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
master commit: 6be613f29b4205349275d24367bd4c82fb2960dd
master date: 2019-03-12 17:05:21 +0000
docs/misc/xen-command-line.markdown
tools/misc/xen-cpuid.c
xen/arch/x86/cpu/intel.c
xen/arch/x86/cpu/vpmu.c
xen/arch/x86/msr.c
xen/include/asm-x86/cpufeature.h
xen/include/asm-x86/msr-index.h
xen/include/asm-x86/vpmu.h
xen/include/public/arch-x86/cpufeatureset.h