Received: by 10.223.176.46 with SMTP id f43csp584064wra; Fri, 26 Jan 2018 03:46:52 -0800 (PST) X-Google-Smtp-Source: AH8x225ZFgV1IzyjL72xGcHYzDHhE4kmC1ydGm9PxPUzkj6W0BK0SHi6WKebI9cucSUaikUNarrn X-Received: by 2002:a17:902:67:: with SMTP id 94-v6mr14010199pla.183.1516967212657; Fri, 26 Jan 2018 03:46:52 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1516967212; cv=none; d=google.com; s=arc-20160816; b=xL/Xm/h01QCcUE3VEixXOpfNVzgYmhPkUTZR4BULB4bo0keH5OPNjPF+G/sFIDe7UN 5lUD9BahCxWVjtCouuBn7wgR9F6w7UgI6mCS6Ds14lzpff4p0ZaQzGVV1z6Joic8mQqH btOCxhdgWhiObiCghGjetsG+coEgXO1EXNXCvZWxfKqHodSmSDQUa8GuAEkgR6t8v3eE yFbtYIt1anBGxMRLXt+hKdUWYKoRyD+Vx+59cM8hPQ3UKe9iXVlC/qHvFcqJkVagR25C GxpKGvsCAxXDedYkaESp8T12q4uwmz7UoycupGACqgvKb9M3n2p2ObY97xukvhIz5/g7 ca3w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :organization:references:in-reply-to:date:cc:to:reply-to:from :subject:message-id:arc-authentication-results; bh=Seb9GAZ9/hBEGUbFjSiE3USgH+gOGWagf2XSgFCcSC4=; b=TEe4kKFsLxlNVGO3Xkrl/pUlxwmJjqMHJBO4ZhQnakXn1Rq5OFM5QXlOwK7wVfAgYm TWm74u9vOOqqofYFwC1/N0twpyJMUMDDltW17U5BtrKWl0I6vpaW/CIXCo9ZXUjkIz4y o3v6slEQ+Fjlbf3fM/Bsfm6EcE4ejeAifbvZG6te1WTaN9XHlda2nnyZxpzptH4F4uCx u5ELzFJE50abkt3gUW9uWg6ZbVi5GYRYSXGspYccyaZJZk2K2UYT7YWD7OLU+JswQuMV EhbKppqqp/RwKWuyQsoI33TbjlXxoTiQSFJ4+shD1l7c4NVWPW47sP9emjbGPYdBbmLt 7yzA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 201si6239967pfu.37.2018.01.26.03.46.38; Fri, 26 Jan 2018 03:46:52 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751804AbeAZLpi (ORCPT + 99 others); Fri, 26 Jan 2018 06:45:38 -0500 Received: from mx1.redhat.com ([209.132.183.28]:41554 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751363AbeAZLph (ORCPT ); Fri, 26 Jan 2018 06:45:37 -0500 Received: from smtp.corp.redhat.com (int-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.12]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 62C5FDEE92; Fri, 26 Jan 2018 11:45:37 +0000 (UTC) Received: from [10.43.2.12] (unknown [10.43.2.12]) by smtp.corp.redhat.com (Postfix) with ESMTP id 102BC6CE44; Fri, 26 Jan 2018 11:45:35 +0000 (UTC) Message-ID: <1516967135.2801.1.camel@redhat.com> Subject: Re: [PATCH] x86/microcode/intel: print previous microcode revision during early update From: Petr Oros Reply-To: poros@redhat.com To: Borislav Petkov Cc: Thomas Gleixner , Ingo Molnar , "H. Peter Anvin" , x86@kernel.org, linux-kernel@vger.kernel.org Date: Fri, 26 Jan 2018 12:45:35 +0100 In-Reply-To: <20180126104109.slxxoq4vkqytqjxd@pd.tnic> References: <20180126103451.16863-1-poros@redhat.com> <20180126104109.slxxoq4vkqytqjxd@pd.tnic> Organization: Red Hat Content-Type: text/plain; charset="UTF-8" Mime-Version: 1.0 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.79 on 10.5.11.12 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.39]); Fri, 26 Jan 2018 11:45:37 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Borislav Petkov píše v Pá 26. 01. 2018 v 11:41 +0100: > On Fri, Jan 26, 2018 at 11:34:50AM +0100, Petr Oros wrote: > > When kernel do early microcode update, code printing only > > new microcode version. But in this case we no have chance > > to check which version was in cpu from BIOS vendor. > > And we need that because? > During time of facing the Spectre vulnerability and the requirement of handling different microcode updates, it has shown, that it would be useful to have additional information which microcode version was in BIOS, if the early-update routine will apply an update.