Received: by 10.223.176.46 with SMTP id f43csp594885wra; Fri, 26 Jan 2018 03:58:49 -0800 (PST) X-Google-Smtp-Source: AH8x226ttabF+MhH5EKkyG/aydCAUfKfBk9PhKqHH6Th4TPVXNY+WGPdcAOcbQPbLQWacdDnUFIN X-Received: by 2002:a17:902:328:: with SMTP id 37-v6mr7088300pld.398.1516967929733; Fri, 26 Jan 2018 03:58:49 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1516967929; cv=none; d=google.com; s=arc-20160816; b=TQzaToamnK4zVO4WB3F40/1EG1sRBffaZHVlNvbJs8ftwW0yPVVkwIfgZ2lk1rQZSn ZqxfG4+lDmSfkY/pZHgreLx6fL4ayDQ5693YUwPrHGpF8tfF00+O4kqg3zYGmCn1ZLQH VurfuZ11P6Axc7a3nwzmz/KADuFbo0KThFKZO+X8oYDmQzSuhOvzkQQU/v/vgNPcQzs2 UsLbC6bTYraylYHz39RlsOioz/IpOYrYSsaob70bEGf+OUj/tOLhUbolc071jOLcaYai W+ZxQ7i0fC+WlndSDd+VFgs0I2Zz94ie2gbkOF7c3DjwQOs7qNDywjd+TCC7LP1LIbfT 8Rvw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=61yphFy07wlhfvBBgP+JVYz8I+zQc1YYs83Q4AdJNj0=; b=wCKDJ87iU5W91bLejbNltp+jzLdA574IYu0cIMHbLv/1lnTSyQ3ZA+FZFA/zRWBNUY yRVo4BOpEsaNT92HwCXHXjcWmBkcId4Dv5KO2CfoXDIsEIfLpTJB8+wH8pfpBwh/fseR 1yFIjius1esJxFwgkvKfh93VyEb10W8R4BO6L285ihu9CenZ2GWdHXIXQlIPrOP9FFQK LjM041OJZt3Ppt0zRZ6rSO+n+5U+uQC487qU5kYFLbmZjrv5aT1YUBqy0r652+WLnLcz qYmHVoN5j9Y48M1Z9+UbVW+2QaD4EG6C9X2cgWqTEeTGwAxpUnPXsoAX+glo75uZlVS/ k7mA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y5si6200234pfl.267.2018.01.26.03.58.34; Fri, 26 Jan 2018 03:58:49 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751783AbeAZL6N (ORCPT + 99 others); Fri, 26 Jan 2018 06:58:13 -0500 Received: from mail.skyhub.de ([5.9.137.197]:56868 "EHLO mail.skyhub.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751457AbeAZL6M (ORCPT ); Fri, 26 Jan 2018 06:58:12 -0500 X-Virus-Scanned: Nedap ESD1 at mail.skyhub.de Received: from mail.skyhub.de ([127.0.0.1]) by localhost (blast.alien8.de [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id a3xI3c7hcE62; Fri, 26 Jan 2018 12:58:10 +0100 (CET) Received: from pd.tnic (p200300EC2BCF3A0024194793E6CFFC7A.dip0.t-ipconnect.de [IPv6:2003:ec:2bcf:3a00:2419:4793:e6cf:fc7a]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.skyhub.de (SuperMail on ZX Spectrum 128k) with ESMTPSA id B6ABD1EC0236; Fri, 26 Jan 2018 12:58:10 +0100 (CET) Date: Fri, 26 Jan 2018 12:58:00 +0100 From: Borislav Petkov To: Petr Oros Cc: Thomas Gleixner , Ingo Molnar , "H. Peter Anvin" , x86@kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH] x86/microcode/intel: print previous microcode revision during early update Message-ID: <20180126115800.bvqrzik2f3hmmiah@pd.tnic> References: <20180126103451.16863-1-poros@redhat.com> <20180126104109.slxxoq4vkqytqjxd@pd.tnic> <1516967135.2801.1.camel@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <1516967135.2801.1.camel@redhat.com> User-Agent: NeoMutt/20170609 (1.8.3) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Jan 26, 2018 at 12:45:35PM +0100, Petr Oros wrote: > During time of facing the Spectre vulnerability and the requirement of handling > different microcode updates, it has shown, that it would be useful to have > additional information which microcode version was in BIOS, if the early-update > routine will apply an update. Dmesg tells you if the update was applied or not. And if you really wanna know the old microcode revision, you can boot with "dis_ucode_ldr" and do "grep microcode /proc/cpuinfo". -- Regards/Gruss, Boris. Good mailing practices for 400: avoid top-posting and trim the reply.