Received: by 10.223.176.46 with SMTP id f43csp715973wra; Fri, 26 Jan 2018 05:53:47 -0800 (PST) X-Google-Smtp-Source: AH8x225QrM9gs/Y90QhJQr565406PPNBS75dm+ims1KqF92n4LeHqeIMh8YipWmZZniLh6vJSxgd X-Received: by 2002:a17:902:6849:: with SMTP id f9-v6mr14810130pln.113.1516974827520; Fri, 26 Jan 2018 05:53:47 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1516974827; cv=none; d=google.com; s=arc-20160816; b=T/GKroyMihd3ImvPO8xPwqzaKUt0k9JDESIPFPJrDJiwOTW/qyR+Hvz9SBMfpgKzEO wg56rqYi9GT7NzQRk4y8ga1j99xhiDY+b6pQP97zaevrgMG1Ufn/09qigeTJ2gB1rRDX DL8wWYK0+sot5mZxPQG6jUw+kwkAg6JTvTQrQnKpSlSHXldObF1o6laLTT1ET4NUSp9s jamUE53ksV6NVH8I2608GBw/1q4K2Ii/1ObFf9k1/qgz6NadBnkZGg2Z3uv1fSKxBoT7 9kpEYlVRm2ScaU2TrtJ361dsMvD7Np3GaQ04vrlS/nSErHeuujoIglMvI0Ch1CshvlbR OP2g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :organization:references:in-reply-to:date:cc:to:reply-to:from :subject:message-id:arc-authentication-results; bh=c0NSOSIh+2ejc9LC3XXk8WklouvZJC8cCf1hzhxga9Y=; b=pLYB3JTcdjWcYEACsuaV+l09eBG2wflM1tAxBqo8Aird9mxOlUCTEho09UVEw1o33i bqwlUzOC1UjUOLYO5G27msA+nq7daN1eZaDDxJ0YX4iePfbzuLTiyzzAle5lt/HQKyFP jiViFkxqJ7EMUgTGnwgS6Pw20qVwu92xIj2wkKBYYZPqVl5ibQys8UQLQjsaA2HZJBDH VoMg+x9WX/t0P8QrlqxNyhd0bYyRbihgJGw3SbblToKroyEPZBIyDsLWbPEmU172QRD9 nMIsQisSUYC+QsKS8sDK2+uWDAc4YGsFpSTfYSSSZtUwNwSAH+rW/rGqQBEmXHbGUvey sCIw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o13si3004770pgp.740.2018.01.26.05.53.33; Fri, 26 Jan 2018 05:53:47 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753070AbeAZNwq (ORCPT + 99 others); Fri, 26 Jan 2018 08:52:46 -0500 Received: from mx1.redhat.com ([209.132.183.28]:37910 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752819AbeAZNuD (ORCPT ); Fri, 26 Jan 2018 08:50:03 -0500 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.phx2.redhat.com [10.5.11.14]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 9D33E489; Fri, 26 Jan 2018 13:50:03 +0000 (UTC) Received: from [10.43.2.12] (unknown [10.43.2.12]) by smtp.corp.redhat.com (Postfix) with ESMTP id 7A9C77ED7D; Fri, 26 Jan 2018 13:50:01 +0000 (UTC) Message-ID: <1516974600.2801.10.camel@redhat.com> Subject: Re: [PATCH] x86/microcode/intel: print previous microcode revision during early update From: Petr Oros Reply-To: poros@redhat.com To: Borislav Petkov Cc: Thomas Gleixner , Ingo Molnar , "H. Peter Anvin" , x86@kernel.org, linux-kernel@vger.kernel.org Date: Fri, 26 Jan 2018 14:50:00 +0100 In-Reply-To: <20180126115800.bvqrzik2f3hmmiah@pd.tnic> References: <20180126103451.16863-1-poros@redhat.com> <20180126104109.slxxoq4vkqytqjxd@pd.tnic> <1516967135.2801.1.camel@redhat.com> <20180126115800.bvqrzik2f3hmmiah@pd.tnic> Organization: Red Hat Content-Type: text/plain; charset="UTF-8" Mime-Version: 1.0 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.79 on 10.5.11.14 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.29]); Fri, 26 Jan 2018 13:50:03 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Borislav Petkov píše v Pá 26. 01. 2018 v 12:58 +0100: > On Fri, Jan 26, 2018 at 12:45:35PM +0100, Petr Oros wrote: > > During time of facing the Spectre vulnerability and the requirement of handling > > different microcode updates, it has shown, that it would be useful to have > > additional information which microcode version was in BIOS, if the early-update > > routine will apply an update. > > Dmesg tells you if the update was applied or not. > > And if you really wanna know the old microcode revision, you can boot > with "dis_ucode_ldr" and do "grep microcode /proc/cpuinfo". > Ohh, yes, it is easy and fast. Mainly in time when new microcodes are released frequently and microcode can be early updated from initrd too. But what in production? Edit boot params, restart server, grep /proc/cpuinfo and restart again? Why i can not read it just from dmesg? Thanks, -Petr