Received: by 10.223.185.116 with SMTP id b49csp641271wrg; Sat, 10 Feb 2018 15:43:46 -0800 (PST) X-Google-Smtp-Source: AH8x227NV2Z2ya1sBMZLZfEUNwms1x8010ifwlHDOG4q6Eae7nMUxOraeUAFDHK9sJRfQlNiTt6v X-Received: by 10.101.89.3 with SMTP id f3mr5912234pgu.372.1518306226246; Sat, 10 Feb 2018 15:43:46 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1518306226; cv=none; d=google.com; s=arc-20160816; b=iHRW1EvpT/3GwCmg5g71iSMoQah62iBXij21cUqMYqQ18T2xCpt3HuBJWhDumZ5XlU irgzgKJY4bpBOJ4QzFiwpj731/8W4D3ViE5OndLMN2TN2LtDh17l+ECaL66sc0Ju92TZ zaEYHK/Dc0gXA0nflZsz0aKPaODXRyPIlo8xUqQL/0xEnaYm3QQd4w33tTvkwg5uF4sh qILuuD5Nw2W1rueezlrl6nUmqtG8X5W9NzNHS0WmPcQnHlTD8Acv1OClpHUxAQRyR5CZ g2QQTwAPa2NcczTPBZfLkKyy4u5BDNybi8YCPJtCc825CnfHRB4cohGAG/5w81aDeulL yCWw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:to:from:dkim-signature:arc-authentication-results; bh=reWMW792MaWAXMdnTONVU9Ty00J2XpHsTqcH+UveFmw=; b=Qpte38+/5e0f3ylOzlvTIfUY2fhz1WrvcQ9FtsUkWsxyB3AjDh5Efm4bT1TT65QsQv AmoOkXR3NT+RXLA8dPB67nq/KPKwvyv/WviRu1Qj9+U2rEMh8P8/In635XC/SzfQVwHB p7uTUFY8KcPzcfRm6GBBBLoEMRnbXMfBERui1pa9Q0pruJ1mIfOCzhFcev1XKcHXkJbD +eYKxaKHEm9JScHTFYAKFh0x8Qt4jcv9PZUljYsQHtZeLHy5xQIzqoHIv9GXGtZT3/bf KpHjcXyEP+Y2KKtaNY2h5h7Q0nQ6zLg/A/oDcK68RepyUGnW37TZqneX/poJFstvET8Z YSDA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@amazon.co.uk header.s=amazon201209 header.b=ir61NWNO; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amazon.co.uk Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y12si2454411pgv.267.2018.02.10.15.43.32; Sat, 10 Feb 2018 15:43:46 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@amazon.co.uk header.s=amazon201209 header.b=ir61NWNO; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amazon.co.uk Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753165AbeBJXlD (ORCPT + 99 others); Sat, 10 Feb 2018 18:41:03 -0500 Received: from smtp-fw-6001.amazon.com ([52.95.48.154]:21107 "EHLO smtp-fw-6001.amazon.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752932AbeBJXjs (ORCPT ); Sat, 10 Feb 2018 18:39:48 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amazon.co.uk; i=@amazon.co.uk; q=dns/txt; s=amazon201209; t=1518305988; x=1549841988; h=from:to:subject:date:message-id:in-reply-to:references; bh=reWMW792MaWAXMdnTONVU9Ty00J2XpHsTqcH+UveFmw=; b=ir61NWNODTMwIwt8zoCeT+VUPRKy3XVzNnMGaI2oPwaZiegKA7STXRlv Mh4xxxDjH0LJtquwbWpLlsPQbaDVvtWxe6Xj9zk/rbcy6+AtR8zBJEavT leZteQ0W6gYYAazSJwU6vXdAPR0OEZ/ZlssREU/k6DS2lqWRe8OuYyZ7y Q=; X-IronPort-AV: E=Sophos;i="5.46,492,1511827200"; d="scan'208";a="331584183" Received: from iad6-co-svc-p1-lb1-vlan3.amazon.com (HELO email-inbound-relay-2b-2eab95aa.us-west-2.amazon.com) ([10.124.125.6]) by smtp-border-fw-out-6001.iad6.amazon.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 10 Feb 2018 23:39:47 +0000 Received: from uc8d3ff76b9bc5848a9cc.ant.amazon.com (pdx2-ws-svc-lb17-vlan2.amazon.com [10.247.140.66]) by email-inbound-relay-2b-2eab95aa.us-west-2.amazon.com (8.14.7/8.14.7) with ESMTP id w1ANdegv125918 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 10 Feb 2018 23:39:41 GMT Received: from uc8d3ff76b9bc5848a9cc.ant.amazon.com (localhost [127.0.0.1]) by uc8d3ff76b9bc5848a9cc.ant.amazon.com (8.15.2/8.15.2/Debian-3) with ESMTP id w1ANddLb031581; Sat, 10 Feb 2018 23:39:39 GMT Received: (from dwmw@localhost) by uc8d3ff76b9bc5848a9cc.ant.amazon.com (8.15.2/8.15.2/Submit) id w1ANdc32031580; Sat, 10 Feb 2018 23:39:38 GMT From: David Woodhouse To: tglx@linutronix.de, karahmed@amazon.de, sironi@amazon.de, x86@kernel.org, kvm@vger.kernel.org, torvalds@linux-foundation.org, pbonzini@redhat.com, linux-kernel@vger.kernel.org, bp@alien8.de, peterz@infradead.org, jmattson@google.com, rkrcmar@redhat.com, arjan.van.de.ven@intel.com, dave.hansen@intel.com Subject: [PATCH v2 1/6] x86/speculation: Update Speculation Control microcode blacklist Date: Sat, 10 Feb 2018 23:39:22 +0000 Message-Id: <1518305967-31356-2-git-send-email-dwmw@amazon.co.uk> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1518305967-31356-1-git-send-email-dwmw@amazon.co.uk> References: <1518305967-31356-1-git-send-email-dwmw@amazon.co.uk> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Intel have retroactively blessed the 0xc2 microcode on Skylake mobile and desktop parts, and the Gemini Lake 0x22 microcode is apparently fine too. We blacklisted the latter purely because it was present with all the other problematic ones in the 2018-01-08 release, but now it's explicitly listed as OK. We still list 0x84 for the various Kaby Lake / Coffee Lake parts, as that appeared in one version of the blacklist and then reverted to 0x80 again. We can change it if 0x84 is actually announced to be safe. Signed-off-by: David Woodhouse --- arch/x86/kernel/cpu/intel.c | 4 ---- 1 file changed, 4 deletions(-) diff --git a/arch/x86/kernel/cpu/intel.c b/arch/x86/kernel/cpu/intel.c index 319bf98..f73b814 100644 --- a/arch/x86/kernel/cpu/intel.c +++ b/arch/x86/kernel/cpu/intel.c @@ -123,8 +123,6 @@ static const struct sku_microcode spectre_bad_microcodes[] = { { INTEL_FAM6_KABYLAKE_MOBILE, 0x09, 0x84 }, { INTEL_FAM6_SKYLAKE_X, 0x03, 0x0100013e }, { INTEL_FAM6_SKYLAKE_X, 0x04, 0x0200003c }, - { INTEL_FAM6_SKYLAKE_MOBILE, 0x03, 0xc2 }, - { INTEL_FAM6_SKYLAKE_DESKTOP, 0x03, 0xc2 }, { INTEL_FAM6_BROADWELL_CORE, 0x04, 0x28 }, { INTEL_FAM6_BROADWELL_GT3E, 0x01, 0x1b }, { INTEL_FAM6_BROADWELL_XEON_D, 0x02, 0x14 }, @@ -136,8 +134,6 @@ static const struct sku_microcode spectre_bad_microcodes[] = { { INTEL_FAM6_HASWELL_X, 0x02, 0x3b }, { INTEL_FAM6_HASWELL_X, 0x04, 0x10 }, { INTEL_FAM6_IVYBRIDGE_X, 0x04, 0x42a }, - /* Updated in the 20180108 release; blacklist until we know otherwise */ - { INTEL_FAM6_ATOM_GEMINI_LAKE, 0x01, 0x22 }, /* Observed in the wild */ { INTEL_FAM6_SANDYBRIDGE_X, 0x06, 0x61b }, { INTEL_FAM6_SANDYBRIDGE_X, 0x07, 0x712 }, -- 2.7.4