Received: by 10.223.185.116 with SMTP id b49csp1802387wrg; Sat, 17 Feb 2018 05:43:45 -0800 (PST) X-Google-Smtp-Source: AH8x226w8Yubf8TvRqevDgesuwzDoz64jT+eIri4KSAl8tt2obM0IRQ4pBpZr95D7sm+Zvm+hUkA X-Received: by 10.99.131.198 with SMTP id h189mr7889280pge.25.1518875025596; Sat, 17 Feb 2018 05:43:45 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1518875025; cv=none; d=google.com; s=arc-20160816; b=kJbEBZbRQPxRJxkxo76SANWDNtOo2Ha3iqsdQGYgPICIi739hWMpXhUaQwtz/Bas8k Z2pPkbk0UriwQFGQTP9D/Ziji/waJTOSQfZd8aU9H7k5xa/F4mD58qdledfUpKnZ9TIM w1teBHGqbUUuJzd3pJnGQi8Cij6GogglgCoDAoNeBtdwUA5nd33OcOinTdSBeI+vOfpz 28L/VlbKn9rnikGdruwCcHZnjwDyrqIkNizxTWXugTkColGPMMrY7sR6o4FG6W+IfBk4 lhZ5BByexH4BolZ644QeBAIhFuN2Rm9OR6bU2oHFmGZKgOVAkWTVKXiQL6qDF8RzOJ4C vXVA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature:dkim-signature :arc-authentication-results; bh=uZbE76elsPjsVgu1QUZkY0DvmnR1iJK5yp19r+p7Y4g=; b=ynr0GMA9L1WjgQ+LFnhuddzHQDYAKYpywhE1YQ1W2PfXBuIGRNcSvsp3l0v78YjcXI wllNE5gwK+pAXmbfAvD09j6iGPFwu26TQ86vmEwQ3q4OPnLerrVk29Wv37tlvdOGAvXF +U7AN9ffIjSocMXYjz1svy9nRuEZwQviNNiAZOBTlaF6F34nlT9R4Zk9weWE96+8+i94 pgrcJYmfzG5ffKwDwHV4sGLeW51h1gjeuk1ulD52Eu+8XBKA0gpeKiUZMvjI3nc7pMg4 TomlxtETLI9GEn+/LuTixlnxNUyht6FdD2vtTHlpfRV6zId0gV36RiXE5aYMRZRY7Ms2 eyAQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@hmh.eng.br header.s=fm1 header.b=ZST46MD3; dkim=pass header.i=@messagingengine.com header.s=fm2 header.b=Bt2uzuB6; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s11si3940458pgp.162.2018.02.17.05.43.31; Sat, 17 Feb 2018 05:43:45 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@hmh.eng.br header.s=fm1 header.b=ZST46MD3; dkim=pass header.i=@messagingengine.com header.s=fm2 header.b=Bt2uzuB6; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751182AbeBQNmx (ORCPT + 99 others); Sat, 17 Feb 2018 08:42:53 -0500 Received: from out5-smtp.messagingengine.com ([66.111.4.29]:50945 "EHLO out5-smtp.messagingengine.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751050AbeBQNmw (ORCPT ); Sat, 17 Feb 2018 08:42:52 -0500 Received: from compute5.internal (compute5.nyi.internal [10.202.2.45]) by mailout.nyi.internal (Postfix) with ESMTP id 7B75A20BF9; Sat, 17 Feb 2018 08:42:51 -0500 (EST) Received: from frontend1 ([10.202.2.160]) by compute5.internal (MEProxy); Sat, 17 Feb 2018 08:42:51 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=hmh.eng.br; h=cc :content-type:date:from:in-reply-to:message-id:mime-version :references:subject:to:x-me-sender:x-me-sender:x-sasl-enc; s= fm1; bh=uZbE76elsPjsVgu1QUZkY0DvmnR1iJK5yp19r+p7Y4g=; b=ZST46MD3 9ZKp9FrOwEybtZ4xM0dniX/x2pE6POhTEQ1E7WENh4Ymj0YcDNjP3M0huzFeL+nt FWhwtKM7j5u285USUWAjIX7ar7WNJcCuS1eT43/qc/1SsYOTuHavYCLv9J2MOHV+ ht3sydseW2tMs9LkTAA9HCQO+zbMVSd86ElXuDq6WxSmxkSNFM+UjDRYHGUdzN6u acqYMIq5bKQzZmAzf0MSiN51HTRPo61OOfRW/lE98GEslUEnyegmv5A1ZiXSJpAp hObaEr6lkaqwGnNRIDjDl37tDuBsEhUWPPsZQbV2iuPnZcT3nbG46nB8pnCL1th/ aPrjCCGlcGapqw== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to:x-me-sender :x-me-sender:x-sasl-enc; s=fm2; bh=uZbE76elsPjsVgu1QUZkY0DvmnR1i JK5yp19r+p7Y4g=; b=Bt2uzuB6D5d24mQ9Ov8KcAgBMupWEUhgB+rmoK2VyCiEz bqdasiFLL2HTlnbGgjpHX2dA0GOT4cSQeyWmBc8Tb04eIPJ0f+Pt/Z42E6fA1BcG x7A2HVOU5PUL49kMvwqf17OaS1bGdAOhRRd2EvhHrI48aw7ITi/5T9rpA3GGK81H 4QRKPXGoNas21jaBVDc6GgHFYV1D32q7yoW+UgYAc43k2hVU+muQSylIxKs014RO QLQatT3gvRYyiWelV3cSO7UpuaeKsAvEPF2zvEjOKGy9bZWxKvr74DnP+zY3gw5O muMO+IySU85WtjAzdzIFiMN8RMXpw2VpKAY4m71Bg== X-ME-Sender: Received: from khazad-dum.debian.net (unknown [201.82.128.91]) by mail.messagingengine.com (Postfix) with ESMTPA id 3195D7E4B2; Sat, 17 Feb 2018 08:42:51 -0500 (EST) Received: from localhost (localhost [127.0.0.1]) by localhost.khazad-dum.debian.net (Postfix) with ESMTP id 62A20340040E; Sat, 17 Feb 2018 11:42:49 -0200 (-02) X-Virus-Scanned: Debian amavisd-new at khazad-dum.debian.net Received: from khazad-dum.debian.net ([127.0.0.1]) by localhost (khazad-dum2.khazad-dum.debian.net [127.0.0.1]) (amavisd-new, port 10024) with LMTP id HwfcQTc6ZMuB; Sat, 17 Feb 2018 11:42:48 -0200 (-02) Received: by khazad-dum.debian.net (Postfix, from userid 1000) id 1CA0F340040D; Sat, 17 Feb 2018 11:42:48 -0200 (-02) Date: Sat, 17 Feb 2018 11:42:48 -0200 From: Henrique de Moraes Holschuh To: Ashok Raj Cc: bp@suse.de, X86 ML , LKML Subject: Re: [PATCH] x86/microcode: Check microcode revision before updating sibling threads Message-ID: <20180217134247.sccdynjiqnk2mjby@khazad-dum.debian.net> References: <1518806808-4074-1-git-send-email-ashok.raj@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1518806808-4074-1-git-send-email-ashok.raj@intel.com> X-GPG-Fingerprint1: 4096R/0x0BD9E81139CB4807: C467 A717 507B BAFE D3C1 6092 0BD9 E811 39CB 4807 User-Agent: NeoMutt/20170113 (1.7.2) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 16 Feb 2018, Ashok Raj wrote: > After updating microcode on one of the threads in the core, the > thread sibling automatically gets the update since the microcode > resources are shared. Check the ucode revision on the cpu before > performing a ucode update. I wonder when this broke, because it used to do that just fine. I even had to explain to a couple Debian users that no, nothing was broken and yes, while it looked like the kernel was skipping some "CPUs", it was actually updating all of them... -- Henrique Holschuh