Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp2460165imm; Thu, 7 Jun 2018 10:58:21 -0700 (PDT) X-Google-Smtp-Source: ADUXVKIG+6tP3BZ7RcOR67Fyr7HsZCUhL//QNclU2S5c6OI//zpw7QAIWhtQRCYxyqZzxc5LgzG6 X-Received: by 2002:a65:4d47:: with SMTP id j7-v6mr2368624pgt.19.1528394301827; Thu, 07 Jun 2018 10:58:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1528394301; cv=none; d=google.com; s=arc-20160816; b=obkdGdHRIWZM3e8+Ek8Ut/O1enUckMKjpmDP8UTaL3aaFqcaTrbSMSLvAm/lbt6aON Y18SfXhiQNwpyA6piBz4Kk0iahqBJ251lYK1MVpSyhYgigs/IPuFT/cJRHvTHu2iXxpk GmXtqJ18CJ+kUJZ9xnypmPz9qaumxtLtjla5AM9CI5YYVy65omscAH7fbENpLHDlrSu0 ceBLVWVXhXWRWE9uwjyQJvcHxRq7m5MVgviposTbmRUUYU0hC0/EXEof/O6DIN7W1Qz4 tiu5LKQMoYWAdlkErYiVENWHtbsFju5uVCseCffmr4qcEY+23Vg5wc4U5vxAzddLSNep Y/tg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:subject:message-id:date:cc:to :from:mime-version:content-transfer-encoding:content-disposition :arc-authentication-results; bh=oFj1c02VBEvIwZXIjx3P2EdgAbyVPh72l7QLUy5t7j8=; b=0RYKRzNfXzj4koqBVzPAGgEVEeQLpHld8o2A96dYruVNaFTk67qTusF9luRHnqN1e0 OOAmWI5YKLs4z1tOsUQ6b4JmabjYQQdEAoDyPT71RQ0F6y9pE9GmlKMrCiVeXDVAp+cQ lhni8BBqzf3YbiIFs00Y6y0nW7vDi2e2QeeddxtaUu0jkYMDhleFCNXjYTsWY3wWMkGc Yi+zmFMIGCJvszgS50aVfir4X/JoelRu6sEISrOikVqrqutlh4cg/bDW8k/q0HEcXbd8 cp0w7uitLqHLiCd/6t9Lcibu8O8d+2q1fkgyQWBBZ1RE8pekryyXVR16ZQuxlFFh/BKV MMXw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 38-v6si7986750pln.390.2018.06.07.10.58.06; Thu, 07 Jun 2018 10:58:21 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S935009AbeFGOqg (ORCPT + 99 others); Thu, 7 Jun 2018 10:46:36 -0400 Received: from shadbolt.e.decadent.org.uk ([88.96.1.126]:40774 "EHLO shadbolt.e.decadent.org.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S934993AbeFGOqd (ORCPT ); Thu, 7 Jun 2018 10:46:33 -0400 Received: from [148.252.241.226] (helo=deadeye) by shadbolt.decadent.org.uk with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.84_2) (envelope-from ) id 1fQvbv-0005hO-CU; Thu, 07 Jun 2018 15:09:55 +0100 Received: from ben by deadeye with local (Exim 4.91) (envelope-from ) id 1fQvaz-0002lG-NB; Thu, 07 Jun 2018 15:08:57 +0100 Content-Type: text/plain; charset="UTF-8" Content-Disposition: inline Content-Transfer-Encoding: 8bit MIME-Version: 1.0 From: Ben Hutchings To: linux-kernel@vger.kernel.org, stable@vger.kernel.org CC: akpm@linux-foundation.org, "Peter Zijlstra" , "David Woodhouse" , "Borislav Petkov" , "Ingo Molnar" , "Greg Kroah-Hartman" , "Dave Hansen" , pbonzini@redhat.com, kvm@vger.kernel.org, "Linus Torvalds" , "Thomas Gleixner" , "Arjan van de Ven" , "Josh Poimboeuf" , "David Woodhouse" , "Andy Lutomirski" , "Arjan van de Ven" , "Dan Williams" , dave.hansen@intel.com Date: Thu, 07 Jun 2018 15:05:21 +0100 Message-ID: X-Mailer: LinuxStableQueue (scripts by bwh) Subject: [PATCH 3.16 064/410] x86/speculation: Correct Speculation Control microcode blacklist again In-Reply-To: X-SA-Exim-Connect-IP: 148.252.241.226 X-SA-Exim-Mail-From: ben@decadent.org.uk X-SA-Exim-Scanned: No (on shadbolt.decadent.org.uk); SAEximRunCond expanded to false Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 3.16.57-rc1 review patch. If anyone has any objections, please let me know. ------------------ From: David Woodhouse commit d37fc6d360a404b208547ba112e7dabb6533c7fc upstream. Arjan points out that the Intel document only clears the 0xc2 microcode on *some* parts with CPUID 506E3 (INTEL_FAM6_SKYLAKE_DESKTOP stepping 3). For the Skylake H/S platform it's OK but for Skylake E3 which has the same CPUID it isn't (yet) cleared. So removing it from the blacklist was premature. Put it back for now. Also, Arjan assures me that the 0x84 microcode for Kaby Lake which was featured in one of the early revisions of the Intel document was never released to the public, and won't be until/unless it is also validated as safe. So those can change to 0x80 which is what all *other* versions of the doc have identified. Once the retrospective testing of existing public microcodes is done, we should be back into a mode where new microcodes are only released in batches and we shouldn't even need to update the blacklist for those anyway, so this tweaking of the list isn't expected to be a thing which keeps happening. Requested-by: Arjan van de Ven Signed-off-by: David Woodhouse Cc: Andy Lutomirski Cc: Arjan van de Ven Cc: Borislav Petkov Cc: Dan Williams Cc: Dave Hansen Cc: David Woodhouse Cc: Greg Kroah-Hartman Cc: Josh Poimboeuf Cc: Linus Torvalds Cc: Peter Zijlstra Cc: Thomas Gleixner Cc: arjan.van.de.ven@intel.com Cc: dave.hansen@intel.com Cc: kvm@vger.kernel.org Cc: pbonzini@redhat.com Link: http://lkml.kernel.org/r/1518449255-2182-1-git-send-email-dwmw@amazon.co.uk Signed-off-by: Ingo Molnar Signed-off-by: Ben Hutchings --- arch/x86/kernel/cpu/intel.c | 11 ++++++----- 1 file changed, 6 insertions(+), 5 deletions(-) --- a/arch/x86/kernel/cpu/intel.c +++ b/arch/x86/kernel/cpu/intel.c @@ -40,13 +40,14 @@ struct sku_microcode { u32 microcode; }; static const struct sku_microcode spectre_bad_microcodes[] = { - { INTEL_FAM6_KABYLAKE_DESKTOP, 0x0B, 0x84 }, - { INTEL_FAM6_KABYLAKE_DESKTOP, 0x0A, 0x84 }, - { INTEL_FAM6_KABYLAKE_DESKTOP, 0x09, 0x84 }, - { INTEL_FAM6_KABYLAKE_MOBILE, 0x0A, 0x84 }, - { INTEL_FAM6_KABYLAKE_MOBILE, 0x09, 0x84 }, + { INTEL_FAM6_KABYLAKE_DESKTOP, 0x0B, 0x80 }, + { INTEL_FAM6_KABYLAKE_DESKTOP, 0x0A, 0x80 }, + { INTEL_FAM6_KABYLAKE_DESKTOP, 0x09, 0x80 }, + { INTEL_FAM6_KABYLAKE_MOBILE, 0x0A, 0x80 }, + { INTEL_FAM6_KABYLAKE_MOBILE, 0x09, 0x80 }, { INTEL_FAM6_SKYLAKE_X, 0x03, 0x0100013e }, { INTEL_FAM6_SKYLAKE_X, 0x04, 0x0200003c }, + { INTEL_FAM6_SKYLAKE_DESKTOP, 0x03, 0xc2 }, { INTEL_FAM6_BROADWELL_CORE, 0x04, 0x28 }, { INTEL_FAM6_BROADWELL_GT3E, 0x01, 0x1b }, { INTEL_FAM6_BROADWELL_XEON_D, 0x02, 0x14 },