Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp5764228imm; Mon, 23 Jul 2018 05:48:04 -0700 (PDT) X-Google-Smtp-Source: AAOMgpd1FphiA2ctaWqnOqcnOqT3dUNONg+zmctf/BfY0BzxK1u49G8gE0Sjk6WSdLoof9y29kDf X-Received: by 2002:a17:902:42a3:: with SMTP id h32-v6mr12654923pld.72.1532350084271; Mon, 23 Jul 2018 05:48:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1532350084; cv=none; d=google.com; s=arc-20160816; b=i7+Lx7a21Sv8AzavrHLiqOLwxf6jsxtaACegWf8lGCpbpdMnpgAU4wPDNUJxI8BoQs P4ezOuq0VesH3IjdrBTT9bNNVgJytBSeZ2zUb6y2no3C0S0pi5epnAohhDA63l8oWpw3 rzGFNol3G4t9jHNs2isq5CCtZ4EHoth+Xo61G2AcvUdD8qvzX08o/YxvwQKZUJf9sO9N LmruEz5c536zF+7smyUmdzx/1/mt88DSAhmq+zXUPTG0RJerGnETIT9T5esAbA88uHjO vTRu6u1/lVMDxpcuEq7SYMYboYhgkfYGl5vhQLbEt58Ik0VofiGn5Ay+TRD/dwopYGby cpJQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=bw+3go3cs3BlROTzMsQb0BBzcr/efdrwM+paJjbCXLU=; b=OhxaXFZF5gDXojdLtxqGpIoQ4VnnQC2LNNuzAlvAMq5pCrC5+jqEOcZL2bLC+kqsOe UZgWfXSiMpO6CnI/c6Khm75V1hmq0TrdUEWz/EOq+ATYnqLrcfP7cjLwFn6ijA+WdNiQ lT+XoVLByIMsNb/t1ZsYf8WOJGAqroyf3b2Edb61hfZ1Co1GnjVu8ZDypEJ5VAXU8U2n 28lAFdQ53Sc+W0CPwDpIGKR6adr652LUPODmz3s9ZzwS9XFwMPbPCSXdOM++DYmILecW 9b8ZDKHi3EQ50OF5DYBBC9ATGhZzZUisgOhklr2ZenIYip57p55Ep24+6ko4ksxW5jp9 boCg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q145-v6si8900347pfq.315.2018.07.23.05.47.49; Mon, 23 Jul 2018 05:48:04 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388763AbeGWNq6 (ORCPT + 99 others); Mon, 23 Jul 2018 09:46:58 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:50590 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388007AbeGWNq5 (ORCPT ); Mon, 23 Jul 2018 09:46:57 -0400 Received: from localhost (LFbn-1-12238-233.w90-92.abo.wanadoo.fr [90.92.53.233]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 73D90C0A; Mon, 23 Jul 2018 12:43:52 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Arjan van de Ven , David Woodhouse , Andy Lutomirski , Arjan van de Ven , Borislav Petkov , Dan Williams , Dave Hansen , David Woodhouse , Josh Poimboeuf , Linus Torvalds , Peter Zijlstra , Thomas Gleixner , dave.hansen@intel.com, kvm@vger.kernel.org, pbonzini@redhat.com, Ingo Molnar , "Srivatsa S. Bhat" , "Matt Helsley (VMware)" , Alexey Makhalov , Bo Gan Subject: [PATCH 4.4 032/107] x86/speculation: Correct Speculation Control microcode blacklist again Date: Mon, 23 Jul 2018 14:41:26 +0200 Message-Id: <20180723122414.447651362@linuxfoundation.org> X-Mailer: git-send-email 2.18.0 In-Reply-To: <20180723122413.003644357@linuxfoundation.org> References: <20180723122413.003644357@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.4-stable review patch. If anyone has any objections, please let me know. ------------------ From: David Woodhouse commit d37fc6d360a404b208547ba112e7dabb6533c7fc upstream. Arjan points out that the Intel document only clears the 0xc2 microcode on *some* parts with CPUID 506E3 (INTEL_FAM6_SKYLAKE_DESKTOP stepping 3). For the Skylake H/S platform it's OK but for Skylake E3 which has the same CPUID it isn't (yet) cleared. So removing it from the blacklist was premature. Put it back for now. Also, Arjan assures me that the 0x84 microcode for Kaby Lake which was featured in one of the early revisions of the Intel document was never released to the public, and won't be until/unless it is also validated as safe. So those can change to 0x80 which is what all *other* versions of the doc have identified. Once the retrospective testing of existing public microcodes is done, we should be back into a mode where new microcodes are only released in batches and we shouldn't even need to update the blacklist for those anyway, so this tweaking of the list isn't expected to be a thing which keeps happening. Requested-by: Arjan van de Ven Signed-off-by: David Woodhouse Cc: Andy Lutomirski Cc: Arjan van de Ven Cc: Borislav Petkov Cc: Dan Williams Cc: Dave Hansen Cc: David Woodhouse Cc: Greg Kroah-Hartman Cc: Josh Poimboeuf Cc: Linus Torvalds Cc: Peter Zijlstra Cc: Thomas Gleixner Cc: arjan.van.de.ven@intel.com Cc: dave.hansen@intel.com Cc: kvm@vger.kernel.org Cc: pbonzini@redhat.com Link: http://lkml.kernel.org/r/1518449255-2182-1-git-send-email-dwmw@amazon.co.uk Signed-off-by: Ingo Molnar Signed-off-by: Greg Kroah-Hartman Signed-off-by: Srivatsa S. Bhat Reviewed-by: Matt Helsley (VMware) Reviewed-by: Alexey Makhalov Reviewed-by: Bo Gan Signed-off-by: Greg Kroah-Hartman --- arch/x86/kernel/cpu/intel.c | 11 ++++++----- 1 file changed, 6 insertions(+), 5 deletions(-) --- a/arch/x86/kernel/cpu/intel.c +++ b/arch/x86/kernel/cpu/intel.c @@ -40,13 +40,14 @@ struct sku_microcode { u32 microcode; }; static const struct sku_microcode spectre_bad_microcodes[] = { - { INTEL_FAM6_KABYLAKE_DESKTOP, 0x0B, 0x84 }, - { INTEL_FAM6_KABYLAKE_DESKTOP, 0x0A, 0x84 }, - { INTEL_FAM6_KABYLAKE_DESKTOP, 0x09, 0x84 }, - { INTEL_FAM6_KABYLAKE_MOBILE, 0x0A, 0x84 }, - { INTEL_FAM6_KABYLAKE_MOBILE, 0x09, 0x84 }, + { INTEL_FAM6_KABYLAKE_DESKTOP, 0x0B, 0x80 }, + { INTEL_FAM6_KABYLAKE_DESKTOP, 0x0A, 0x80 }, + { INTEL_FAM6_KABYLAKE_DESKTOP, 0x09, 0x80 }, + { INTEL_FAM6_KABYLAKE_MOBILE, 0x0A, 0x80 }, + { INTEL_FAM6_KABYLAKE_MOBILE, 0x09, 0x80 }, { INTEL_FAM6_SKYLAKE_X, 0x03, 0x0100013e }, { INTEL_FAM6_SKYLAKE_X, 0x04, 0x0200003c }, + { INTEL_FAM6_SKYLAKE_DESKTOP, 0x03, 0xc2 }, { INTEL_FAM6_BROADWELL_CORE, 0x04, 0x28 }, { INTEL_FAM6_BROADWELL_GT3E, 0x01, 0x1b }, { INTEL_FAM6_BROADWELL_XEON_D, 0x02, 0x14 },