Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp6930257imm; Tue, 28 Aug 2018 03:39:30 -0700 (PDT) X-Google-Smtp-Source: ANB0VdYY47D7R/SInZC7FReFjaQuqIHzTAvOvwsPoxQS3uX+NCPIXJINdzYBFX2CBEveSEiILD3J X-Received: by 2002:a62:f555:: with SMTP id n82-v6mr923979pfh.59.1535452769992; Tue, 28 Aug 2018 03:39:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1535452769; cv=none; d=google.com; s=arc-20160816; b=NE6gJv9llH/4BPhotz3wQJFKuBJRi13daM1zwOrFKu7pJ1tqqkfpsldvtHObuKrS00 fb3PowPWjhcwMjDWxD9aRhTOCfCcCXT17EKtrHDR38LUaaACE0pxzFpK4mBSIIGqS8OS Wr94+CMnVEks9HvvCIsUHCQrWrXO8M6z2p/LLQJAXybhvihWMWsKL/yIkrual2yl1xWY N8xeBiE+iSe37tmU3vCvvyqTA02Pl6Y2vevGdsevlq/X0oF8jjNFfcBTcTGH+8qxiHoW KPgRT2738mBRyrNiYuhDSFWOVlnCzgRtRq2RXUZRYg5oD6TctoXo4KQVcPZ52cyEB9me rz0g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:message-id :subject:to:from:date:arc-authentication-results; bh=bYQ7x0sQnqTL363cIP6E3T3yN0UkgEE4w7igbVxQhRw=; b=kj8Lj0AveNjdSemBechVQPlmZq9PTodQhoS6L3JGUxYiMZK2+dDfbSf+goLMRBrQQT eqXizUw2auesdJi3k9NaUqAleeElIetrL3X90Syh+d3LxRAvKzj+tmNMYRaPRgcM2wVF UO8KWoV/rW4m8TQOqU3SMBWXCX2M4UDRKAUY/cz/CSD/cWrbxohr5PbDV7pShdUP+YUi 4fwXkZxK8xnXojVkjlsDkOECMCb6Guju78I8kF+EnbIsQaljrduH0JbUX/Sb0hmypSTh Y5Jwmu9muq89eF7eGp+r5bv/F5F+tKAd+JcJorqUYuCwmlHFM+CJdD2xV7SjkzeFodWl PWyQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h7-v6si758477pgl.441.2018.08.28.03.39.14; Tue, 28 Aug 2018 03:39:29 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727605AbeH1O2O (ORCPT + 99 others); Tue, 28 Aug 2018 10:28:14 -0400 Received: from er-systems.de ([148.251.68.21]:57450 "EHLO er-systems.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727067AbeH1O2O (ORCPT ); Tue, 28 Aug 2018 10:28:14 -0400 X-Greylist: delayed 607 seconds by postgrey-1.27 at vger.kernel.org; Tue, 28 Aug 2018 10:28:13 EDT Received: from localhost.localdomain (localhost [127.0.0.1]) by er-systems.de (Postfix) with ESMTP id 4A5A2D60115; Tue, 28 Aug 2018 12:27:05 +0200 (CEST) X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on er-systems.de X-Spam-Level: X-Spam-Status: No, score=-2.9 required=5.0 tests=ALL_TRUSTED,BAYES_00 autolearn=ham autolearn_force=no version=3.4.1 Received: from localhost (localhost [127.0.0.1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by er-systems.de (Postfix) with ESMTPS id 2B24CD60109; Tue, 28 Aug 2018 12:27:05 +0200 (CEST) Date: Tue, 28 Aug 2018 12:27:04 +0200 (CEST) From: Thomas Voegtle X-X-Sender: thomas@er-systems.de To: x86@kernel.org, linux-kernel@vger.kernel.org, tglx@linutronix.de, mingo@redhat.com Subject: Apollo Lake with newer microcode: not affected by meltdown anymore? Message-ID: User-Agent: Alpine 2.21 (LSU 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; format=flowed; charset=US-ASCII X-Virus-Status: No X-Virus-Checker-Version: clamassassin 1.2.4 with clamdscan / ClamAV 0.100.1/24880/Tue Aug 28 06:46:22 2018 signatures 58. Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello, Kernel 4.18.5 with old microcode: [ 0.000000] microcode: microcode updated early to revision 0x2c, date = 2017-03-25 cat /sys/devices/system/cpu/vulnerabilities/meltdown Mitigation: PTI Kernel 4.18.5 with new microcode (microcode-20180807.tgz), same config: [ 0.000000] microcode: microcode updated early to revision 0x32, date = 2018-05-11 cat /sys/devices/system/cpu/vulnerabilities/meltdown Not affected This happens with 4.14.y and 4.9.y as well. The same with ssb: old microcode: spec_store_bypass:Vulnerable new microcode: spec_store_bypass:Not affected Is this intentional behavior? I have never seen this on other CPUs, such as Gemini Lake or Baytrail, Haswell etc. This is a Lenovo Ideapad 120S-11IAP with Apollo Lake N3350 (Goldmont) Thomas