Re: [PATCH 06/24] x86/cpufeature: Blacklist SPEC_CTRL/PRED_CMD on early Spectre v2 microcodes

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



2018-04-18 5:18 GMT+02:00 Youquan Song <youquan.song@xxxxxxxxx>:
> From: David Woodhouse <dwmw@xxxxxxxxxxxx>
>
> (cherry picked from commit a5b2966364538a0e68c9fa29bc0a3a1651799035)
>
> This doesn't refuse to load the affected microcodes; it just refuses to
> use the Spectre v2 mitigation features if they're detected, by clearing
> the appropriate feature bits.
>
> The AMD CPUID bits are handled here too, because hypervisors *may* have
> been exposing those bits even on Intel chips, for fine-grained control
> of what's available.
>
> It is non-trivial to use x86_match_cpu() for this table because that
> doesn't handle steppings. And the approach taken in commit bd9240a18
> almost made me lose my lunch.
>
Hi Youquan,

Thanks for doing this.
There are following patches should also be applied:
1751342095f0 ("x86/speculation: Update Speculation Control microcode blacklist")
d37fc6d360a4 ("x86/speculation: Correct Speculation Control microcode
blacklist again")
e3b3121fa8da ("x86/speculation: Remove Skylake C2 from Speculation
Control microcode blacklist")

Hi Greg, please apply also above patches to v4.4 when merge these
patchset, all of them apply cleanly to v4.4.128.

Regards,
Jack Wang



[Index of Archives]     [Linux Kernel]     [Kernel Development Newbies]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite Hiking]     [Linux Kernel]     [Linux SCSI]