2018-04-18 5:18 GMT+02:00 Youquan Song <youquan.song@xxxxxxxxx>: > From: David Woodhouse <dwmw@xxxxxxxxxxxx> > > (cherry picked from commit a5b2966364538a0e68c9fa29bc0a3a1651799035) > > This doesn't refuse to load the affected microcodes; it just refuses to > use the Spectre v2 mitigation features if they're detected, by clearing > the appropriate feature bits. > > The AMD CPUID bits are handled here too, because hypervisors *may* have > been exposing those bits even on Intel chips, for fine-grained control > of what's available. > > It is non-trivial to use x86_match_cpu() for this table because that > doesn't handle steppings. And the approach taken in commit bd9240a18 > almost made me lose my lunch. > Hi Youquan, Thanks for doing this. There are following patches should also be applied: 1751342095f0 ("x86/speculation: Update Speculation Control microcode blacklist") d37fc6d360a4 ("x86/speculation: Correct Speculation Control microcode blacklist again") e3b3121fa8da ("x86/speculation: Remove Skylake C2 from Speculation Control microcode blacklist") Hi Greg, please apply also above patches to v4.4 when merge these patchset, all of them apply cleanly to v4.4.128. Regards, Jack Wang