From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751618AbcC0McX (ORCPT ); Sun, 27 Mar 2016 08:32:23 -0400 Received: from out2-smtp.messagingengine.com ([66.111.4.26]:37477 "EHLO out2-smtp.messagingengine.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750855AbcC0McW (ORCPT ); Sun, 27 Mar 2016 08:32:22 -0400 X-Sasl-enc: v5B5ZEsYSGCDXdguatfr18531FGzN4+AlWknSwT7vBSX 1459081940 Date: Sun, 27 Mar 2016 09:32:18 -0300 From: Henrique de Moraes Holschuh To: Borislav Petkov Cc: LKML , X86 ML Subject: Re: [PATCH 0/2] x86/microcode/amd: Do not overwrite specific patch levels Message-ID: <20160327123218.GA28778@khazad-dum.debian.net> References: <1435781656-1890-1-git-send-email-bp@alien8.de> <20160326233157.GA11398@khazad-dum.debian.net> <20160327083159.GA32241@pd.tnic> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20160327083159.GA32241@pd.tnic> X-GPG-Fingerprint1: 4096R/39CB4807 C467 A717 507B BAFE D3C1 6092 0BD9 E811 39CB 4807 User-Agent: Mutt/1.5.23 (2014-03-12) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, 27 Mar 2016, Borislav Petkov wrote: > On Sat, Mar 26, 2016 at 08:31:57PM -0300, Henrique de Moraes Holschuh wrote: > > This patchset looks like it is pretty much a requirement for any distro that > > ships AMD microcode updates... Maybe the two commits should be sent to > > -stable, now that they have seen lots of testing in mainline 4.4.x as well > > as SuSE kernels? > > I wouldn't say lots... :) > > Do you have any specific bug report(s) or similar in mind? Or is it more > of a "it would be wise to backport" sentiment? Well, a Google search shows that microcodes 0x100098 and 0x100009f are not that rare. IMHO, it is a pretty safe bet that both Debian and Ubuntu have some users of those microcodes. Users who will have their systems rendered unbootable (until we teach them about the dis_ucode_ldr parameter to the kernel) if they ever install the amd64-microcode package in a kernel that doesn't have this patchset. So, it is really a bit of both: I had several "it doesn't work" type of reports for both AMD and Intel over the years, and most often people won't come back to the initial bug report, if they even go that far as to report a bug in the first place: they just remove the microcode update packages and disapear... so, I wouldn't know if any were due to this specific issue except by luck. But I do assume there are at least 20 users having trouble that will never report it for each single bug report I get, and it is likely to be a lot more :-( -- "One disk to rule them all, One disk to find them. One disk to bring them all and in the darkness grind them. In the Land of Redmond where the shadows lie." -- The Silicon Valley Tarot Henrique Holschuh