On Fri, 11 Jul 2025, Borislav Petkov wrote:
On Fri, Jul 11, 2025 at 02:03:31PM +0200, Thomas Voegtle wrote:
Is something missing in 6.6.y and 6.12.y?
I have a suspicion. Run the below patch, pls, and send me full dmesg.
Also send me your .config.
Thx.
diff --git a/arch/x86/kernel/cpu/amd.c b/arch/x86/kernel/cpu/amd.c index 1180689a2390..104a2375c281 100644 --- a/arch/x86/kernel/cpu/amd.c +++ b/arch/x86/kernel/cpu/amd.c @@ -569,12 +569,15 @@ static bool amd_check_tsa_microcode(void) case 0xa70c0: min_rev = 0x0a70c008; break; case 0xaa002: min_rev = 0x0aa00216; break; default:
pr_debug("%s: ucode_rev: 0x%x, current revision: 0x%x\n",
pr_info("%s: ucode_rev: 0x%x, current revision: 0x%x\n", __func__, p.ucode_rev, c->microcode); return false;
} }
pr_info("c->microcode: 0x%x, min_rev: 0x%x\n",
c->microcode, min_rev);
if (!min_rev) return false;
dmesg | grep -E '(micro|min_rev)' [ 0.000000] amd_check_tsa_microcode: ucode_rev: 0xa001000, current revision: 0xa20102e [ 0.543235] Transient Scheduler Attacks: Vulnerable: Clear CPU buffers attempted, no microcode [ 1.168831] microcode: Current revision: 0x0a20102e [ 1.168835] microcode: Updated early from: 0x0a201016 [ 1.168922] microcode: Microcode Update Driver: v2.2.
dmesg and config are attached.
thanks,
Thomas