Intel APX Ready With Linux 6.16, Outdated Intel CPU Microcode Reporting Merged
([Intel] 4 Hours Ago
x86 Core)
- Reference: 0001549323
- News link: https://www.phoronix.com/news/Linux-6.16-x86-Core
- Source link:
Merged for the [1]Linux 6.16 kernel are all of the x86 core enhancements that provide a variety of benefits to Intel as well as AMD processors.
Preparations for Intel [2]Advanced Performance Extensions (APX) support have made it into the Linux 6.16 kernel. The X86_FEATURE_APX feature flag is added, APX state support is now handled, and various other changes around Intel APX. Intel APX isn't intended to be used by kernel code but rather user-space. Various changes though to the Linux kernel were needed for properly managing APX state and being able to report the capability to user-space. Intel APX will be found with future processors as a very exciting addition to the x86_64 world.
This pull also reports to users when running known outdated Intel CPU microcode. With this code in Linux 6.16, via the existing CPU security vulnerabilities/mitigation reporting it is now noted if the Intel CPU is running an oudated microcode version, a.k.a. what was previously covered on Phoronix within [3]Intel Linux Patch Would Report Outdated CPU Microcode As A Security Vulnerability . The information is reported via the /sys/devices/system/cpu/vulnerabilities/old_microcode sysfs file. This outdated CPU microcode reporting will also taint the kernel with "TAINT_CPU_OUT_OF_SPEC" for mkaing it clear to kernel developers the out-of-date CPU microcode.
Also added as part of this merge is the AMD Zen debugging document. More details on that AMD Zen debugging documentation within [4]New Documentation Aims To Help Improve AMD Zen System Debugging On Linux .
Some of the other x86 core changes for Linux 6.16 include improved code-patching scalability, simplifying the 32-bit PAE page table handling, making 5-level paging support on x86_64 unconditional, a fix for the Intel Spectre V2 mitigation handling by default on Intel CPUs, and a lot of other Intel/AMD CPU code refactoring.
More details on these x86 core changes in Linux 6.16 via [5]this pull request that already has been merged to Linux Git.
[1] https://www.phoronix.com/search/Linux+6.16
[2] https://www.phoronix.com/search/Advanced+Performance+Extensions
[3] https://www.phoronix.com/news/Linux-Intel-Old-Microcode-Vuln
[4] https://www.phoronix.com/news/AMD-Ryzen-Linux-Debug-Docs
[5] https://lore.kernel.org/lkml/aDL35MA4vH0wQ6Gb@gmail.com/
Preparations for Intel [2]Advanced Performance Extensions (APX) support have made it into the Linux 6.16 kernel. The X86_FEATURE_APX feature flag is added, APX state support is now handled, and various other changes around Intel APX. Intel APX isn't intended to be used by kernel code but rather user-space. Various changes though to the Linux kernel were needed for properly managing APX state and being able to report the capability to user-space. Intel APX will be found with future processors as a very exciting addition to the x86_64 world.
This pull also reports to users when running known outdated Intel CPU microcode. With this code in Linux 6.16, via the existing CPU security vulnerabilities/mitigation reporting it is now noted if the Intel CPU is running an oudated microcode version, a.k.a. what was previously covered on Phoronix within [3]Intel Linux Patch Would Report Outdated CPU Microcode As A Security Vulnerability . The information is reported via the /sys/devices/system/cpu/vulnerabilities/old_microcode sysfs file. This outdated CPU microcode reporting will also taint the kernel with "TAINT_CPU_OUT_OF_SPEC" for mkaing it clear to kernel developers the out-of-date CPU microcode.
Also added as part of this merge is the AMD Zen debugging document. More details on that AMD Zen debugging documentation within [4]New Documentation Aims To Help Improve AMD Zen System Debugging On Linux .
Some of the other x86 core changes for Linux 6.16 include improved code-patching scalability, simplifying the 32-bit PAE page table handling, making 5-level paging support on x86_64 unconditional, a fix for the Intel Spectre V2 mitigation handling by default on Intel CPUs, and a lot of other Intel/AMD CPU code refactoring.
More details on these x86 core changes in Linux 6.16 via [5]this pull request that already has been merged to Linux Git.
[1] https://www.phoronix.com/search/Linux+6.16
[2] https://www.phoronix.com/search/Advanced+Performance+Extensions
[3] https://www.phoronix.com/news/Linux-Intel-Old-Microcode-Vuln
[4] https://www.phoronix.com/news/AMD-Ryzen-Linux-Debug-Docs
[5] https://lore.kernel.org/lkml/aDL35MA4vH0wQ6Gb@gmail.com/
Jumbotron