@@ -105,7 +105,7 @@ static void probe_xeon_phi_r3mwait(struct cpuinfo_x86 *c)
105
105
/*
106
106
* Early microcode releases for the Spectre v2 mitigation were broken.
107
107
* Information taken from;
108
- * - https://newsroom.intel.com/wp-content/uploads/sites/11/2018/01 /microcode-update-guidance.pdf
108
+ * - https://newsroom.intel.com/wp-content/uploads/sites/11/2018/03 /microcode-update-guidance.pdf
109
109
* - https://kb.vmware.com/s/article/52345
110
110
* - Microcode revisions observed in the wild
111
111
* - Release note from 20180108 microcode release
@@ -123,7 +123,6 @@ static const struct sku_microcode spectre_bad_microcodes[] = {
123
123
{ INTEL_FAM6_KABYLAKE_MOBILE , 0x09 , 0x80 },
124
124
{ INTEL_FAM6_SKYLAKE_X , 0x03 , 0x0100013e },
125
125
{ INTEL_FAM6_SKYLAKE_X , 0x04 , 0x0200003c },
126
- { INTEL_FAM6_SKYLAKE_DESKTOP , 0x03 , 0xc2 },
127
126
{ INTEL_FAM6_BROADWELL_CORE , 0x04 , 0x28 },
128
127
{ INTEL_FAM6_BROADWELL_GT3E , 0x01 , 0x1b },
129
128
{ INTEL_FAM6_BROADWELL_XEON_D , 0x02 , 0x14 },
0 commit comments