Blame SOURCES/06-55-04_readme

175f9a
Intel Skulake Scalable Platform CPU models (SKL-SP/W/X, family 6, model 85,
175f9a
stepping 4) have reports of system hangs when revision 0x2000065 of microcode,
175f9a
that is included since microcode-20191112 update, is applied.  In order
175f9a
to address this, microcode update to this revision has been disabled,
175f9a
and the previously published microcode revision 0x2000064 is used by default
175f9a
for the OS-driven microcode update.
175f9a
175f9a
For the reference, SHA1 checksums of 06-55-04 microcode files containing
175f9a
microcode revisions in question are listed below:
175f9a
 * 06-55-04, revision 0x2000064: 2e405644a145de0f55517b6a9de118eec8ec1e5a
175f9a
 * 06-55-04, revision 0x2000065: f27f12b9d53f492c297afd856cdbc596786fad23
175f9a
175f9a
Please contact your system vendor for a BIOS/firmware update that contains
175f9a
the latest microcode version.  For the information regarding microcode versions
175f9a
required for mitigating specific side-channel cache attacks, please refer
175f9a
to the following knowledge base articles:
175f9a
 * CVE-2017-5715 ("Spectre"):
175f9a
   https://access.redhat.com/articles/3436091
175f9a
 * CVE-2018-3639 ("Speculative Store Bypass"):
175f9a
   https://access.redhat.com/articles/3540901
175f9a
 * CVE-2018-3620, CVE-2018-3646 ("L1 Terminal Fault Attack"):
175f9a
   https://access.redhat.com/articles/3562741
175f9a
 * CVE-2018-12130, CVE-2018-12126, CVE-2018-12127, and CVE-2019-11091
175f9a
   ("Microarchitectural Data Sampling"):
175f9a
   https://access.redhat.com/articles/4138151
175f9a
 * CVE-2019-0117 (Intel SGX Information Leak),
175f9a
   CVE-2019-0123 (Intel SGX Privilege Escalation),
175f9a
   CVE-2019-11135 (TSX Asynchronous Abort),
175f9a
   CVE-2019-11139 (Voltage Setting Modulation):
175f9a
   https://access.redhat.com/solutions/2019-microcode-nov
175f9a
175f9a
The information regarding enforcing microcode update is provided below.
175f9a
175f9a
To enforce usage of the 0x2000065 microcode revision for a specific kernel
175f9a
version, please create a file "force-intel-06-55-04" inside
175f9a
/lib/firmware/<kernel_version> directory, run
175f9a
"/usr/libexec/microcode_ctl/update_ucode" to add it to firmware directory
175f9a
where microcode will be available for late microcode update, and run
175f9a
"dracut -f --kver <kernel_version>", so initramfs for this kernel version
175f9a
is regenerated and the microcode can be loaded early, for example:
175f9a
175f9a
    touch /lib/firmware/3.10.0-862.9.1/force-intel-06-55-04
175f9a
    /usr/libexec/microcode_ctl/update_ucode
175f9a
    dracut -f --kver 3.10.0-862.9.1
175f9a
175f9a
After that, it is possible to perform a late microcode update by executing
175f9a
"/usr/libexec/microcode_ctl/reload_microcode" or by writing value "1" to
175f9a
"/sys/devices/system/cpu/microcode/reload" directly.
175f9a
175f9a
To enforce addition of this microcode for all kernels, please create file
175f9a
"/etc/microcode_ctl/ucode_with_caveats/force-intel-06-55-04", run
175f9a
"/usr/libexec/microcode_ctl/update_ucode" for enabling late microcode updates,
175f9a
and "dracut -f --regenerate-all" for enabling early microcode updates:
175f9a
175f9a
    mkdir -p /etc/microcode_ctl/ucode_with_caveats
175f9a
    touch /etc/microcode_ctl/ucode_with_caveats/force-intel-06-55-04
175f9a
    /usr/libexec/microcode_ctl/update_ucode
175f9a
    dracut -f --regenerate-all
175f9a
175f9a
Please refer to /usr/share/doc/microcode_ctl/README.caveats for additional
175f9a
information.