Thanks Phil,

Oh the irony,

Intel's dismissive stance of "Contact your OS vendor" which has been more than 
a little frustrating given it was their massive mess-up, then seeing this 
pushed back to "Contact your hardware vendor".

Can't help but laugh (and cry) a little on the inside.

--
Sam McLeod
https://smcleod.net
https://twitter.com/s_mcleod

> On 17 Jan 2018, at 10:01 am, Phil Perry <p...@elrepo.org> wrote:
> 
> On 10/01/18 20:21, Phil Perry wrote:
>> On 10/01/18 19:55, Phil Perry wrote:
>>> I'm starting this thread as somewhere to collect latest information on 
>>> Meltdown and Spectre as relating to the elrepo kernel-lt and kernel-ml 
>>> kernels.
>>> 
>>> Please feel free to post to this thread, ask questions and share 
>>> information. This is the place to do it.
>>> 
>>> Please do not open bugs on https://elrepo.org/bugs unless you have 
>>> identified a bug in the elrepo packaging process. They will be closed and 
>>> you will be pointed here. Understand elrepo simply packages the upstream 
>>> kernel source code as-is for your use on RHEL. They are not our bugs!
>>> 
>>> Thank you,
>>> 
>>> The ELRepo Team.
>>> 
>> Microcode updates from Intel:
>> https://downloadcenter.intel.com/download/27431/Linux-Processor-Microcode-Data-File
>>  You can download the latest mircocode update directly from Intel (above, 
>> check you are downloading the latest version) and apply it directly to your 
>> machine.
>> Download and extract the above microcode tarball and extract.
>> Copy the files in the intel-ucode directory to 
>> /usr/lib/firmware/intel-ucode/ to update the firmware files.
>> The following command may be used to reload the updated firmware without 
>> rebooting:
>> echo 1 > /sys/devices/system/cpu/microcode/reload
>> Check in /var/log/messages to see if the microcode has been updated. For 
>> example:
>> # cat /var/log/messages | grep 'microcode'
>> Jan 10 20:17:00 quad kernel: microcode: CPU0 sig=0x506e3, pf=0x2, 
>> revision=0xba
>> Jan 10 20:17:00 quad kernel: microcode: CPU0 updated to revision 0xc2, date 
>> = 2017-11-16
>> Jan 10 20:17:00 quad kernel: microcode: CPU1 sig=0x506e3, pf=0x2, 
>> revision=0xba
>> Jan 10 20:17:00 quad kernel: microcode: CPU1 updated to revision 0xc2, date 
>> = 2017-11-16
>> Jan 10 20:17:00 quad kernel: microcode: CPU2 sig=0x506e3, pf=0x2, 
>> revision=0xba
>> Jan 10 20:17:00 quad kernel: microcode: CPU2 updated to revision 0xc2, date 
>> = 2017-11-16
>> Jan 10 20:17:00 quad kernel: microcode: CPU3 sig=0x506e3, pf=0x2, 
>> revision=0xba
>> Jan 10 20:17:00 quad kernel: microcode: CPU3 updated to revision 0xc2, date 
>> = 2017-11-16
>> Note that updating of the microcode_ctl package may overwrite the microcode 
>> firmware files so check a package update doesn't revert to older firmware.
> 
> Red Hat have just released an updated microcode_ctl package that reverts to 
> older versions of the microcode due to instabilities in the latest versions 
> that was preventing some systems from booting.
> 
> https://access.redhat.com/errata/RHSA-2018:0093
> 
> https://access.redhat.com/solutions/3315431
> 
> Red Hat are not providing providing microcode to address Spectre, variant 2, 
> due to instabilities introduced that are causing customer systems to not 
> boot, and are recommending customers contact their hardware vendors directly 
> for microcode/BIOS updates for their CPU.
> 
> _______________________________________________
> elrepo mailing list
> elrepo@lists.elrepo.org
> http://lists.elrepo.org/mailman/listinfo/elrepo

_______________________________________________
elrepo mailing list
elrepo@lists.elrepo.org
http://lists.elrepo.org/mailman/listinfo/elrepo

Reply via email to