Hi Paul, Someone from Dell did say they were at least looking into it [1].
I also did reach out to our account manager (sent them the links to the posts to this list) and they said they were reaching out to the product group to see what was going on too. We'll see what comes of any of this. However, it does seem like the R815 3.4.0 BIOS update page [2] that Dell's Meltdown/Spectre page links to is no longer working...maybe it got pulled? The Meltdown/Spectre page hasn't been updated yet though (still links to the same 3.4.0 BIOS update page) [3]. So, we may see some updates soon...hopefully... Thanks. [1] http://lists.us.dell.com/pipermail/linux-poweredge/2018-May/051704.html [2] http://www.dell.com/support/home/us/en/04/drivers/ driversdetails?driverId=PDFYH [3] http://www.dell.com/support/article/us/en/04/sln308588/ microprocessor-side-channel-vulnerabilities-cve-2017-5715- cve-2017-5753-cve-2017-5754-impact-on-dell-emc-products- dell-enterprise-servers-storage-and-networking-?lang=en#bios -- Matt Vander Werf HPC System Administrator University of Notre Dame Center for Research Computing - Union Station 506 W. South Street South Bend, IN 46601 On Thu, May 3, 2018 at 9:04 AM, Paul Menzel <[email protected]> wrote: > Dear Matt, > > > On 04/30/18 16:44, Matt Vander Werf wrote: > > I did actually test also on an R815 running Opteron 6234 as well, and >> got the same result. Microcode version is different (0x600063d) but >> also did not change with the update. >> > > Thank you for sharing the information. > > Systems running Opteron 6100 series processors wouldn't be included >> in the fixes AMD said they released to OEMs (like Dell), since those >> are pre-"Bulldozer" processors. Also, from what I can tell, they >> don't need microcode updates to mitigate Spectre, since the vulnerable >> features can be disabled with simple OS updates. For >> those processors, the ibp_disable CPU flag will show up after >> installing latest OS updates (see https://www.realworldtech.com/ >> forum/?threadid=176206&curpostid=176206 >> and second option under AMD defaults at https://access.redhat.com/arti >> cles/3311301#architectural-defaults-11). >> > > Thank you for the clarification. Indeed, updating the firmware to 3.4.0, > the microcode version is still the same at 0x10000d9 (model 9 stepping 1 > ucode 0x10000d9 cpuid 0x100f91). The processor is from March 2010 [1]. > > It would be nice if AMD would release microcode updates to the >> public through linux-firmware or on their own site like Intel does ( >> https://downloadcenter.intel.com/download/27591/Linux-Proces >> sor-Microcode-Data-File?product=873) >> that users can then apply manually. Sure, BIOS updates are always >> preferred, but having the microcode updates would mean we wouldn't >> have to worry about vendors like Dell releasing BIOS updates that >> work... >> > > Agreed. > > @Dell: Any update/thoughts on this?? >> > > To bad, Dell does not answer the question at hand. (The thread hijacking > also did not help.) Did you open a call yet with Dell? Maybe that’s the > better route. > > > Kind regards, > > Paul > > > PS: Your signature separator misses a space after the two dashes to be > automatically stripped by standard mail user agents [1]. > > -- >> Matt Vander Werf >> > > > [1] https://en.wikipedia.org/wiki/Opteron > [2] https://en.wikipedia.org/wiki/Signature_block#Signatures_in_ > Usenet_postings > >
_______________________________________________ Linux-PowerEdge mailing list [email protected] https://lists.us.dell.com/mailman/listinfo/linux-poweredge
