[Bug 1756633] Re: Backport request, 16.04 LTS (w/ Spectre/Meltdown fixups)

2019-05-22 Thread Steve Beattie
All releases of Ubuntu (except for Ubuntu 12.04 ESM, where the kernel
does not support early microcode loading, and the changes to add support
are significant and would likely introduce regressions) received
backported intel-microcode updates for Spectre/Meltdown.

Closing this bug. Thanks.

** Changed in: intel-microcode (Ubuntu)
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1756633

Title:
  Backport request, 16.04 LTS (w/ Spectre/Meltdown fixups)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/intel-microcode/+bug/1756633/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1756633] Re: Backport request, 16.04 LTS (w/ Spectre/Meltdown fixups)

2018-03-27 Thread Jason Mills
@sdeziel -- I have tested on an Ivy Bridge era (i5-3427U) and Apollo
Lake era (N3350) system thus far. The former is covered by the Intel
20180312 release, the latter is not. If time permits I'll also test on a
Skylake system.

Everything seems to be working properly w/r2 updated microcode query and
load during early InitRAMfs phase.


Install media was Ubuntu 16.04.2 LTS Server x86_64, patched to current but with 
both old and new kernels available. I did have to pull the .deb packages in 
manually, the PPA you referenced is no longer accepted automagically -- signing 
key cannot be found.

Details for the tests I performed on the Ivy Bridge system follow:

admin@ubuntu-1604-microcode-test:~$ dmesg | grep -i microcode
[2.297820] microcode: CPU0 sig=0x306a9, pf=0x10, revision=0x1b
[2.297849] microcode: CPU1 sig=0x306a9, pf=0x10, revision=0x1b
[2.297854] microcode: CPU2 sig=0x306a9, pf=0x10, revision=0x1b
[2.297872] microcode: CPU3 sig=0x306a9, pf=0x10, revision=0x1b
[2.297946] microcode: Microcode Update Driver: v2.01 
, Peter Oruba


admin@ubuntu-1604-microcode-test:~$ dpkg -l | grep -E -- 
'(linux-|intel-microcode|iucode)'
ii  intel-microcode  3.20180312.0~ubuntu16.04.1 
amd64Processor microcode firmware for Intel CPUs
ii  iucode-tool  2.1.2-2
amd64Intel processor microcode tool
ii  linux-base   4.0ubuntu1 
all  Linux image base package
ii  linux-firmware   1.157.17   
all  Firmware for Linux kernel drivers
ii  linux-headers-4.4.0-116  4.4.0-116.140  
all  Header files related to Linux kernel version 4.4.0
ii  linux-headers-4.4.0-116-generic  4.4.0-116.140  
amd64Linux kernel headers for version 4.4.0 on 64 bit x86 SMP
ii  linux-headers-4.4.0-62   4.4.0-62.83
all  Header files related to Linux kernel version 4.4.0
ii  linux-headers-4.4.0-62-generic   4.4.0-62.83
amd64Linux kernel headers for version 4.4.0 on 64 bit x86 SMP
ii  linux-headers-generic4.4.0.116.122  
amd64Generic Linux kernel headers
ii  linux-image-4.4.0-116-generic4.4.0-116.140  
amd64Linux kernel image for version 4.4.0 on 64 bit x86 SMP
ii  linux-image-4.4.0-62-generic 4.4.0-62.83
amd64Linux kernel image for version 4.4.0 on 64 bit x86 SMP
ii  linux-image-extra-4.4.0-116-generic  4.4.0-116.140  
amd64Linux kernel extra modules for version 4.4.0 on 64 bit x86 SMP
ii  linux-image-extra-4.4.0-62-generic   4.4.0-62.83
amd64Linux kernel extra modules for version 4.4.0 on 64 bit x86 SMP
ii  linux-signed-generic 4.4.0.116.122  
amd64Complete Signed Generic Linux kernel and headers
ii  linux-signed-image-4.4.0-116-generic 4.4.0-116.140  
amd64Signed kernel image generic
ii  linux-signed-image-4.4.0-62-generic  4.4.0-62.83
amd64Signed kernel image generic
ii  linux-signed-image-generic   4.4.0.116.122  
amd64Signed Generic Linux kernel image

*

New kernel, current microcode

admin@ubuntu-1604-microcode-test:~$ uname -a
Linux ubuntu-1604-microcode-test 4.4.0-116-generic #140-Ubuntu SMP Mon Feb 12 
21:23:04 UTC 2018 x86_64 x86_64 x86_64 GNU/Linux

admin@ubuntu-1604-microcode-test:~$ find 
/sys/devices/system/cpu/vulnerabilities -type f -print -exec sudo -- cat {} \;
/sys/devices/system/cpu/vulnerabilities/spectre_v1
Mitigation: OSB (observable speculation barrier, Intel v6)
/sys/devices/system/cpu/vulnerabilities/spectre_v2
Mitigation: Full generic retpoline, IBPB (Intel v4)
/sys/devices/system/cpu/vulnerabilities/meltdown
Mitigation: PTI

admin@ubuntu-1604-microcode-test:~$ dmesg | grep -i microcode
[0.00] microcode: CPU0 microcode updated early to revision 0x1f, date = 
2018-02-07
[0.115812] microcode: CPU1 microcode updated early to revision 0x1f, date = 
2018-02-07
[2.335679] microcode: CPU0 sig=0x306a9, pf=0x10, revision=0x1f
[2.335690] microcode: CPU1 sig=0x306a9, pf=0x10, revision=0x1f
[2.335694] microcode: CPU2 sig=0x306a9, pf=0x10, revision=0x1f
[2.335736] microcode: CPU3 sig=0x306a9, pf=0x10, revision=0x1f
[2.335766] microcode: Microcode Update Driver: v2.01 
, Peter Oruba

admin@ubuntu-1604-microcode-test:~$ grep -E -- '^IUCODE_TOOL' 
/etc/default/intel-microcode 
IUCODE_TOOL_INITRAMFS=auto
IUCODE_TOOL_SCANCPUS=no


[Bug 1756633] Re: Backport request, 16.04 LTS (w/ Spectre/Meltdown fixups)

2018-03-22 Thread Launchpad Bug Tracker
Status changed to 'Confirmed' because the bug affects multiple users.

** Changed in: intel-microcode (Ubuntu)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1756633

Title:
  Backport request, 16.04 LTS (w/ Spectre/Meltdown fixups)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/intel-microcode/+bug/1756633/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1756633] Re: Backport request, 16.04 LTS (w/ Spectre/Meltdown fixups)

2018-03-18 Thread Simon Déziel
So far, the intel-microcode package has been kept in sync between all
the supported releases. They all get the "stable" version at the same
time. If you'd like to help testing, there is version 3.20180312.0 that
is currently in QA and available from https://launchpad.net/~ubuntu-
security-proposed/+archive/ubuntu/ppa.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1756633

Title:
  Backport request, 16.04 LTS (w/ Spectre/Meltdown fixups)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/intel-microcode/+bug/1756633/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs