Blame SPECS/06-4e-03_readme

Packit Service 2ad00c
Some Intel Skylake CPU models (SKL-U/Y, family 6, model 78, stepping 3)
Packit Service 2ad00c
have reports of system hangs when revision 0xdc of microcode, that is included
Packit Service 2ad00c
since microcode-20200609 update to address CVE-2020-0543, CVE-2020-0548,
Packit Service 2ad00c
and CVE-2020-0549, is applied[1].  In order to address this, microcode update
Packit Service 2ad00c
to the newer revision has been disabled by default on these systems,
Packit Service 2ad00c
and the previously published microcode revision 0xd6 is used by default
Packit Service 2ad00c
for the OS-driven microcode update.
Packit Service 2ad00c
Packit Service 2ad00c
[1] https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/issues/31
Packit Service 2ad00c
Packit Service 2ad00c
For the reference, SHA1 checksums of 06-4e-03 microcode files containing
Packit Service 2ad00c
microcode revisions in question are listed below:
Packit Service 2ad00c
 * 06-4e-03, revision 0xd6: 06432a25053c823b0e2a6b8e84e2e2023ee3d43e
Packit Service 2ad00c
 * 06-4e-03, revision 0xdc: cd1733458d187486999337ff8b51eeaa0cfbca6c
Packit Service 2ad00c
 * 06-4e-03, revision 0xe2: 41f4513cf563605bc85db38056ac430dec948366
Packit Service 2ad00c
Packit Service 2ad00c
Please contact your system vendor for a BIOS/firmware update that contains
Packit Service 2ad00c
the latest microcode version.  For the information regarding microcode versions
Packit Service 2ad00c
required for mitigating specific side-channel cache attacks, please refer
Packit Service 2ad00c
to the following knowledge base articles:
Packit Service 2ad00c
 * CVE-2017-5715 ("Spectre"):
Packit Service 2ad00c
   https://access.redhat.com/articles/3436091
Packit Service 2ad00c
 * CVE-2018-3639 ("Speculative Store Bypass"):
Packit Service 2ad00c
   https://access.redhat.com/articles/3540901
Packit Service 2ad00c
 * CVE-2018-3620, CVE-2018-3646 ("L1 Terminal Fault Attack"):
Packit Service 2ad00c
   https://access.redhat.com/articles/3562741
Packit Service 2ad00c
 * CVE-2018-12130, CVE-2018-12126, CVE-2018-12127, and CVE-2019-11091
Packit Service 2ad00c
   ("Microarchitectural Data Sampling"):
Packit Service 2ad00c
   https://access.redhat.com/articles/4138151
Packit Service 2ad00c
 * CVE-2019-0117 (Intel SGX Information Leak),
Packit Service 2ad00c
   CVE-2019-0123 (Intel SGX Privilege Escalation),
Packit Service 2ad00c
   CVE-2019-11135 (TSX Asynchronous Abort),
Packit Service 2ad00c
   CVE-2019-11139 (Voltage Setting Modulation):
Packit Service 2ad00c
   https://access.redhat.com/solutions/2019-microcode-nov
Packit Service 2ad00c
 * CVE-2020-0543 (Special Register Buffer Data Sampling),
Packit Service 2ad00c
   CVE-2020-0548 (Vector Register Data Sampling),
Packit Service 2ad00c
   CVE-2020-0549 (L1D Cache Eviction Sampling):
Packit Service 2ad00c
   https://access.redhat.com/solutions/5142751
Packit Service 2ad00c
Packit Service 2ad00c
The information regarding enforcing microcode update is provided below.
Packit Service 2ad00c
Packit Service 2ad00c
To enforce usage of the latest 06-4e-03 microcode revision for a specific kernel
Packit Service 2ad00c
version, please create a file "force-intel-06-4e-03" inside
Packit Service 2ad00c
/lib/firmware/<kernel_version> directory, run
Packit Service 2ad00c
"/usr/libexec/microcode_ctl/update_ucode" to add it to firmware directory
Packit Service 2ad00c
where microcode will be available for late microcode update, and run
Packit Service 2ad00c
"dracut -f --kver <kernel_version>", so initramfs for this kernel version
Packit Service 2ad00c
is regenerated and the microcode can be loaded early, for example:
Packit Service 2ad00c
Packit Service 2ad00c
    touch /lib/firmware/3.10.0-862.9.1/force-intel-06-4e-03
Packit Service 2ad00c
    /usr/libexec/microcode_ctl/update_ucode
Packit Service 2ad00c
    dracut -f --kver 3.10.0-862.9.1
Packit Service 2ad00c
Packit Service 2ad00c
After that, it is possible to perform a late microcode update by executing
Packit Service 2ad00c
"/usr/libexec/microcode_ctl/reload_microcode" or by writing value "1" to
Packit Service 2ad00c
"/sys/devices/system/cpu/microcode/reload" directly.
Packit Service 2ad00c
Packit Service 2ad00c
To enforce addition of this microcode for all kernels, please create file
Packit Service 2ad00c
"/etc/microcode_ctl/ucode_with_caveats/force-intel-06-4e-03", run
Packit Service 2ad00c
"/usr/libexec/microcode_ctl/update_ucode" for enabling late microcode updates,
Packit Service 2ad00c
and "dracut -f --regenerate-all" for enabling early microcode updates:
Packit Service 2ad00c
Packit Service 2ad00c
    mkdir -p /etc/microcode_ctl/ucode_with_caveats
Packit Service 2ad00c
    touch /etc/microcode_ctl/ucode_with_caveats/force-intel-06-4e-03
Packit Service 2ad00c
    /usr/libexec/microcode_ctl/update_ucode
Packit Service 2ad00c
    dracut -f --regenerate-all
Packit Service 2ad00c
Packit Service 2ad00c
Please refer to /usr/share/doc/microcode_ctl/README.caveats for additional
Packit Service 2ad00c
information.