Debian Bug report logs -
#886998
intel-microcode: regressions on Haswell, Broadwell (crashes/reboots) and Kaby Lake (sleep-to-ram)
Reported by: Henrique de Moraes Holschuh <hmh@debian.org>
Date: Fri, 12 Jan 2018 11:42:01 UTC
Severity: grave
Found in version intel-microcode/3.20180108.1
Fixed in version intel-microcode/3.20180108.1+really20171117.1
Done: Henrique de Moraes Holschuh <hmh@debian.org>
Bug is archived. No further changes may be made.
Toggle useless messages
Report forwarded
to debian-bugs-dist@lists.debian.org:
Bug#886998; Package intel-microcode.
(Fri, 12 Jan 2018 11:42:04 GMT) (full text, mbox, link).
Acknowledgement sent
to Henrique de Moraes Holschuh <hmh@debian.org>:
New Bug report received and forwarded.
(Fri, 12 Jan 2018 11:42:04 GMT) (full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
Package: intel-microcode
Version: 3.20180108.1
Severity: grave
According to this:
https://newsroom.intel.com/news/intel-security-issue-update-addressing-reboot-issues/
and this far more helpful information:
https://pcsupport.lenovo.com/br/en/product_security/ps500151
A subset of systems with the recent Haswell, Haswell/E, Broadwell,
Broadwell/E/DE, and Kaby Lake microcode updates have shown regressions
of either the "crash" sort, or of the "doesn't wake up from C3 sleep
(sleep-to-ram) properly" sort.
The Lenovo advisory implies that the regressions won't trigger always/on
every system. It is unclear at this time if they would only possibly
trigger when the new IBRS/IBPB Spectre mitigation functionality is
active (hint: Microsoft Windows 10 already activates it, but Debian
kernels don't enable it as we are still waiting for the upstream changes
to Linux, gcc and clang to stabilize).
To put it in simple terms: we don't know at the present time if Debian
systems would be affected by these microcode regressions right now, or
if they would start to be affected after the microcode-based Spectre
mitigation support is enabled in the kernels, or if they would be
affected at all.
Some of these possibly problematic microcode updates are indeed present
in Intel's 20180108 Linux microcode release. I will pause the
deployment of the 20180108 update in Debian: it will be restricted to
unstable (and possibly to testing, if the packages already migrated by
the time this bug report is active) until we either get more information
or a new set of microcode updates.
Updated packages removing the subset of problematic updates are not
going to be produced until at least next monday/tuesday for two reasons:
1. we don't have an exact list of signatures that are possibly
affected at this time. Removing all updates is equivalent to just
rolling back the package to the previous version.
2. there is a reasonably high chance of a new Intel microcode update
release in the next few days, which would most probably either revert
or fix the problematic microcode updates.
Should you face issues with the new microcode (note: test it with an
older kernel as well, since the current crop of new kernels are *ALSO*
causing boot and resume-from-sleep issues that are completely unrelated
to the microcode updates), please send a note to this bug report, with
the output of /proc/cpuinfo.
Previous versions of the packages are available here:
http://snapshot.debian.org/package/intel-microcode/
--
Henrique Holschuh
Information forwarded
to debian-bugs-dist@lists.debian.org:
Bug#886998; Package intel-microcode.
(Fri, 12 Jan 2018 12:24:05 GMT) (full text, mbox, link).
Acknowledgement sent
to Henrique de Moraes Holschuh <hmh@debian.org>:
Extra info received and forwarded to list.
(Fri, 12 Jan 2018 12:24:05 GMT) (full text, mbox, link).
Message #10 received at 886998@bugs.debian.org (full text, mbox, reply):
On Fri, 12 Jan 2018, Henrique de Moraes Holschuh wrote:
> Should you face issues with the new microcode (note: test it with an
> older kernel as well, since the current crop of new kernels are *ALSO*
> causing boot and resume-from-sleep issues that are completely unrelated
> to the microcode updates), please send a note to this bug report, with
> the output of /proc/cpuinfo.
>
> Previous versions of the packages are available here:
> http://snapshot.debian.org/package/intel-microcode/
And the version to pick when downgrading is 20171117.
DO NOT use 20171215 if you are trying to avoid possible regressions.
--
Henrique Holschuh
Information forwarded
to debian-bugs-dist@lists.debian.org:
Bug#886998; Package intel-microcode.
(Sat, 13 Jan 2018 23:36:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Henrique de Moraes Holschuh <hmh@debian.org>:
Extra info received and forwarded to list.
(Sat, 13 Jan 2018 23:36:03 GMT) (full text, mbox, link).
Message #15 received at 886998@bugs.debian.org (full text, mbox, reply):
The VMWare KB52345 article at:
https://kb.vmware.com/s/article/52345
Includes an _incomplete_ list of signatures for the microcode updates
that are problematic in release 20180108:
Processor name
(non-exhaustive) signature stepping name
Intel Xeon E3-1200-v3,
Intel i3-4300,
Intel i5-4500-TE,
Intel i7-4700-EQ: 0x000306C3 C0
Intel Xeon E5-1600-v3,
Intel Xeon E5-2400-v3,
Intel Xeon E5-2600-v3,
Intel Xeon E5-4600-v3: 0x000306F2 C0/C1, M0/M1, R1/R2
Intel Xeon E7-8800/4800-v3: 0x000306F4 E0
Intel Xeon E3-1200-v4: 0x00040671 G0
ntel Xeon E5-1600-v4,
Intel Xeon E5-2600-v4,
Intel Xeon E5-4600-v4: 0x000406F1 B0/M0/R0
Intel Xeon E7-8800/4800-v4: 0x000406F1 B0/M0/R0
Intel Xeon D-1500: 0x00050663 V2
This list is only relevant for server processors. Desktop/mobile
processors were not included, and we cannot assume anything about
updates for such processors that were deployed in release 20180108.
--
Henrique Holschuh
Information forwarded
to debian-bugs-dist@lists.debian.org:
Bug#886998; Package intel-microcode.
(Fri, 19 Jan 2018 00:54:04 GMT) (full text, mbox, link).
Acknowledgement sent
to Henrique de Moraes Holschuh <hmh@debian.org>:
Extra info received and forwarded to list.
(Fri, 19 Jan 2018 00:54:04 GMT) (full text, mbox, link).
Message #20 received at 886998@bugs.debian.org (full text, mbox, reply):
Updated information from Intel:
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088
---8<---
Recommendations:
Status
Intel has made significant progress in our investigation into the
customer reboot sightings that we confirmed publicly last week
Intel has reproduced these issues internally and has developed a
test method that allows us to do so in a predictable manner
Initial sightings were reported on Broadwell and Haswell based
platforms in some configurations. During due diligence we determined
that similar behavior occurs on other products including Ivy Bridge,
Sandy Bridge, Skylake, and Kaby Lake based platforms in some
configurations
We are working toward root cause
While our root cause analysis continues, we will start making beta
microcode updates available to OEMs, Cloud service providers, system
manufacturers and Software vendors next week for internal evaluation
purposes
In all cases, the existing and any new beta microcode updates
continue to provide protection against the exploit (CVE-2017-5715) also
known as “Spectre Variant 2”
Variants 1 (Spectre) and Variant 3 (Meltdown) continue to be
mitigated through system software changes from operating system and
virtual machine vendors
As we gather feedback from our customers we will continue to provide
updates that improve upon performance and usability
Intel recommendations to OEMs, Cloud service providers, system
manufacturers and software vendors
Intel recommends that these partners maintain availability of
existing microcode updates already released to end users. Intel does not
recommend pulling back any updates already made available to end users
NEW - Intel recommends that these partners, at their discretion,
continue development and release of updates with existing microcode to
provide protection against these exploits, understanding that the
current versions may introduce issues such as reboot in some
configurations
NEW - We further recommend that OEMs, Cloud service providers,
system manufacturers and software vendors begin evaluation of Intel beta
microcode update releases in anticipation of definitive root cause and
subsequent production releases suitable for end users
---8<---
As such, current plans are to _not_ distributed updated microcode
packages to Debian stable users, until a new batch of microcode updates
are released by Intel.
"Beta" microcode updates will be initially uploaded to experimental (if
such updates are made available to Debian): do *not* assume that beta
updates "can't be worse than the current ones".
--
Henrique Holschuh
Added indication that bug 886998 blocks 887856
Request was from Henrique de Moraes Holschuh <hmh@debian.org>
to control@bugs.debian.org.
(Sun, 21 Jan 2018 09:51:15 GMT) (full text, mbox, link).
Reply sent
to Henrique de Moraes Holschuh <hmh@debian.org>:
You have taken responsibility.
(Tue, 23 Jan 2018 01:21:08 GMT) (full text, mbox, link).
Notification sent
to Henrique de Moraes Holschuh <hmh@debian.org>:
Bug acknowledged by developer.
(Tue, 23 Jan 2018 01:21:08 GMT) (full text, mbox, link).
Message #27 received at 886998-close@bugs.debian.org (full text, mbox, reply):
Source: intel-microcode
Source-Version: 3.20180108.1+really20171117.1
We believe that the bug you reported is fixed in the latest version of
intel-microcode, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 886998@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Henrique de Moraes Holschuh <hmh@debian.org> (supplier of updated intel-microcode package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Mon, 22 Jan 2018 23:01:59 -0200
Source: intel-microcode
Binary: intel-microcode
Architecture: source amd64
Version: 3.20180108.1+really20171117.1
Distribution: unstable
Urgency: critical
Maintainer: Henrique de Moraes Holschuh <hmh@debian.org>
Changed-By: Henrique de Moraes Holschuh <hmh@debian.org>
Description:
intel-microcode - Processor microcode firmware for Intel CPUs
Closes: 886998
Changes:
intel-microcode (3.20180108.1+really20171117.1) unstable; urgency=critical
.
* Revert to release 20171117, as per Intel instructions issued to
the public in 2018-01-22 (closes: #886998)
* This effectively removes IBRS/IBPB/STIPB microcode support for
Spectre variant 2 mitigation.
Checksums-Sha1:
2ecfe6036525207dea082973949a538fb027af0d 1865 intel-microcode_3.20180108.1+really20171117.1.dsc
0dae4e35e418c31f0f8918dc156e959720f95e21 1801480 intel-microcode_3.20180108.1+really20171117.1.tar.xz
bdc109d548b74f7aea64ae1f17703f2f1ffbeb61 5665 intel-microcode_3.20180108.1+really20171117.1_amd64.buildinfo
210553661c42faae406f4edfedacdf0c804b0e7e 1270444 intel-microcode_3.20180108.1+really20171117.1_amd64.deb
Checksums-Sha256:
a7df931b02fa66df34106c1d4ff96b39921309b07fac2452b3112eeb29b87bcc 1865 intel-microcode_3.20180108.1+really20171117.1.dsc
376c988faedbee9ddfdfed6073fba65fbd3504a7fab4c3fe1d7e141e8e417126 1801480 intel-microcode_3.20180108.1+really20171117.1.tar.xz
04040e9355771e3f9c75a995107f9938f9e6fd304ea41ba351eddc77cbead848 5665 intel-microcode_3.20180108.1+really20171117.1_amd64.buildinfo
57a22d3dd3379149fc550f371874bfa864f6d2f264665379e8fc8c85bd90e6f0 1270444 intel-microcode_3.20180108.1+really20171117.1_amd64.deb
Files:
04360f77e2fe481ecce632f214cea4b8 1865 non-free/admin standard intel-microcode_3.20180108.1+really20171117.1.dsc
c5d6395ae7719dabd161739b6aa21cef 1801480 non-free/admin standard intel-microcode_3.20180108.1+really20171117.1.tar.xz
2a6ca1e54e22d5e16fae1f908edf4918 5665 non-free/admin standard intel-microcode_3.20180108.1+really20171117.1_amd64.buildinfo
d99a8480e9d1405749b5b1ae4bc5c232 1270444 non-free/admin standard intel-microcode_3.20180108.1+really20171117.1_amd64.deb
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEq7GuO+cOOhDUp+2l/hG/posVjpgFAlpmifIACgkQ/hG/posV
jpgfPw/8CMVJPItsxGqebnznKCmN5UXvxkSiGTpivUyzZoik8Nmh6259ukF1iIvv
kYHnFoxTpYNbWMrCBD9KnCAxIARmru1G1jK1K6kytxHroYseBKgE2fsvcSsqcN5/
lctedHZj0cwNqhRN2p8ROuw9Di3/ZukcyyxICAj0W8CyYHfdNfBpXw1hnJ0gp0Bx
TDjZ4DUhScLQ9W6nOr3YkiAB2VSIDM2w8TAPgrtQnuNUYyHQmnajuaI/1U7tjsrB
Huj/rS0lUzkoLzm7yp9OPpEOmdKcUtKEcyk63v5oiqf4eNCeg1yGg0QPr6ET/p49
J2IOYBAopUja60CmmF1fveXAuaBwPvvibvOZ+GNmt52E4ybnvs2MK5Bd4KwRhA82
ZMks7lP8Dr56Zl0GsDwKBfVhgvVAlXNOyFhzDJnQlhpRCcWKlVTI1b5yDnoO4+vm
C6YqBf/4Jh1YmPI6og8lKVtcU0jUxVKSnxTNOYfJz2T2qb3yvfMmS8ZV9PbUBpa5
nwLWJcLGVQYlOiNEhFaP8oV2dI4Ip7plHjT6m6SorhCSisz4B6nPcpDyNhFZ2Mue
SaRhicv+gtCMLruvY4UYt9JYlzo7dQUAcnANZjaNu7l6nF5jZxB7FCA9WqmcaTbd
3uleOMd2VGAO5uN4evnuaWRA1bbizlN9fkgve/T4FKnyCEEXkyQ=
=fP+B
-----END PGP SIGNATURE-----
Bug archived.
Request was from Debbugs Internal Request <owner@bugs.debian.org>
to internal_control@bugs.debian.org.
(Wed, 21 Feb 2018 07:31:12 GMT) (full text, mbox, link).
Bug unarchived.
Request was from Adrian Bunk <bunk@debian.org>
to control@bugs.debian.org.
(Mon, 19 Mar 2018 22:03:07 GMT) (full text, mbox, link).
Removed indication that bug 886998 blocks 887856
Request was from Adrian Bunk <bunk@debian.org>
to control@bugs.debian.org.
(Mon, 19 Mar 2018 22:03:11 GMT) (full text, mbox, link).
Bug archived.
Request was from Debbugs Internal Request <owner@bugs.debian.org>
to internal_control@bugs.debian.org.
(Tue, 17 Apr 2018 07:33:35 GMT) (full text, mbox, link).
Send a report that this bug log contains spam.
Debian bug tracking system administrator <owner@bugs.debian.org>.
Last modified:
Sun Jan 14 01:31:28 2024;
Machine Name:
buxtehude
Debian Bug tracking system
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.