Bugzilla – Bug 903589
amd microcode upgrades only select cores not all? 2 out of 4?, opensuse 13.2 x86
Last modified: 2015-04-22 11:45:36 UTC
+++ This bug was initially created as a clone of Bug #758499 +++ --------- dmesg | grep -i micro -A 3 -B 3 [ 0.453311] pci 0000:00:01.0: Video device with shadowed ROM [ 0.601397] PCI: CLS 64 bytes, default 64 [ 0.601444] Unpacking initramfs... [ 1.515294] microcode: updated early to new patch_level=0x06001119 [ 1.517526] Freeing initrd memory: 10372K (f63d6000 - f6df7000) [ 1.517749] perf: AMD NB counters detected [ 1.517805] microcode: CPU0: patch_level=0x06001119 [ 1.517813] microcode: CPU1: patch_level=0x06001119 [ 1.517828] microcode: CPU2: patch_level=0x06001116 [ 1.517850] microcode: CPU3: patch_level=0x06001116 [ 1.517939] microcode: Microcode Update Driver: v2.00 <tigran@aivazian.fsnet.co.uk>, Peter Oruba [ 1.517948] LVT offset 0 assigned for vector 0x400 [ 1.517963] perf: AMD IBS detected (0x000000ff) [ 1.517986] Scanning for low memory corruption every 60 seconds -- [ 3.022623] [TTM] Initializing DMA pool allocator [ 3.022651] [drm] radeon: 512M of VRAM memory ready [ 3.022655] [drm] radeon: 1024M of GTT memory ready. [ 3.022669] [drm] Loading ARUBA Microcode [ 3.022739] [drm] Internal thermal controller without fan control [ 3.023134] [drm] radeon: dpm initialized [ 3.023273] [drm] GART: num cpu pages 262144, num gpu pages 262144 ------- cat /etc/os-release NAME=openSUSE VERSION="13.2 (Harlequin)" VERSION_ID="13.2" PRETTY_NAME="openSUSE 13.2 (Harlequin) (i586)" ID=opensuse ANSI_COLOR="0;32" CPE_NAME="cpe:/o:opensuse:opensuse:13.2" BUG_REPORT_URL="https://bugs.opensuse.org" HOME_URL="https://opensuse.org/" ID_LIKE="suse" ------- rpm -aq | grep -i firmw kernel-firmware-20140903git-2.4.noarch brux:/etc/ssh # rpm -aq | grep -i kerne kernel-desktop-3.11.10-21.1.i686 kernel-firmware-20140903git-2.4.noarch kernel-desktop-3.16.6-2.1.i686 -------- system was a 13.1 x86 and zypper dup to 13.2 today Linux brux 3.16.6-2-desktop #1 SMP PREEMPT Mon Oct 20 13:47:22 UTC 2014 (feb42ea) i686 athlon i386 GNU/Linux [ 0.000000] Initializing cgroup subsys cpuset [ 0.000000] Initializing cgroup subsys cpu [ 0.000000] Initializing cgroup subsys cpuacct [ 0.000000] Linux version 3.16.6-2-desktop (geeko@buildhost) (gcc version 4.8.3 20140627 [gcc-4_8-branch revision 212064] (SUSE Linux) ) #1 SMP PREEM PT Mon Oct 20 13:47:22 UTC 2014 (feb42ea) [ 0.170159] smpboot: CPU0: AMD A10-5800K APU with Radeon(tm) HD Graphics (fam: 15, model: 10, stepping: 01)
during uptime of this system /proc/cpuinfo shows four entries for the four cores, and two of them have the old microcode revision and two cores have the patched revision microcode : 0x6001116 microcode : 0x6001119
Boris, could you take a look?
Yeah, this is the microcode loader on 32-bit, I've seen this last week and am working on fixing it. Andreas, as a temporary workaround, you can do echo 1 > /sys/devices/system/cpu/microcode/reload as root to update microcode on all cores. Btw, consider moving to 64-bit unless you have a seriously compelling reason not to do so. :) Thanks.
Ok, I'm attaching a fix which applies to 3.16, please give it a run. It seems to address your issue on my test machine but who knows. If you need any help testing, please don't hesitate to ask. Also, I'd appreciate it if you test whether suspend/resume works too, provided your box supports it. Thanks.
Created attachment 612305 [details] test patch
Ok, I've backported the upstream fixes, can, can you test please: http://beta.suse.com/private/bpetkov/kernel-3.16.7_default+-6.x86_64.rpm ? This is a 64-bit kernel, though. I know you have another bugzilla for openSUSE 13.1, the kernel for that one is still in the works. Thanks.
See bsc#912208. Closing.
openSUSE-SU-2015:0713-1: An update that solves 13 vulnerabilities and has 52 fixes is now available. Category: security (important) Bug References: 867199,893428,895797,900811,901925,903589,903640,904899,905681,907039,907818,907988,908582,908588,908589,908592,908593,908594,908596,908598,908603,908604,908605,908606,908608,908610,908612,909077,909078,909477,909634,910150,910322,910440,911311,911325,911326,911356,911438,911578,911835,912061,912202,912429,912705,913059,913466,913695,914175,915425,915454,915456,915577,915858,916608,917830,917839,918954,918970,919463,920581,920604,921313,922542,922944 CVE References: CVE-2014-8134,CVE-2014-8160,CVE-2014-8559,CVE-2014-9419,CVE-2014-9420,CVE-2014-9428,CVE-2014-9529,CVE-2014-9584,CVE-2014-9585,CVE-2015-0777,CVE-2015-1421,CVE-2015-1593,CVE-2015-2150 Sources used: openSUSE 13.2 (src): bbswitch-0.8-3.6.6, cloop-2.639-14.6.6, crash-7.0.8-6.6, hdjmod-1.28-18.7.6, ipset-6.23-6.6, kernel-docs-3.16.7-13.2, kernel-obs-build-3.16.7-13.7, kernel-obs-qa-3.16.7-13.1, kernel-obs-qa-xen-3.16.7-13.1, kernel-source-3.16.7-13.1, kernel-syms-3.16.7-13.1, pcfclock-0.44-260.6.2, vhba-kmp-20140629-2.6.2, virtualbox-4.3.20-10.2, xen-4.4.1_08-12.2, xtables-addons-2.6-6.2