<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Intel Linux Microcode Data file incomplete in Mobile and Desktop Processors</title>
    <link>https://community.intel.com/t5/Mobile-and-Desktop-Processors/Intel-Linux-Microcode-Data-file-incomplete/m-p/600331#M33224</link>
    <description>&lt;P&gt;First of all, Intel will be releasing microcode updates for every processor affected. They have committed publicly to doing so - and by the end of the month.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Secondly, any board manufacturer who refuses to release a BIOS update is not one that I would ever purchase anything from again. Security is an absolute requirement; anyone not prioritizing that is not someone that I will deal with. If a board can accommodate a processor that is affected, it better get a BIOS that provides the necessary microcode updates -- and this update better close the ME vulnerabilities as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Finally, while it is true that you can get microcode updates via various O/Ss, I absolutely insist that this be at the BIOS level. I want all security holes (and all errata) closed before any O/S starts to load. I do not consider any O/S to be fully secure if it is not until part way through the O/S load that the microcode gets updated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;...S&lt;/P&gt;</description>
    <pubDate>Mon, 15 Jan 2018 02:21:07 GMT</pubDate>
    <dc:creator>n_scott_pearson</dc:creator>
    <dc:date>2018-01-15T02:21:07Z</dc:date>
    <item>
      <title>Intel Linux Microcode Data file incomplete</title>
      <link>https://community.intel.com/t5/Mobile-and-Desktop-Processors/Intel-Linux-Microcode-Data-file-incomplete/m-p/600327#M33220</link>
      <description>&lt;P&gt;Since the recent disclosure of the Meltdown and Spectre vulnerabilities Intel released new microcode update data in the download center (&lt;A href="https://downloadcenter.intel.com/download/27431/Linux-Processor-Microcode-Data-File"&gt;https://downloadcenter.intel.com/download/27431/Linux-Processor-Microcode-Data-File&lt;/A&gt; Download Linux* Processor Microcode Data File ).&lt;/P&gt;&lt;P&gt;The description states that it also applies to one of my processors: &lt;A href="https://downloadcenter.intel.com/product/87258/Intel-Celeron-Processor-N3150-2M-Cache-up-to-2-08-GHz-"&gt;https://downloadcenter.intel.com/product/87258/Intel-Celeron-Processor-N3150-2M-Cache-up-to-2-08-GHz-&lt;/A&gt; Intel® Celeron® Processor N3150 (2M Cache, up to 2.08 GHz)&lt;/P&gt;&lt;P&gt;I'd like to get the most recent update (probably from 2018-01-08) to get the new instructions introduced for CPUs by Intel released in the last 5 years in order to secure my CPU against the vulnerabilities.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;  Vendor:       GenuineIntel  Brandstring:  Intel® Celeron® CPU N3150 @ 1.60GHz  Identified as:Braswell, C0 (14nm)&lt;P&gt;  Signature: 0x406C3&lt;/P&gt;Family:0x6   (extended 0x0, base 0x6)Model: 0x4C  (extended 0x4, base 0xC)Stepping:  0x3 &lt;P&gt;  4 cores, 4 threads&lt;/P&gt;&lt;P&gt;  µcode rev: 0x363&lt;/P&gt;&lt;P&gt;  platform : 0x01&lt;/P&gt;  Tjmax: 90 C&lt;P&gt;  Cache information:&lt;/P&gt;L1 DATA  cache: 4x   24 kBL1 INSTR cache: 4x   32 kBL2 UNI   cache: 1x  1.0 MB&lt;P&gt;&lt;/P&gt;&lt;P&gt;My CPU is at microcode revision 0x33c with the latest available BIOS from from the mainboard manufacturer (Asus) and there is no update for my CPU in the download provided by Intel.&lt;/P&gt;&lt;P&gt;There is however a newer microcode available for my CPU, the U-Boot project has revision 0x363 in its repository (&lt;A href="https://github.com/trini/u-boot/tree/master/arch/x86/dts/microcode"&gt;https://github.com/trini/u-boot/tree/master/arch/x86/dts/microcode&lt;/A&gt; u-boot/arch/x86/dts/microcode at master · trini/u-boot · GitHub ).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sadly this data is in dtsi format and needs to be converted to binary and compressed into a cpio archive and passed to the linux kernel via initrd command when booting.&lt;/P&gt;&lt;P&gt;Here's the relevant dmesg output after this procedure:&lt;/P&gt;[0.000000] microcode: microcode updated early to revision 0x363, date = 2015-12-18[1.137958] microcode: sig=0x406c3, pf=0x1, revision=0x363&lt;P&gt;&lt;/P&gt;&lt;P&gt;I double-checked the Intel Linux Microcode Data file and there is definitely no update for my CPU with signature 0x406C3.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where can I find microcode updates for my CPU provided by Intel? Why are certain updates not available in the download center?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;Peter&lt;/P&gt;</description>
      <pubDate>Sat, 13 Jan 2018 12:17:16 GMT</pubDate>
      <guid>https://community.intel.com/t5/Mobile-and-Desktop-Processors/Intel-Linux-Microcode-Data-file-incomplete/m-p/600327#M33220</guid>
      <dc:creator>PGanz2</dc:creator>
      <dc:date>2018-01-13T12:17:16Z</dc:date>
    </item>
    <item>
      <title>Re: Intel Linux Microcode Data file incomplete</title>
      <link>https://community.intel.com/t5/Mobile-and-Desktop-Processors/Intel-Linux-Microcode-Data-file-incomplete/m-p/600328#M33221</link>
      <description>&lt;P&gt;You, as an individual, should be getting your microcode update via a BIOS update from your board manufacturer. It is also true that Intel releases microcode updates to the OS community for inclusion into OS (and distro) releases.&lt;/P&gt;&lt;P&gt;...S&lt;/P&gt;</description>
      <pubDate>Sun, 14 Jan 2018 01:09:03 GMT</pubDate>
      <guid>https://community.intel.com/t5/Mobile-and-Desktop-Processors/Intel-Linux-Microcode-Data-file-incomplete/m-p/600328#M33221</guid>
      <dc:creator>n_scott_pearson</dc:creator>
      <dc:date>2018-01-14T01:09:03Z</dc:date>
    </item>
    <item>
      <title>Re: Intel Linux Microcode Data file incomplete</title>
      <link>https://community.intel.com/t5/Mobile-and-Desktop-Processors/Intel-Linux-Microcode-Data-file-incomplete/m-p/600329#M33222</link>
      <description>&lt;P&gt;Well, this isn't particularly helpful since Asus does not support Linux and I am sure they won't release a update as they haven't done so since mid-2015.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"This microcode data file contains the latest microcode definitions for all Intel processors. Intel releases these updates periodically. These microcode data files correct processor behavior as documented in the respective processor specification guidelines.&lt;/P&gt;&lt;P&gt;While the regular approach to getting this microcode update is via a BIOS update, Intel realizes that this can be an administrative hassle. The Linux* operating system has a mechanism to update the microcode after booting. For example, this file will be used by the operating system mechanism if the file is placed in the /etc/firmware directory of the Linux system."&lt;/P&gt;&lt;P&gt;Source: &lt;A href="https://downloadcenter.intel.com/download/27431/Linux-Processor-Microcode-Data-File?product=873"&gt;https://downloadcenter.intel.com/download/27431/Linux-Processor-Microcode-Data-File?product=873&lt;/A&gt; Download Linux* Processor Microcode Data File &lt;/P&gt;&lt;P&gt;The download should contain the updates for all CPUs and I should not have to rely on mainboard manufacturers to be able to get support for my Intel CPU.&lt;/P&gt;</description>
      <pubDate>Sun, 14 Jan 2018 09:01:46 GMT</pubDate>
      <guid>https://community.intel.com/t5/Mobile-and-Desktop-Processors/Intel-Linux-Microcode-Data-file-incomplete/m-p/600329#M33222</guid>
      <dc:creator>PGanz2</dc:creator>
      <dc:date>2018-01-14T09:01:46Z</dc:date>
    </item>
    <item>
      <title>Re: Intel Linux Microcode Data file incomplete</title>
      <link>https://community.intel.com/t5/Mobile-and-Desktop-Processors/Intel-Linux-Microcode-Data-file-incomplete/m-p/600330#M33223</link>
      <description>&lt;P&gt;Hi, I agree with you. I have computers that are not going to get a BIOS update any time soon if ever. I'd like to be able to download the microcode for my CPU direct from intel. I can't see why that doesn't happen.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Steve&lt;/P&gt;</description>
      <pubDate>Sun, 14 Jan 2018 16:04:00 GMT</pubDate>
      <guid>https://community.intel.com/t5/Mobile-and-Desktop-Processors/Intel-Linux-Microcode-Data-file-incomplete/m-p/600330#M33223</guid>
      <dc:creator>SZodi</dc:creator>
      <dc:date>2018-01-14T16:04:00Z</dc:date>
    </item>
    <item>
      <title>Re: Intel Linux Microcode Data file incomplete</title>
      <link>https://community.intel.com/t5/Mobile-and-Desktop-Processors/Intel-Linux-Microcode-Data-file-incomplete/m-p/600331#M33224</link>
      <description>&lt;P&gt;First of all, Intel will be releasing microcode updates for every processor affected. They have committed publicly to doing so - and by the end of the month.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Secondly, any board manufacturer who refuses to release a BIOS update is not one that I would ever purchase anything from again. Security is an absolute requirement; anyone not prioritizing that is not someone that I will deal with. If a board can accommodate a processor that is affected, it better get a BIOS that provides the necessary microcode updates -- and this update better close the ME vulnerabilities as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Finally, while it is true that you can get microcode updates via various O/Ss, I absolutely insist that this be at the BIOS level. I want all security holes (and all errata) closed before any O/S starts to load. I do not consider any O/S to be fully secure if it is not until part way through the O/S load that the microcode gets updated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;...S&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jan 2018 02:21:07 GMT</pubDate>
      <guid>https://community.intel.com/t5/Mobile-and-Desktop-Processors/Intel-Linux-Microcode-Data-file-incomplete/m-p/600331#M33224</guid>
      <dc:creator>n_scott_pearson</dc:creator>
      <dc:date>2018-01-15T02:21:07Z</dc:date>
    </item>
    <item>
      <title>Re: Intel Linux Microcode Data file incomplete</title>
      <link>https://community.intel.com/t5/Mobile-and-Desktop-Processors/Intel-Linux-Microcode-Data-file-incomplete/m-p/600332#M33225</link>
      <description>&lt;P&gt;What I am more concerned about is that Intel didn't release any microcode updates for my CPU directly ever as far as I can tell, but several updates exist.&lt;/P&gt;&lt;P&gt;There's at least revisions 0x33c, 0x343, 0x353 and 0x363.&lt;/P&gt;&lt;P&gt;I found those in various BIOS files from different manufacturers and from the U-Boot project (they probably got out of BIOS update files too).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am used to poor support from mainboard manufacturers and if you don't buy anything server-grade, it's the same after a few months no matter what brand you choose.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Really annoying is that Intel advertises that the download contains updates for my CPU (it's explicitly listed!) but there is no update in any data file released in the last 2 years (probably not in any). The fact that you find the updates in BIOS updates mean that there have been updates and Intel kept those already from me as customer.&lt;/P&gt;&lt;P&gt;So this would mean I shouldn't buy from Intel anymore as well...&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jan 2018 06:18:31 GMT</pubDate>
      <guid>https://community.intel.com/t5/Mobile-and-Desktop-Processors/Intel-Linux-Microcode-Data-file-incomplete/m-p/600332#M33225</guid>
      <dc:creator>PGanz2</dc:creator>
      <dc:date>2018-01-15T06:18:31Z</dc:date>
    </item>
  </channel>
</rss>

