From owner-freebsd-ports-bugs@freebsd.org Thu May 16 11:01:14 2019 Return-Path: Delivered-To: freebsd-ports-bugs@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 18E02159128A for ; Thu, 16 May 2019 11:01:14 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id A50E16FE79 for ; Thu, 16 May 2019 11:01:13 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id 61DE41591289; Thu, 16 May 2019 11:01:13 +0000 (UTC) Delivered-To: ports-bugs@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 23C921591288 for ; Thu, 16 May 2019 11:01:13 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.ysv.freebsd.org (mxrelay.ysv.freebsd.org [IPv6:2001:1900:2254:206a::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.ysv.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id B07786FE77 for ; Thu, 16 May 2019 11:01:12 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.ysv.freebsd.org (Postfix) with ESMTPS id 136AFDDD1 for ; Thu, 16 May 2019 11:01:12 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id x4GB1Bil087055 for ; Thu, 16 May 2019 11:01:11 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id x4GB1Bm4087054 for ports-bugs@FreeBSD.org; Thu, 16 May 2019 11:01:11 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: ports-bugs@FreeBSD.org Subject: [Bug 237920] devcpu-data missing microcode Xeon v4 Date: Thu, 16 May 2019 11:01:11 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: lampa@fit.vutbr.cz X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: ports-bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 16 May 2019 11:01:14 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D237920 Bug ID: 237920 Summary: devcpu-data missing microcode Xeon v4 Product: Ports & Packages Version: Latest Hardware: amd64 OS: Any Status: New Severity: Affects Some People Priority: --- Component: Individual Port(s) Assignee: ports-bugs@FreeBSD.org Reporter: lampa@fit.vutbr.cz Microcode 06-4f-01 for Xeon v4 family is not installed from intel-ucode-with-caveats. =3D=3D=3D> devcpu-data-1.22 depends on file: /usr/local/sbin/pkg - found =3D=3D=3D> Fetching all distfiles required by devcpu-data-1.22 for building =3D=3D=3D> Extracting for devcpu-data-1.22 =3D> SHA256 Checksum OK for amd64-microcode.20181214.tar.xz. =3D> SHA256 Checksum OK for intel-Intel-Linux-Processor-Microcode-Data-Files-1.22-microcode-20190514_GH= 0.tar.gz. cp -f -p /usr/ports/sysutils/devcpu-data/files/Makefile /usr/ports/sysutils/devcpu-data/files/ucode-split.c /usr/ports/sysutils/devcpu-data/work/Intel-Linux-Processor-Microcode-Data-F= iles-microcode-20190514 /usr/bin/sed -i.bak 's|%%GH_TAGNAME%%|microcode-20190514|g' /usr/ports/sysutils/devcpu-data/work/Intel-Linux-Processor-Microcode-Data-F= iles-microcode-20190514/Makefile /bin/cat /usr/ports/sysutils/devcpu-data/work/Intel-Linux-Processor-Microcode-Data-F= iles-microcode-20190514/Intel-Linux-Processor-Microcode-Data-Files-microcod= e-20190514/intel-ucode/* /usr/ports/sysutils/devcpu-data/work/Intel-Linux-Processor-Microcode-Data-F= iles-microcode-20190514/Intel-Linux-Processor-Microcode-Data-Files-microcod= e-20190514/intel-ucode-with-caveats/* > /usr/ports/sysutils/devcpu-data/work/Intel-Linux-Processor-Microcode-Data-F= iles-microcode-20190514/intel-ucode.bin =3D=3D=3D> Patching for devcpu-data-1.22 =3D=3D=3D> Configuring for devcpu-data-1.22 =3D=3D=3D> Building for devcpu-data-1.22 --- ucode --- mkdir -p mcodes cd mcodes && for file in=20 ../Intel-Linux-Processor-Microcode-Data-Files-microcode-20190514/intel-ucod= e/[0-9,a-f][0-9,a-f]-[0-9,a-f][0-9,a-f]-[0-9,a-f][0-9,a-f]; do ../ucode-split $file; done ucode-split doesn't look in intel-ucode-with-caveats (but cat does). What is intel-ucode-with-caveats? -- intel-ucode-with-caveats/ -- This directory holds microcode that might need special handling. BDX-ML microcode is provided in directory, because it need special commits = in the Linux kernel, otherwise, updating it might result in unexpected system behavior. OS vendors must ensure that the late loader patches (provided in linux-kernel-patches) are included in the distribution before packaging the BDX-ML microcode for late-loading. ----- This ucode with caveats started with 20180703 version and it is used in cur= rent BIOS microcode (Supermicro X10*) anyway. Mentioned linux kernel patches loo= ks like features re-detection after microcode update. The only Broadwell speci= fic patch is: ----- Subject: x86/microcode/intel: Writeback and invalidate caches before updati= ng microcode Updating microcode is less error prone when caches have been flushed and depending on what exactly the microcode is updating. For example, some of the issues around certain Broadwell parts can be addressed by doing a full cache flush. ----- That is already handled in dev/cpuctl.c: /* * Perform update. Flush caches first to work around seemingly * undocumented errata applying to some Broadwell CPUs. */ wbinvd(); Is there any reason that this microcode update is still skipped? --=20 You are receiving this mail because: You are the assignee for the bug.=