From mboxrd@z Thu Jan 1 00:00:00 1970
From: bugzilla-daemon@bugzilla.kernel.org
Subject: [Bug 103351] Machine check exception on Broadwell quad-core with
SpeedStep enabled
Date: Thu, 15 Oct 2015 01:05:23 +0000
Message-ID:
References:
Mime-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 7bit
Return-path:
Received: from mail.kernel.org ([198.145.29.136]:60452 "EHLO mail.kernel.org"
rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP
id S1752698AbbJOBF2 (ORCPT );
Wed, 14 Oct 2015 21:05:28 -0400
Received: from mail.kernel.org (localhost [127.0.0.1])
by mail.kernel.org (Postfix) with ESMTP id A0E022073E
for ; Thu, 15 Oct 2015 01:05:27 +0000 (UTC)
Received: from bugzilla1.web.kernel.org (bugzilla1.web.kernel.org [172.20.200.51])
by mail.kernel.org (Postfix) with ESMTP id 6C6B420852
for ; Thu, 15 Oct 2015 01:05:26 +0000 (UTC)
In-Reply-To:
Sender: linux-pm-owner@vger.kernel.org
List-Id: linux-pm@vger.kernel.org
To: linux-pm@vger.kernel.org
https://bugzilla.kernel.org/show_bug.cgi?id=103351
--- Comment #65 from Henrique de Moraes Holschuh ---
General Warning:
Some of the microcodes mentioned in this thread, particularly the revision 0x13
microcode for the Core i5/i7-5xxxHQ and Core i5/i7 5x75C, 5x75R, *have strict
requirements* for safe installation.
These microcodes disable Intel TSX-NI when loaded. On any system where glibc
was compiled with lock elision enabled, these microcodes *must* be installed
through either a BIOS update, or through the early microcode loader (at least
for the time being).
Do *not* install these microcodes to a standard initramfs. It can render the
system unbootable should it crash systemd or udev inside the standard
initramfs. You *must* use an early-initramfs to safely apply such microcode
updates.
For safety, I strongly recommend that they should not be added to
/lib/firmware/intel-ucode with standard names. Debian and Ubuntu rename such
microcode by appending ".initramfs" to their names, for example: iucode-tool
won't care and will still install them to the early-initramfs, but the kernel
microcode module will not find them, rendering them safe.
If you fail install such microcode correctly in a system with a
lock-elision-enabled glibc, it will instantly crash systemd, udev, and anything
else linked to libpthreads when the microcode update is loaded.
Eventually, Debian, Ubuntu and Fedora are likely to blacklist lock elision for
Broadwell processors in glibc, just like it was done for Haswell. With that
blacklist in place, glibc won't crash even if the update is applied at an
inappropriate time (after the kernel booted). But AFAIK nobody has updated the
glibc blacklist to add broadwell processors, yet.
So, please use an early-initramfs for microcode updates, and enjoy a far more
stable system ;-)
--
You are receiving this mail because:
You are the assignee for the bug.