Page 1 of 1

Intel Microcode update [Solved]

Posted: Wed May 22, 2019 9:55 pm
by Beardedragon
I just installed the update and I wonder if there is any test to see if it worked? This is the latest problem and I had seen mention of it when upgrading, never understood what it means.

Re: Intel Microcode update

Posted: Wed May 22, 2019 10:23 pm
by jglen490
What do you think should be tested?

To me, if it installed without issues, and it came through the wickets it has to go though to get to the update, and understand that it was tested by people who know what it's supposed to do, and it was written by computer engineers or computer scientists who know a lot better than me how to find and solve problems at the hardware level - it's good enough for me.

Especially, if nothing bad happens over the next few days of normal use.

It's part of an ongoing effort to find and fix the bad processes that went into making certain CPUs by a certain well known manufacturer. Problems, that also by the way, are not baked into the CPUs made by another manufacturer. Think Spectre and Meltdown, only way worse. From what I've read, there will be a point - for that certain manufacturer - where software fixes to hardware problems will no longer be effective.

Re: Intel Microcode update

Posted: Thu May 23, 2019 12:17 am
by smurphos
Beardedragon wrote:
Wed May 22, 2019 9:55 pm
I just installed the update and I wonder if there is any test to see if it worked? This is the latest problem and I had seen mention of it when upgrading, never understood what it means.
To see what microcode revision your system is using.

dmesg | grep microcode

e.g. in my output (procesor is a i5-2430m)

Code: Select all

steve@steve-HP-Pavilion-g6-Notebook-PC:~$ dmesg | grep microcode
[    0.000000] microcode: microcode updated early to revision 0x2f, date = 2019-02-17
[    3.050628] microcode: sig=0x206a7, pf=0x10, revision=0x2f
[    3.050732] microcode: Microcode Update Driver: v2.2.
This document lists processors and the current microcode signature for comparison with the output above.

https://www.intel.com/content/dam/www/p ... 132019.pdf

Are you concerned whether your computer is still vulnerable to the MDS vulnerabilities the microcode was released to mitigate against?

If so run cat /sys/devices/system/cpu/vulnerabilities/mds and compare the output to the checking status section of https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/MDS

Re: Intel Microcode update

Posted: Thu May 23, 2019 12:26 am
by Beardedragon
smurphos wrote:
Thu May 23, 2019 12:17 am
Beardedragon wrote:
Wed May 22, 2019 9:55 pm
I just installed the update and I wonder if there is any test to see if it worked? This is the latest problem and I had seen mention of it when upgrading, never understood what it means.
To see what microcode revision your system is using.

dmesg | grep microcode

e.g. in my output (procesor is a i5-2430m)

Code: Select all

steve@steve-HP-Pavilion-g6-Notebook-PC:~$ dmesg | grep microcode
[    0.000000] microcode: microcode updated early to revision 0x2f, date = 2019-02-17
[    3.050628] microcode: sig=0x206a7, pf=0x10, revision=0x2f
[    3.050732] microcode: Microcode Update Driver: v2.2.
This document lists processors and the current microcode signature for comparison with the output above.

https://www.intel.com/content/dam/www/p ... 132019.pdf

Are you concerned whether your computer is still vulnerable to the MDS vulnerabilities the microcode was released to mitigate against?

If so run cat /sys/devices/system/cpu/vulnerabilities/mds and compare the output to the checking status section of https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/MDS

Code: Select all

bob@Lenovo-K450e:~$ dmesg | grep microcode
[    0.000000] microcode: microcode updated early to revision 0x27, date = 2019-02-26
[    0.831428] microcode: sig=0x306c3, pf=0x2, revision=0x27
[    0.831502] microcode: Microcode Update Driver: v2.2.
The file will contain the following contents for processors that do not support Intel Hyper-Threading or where Hyper-Threading has been disabled:

Code: Select all

bob@Lenovo-K450e:~$ cat /sys/devices/system/cpu/vulnerabilities/mds
Mitigation: Clear CPU buffers; SMT disabled
Do I have a problem?

Re: Intel Microcode update

Posted: Thu May 23, 2019 12:42 am
by smurphos
Beardedragon wrote:
Thu May 23, 2019 12:26 am
Do I have a problem?
Nope you are all good - the current micrcode is being set for a Haswell Desktop family processor, the MDS mitigation is in place and either your processor was not Hyperthreading capable in the first place or you have turned Hyperthreading off. You are as mitigated as you can be against the MDS CPU vulnerabilities. :)

Re: Intel Microcode update [Solved]

Posted: Thu May 23, 2019 12:44 am
by Beardedragon
Thanks, marked Solved.

Re: Intel Microcode update

Posted: Thu May 23, 2019 12:48 am
by phd21
Hi Beardedragon,

I just read your post and the good replies to it. Here are my thoughts on this as well.

There are a couple of other tests you can run on microcode vulnerabilities and updates.

How to check Linux for Spectre and Meltdown vulnerability - nixCraft
https://www.cyberciti.biz/faq/check-lin ... erability/

speed47/spectre-meltdown-checker: Spectre, Meltdown, Foreshadow, Fallout, RIDL, ZombieLoad vulnerability/mitigation checker for Linux & BSD
https://github.com/speed47/spectre-meltdown-checker
.
.
How to check if your Windows or Linux system is vulnerable to Microarchitectural Data Sampling (MDS) attacks
https://betanews.com/2019/05/15/check-i ... s-attacks/

MDS Tool: find out if you are vulnerable to Microarchitectural Data Sampling Attacks (MDS) - gHacks Tech News
https://www.ghacks.net/2019/05/15/mds-t ... tacks-mds/

Hope this helps ...

Re: Intel Microcode update

Posted: Thu May 23, 2019 12:52 am
by Beardedragon
phd21 wrote:
Thu May 23, 2019 12:48 am
Hi Beardedragon,

I just read your post and the good replies to it. Here are my thoughts on this as well.

There are a couple of tests you can run on microcode vulnerabilities and updates.

Hope this helps ...
Thanks, I got this covered.