home.social

#microcode — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #microcode, aggregated by home.social.

  1. Waiting for #AMD to release the RDSEED #microcode fix for the "embedded" #EPYC 4005 series. I think it will be the first time I ever needed or wanted to update my CPU firmware. I know a bit more about it now that I attended the talk about AMD Zen microcode tools at the #39C3.

    https://media.ccc.de/v/39c3-the-angry-path-to-zen-amd-zen-microcode-tools-and-insights

    https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7055.html

  2. If you use on kernels ranging from 6.12 to 6.19 and get the error:

    VFS: Unable to mount root fs on unknown_block(0,0)

    Add the 'btrfs' and 'microcode' hooks to /etc/mkinitcpio.conf via chroot and rerun initramfs generation.

    If that doesn't help install `intel-ucode.img` and add it to your grub boot parameters in the initrd list.

    If that still doesn't help (happens on Intel 3770k and older) disable initramfs compression, use gzip instead.

    You are welcome

  3. If you use #btrfs on kernels ranging from 6.12 to 6.19 and get the error:

    VFS: Unable to mount root fs on unknown_block(0,0)

    Add the 'btrfs' and 'microcode' hooks to /etc/mkinitcpio.conf via chroot and rerun initramfs generation.

    If that doesn't help install `intel-ucode.img` and add it to your grub boot parameters in the initrd list.

    If that still doesn't help (happens on Intel 3770k and older) disable #zstd initramfs compression, use gzip instead.

    You are welcome

    #initramfs #microcode

  4. If you use #btrfs on kernels ranging from 6.12 to 6.19 and get the error:

    VFS: Unable to mount root fs on unknown_block(0,0)

    Add the 'btrfs' and 'microcode' hooks to /etc/mkinitcpio.conf via chroot and rerun initramfs generation.

    If that doesn't help install `intel-ucode.img` and add it to your grub boot parameters in the initrd list.

    If that still doesn't help (happens on Intel 3770k and older) disable #zstd initramfs compression, use gzip instead.

    You are welcome

    #initramfs #microcode

  5. If you use #btrfs on kernels ranging from 6.12 to 6.19 and get the error:

    VFS: Unable to mount root fs on unknown_block(0,0)

    Add the 'btrfs' and 'microcode' hooks to /etc/mkinitcpio.conf via chroot and rerun initramfs generation.

    If that doesn't help install `intel-ucode.img` and add it to your grub boot parameters in the initrd list.

    If that still doesn't help (happens on Intel 3770k and older) disable #zstd initramfs compression, use gzip instead.

    You are welcome

    #initramfs #microcode

  6. Courtesy of Eric Rechlin of hpcalc.org, now you can watch a fat ugly guy who says "um" far too often, at HHC 2025 talking about and demonstrating the forthcoming Nonpareil II microcode-level simulation of various HP RPN calculators (currently HP-15C and HP-16C):

    youtube.com/watch?v=eraikEonaJQ

    The audience really liked that the graphics is fully scalable, rather than only having integer multiple scaling of a bitmap, in the original Nonpareil.

    #hhc2025 #Nonpareil2 #rpn #calculator #microcode

  7. At HHC 2025, I learned of the existence of another HP-95C in private hands, which makes four that I know of.

    The HP-95C was a desktop scientific programmable printing calculator, with continuous (CMOS) memory but no card reader. It would have been introduced in 1976, positioned between the HP-91 desktop non-programmable printing scientific, and the HP-97 desktop programmable printing scientific with magnetic card reader.
    1/
    #hhc2025 #rpn #calculator #microcode #simulator

  8. I just gave an HHC 2025 presentation and demonstration of Nonpareil II, my work--in-progress microcode-level HP calculator simulator, now written in C++20 using the Qt6 toolkit. Compared to the original, it uses vector graphics for smooth scaling over a wide range of window sizes.
    #hhc2025 #rpn #calculator #microcode #simulator

  9. World's first #CPU-level #ransomware can "bypass every freaking traditional technology we have out there" — new #firmware-based attacks could usher in new era of unavoidable ransomware
    Beek, #Rapid7's senior director of threat analytics, revealed AMD Zen chip bug gave him idea that highly skilled attacker could in theory "allow those intruders to load unapproved #microcode into the processors, breaking encryption at the hardware level and modifying CPU behavior at will."
    tomshardware.com/pc-components

  10. How to make any #AMD Zen #CPU always generate 4 from RDRAND
    "We have demonstrated the ability to craft arbitrary malicious microcode patches on Zen 1 through #Zen4 CPUs," the Google #Security Team said.
    "The #vulnerability is that the CPU uses an insecure hash function in the signature validation for #microcode updates."
    The flaw listed as CVE-2024-56161 with a CVSS score of 7.2 out of 10, was discovered and reported to AMD in September, and a fix was devised by December.
    theregister.com/2025/02/04/goo

  11. Just finished Tracy Kidder’s The Soul of a New Machine, a , about the creation of one of Data General’s machines in the 1970s. If you love language, learning about low level stuff like , and how engineers designed full computers in those days, etc this book is for you.

  12. Lilbits: Intel extends warranties for desktop chips (but your PC maker may not be following suit)

    Last month Intel finally acknowledged issues with its 13th and 14th-gen desktop chips based on Raptor Lake architecture and promised to release microcode updates that would prevent these chips from becoming unstable. They’re starting to roll out now. But if you have one of these chips and it’s already become glitchy and crash-prone, the only fix is to […]

    https://liliputing.com/?p=170904

    #300w #bios #fastCharging #intel #lilbits #mediatekHelioG100 #microcode #raptorLake #realme #samsung #samsungGalaxyTabA9PlusKidsEdition

  13. 8086 Multiply Algorithm Gets Reverse Engineered - The 8086 has been around since 1978, so it’s pretty well understood. As the namesa... - hackaday.com/2023/03/16/8086-m #computerhacks #intel8086 #microcode #cpu

  14. Amazing work by Ken Shirriff.

    "I'm developing a microcode-level simulator for the IBM System/360 Model 50 [...]; this blog post provides background to understand the Model 50 and the simulator."

    righto.com/2022/01/ibm360model

    #Computers #ComputerHistory #IBM #System360 #Technology #Simulations #Microcode #ComputerArchitecture