<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<atom:link href="http://dev1galaxy.org/extern.php?action=feed&amp;tid=2955&amp;type=rss" rel="self" type="application/rss+xml" />
		<title><![CDATA[Dev1 Galaxy Forum / CPU microcode blacklisted by nvidia drivers]]></title>
		<link>http://dev1galaxy.org/viewtopic.php?id=2955</link>
		<description><![CDATA[The most recent posts in CPU microcode blacklisted by nvidia drivers.]]></description>
		<lastBuildDate>Mon, 15 Jul 2019 20:04:08 +0000</lastBuildDate>
		<generator>FluxBB</generator>
		<item>
			<title><![CDATA[Re: CPU microcode blacklisted by nvidia drivers]]></title>
			<link>http://dev1galaxy.org/viewtopic.php?pid=17093#p17093</link>
			<description><![CDATA[<div class="quotebox"><cite>Dutch_Master wrote:</cite><blockquote><div><p>I wonder how an AMD Ryzen-9 proc would fare</p></div></blockquote></div><p>My posted output is from a Ryzen 5 2500u. It doesn&#039;t suffer the MDS, L1TF or Meltdown vulnerabilities.</p>]]></description>
			<author><![CDATA[dummy@example.com (Head_on_a_Stick)]]></author>
			<pubDate>Mon, 15 Jul 2019 20:04:08 +0000</pubDate>
			<guid>http://dev1galaxy.org/viewtopic.php?pid=17093#p17093</guid>
		</item>
		<item>
			<title><![CDATA[Re: CPU microcode blacklisted by nvidia drivers]]></title>
			<link>http://dev1galaxy.org/viewtopic.php?pid=17071#p17071</link>
			<description><![CDATA[<p>From what I have been reading on Slashdot, they have far fewer vulnerabilities than Intel, but not none. Broadly, they tend to have a few of the &quot;<a href="https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)" rel="nofollow">Spectre</a>&quot; problems, but nothing in the &quot;<a href="https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)" rel="nofollow">Meltdown</a>&quot; category, which is mostly an Intel-specific problem. Quite a bit is riding on how secure this next generation of Intel processors turns out to be.</p>]]></description>
			<author><![CDATA[dummy@example.com (Micronaut)]]></author>
			<pubDate>Sun, 14 Jul 2019 22:08:06 +0000</pubDate>
			<guid>http://dev1galaxy.org/viewtopic.php?pid=17071#p17071</guid>
		</item>
		<item>
			<title><![CDATA[Re: CPU microcode blacklisted by nvidia drivers]]></title>
			<link>http://dev1galaxy.org/viewtopic.php?pid=17070#p17070</link>
			<description><![CDATA[<p>I wonder how an AMD Ryzen-9 proc would fare <img src="http://dev1galaxy.org/img/smilies/wink.png" width="15" height="15" alt="wink" /></p><p>And I reckon now they&#039;re out (launched last week), the Ryzen-3 series will become dirt cheap. And TTBOMK (to the best of my knowledge) AMD doesn&#039;t suffer from Intel&#039;s security holes in their proc&#039;s.</p>]]></description>
			<author><![CDATA[dummy@example.com (Dutch_Master)]]></author>
			<pubDate>Sun, 14 Jul 2019 21:38:52 +0000</pubDate>
			<guid>http://dev1galaxy.org/viewtopic.php?pid=17070#p17070</guid>
		</item>
		<item>
			<title><![CDATA[Re: CPU microcode blacklisted by nvidia drivers]]></title>
			<link>http://dev1galaxy.org/viewtopic.php?pid=17069#p17069</link>
			<description><![CDATA[<p>Intel are only issuing fixes for certain CPUs, I don&#039;t think yours is covered. They really are a bunch of incompetent twats.</p><p><a href="https://www.intel.com/content/dam/www/public/us/en/documents/sa00115-microcode-update-guidance.pdf" rel="nofollow">https://www.intel.com/content/dam/www/p … idance.pdf</a></p>]]></description>
			<author><![CDATA[dummy@example.com (Head_on_a_Stick)]]></author>
			<pubDate>Sun, 14 Jul 2019 20:47:14 +0000</pubDate>
			<guid>http://dev1galaxy.org/viewtopic.php?pid=17069#p17069</guid>
		</item>
		<item>
			<title><![CDATA[Re: CPU microcode blacklisted by nvidia drivers]]></title>
			<link>http://dev1galaxy.org/viewtopic.php?pid=17066#p17066</link>
			<description><![CDATA[<p>Yes, I have a very old CPU but I&#039;m sure it has at least some vulnerabilities. There was a paper published back in the 90s describing the potential security problems with speculative execution. Apparently Intel ignored it. But the worst vulnerabilities are probably in the latest generations due to the increasing use of speculative execution and other tricks to get all that performance. It will be interesting to see what happens with their new generation of CPUs after this problem became public.</p><div class="codebox"><pre><code>grep -R . /sys/devices/system/cpu/vulnerabilities/
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable: Clear CPU buffers attempted, no microcode; SMT disabled
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: EPT disabled
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI</code></pre></div><p>Gory details on the CPU itself:</p><div class="codebox"><pre class="vscroll"><code>cat /proc/cpuinfo

processor	: 0
vendor_id	: GenuineIntel
cpu family	: 6
model		: 15
model name	: Intel(R) Core(TM)2 Quad CPU    Q6600  @ 2.40GHz
stepping	: 11
microcode	: 0xba
cpu MHz		: 1800.000
cache size	: 4096 KB
physical id	: 0
siblings	: 4
core id		: 0
cpu cores	: 4
apicid		: 0
initial apicid	: 0
fpu		: yes
fpu_exception	: yes
cpuid level	: 10
wp		: yes
flags		: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx lm constant_tsc arch_perfmon pebs bts rep_good nopl aperfmperf pni dtes64 monitor ds_cpl vmx est tm2 ssse3 cx16 xtpr pdcm lahf_lm kaiser tpr_shadow vnmi flexpriority dtherm
bugs		: cpu_meltdown spectre_v1 spectre_v2 spec_store_bypass l1tf mds
bogomips	: 5394.85
clflush size	: 64
cache_alignment	: 64
address sizes	: 36 bits physical, 48 bits virtual
power management:

processor	: 1
vendor_id	: GenuineIntel
cpu family	: 6
model		: 15
model name	: Intel(R) Core(TM)2 Quad CPU    Q6600  @ 2.40GHz
stepping	: 11
microcode	: 0xba
cpu MHz		: 1800.000
cache size	: 4096 KB
physical id	: 0
siblings	: 4
core id		: 2
cpu cores	: 4
apicid		: 2
initial apicid	: 2
fpu		: yes
fpu_exception	: yes
cpuid level	: 10
wp		: yes
flags		: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx lm constant_tsc arch_perfmon pebs bts rep_good nopl aperfmperf pni dtes64 monitor ds_cpl vmx est tm2 ssse3 cx16 xtpr pdcm lahf_lm kaiser tpr_shadow vnmi flexpriority dtherm
bugs		: cpu_meltdown spectre_v1 spectre_v2 spec_store_bypass l1tf mds
bogomips	: 5394.85
clflush size	: 64
cache_alignment	: 64
address sizes	: 36 bits physical, 48 bits virtual
power management:

processor	: 2
vendor_id	: GenuineIntel
cpu family	: 6
model		: 15
model name	: Intel(R) Core(TM)2 Quad CPU    Q6600  @ 2.40GHz
stepping	: 11
microcode	: 0xba
cpu MHz		: 1800.000
cache size	: 4096 KB
physical id	: 0
siblings	: 4
core id		: 1
cpu cores	: 4
apicid		: 1
initial apicid	: 1
fpu		: yes
fpu_exception	: yes
cpuid level	: 10
wp		: yes
flags		: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx lm constant_tsc arch_perfmon pebs bts rep_good nopl aperfmperf pni dtes64 monitor ds_cpl vmx est tm2 ssse3 cx16 xtpr pdcm lahf_lm kaiser tpr_shadow vnmi flexpriority dtherm
bugs		: cpu_meltdown spectre_v1 spectre_v2 spec_store_bypass l1tf mds
bogomips	: 5394.85
clflush size	: 64
cache_alignment	: 64
address sizes	: 36 bits physical, 48 bits virtual
power management:

processor	: 3
vendor_id	: GenuineIntel
cpu family	: 6
model		: 15
model name	: Intel(R) Core(TM)2 Quad CPU    Q6600  @ 2.40GHz
stepping	: 11
microcode	: 0xba
cpu MHz		: 1800.000
cache size	: 4096 KB
physical id	: 0
siblings	: 4
core id		: 3
cpu cores	: 4
apicid		: 3
initial apicid	: 3
fpu		: yes
fpu_exception	: yes
cpuid level	: 10
wp		: yes
flags		: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx lm constant_tsc arch_perfmon pebs bts rep_good nopl aperfmperf pni dtes64 monitor ds_cpl vmx est tm2 ssse3 cx16 xtpr pdcm lahf_lm kaiser tpr_shadow vnmi flexpriority dtherm
bugs		: cpu_meltdown spectre_v1 spectre_v2 spec_store_bypass l1tf mds
bogomips	: 5394.85
clflush size	: 64
cache_alignment	: 64
address sizes	: 36 bits physical, 48 bits virtual
power management:</code></pre></div>]]></description>
			<author><![CDATA[dummy@example.com (Micronaut)]]></author>
			<pubDate>Sun, 14 Jul 2019 20:20:32 +0000</pubDate>
			<guid>http://dev1galaxy.org/viewtopic.php?pid=17066#p17066</guid>
		</item>
		<item>
			<title><![CDATA[Re: CPU microcode blacklisted by nvidia drivers]]></title>
			<link>http://dev1galaxy.org/viewtopic.php?pid=17052#p17052</link>
			<description><![CDATA[<div class="quotebox"><cite>Micronaut wrote:</cite><blockquote><div><p>a comment that says it&#039;s not safe to allow microcode</p></div></blockquote></div><p>No, it says that it&#039;s not safe to allow an attempted update when the microcode module autoloads.</p><p>Is your system vulnerable to Spectre/Meltdown? Check the /sys values reported by the kernel.</p>]]></description>
			<author><![CDATA[dummy@example.com (Head_on_a_Stick)]]></author>
			<pubDate>Sun, 14 Jul 2019 12:41:42 +0000</pubDate>
			<guid>http://dev1galaxy.org/viewtopic.php?pid=17052#p17052</guid>
		</item>
		<item>
			<title><![CDATA[Re: CPU microcode blacklisted by nvidia drivers]]></title>
			<link>http://dev1galaxy.org/viewtopic.php?pid=17031#p17031</link>
			<description><![CDATA[<p>As I said, it&#039;s got one active line. And a comment that says it&#039;s not safe to allow microcode. Here is the full content:</p><div class="codebox"><pre><code># The microcode module attempts to apply a microcode update when
# it autoloads.  This is not always safe, so we block it by default.
blacklist microcode</code></pre></div>]]></description>
			<author><![CDATA[dummy@example.com (Micronaut)]]></author>
			<pubDate>Sat, 13 Jul 2019 21:22:47 +0000</pubDate>
			<guid>http://dev1galaxy.org/viewtopic.php?pid=17031#p17031</guid>
		</item>
		<item>
			<title><![CDATA[Re: CPU microcode blacklisted by nvidia drivers]]></title>
			<link>http://dev1galaxy.org/viewtopic.php?pid=17007#p17007</link>
			<description><![CDATA[<div class="quotebox"><cite>Micronaut wrote:</cite><blockquote><div><p>The file is named &quot;intel-microcode-blacklist.conf&quot; and it has a line that simply says &quot;blacklist microcode&quot; -- meaning it will block ALL microcode, I guess.</p></div></blockquote></div><p>No, the µcode is baked into the initramfs so it is still applied. Read the blacklist file to find out why it is there.</p><p>The kernel reports the vulnerability status for the various Meltdown/Spectre exploits:</p><div class="codebox"><pre><code>E485:~$ grep -R . /sys/devices/system/cpu/vulnerabilities/
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: disabled, RSB filling
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
E485:~$</code></pre></div><p>But your output will be more worrying than mine because of your unfortunate choice of CPU manufacturer <img src="http://dev1galaxy.org/img/smilies/big_smile.png" width="15" height="15" alt="big_smile" /></p>]]></description>
			<author><![CDATA[dummy@example.com (Head_on_a_Stick)]]></author>
			<pubDate>Sat, 13 Jul 2019 08:09:46 +0000</pubDate>
			<guid>http://dev1galaxy.org/viewtopic.php?pid=17007#p17007</guid>
		</item>
		<item>
			<title><![CDATA[CPU microcode blacklisted by nvidia drivers]]></title>
			<link>http://dev1galaxy.org/viewtopic.php?pid=16996#p16996</link>
			<description><![CDATA[<p>While researching the mysterious nvidia non-specific boot error message, I found something else annoying. The nvidia drivers install a blacklist that prevents microcode from being loaded for Intel CPUs! The file is named &quot;intel-microcode-blacklist.conf&quot; and it has a line that simply says &quot;blacklist microcode&quot; -- meaning it will block ALL microcode, I guess. Why? This is now very important with the meltdown/spectre issues. Granted, most cloud servers aren&#039;t going to be using nvidia video cards, so it&#039;s not an issue for them, but I am concerned that this might cause problems on a desktop with up-to-date kernels. Are there checks for the state of the CPU before the new security fixes are used? Or do they just assume that your Intel CPU is using the microcode that changes threading behavior?</p>]]></description>
			<author><![CDATA[dummy@example.com (Micronaut)]]></author>
			<pubDate>Sat, 13 Jul 2019 01:02:21 +0000</pubDate>
			<guid>http://dev1galaxy.org/viewtopic.php?pid=16996#p16996</guid>
		</item>
	</channel>
</rss>
