funkypenguin.co.nz - Read More









Search Preview

Should you do microcode updates? | Funky Penguin

funkypenguin.co.nz
A colleague and I were discussing my recent rant re a RedHat-issued kernel update breaking VMs on all my AMD systems. Notwithstanding the fact that my RedHat bug report about the issue is set to “private” and Bugzilla (1990 called wants its UI back, to hang out with Miranda IM) won’t let me change it, he asked me “we’ve applied the latest microcode, right?”
.co.nz > funkypenguin.co.nz

SEO audit: Content analysis

Language Error! No language localisation is found.
Title Should you do microcode updates? | Funky Penguin
Text / HTML ratio 34 %
Frame Excellent! The website does not use iFrame solutions.
Flash Excellent! The website does not have any flash contents.
Keywords cloud microcode CPU Skip run update updates? boot you’re code kernel OS Let’s vendors issue tells I’ve misunderstood running latest security
Keywords consistency
Keyword Content Title Description Headings
microcode 13
CPU 7
Skip 4
run 4
update 4
updates? 4
Headings
H1 H2 H3 H4 H5 H6
2 5 2 2 0 0
Images We found 2 images on this web page.

SEO Keywords (Single)

Keyword Occurrence Density
microcode 13 0.65 %
CPU 7 0.35 %
Skip 4 0.20 %
run 4 0.20 %
update 4 0.20 %
updates? 4 0.20 %
boot 4 0.20 %
you’re 3 0.15 %
code 3 0.15 %
kernel 3 0.15 %
OS 2 0.10 %
Let’s 2 0.10 %
vendors 2 0.10 %
issue 2 0.10 %
tells 2 0.10 %
I’ve 2 0.10 %
misunderstood 2 0.10 %
running 2 0.10 %
latest 2 0.10 %
security 2 0.10 %

SEO Keywords (Two Word)

Keyword Occurrence Density
microcode updates? 4 0.20 %
Skip to 3 0.15 %
on your 2 0.10 %
OS vendors 2 0.10 %
you’re running 2 0.10 %
AME Venom 2 0.10 %
Should you 2 0.10 %
apply microcode 2 0.10 %
you apply 2 0.10 %
your CPU 2 0.10 %
microcode update 2 0.10 %
a microcode 2 0.10 %
Funky Penguin 2 0.10 %
if you’re 2 0.10 %
VMs on 2 0.10 %
it a 1 0.05 %
to run 1 0.05 %
of your 1 0.05 %
CPU calling 1 0.05 %
miscreants to 1 0.05 %

SEO Keywords (Three Word)

Keyword Occurrence Density Possible Spam
apply microcode updates? 2 0.10 % No
you apply microcode 2 0.10 % No
a microcode update 2 0.10 % No
Skip links Skip 1 0.05 % No
impacts you if 1 0.05 % No
run code or 1 0.05 % No
to run code 1 0.05 % No
miscreants to run 1 0.05 % No
untrusted miscreants to 1 0.05 % No
allowing untrusted miscreants 1 0.05 % No
already allowing untrusted 1 0.05 % No
you’re already allowing 1 0.05 % No
if you’re already 1 0.05 % No
you if you’re 1 0.05 % No
only impacts you 1 0.05 % No
or VMs on 1 0.05 % No
vulnerability only impacts 1 0.05 % No
SPECTREMELTDOWN vulnerability only 1 0.05 % No
dreaded SPECTREMELTDOWN vulnerability 1 0.05 % No
the dreaded SPECTREMELTDOWN 1 0.05 % No

SEO Keywords (Four Word)

Keyword Occurrence Density Possible Spam
you apply microcode updates? 2 0.10 % No
Skip links Skip to 1 0.05 % No
you if you’re already 1 0.05 % No
or VMs on your 1 0.05 % No
code or VMs on 1 0.05 % No
run code or VMs 1 0.05 % No
to run code or 1 0.05 % No
miscreants to run code 1 0.05 % No
untrusted miscreants to run 1 0.05 % No
allowing untrusted miscreants to 1 0.05 % No
already allowing untrusted miscreants 1 0.05 % No
you’re already allowing untrusted 1 0.05 % No
if you’re already allowing 1 0.05 % No
impacts you if you’re 1 0.05 % No
on your platforms But 1 0.05 % No
only impacts you if 1 0.05 % No
vulnerability only impacts you 1 0.05 % No
SPECTREMELTDOWN vulnerability only impacts 1 0.05 % No
dreaded SPECTREMELTDOWN vulnerability only 1 0.05 % No
the dreaded SPECTREMELTDOWN vulnerability 1 0.05 % No

Internal links in - funkypenguin.co.nz

Archive
Archive | Funky Penguin
Contact
Contact | Funky Penguin
Search
Search | Funky Penguin
Read More
How I removed a file from my git repo history | Funky Penguin
Read More
OpenStack LBAASv2 failed connection debugging | Funky Penguin
Read More
GPU transcoding with Emby / Plex using docker-nvidia | Funky Penguin
rant re a RedHat-issued kernel update breaking VMs on all my AMD systems
KVM VMs on kernel-2.6.32-696.30.1.el6.x86_64 on AMD-based hypervisor fail to boot | Funky Penguin
Read More
Should you do microcode updates? | Funky Penguin
Read More
Wife-friendly script to transfer media to USB from linux server | Funky Penguin
Read More
What is TurtleCoin and why do I care? | Funky Penguin
2
Funky Penguin | Upgrading the world through the skilled application of technology
3
Funky Penguin | Upgrading the world through the skilled application of technology
14
Funky Penguin | Upgrading the world through the skilled application of technology

Funkypenguin.co.nz Spined HTML


Should you do microcode updates? | Funky Penguin Skip links Skip to primary navigation Skip to content Skip to footer Menu HomeArchiveContactSearchCookbookResumeKitchen Funky Penguin Upgrading the world through the skilled using of technology Should you do microcode updates? David Young 1 min read June 15, 2018 Categories opinion Tags security A colleague and I were discussing my recent rant re a RedHat-issued kernel update breaking VMs on all my AMD systems. Notwithstanding the fact that my RedHat bug report well-nigh the issue is set to “private” and Bugzilla (1990 tabbed wants its UI back, to hang out with Miranda IM) won’t let me transpiration it, he asked me “we’ve unromantic the latest microcode, right?” I said, “What microcode?” So began my schooling in the murky world of CPU microcode - what seems to be “realtime patches” to the hardcoded firmware in your CPU processor. I’ve probably misunderstood much of this, but I imagine something like this: What are microcode updates? Let’s say we have a CPU with some buggy code, we’ll undeniability it the AME Venom. The CPU will unchangingly summate 2+2=5. Disaster. Shortly without this is discovered, OS vendors release a microcode update which tells the operating system, “When you boot, if you’re running on an AME Venom, then ignore what the CPU tells you well-nigh 2+2. The wordplay is unquestionably 4” OS vendors will routinely issue updated microcode packages, which (when installed) will update your initrd, so that on boot, your kernel will load this “software band-aid” and not wilt tumbled by faulty old CPU code. Should you wield microcode updates? Well, it depends on what you want to protect against. The latest in a series of horrible microcode updates from Intel will either suck your performance, or ransom the security of your CPU, calling it a “feature”. And the dreaded SPECTRE/MELTDOWN vulnerability only impacts you if you’re once permitting untrusted miscreants to run lawmaking (or VMs) on your platforms. But, if like me, you’re running some 3+-year-old AMD platforms which have never had a microcode update, you might find yourself unable to marching newer kernels 😡, without applying the dis_ucode_ldr fix as a kernel marching argument. How do you wield microcode updates? Under a RedHat-based distribution, just run yum install microcode_ctl. Under Debian/Ubuntu, run microcode.ctl. And reboot. Job’s done. To personize your version of microcode on your distribution/CPU platform, run cat /proc/cpuinfo | grep microcode. You’ve totally misunderstood microcode Probably. I’ve only known well-nigh it for a few hours. Let’s discuss. See unelevated :) Share Tweet LinkedIn Reddit Previous Wife-friendly script to transfer media to USB from linux server Next GPU transcoding with Emby / Plex using docker-nvidia Copyright © 2018 Funky Penguin. Site logo penguin icon made by Freepik from Flaticon is licensed by Creative Commons BY 3.0. Made with the Jekyll So Simple theme.