You are not logged in.
Pages: 1
After the mkinitcpio flag was deprecated my amd-ucode doesn't load anymore.
I use rEFInd and removed the microcode initrd option from /boot/refind_linux.conf.
My CPU is AMD Ryzen 5 7600X.
/etc/mkinitcpio.d/linux-zen.preset
# mkinitcpio preset file for the 'linux-zen' package
#ALL_config="/etc/mkinitcpio.conf"
ALL_kver="/boot/vmlinuz-linux-zen"
PRESETS=('default' 'fallback')
#default_config="/etc/mkinitcpio.conf"
default_image="/boot/initramfs-linux-zen.img"
#default_uki="/efi/EFI/Linux/arch-linux-zen.efi"
#default_options="--splash /usr/share/systemd/bootctl/splash-arch.bmp"
#fallback_config="/etc/mkinitcpio.conf"
fallback_image="/boot/initramfs-linux-zen-fallback.img"
#fallback_uki="/efi/EFI/Linux/arch-linux-zen-fallback.efi"
fallback_options="-S autodetect"/etc/mkinitcpio.conf
# vim:set ft=sh
# MODULES
# The following modules are loaded before any boot hooks are
# run. Advanced users may wish to specify all system modules
# in this array. For instance:
# MODULES=(usbhid xhci_hcd)
MODULES=(amdgpu usbhid xhci_hcd)
# BINARIES
# This setting includes any additional binaries a given user may
# wish into the CPIO image. This is run last, so it may be used to
# override the actual binaries included by a given hook
# BINARIES are dependency parsed, so you may safely ignore libraries
BINARIES=()
# FILES
# This setting is similar to BINARIES above, however, files are added
# as-is and are not parsed in any way. This is useful for config files.
FILES=()
# HOOKS
# This is the most important setting in this file. The HOOKS control the
# modules and scripts added to the image, and what happens at boot time.
# Order is important, and it is recommended that you do not change the
# order in which HOOKS are added. Run 'mkinitcpio -H <hook name>' for
# help on a given hook.
# 'base' is _required_ unless you know precisely what you are doing.
# 'udev' is _required_ in order to automatically load modules
# 'filesystems' is _required_ unless you specify your fs modules in MODULES
# Examples:
## This setup specifies all modules in the MODULES setting above.
## No RAID, lvm2, or encrypted root is needed.
# HOOKS=(base)
#
## This setup will autodetect all modules for your system and should
## work as a sane default
# HOOKS=(base udev autodetect modconf block filesystems fsck)
#
## This setup will generate a 'full' image which supports most systems.
## No autodetection is done.
# HOOKS=(base udev modconf block filesystems fsck)
#
## This setup assembles a mdadm array with an encrypted root file system.
## Note: See 'mkinitcpio -H mdadm_udev' for more information on RAID devices.
# HOOKS=(base udev modconf keyboard keymap consolefont block mdadm_udev encrypt filesystems fsck)
#
## This setup loads an lvm2 volume group.
# HOOKS=(base udev modconf block lvm2 filesystems fsck)
#
## NOTE: If you have /usr on a separate partition, you MUST include the
# usr and fsck hooks.
HOOKS=(base udev autodetect microcode modconf kms keyboard keymap consolefont block filesystems fsck)
# COMPRESSION
# Use this to compress the initramfs image. By default, zstd compression
# is used. Use 'cat' to create an uncompressed image.
#COMPRESSION="zstd"
#COMPRESSION="gzip"
#COMPRESSION="bzip2"
#COMPRESSION="lzma"
#COMPRESSION="xz"
#COMPRESSION="lzop"
#COMPRESSION="lz4"
# COMPRESSION_OPTIONS
# Additional options for the compressor
#COMPRESSION_OPTIONS=()
# MODULES_DECOMPRESS
# Decompress kernel modules during initramfs creation.
# Enable to speedup boot process, disable to save RAM
# during early userspace. Switch (yes/no).
#MODULES_DECOMPRESS="yes"journalctl -k | grep -i "microcode"
Jun 13 18:45:48 archlinux kernel: Speculative Return Stack Overflow: IBPB-extending microcode not applied!
Jun 13 18:45:48 archlinux kernel: Speculative Return Stack Overflow: Vulnerable: Safe RET, no microcode
Jun 13 18:45:48 archlinux kernel: microcode: Current revision: 0x0a601203Last edited by Yagato (2024-06-16 17:48:25)
Offline
Because AMD only publishes update for high end CPUs, mainly server SKUs.
Online
Because AMD only publishes update for high end CPUs, mainly server SKUs.
I highly doubt that as there're still updates forvthe AM4 platform.
Anyway - this looks like a refind bug - I use grub and loading amd-ucode works fine with all known vulnerabilities actively mitigated.
Maybe give another bootloader a try?
Last edited by cryptearth (2024-06-14 10:20:27)
Offline
AMD feels it's the responsibility of HW vendors to decide whether those new releases are needed for their hardware.
Incase the vendor wants them they are supposed to release a bios (firmware) update to distribute the updates.
My main system is a threadripper and has only got microcode updates from asrock, never through amd-ucode .
Yagato , what is brand and model of your motherboard/system ?
If unsure run (as root) journalcltl -b | curl -F 'file=@-' 0x0.st and post the link it outputs .
Disliking systemd intensely, but not satisfied with alternatives so focusing on taming systemd.
clean chroot building not flexible enough ?
Try clean chroot manager by graysky
Offline
Anyway - this looks like a refind bug - I use grub and loading amd-ucode works fine with all known vulnerabilities actively mitigated.
Maybe give another bootloader a try?
Yagato , what is brand and model of your motherboard/system ?
My motherboard is MSI MAG B650 TOMAHAWK WI-FI but my friend has identical setup, also uses Arch with rEFInd and it works with no issues for him.
Maybe my rEFInd config is broken or something. I may post it on monday. I am away from my computer till then.
Offline
It works fine for you, too, there is just no updated microcode to load. There is no problem here, everything is working as expected. The only way to get new microcode is to update your motherboard firmware or to get it from a 3rd party source such as https://github.com/platomav/CPUMicrocodes. Microcode provided by AMD to the linux-firmware repo is extremely limited https://gitlab.com/kernel-firmware/linu … ode/README
Last edited by Scimmia (2024-06-15 17:41:49)
Online
Updating the motherboard firmware worked. Thanks guys for all the advices.
Offline
Pages: 1