Home
last modified time | relevance | path

Searched refs:microcode (Results 1 – 25 of 134) sorted by relevance

123456

/openbmc/linux/Documentation/powerpc/
H A Dqe_firmware.rst44 In this document, the term 'microcode' refers to the sequence of 32-bit
45 integers that compose the actual QE microcode.
47 The term 'firmware' refers to a binary blob that contains the microcode as
50 1) describes the microcode's purpose
51 2) describes how and where to upload the microcode
60 The QE architecture allows for only one microcode present in I-RAM for each
61 RISC processor. To replace any current microcode, a full QE reset (which
62 disables the microcode) must be performed first.
64 QE microcode is uploaded using the following procedure:
66 1) The microcode is placed into I-RAM at a specific location, using the
[all …]
/openbmc/linux/Documentation/arch/x86/
H A Dmicrocode.rst11 The kernel has a x86 microcode loading facility which is supposed to
12 provide microcode loading methods in the OS. Potential use cases are
13 updating the microcode on platforms beyond the OEM End-Of-Life support,
14 and updating the microcode on long-running systems without rebooting.
18 Early load microcode
21 The kernel can update microcode very early during boot. Loading
22 microcode early can fix CPU issues before they are observed during
25 The microcode is stored in an initrd file. During boot, it is read from
28 The format of the combined initrd image is microcode in (uncompressed)
32 The microcode files in cpio name space are:
[all …]
H A Dmds.rst77 instruction in combination with a microcode update. The microcode clears
87 executed on a CPU without the microcode update there is no side effect
105 the microcode updated, but the hypervisor does not (yet) expose the
127 scenarios where the host has the updated microcode but the
207 functionality in microcode. Aside of that the IO-Port mechanism is a
209 not affected or do not receive microcode updates anymore.
/openbmc/linux/arch/x86/kernel/cpu/microcode/
H A DMakefile2 microcode-y := core.o
3 obj-$(CONFIG_MICROCODE) += microcode.o
4 microcode-$(CONFIG_CPU_SUP_INTEL) += intel.o
5 microcode-$(CONFIG_CPU_SUP_AMD) += amd.o
H A Dcore.c543 int old_rev = boot_cpu_data.microcode; in load_late_stop_cpus()
607 pr_info("revision: 0x%x -> 0x%x\n", old_rev, boot_cpu_data.microcode); in load_late_stop_cpus()
784 cpu_data(cpu).microcode = uci->cpu_sig.rev; in mc_cpu_online()
786 boot_cpu_data.microcode = uci->cpu_sig.rev; in mc_cpu_online()
H A Dintel.c460 cpu_data(cpu).microcode = uci->cpu_sig.rev; in apply_microcode_late()
462 boot_cpu_data.microcode = uci->cpu_sig.rev; in apply_microcode_late()
555 c->microcode < 0x0b000021) { in is_blacklisted()
556 …rr_once("Erratum BDX90: late loading with revision < 0x0b000021 (0x%x) disabled.\n", c->microcode); in is_blacklisted()
/openbmc/pldm/host-bmc/dbus/
H A Dcpu_core.cpp8 uint32_t CPUCore::microcode() const in microcode() function in pldm::dbus::CPUCore
11 microcode(); in microcode()
14 uint32_t CPUCore::microcode(uint32_t value) in microcode() function in pldm::dbus::CPUCore
17 microcode(value); in microcode()
H A Dcpu_core.hpp32 uint32_t microcode() const override;
35 uint32_t microcode(uint32_t value) override;
/openbmc/linux/Documentation/power/
H A Dsuspend-and-cpuhotplug.rst176 There are some interesting situations involving CPU hotplug and microcode
179 [Please bear in mind that the kernel requests the microcode images from
187 to apply the same microcode revision to each of the CPUs.
190 and thereby in applying the correct microcode revision to it.
191 But note that the kernel does not maintain a common microcode image for the
197 In this case since we probably need to apply different microcode revisions
198 to different CPUs, the kernel maintains a copy of the correct microcode
208 (which is sent by the CPU hotplug code), the microcode update driver's
210 microcode image for that CPU.
213 doesn't have the microcode image, it does the CPU type/model discovery
[all …]
/openbmc/linux/Documentation/admin-guide/hw-vuln/
H A Dgather_data_sampling.rst48 This issue is mitigated in microcode. The microcode defines the following new
62 GDS can also be mitigated on systems that don't have updated microcode by
76 use the microcode mitigation when available or disable AVX on affected systems
77 where the microcode hasn't been updated to include the mitigation.
91 Vulnerable: No microcode Processor vulnerable and microcode is missing
94 no microcode Processor is vulnerable and microcode is missing
108 The updated microcode will enable the mitigation by default. The kernel's
H A Dsrso.rst36 First of all, it is required that the latest microcode be loaded for
53 * 'Vulnerable: No microcode':
55 The processor is vulnerable, no microcode extending IBPB
58 * 'Vulnerable: Safe RET, no microcode':
61 kernel, but the IBPB-extending microcode has not been applied. User
66 Extended IBPB functionality microcode patch has been applied. It does
83 (spec_rstack_overflow=microcode)
87 Combined microcode/software mitigation. It complements the
88 extended IBPB microcode patch functionality by addressing
139 microcode patch for one's system. This mitigation comes also at
H A Dreg-file-data-sampling.rst42 Intel released a microcode update that enables software to clear sensitive
46 unused and obsolete VERW instruction in combination with a microcode update.
47 The microcode clears the affected CPU buffers when the VERW instruction is
58 Newer processors and microcode update on existing affected processors added new
64 microcode that clears the affected buffers on VERW execution.
95 * - 'Vulnerable: No microcode'
96 - The processor is vulnerable but microcode is not updated.
H A Dtsx_async_abort.rst99 …- The CPU is affected by this vulnerability and the microcode and kernel mitigation are not applie…
100 * - 'Vulnerable: Clear CPU buffers attempted, no microcode'
101 - The system tries to clear the buffers but the microcode might not support the operation.
103 - The microcode has been updated to clear the buffers. TSX is still enabled.
114 If the processor is vulnerable, but the availability of the microcode-based
120 microcode update applied, but the hypervisor is not yet updated to expose the
121 CPUID to the guest. If the host has updated microcode the protection takes
131 The kernel detects the affected CPUs and the presence of the microcode which is
132 required. If a CPU is affected and the microcode is available, then the kernel
142 Affected systems where the host has TAA microcode and TAA is mitigated by
[all …]
H A Dspecial-register-buffer-data-sampling.rst64 Intel will release microcode updates that modify the RDRAND, RDSEED, and
86 The microcode updates provide an opt-out mechanism (RNGDS_MITG_DIS) to disable
100 9]==1. This MSR is introduced through the microcode update.
132 Vulnerable: No microcode Processor vulnerable and microcode is missing
147 This new microcode serializes processor access during execution of RDRAND,
H A Dmds.rst104 * - 'Vulnerable: Clear CPU buffers attempted, no microcode'
105 - The processor is vulnerable but microcode is not updated.
127 If the processor is vulnerable, but the availability of the microcode based
133 microcode update applied, but the hypervisor is not yet updated to expose
134 the CPUID to the guest. If the host has updated microcode the protection
143 The kernel detects the affected CPUs and the presence of the microcode
146 If a CPU is affected and the microcode is available, then the kernel
176 If the L1D flush mitigation is enabled and up to date microcode is
/openbmc/u-boot/arch/x86/dts/
H A Dcougarcanyon2.dts66 microcode {
68 #include "microcode/m12306a2_00000008.dtsi"
71 #include "microcode/m12306a4_00000007.dtsi"
74 #include "microcode/m12306a5_00000007.dtsi"
77 #include "microcode/m12306a8_00000010.dtsi"
80 #include "microcode/m12306a9_0000001b.dtsi"
H A Dcherryhill.dts201 microcode {
203 #include "microcode/m01406c2220.dtsi"
206 #include "microcode/m01406c3363.dtsi"
209 #include "microcode/m01406c440a.dtsi"
H A Dbayleybay.dts273 microcode {
275 #include "microcode/m0230671117.dtsi"
278 #include "microcode/m0130673325.dtsi"
281 #include "microcode/m0130679907.dtsi"
/openbmc/u-boot/tools/binman/
H A DREADME.entries150 This file contains microcode for some devices in a special format. An
360 Entry: u-boot-dtb-with-ucode: A U-Boot device tree file, with the microcode removed
368 contains the microcode. If the microcode is not being collated into one
369 place then the offset and size of the microcode is recorded by this entry,
371 entry deletes the microcode from the device tree (to save space) and makes
496 Entry: u-boot-spl-with-ucode-ptr: U-Boot SPL with embedded microcode pointer
499 This is used when SPL must set up the microcode for U-Boot.
542 Entry: u-boot-tpl-dtb-with-ucode: U-Boot TPL with embedded microcode pointer
545 This is used when TPL must set up the microcode for U-Boot.
552 Entry: u-boot-tpl-with-ucode-ptr: U-Boot TPL with embedded microcode pointer
[all …]
/openbmc/linux/drivers/net/wireless/intel/iwlegacy/
H A DKconfig22 In order to use this driver, you will need a microcode (uCode)
23 image for it. You can obtain the microcode from:
27 The microcode is typically installed in /lib/firmware. You can
49 In order to use this driver, you will need a microcode (uCode)
50 image for it. You can obtain the microcode from:
54 The microcode is typically installed in /lib/firmware. You can
/openbmc/linux/drivers/crypto/cavium/cpt/
H A Dcptpf.h22 struct microcode { struct
53 struct microcode mcode[CPT_MAX_CORE_GROUPS]; argument
/openbmc/openbmc/meta-security/wic/
H A Dsystemd-bootdisk-dmverity.wks.in9 # Also note that the use of microcode.cpio introduces a meta-intel layer dependency.
11 part /boot --source bootimg-efi --sourceparams="loader=systemd-boot,initrd=microcode.cpio" --ondisk…
/openbmc/u-boot/drivers/qe/
H A Dqe.c511 be32_to_cpu(firmware->microcode[i].count); in qe_upload_firmware()
557 const struct qe_microcode *ucode = &firmware->microcode[i]; in qe_upload_firmware()
650 be32_to_cpu(firmware->microcode[i].count); in u_qe_upload_firmware()
685 const struct qe_microcode *ucode = &firmware->microcode[i]; in u_qe_upload_firmware()
746 const struct qe_microcode *ucode = &firmware->microcode[i]; in u_qe_firmware_resume()
/openbmc/u-boot/tools/binman/test/
H A D039_x86_ucode_missing_node2.dts15 microcode {
H A D038_x86_ucode_missing_node.dts18 microcode {

123456