| /OK3568_Linux_fs/kernel/Documentation/x86/ |
| H A D | microcode.rst | 10 The kernel has a x86 microcode loading facility which is supposed to 11 provide microcode loading methods in the OS. Potential use cases are 12 updating the microcode on platforms beyond the OEM End-Of-Life support, 13 and updating the microcode on long-running systems without rebooting. 17 Early load microcode 20 The kernel can update microcode very early during boot. Loading 21 microcode early can fix CPU issues before they are observed during 24 The microcode is stored in an initrd file. During boot, it is read from 27 The format of the combined initrd image is microcode in (uncompressed) 31 The microcode files in cpio name space are: [all …]
|
| H A D | mds.rst | 77 instruction in combination with a microcode update. The microcode clears 87 executed on a CPU without the microcode update there is no side effect 102 the microcode updated, but the hypervisor does not (yet) expose the 124 scenarios where the host has the updated microcode but the 191 functionality in microcode. Aside of that the IO-Port mechanism is a 193 not affected or do not receive microcode updates anymore.
|
| /OK3568_Linux_fs/kernel/Documentation/powerpc/ |
| H A D | qe_firmware.rst | 44 In this document, the term 'microcode' refers to the sequence of 32-bit 45 integers that compose the actual QE microcode. 47 The term 'firmware' refers to a binary blob that contains the microcode as 50 1) describes the microcode's purpose 51 2) describes how and where to upload the microcode 60 The QE architecture allows for only one microcode present in I-RAM for each 61 RISC processor. To replace any current microcode, a full QE reset (which 62 disables the microcode) must be performed first. 64 QE microcode is uploaded using the following procedure: 66 1) The microcode is placed into I-RAM at a specific location, using the [all …]
|
| /OK3568_Linux_fs/buildroot/package/intel-microcode/ |
| H A D | Config.in | 2 bool "intel-microcode" 5 This package provides an Intel microcode data file that can be 7 proper kernel support are required to upload the microcode. 12 bool "install microcode files to /lib/firmware in target" 16 Select this option to have the microcode files installed to
|
| H A D | intel-microcode.hash | 2 sha256 fd85b6b769efd029dec6a2c07106fd18fb4dcb548b7bc4cde09295a8344ef6d7 intel-microcode-20210608.…
|
| /OK3568_Linux_fs/kernel/arch/x86/kernel/cpu/microcode/ |
| H A D | Makefile | 2 microcode-y := core.o 3 obj-$(CONFIG_MICROCODE) += microcode.o 4 microcode-$(CONFIG_MICROCODE_INTEL) += intel.o 5 microcode-$(CONFIG_MICROCODE_AMD) += amd.o
|
| H A D | intel.c | 735 csig->rev = c->microcode; in collect_cpu_info() 810 c->microcode = rev; in apply_microcode_intel() 814 boot_cpu_data.microcode = rev; in apply_microcode_intel() 917 c->microcode < 0x0b000021) { in is_blacklisted() 918 …rr_once("Erratum BDF90: late loading with revision < 0x0b000021 (0x%x) disabled.\n", c->microcode); in is_blacklisted()
|
| /OK3568_Linux_fs/kernel/Documentation/power/ |
| H A D | suspend-and-cpuhotplug.rst | 176 There are some interesting situations involving CPU hotplug and microcode 179 [Please bear in mind that the kernel requests the microcode images from 187 to apply the same microcode revision to each of the CPUs. 190 and thereby in applying the correct microcode revision to it. 191 But note that the kernel does not maintain a common microcode image for the 197 In this case since we probably need to apply different microcode revisions 198 to different CPUs, the kernel maintains a copy of the correct microcode 208 (which is sent by the CPU hotplug code), the microcode update driver's 210 microcode image for that CPU. 213 doesn't have the microcode image, it does the CPU type/model discovery [all …]
|
| /OK3568_Linux_fs/u-boot/arch/x86/dts/ |
| H A D | cougarcanyon2.dts | 31 microcode { 33 #include "microcode/m12306a2_00000008.dtsi" 36 #include "microcode/m12306a4_00000007.dtsi" 39 #include "microcode/m12306a5_00000007.dtsi" 42 #include "microcode/m12306a8_00000010.dtsi" 45 #include "microcode/m12306a9_0000001b.dtsi"
|
| H A D | bayleybay.dts | 274 microcode { 276 #include "microcode/m0230671117.dtsi" 279 #include "microcode/m0130673325.dtsi" 282 #include "microcode/m0130679907.dtsi"
|
| H A D | baytrail_som-db5800-som-6867.dts | 291 microcode { 293 #include "microcode/m0130673325.dtsi" 296 #include "microcode/m0130679907.dtsi"
|
| /OK3568_Linux_fs/kernel/Documentation/admin-guide/hw-vuln/ |
| H A D | tsx_async_abort.rst | 99 …- The CPU is affected by this vulnerability and the microcode and kernel mitigation are not applie… 100 * - 'Vulnerable: Clear CPU buffers attempted, no microcode' 101 - The system tries to clear the buffers but the microcode might not support the operation. 103 - The microcode has been updated to clear the buffers. TSX is still enabled. 114 If the processor is vulnerable, but the availability of the microcode-based 120 microcode update applied, but the hypervisor is not yet updated to expose the 121 CPUID to the guest. If the host has updated microcode the protection takes 131 The kernel detects the affected CPUs and the presence of the microcode which is 132 required. If a CPU is affected and the microcode is available, then the kernel 142 Affected systems where the host has TAA microcode and TAA is mitigated by [all …]
|
| H A D | special-register-buffer-data-sampling.rst | 63 Intel will release microcode updates that modify the RDRAND, RDSEED, and 85 The microcode updates provide an opt-out mechanism (RNGDS_MITG_DIS) to disable 99 9]==1. This MSR is introduced through the microcode update. 131 Vulnerable: No microcode Processor vulnerable and microcode is missing 146 This new microcode serializes processor access during execution of RDRAND,
|
| H A D | mds.rst | 104 * - 'Vulnerable: Clear CPU buffers attempted, no microcode' 105 - The processor is vulnerable but microcode is not updated. 127 If the processor is vulnerable, but the availability of the microcode based 133 microcode update applied, but the hypervisor is not yet updated to expose 134 the CPUID to the guest. If the host has updated microcode the protection 143 The kernel detects the affected CPUs and the presence of the microcode 146 If a CPU is affected and the microcode is available, then the kernel 176 If the L1D flush mitigation is enabled and up to date microcode is
|
| H A D | processor_mmio_stale_data.rst | 14 vulnerabilities includes a combination of microcode update and software 115 Newer processors and microcode update on existing affected processors added new 157 combination with a microcode update. The microcode clears the affected CPU 227 * - 'Vulnerable: Clear CPU buffers attempted, no microcode' 228 - The processor is vulnerable, but microcode is not updated. The
|
| /OK3568_Linux_fs/kernel/drivers/net/wireless/intel/iwlegacy/ |
| H A D | Kconfig | 23 In order to use this driver, you will need a microcode (uCode) 24 image for it. You can obtain the microcode from: 28 The microcode is typically installed in /lib/firmware. You can 49 In order to use this driver, you will need a microcode (uCode) 50 image for it. You can obtain the microcode from: 54 The microcode is typically installed in /lib/firmware. You can
|
| /OK3568_Linux_fs/buildroot/package/iucode-tool/ |
| H A D | iucode.service | 2 Description=Upload microcode into the processor 6 ExecStart=/usr/sbin/iucode_tool -k /usr/share/misc/intel-microcode.dat
|
| H A D | Config.in | 9 Intel processor microcode tool
|
| /OK3568_Linux_fs/kernel/drivers/crypto/cavium/cpt/ |
| H A D | cptpf.h | 22 struct microcode { struct 53 struct microcode mcode[CPT_MAX_CORE_GROUPS]; argument
|
| /OK3568_Linux_fs/u-boot/drivers/qe/ |
| H A D | qe.c | 436 be32_to_cpu(firmware->microcode[i].count); in qe_upload_firmware() 482 const struct qe_microcode *ucode = &firmware->microcode[i]; in qe_upload_firmware() 575 be32_to_cpu(firmware->microcode[i].count); in u_qe_upload_firmware() 610 const struct qe_microcode *ucode = &firmware->microcode[i]; in u_qe_upload_firmware() 671 const struct qe_microcode *ucode = &firmware->microcode[i]; in u_qe_firmware_resume()
|
| /OK3568_Linux_fs/kernel/arch/x86/kernel/cpu/ |
| H A D | proc.c | 83 if (c->microcode) in show_cpuinfo() 84 seq_printf(m, "microcode\t: 0x%x\n", c->microcode); in show_cpuinfo()
|
| H A D | intel.c | 133 u32 microcode; member 176 return (c->microcode <= spectre_bad_microcodes[i].microcode); in bad_spectre_microcode() 199 c->microcode = intel_get_microcode_revision(); in early_init_intel() 226 c->microcode < 0x20e) { in early_init_intel()
|
| /OK3568_Linux_fs/u-boot/tools/binman/test/ |
| H A D | 39_x86_ucode_missing_node2.dts | 15 microcode {
|
| H A D | 38_x86_ucode_missing_node.dts | 18 microcode {
|
| H A D | 35_x86_single_ucode.dts | 21 microcode {
|