You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
John Allen
a193c6517f
|
12 months ago | |
---|---|---|
.. | ||
README | 12 months ago | |
microcode_amd.bin | ||
microcode_amd.bin.asc | ||
microcode_amd_fam15h.bin | ||
microcode_amd_fam15h.bin.asc | ||
microcode_amd_fam16h.bin | ||
microcode_amd_fam16h.bin.asc | ||
microcode_amd_fam17h.bin | ||
microcode_amd_fam17h.bin.asc | ||
microcode_amd_fam19h.bin | 12 months ago | |
microcode_amd_fam19h.bin.asc | 12 months ago |
README
This repository includes microcode container files for family 15h, 16h,
17h, and 19h AMD CPUs. Microcode patches for families earlier than 15h are
included in the microcode_amd.bin microcode container file. The microcode
patches included in an AMD CPU microcode container file can be listed using
the script in the following git repository:
https://github.com/AMDESE/amd_ucode_info
The microcode patches included in the container files in this directory are
listed below:
Microcode patches in microcode_amd.bin:
Family=0x10 Model=0x02 Stepping=0x02: Patch=0x01000083 Length=960 bytes
Family=0x10 Model=0x02 Stepping=0x0a: Patch=0x01000084 Length=960 bytes
Family=0x10 Model=0x06 Stepping=0x02: Patch=0x010000c7 Length=960 bytes
Family=0x10 Model=0x05 Stepping=0x03: Patch=0x010000c8 Length=960 bytes
Family=0x10 Model=0x09 Stepping=0x01: Patch=0x010000d9 Length=960 bytes
Family=0x10 Model=0x08 Stepping=0x00: Patch=0x010000da Length=960 bytes
Family=0x10 Model=0x05 Stepping=0x02: Patch=0x010000db Length=960 bytes
Family=0x10 Model=0x0a Stepping=0x00: Patch=0x010000dc Length=960 bytes
Family=0x11 Model=0x03 Stepping=0x01: Patch=0x02000032 Length=512 bytes
Family=0x12 Model=0x01 Stepping=0x00: Patch=0x03000027 Length=960 bytes
Family=0x14 Model=0x01 Stepping=0x00: Patch=0x05000029 Length=1568 bytes
Family=0x14 Model=0x02 Stepping=0x00: Patch=0x05000119 Length=1568 bytes
Microcode patches in microcode_amd_fam15h.bin:
Family=0x15 Model=0x01 Stepping=0x02: Patch=0x0600063e Length=2592 bytes
Family=0x15 Model=0x02 Stepping=0x00: Patch=0x06000852 Length=2592 bytes
Family=0x15 Model=0x10 Stepping=0x01: Patch=0x06001119 Length=2592 bytes
Microcode patches in microcode_amd_fam16h.bin:
Family=0x16 Model=0x00 Stepping=0x01: Patch=0x0700010f Length=3458 bytes
Microcode patches in microcode_amd_fam17h.bin:
Family=0x17 Model=0x08 Stepping=0x02: Patch=0x0800820d Length=3200 bytes
Family=0x17 Model=0x31 Stepping=0x00: Patch=0x0830107b Length=3200 bytes
Family=0x17 Model=0xa0 Stepping=0x00: Patch=0x08a00008 Length=3200 bytes
Family=0x17 Model=0x01 Stepping=0x02: Patch=0x0800126e Length=3200 bytes
Microcode patches in microcode_amd_fam19h.bin:
Family=0x19 Model=0x11 Stepping=0x02: Patch=0x0a101244 Length=5568 bytes
Family=0x19 Model=0x01 Stepping=0x02: Patch=0x0a001236 Length=5568 bytes
Family=0x19 Model=0x01 Stepping=0x00: Patch=0x0a001079 Length=5568 bytes
Family=0x19 Model=0x01 Stepping=0x01: Patch=0x0a0011d3 Length=5568 bytes
Family=0x19 Model=0xa0 Stepping=0x02: Patch=0x0aa00213 Length=5568 bytes
Family=0x19 Model=0xa0 Stepping=0x01: Patch=0x0aa00116 Length=5568 bytes
Family=0x19 Model=0x11 Stepping=0x01: Patch=0x0a101144 Length=5568 bytes
NOTE: For Genoa (Family=0x19 Model=0x11) and Bergamo (Family=0x19 Model=0xa0),
either AGESA version >= 1.0.0.8 OR a kernel with the following commit is
required:
a32b0f0db3f3 ("x86/microcode/AMD: Load late on both threads too")
When late loading the patches for Genoa or Bergamo, there may be one spurious
NMI observed per physical core. These NMIs are benign and don't cause any
functional issue but will result in kernel messages being logged.
NOTE: When running 5.19+ kernels on Genoa or Bergamo systems, some microcode
patches are known to trigger warnings in the PMI handler. The following are
the required minimum patch levels to address this problem:
Family=0x19 Model=0x11 Stepping=0x01: Patch=0x0a10113e
Family=0x19 Model=0x11 Stepping=0x02: Patch=0x0a10123e
Family=0x19 Model=0xa0 Stepping=0x01: Patch=0x0aa00116
Family=0x19 Model=0xa0 Stepping=0x02: Patch=0x0aa00212