AMD Microcode:

Clarify that vulnerabilities are now fixed by AMD supplying an
updated AGESA to motherboard manufacturers, for those to update
the BIOS.
This commit is contained in:
Ken Moffat 2023-02-05 15:05:28 +00:00
parent a40e34897b
commit 39eae8f182
2 changed files with 16 additions and 3 deletions

View File

@ -59,6 +59,17 @@
</glossdef>
</glossentry>
<glossentry id="gAGESA">
<glossterm>
<acronym>AGESA</acronym>
</glossterm>
<glossdef>
<para>
AMD Generic Encapsulated Software Architecture
</para>
</glossdef>
</glossentry>
<glossentry id="gAIFF">
<glossterm>
<acronym>AIFF</acronym>

View File

@ -152,7 +152,7 @@
firmware are rare and usually only apply to a few models, although
motherboard manufacturers get AGESA (AMD Generic Encapsulated Software
Architecture) updates to change BIOS values, e.g. to support more memory
variants or newer CPUs.
variants, new vulnerability fixes or newer CPUs.
</para>
<para>
@ -279,8 +279,10 @@ Processor type and features ---&gt;
'&sources-anduin-http;/linux-firmware/amd-ucode/'/>.
The family is always specified in hex. Families 10h to 14h (16 to 20)
are in microcode_amd.bin. Families 15h, 16h, 17h (Zen, Zen+, Zen2) and
19h (Zen3) have their own containers. Very few machines are likely to
get updated microcode. There is a Python3 script at <ulink url=
19h (Zen3) have their own containers, but very few machines are likely to
get updated microcode. Instead, AMD provide an updated AGESA to the
motherboard makers, who may provide an updated BIOS using this.
There is a Python3 script at <ulink url=
'https://github.com/AMDESE/amd_ucode_info/blob/master/amd_ucode_info.py'/>.
Download that script and run it against the bin file to check which
processors have updates.