Ignore:
Timestamp:
02/05/2023 03:05:28 PM (15 months ago)
Author:
Ken Moffat <ken@…>
Branches:
11.3, 12.0, 12.1, kea, ken/TL2024, ken/inkscape-core-mods, ken/tuningfonts, lazarus, lxqt, plabs/newcss, python3.11, qt5new, rahul/power-profiles-daemon, renodr/vulkan-addition, trunk, xry111/llvm18, xry111/xf86-video-removal
Children:
5cf034b
Parents:
a40e3489
Message:

AMD Microcode:

Clarify that vulnerabilities are now fixed by AMD supplying an
updated AGESA to motherboard manufacturers, for those to update
the BIOS.

File:
1 edited

Legend:

Unmodified
Added
Removed
  • postlfs/config/firmware.xml

    ra40e3489 r39eae8f1  
    153153      motherboard manufacturers get AGESA (AMD Generic Encapsulated Software
    154154      Architecture) updates to change BIOS values, e.g. to support more memory
    155       variants or newer CPUs.
     155      variants, new vulnerability fixes or newer CPUs.
    156156    </para>
    157157
     
    280280        The family is always specified in hex. Families 10h to 14h (16 to 20)
    281281        are in microcode_amd.bin.  Families 15h, 16h, 17h (Zen, Zen+, Zen2) and
    282         19h (Zen3) have their own containers.  Very few machines are likely to
    283         get updated microcode. There is a Python3 script at <ulink url=
     282        19h (Zen3) have their own containers, but  very few machines are likely to
     283        get updated microcode. Instead, AMD provide an updated AGESA to the
     284        motherboard makers, who may provide an updated BIOS using this.
     285        There is a Python3 script at <ulink url=
    284286        'https://github.com/AMDESE/amd_ucode_info/blob/master/amd_ucode_info.py'/>.
    285287        Download that script and run it against the bin file to check which
Note: See TracChangeset for help on using the changeset viewer.