Lines Matching refs:microcode

11 The kernel has a x86 microcode loading facility which is supposed to
12 provide microcode loading methods in the OS. Potential use cases are
13 updating the microcode on platforms beyond the OEM End-Of-Life support,
14 and updating the microcode on long-running systems without rebooting.
18 Early load microcode
21 The kernel can update microcode very early during boot. Loading
22 microcode early can fix CPU issues before they are observed during
25 The microcode is stored in an initrd file. During boot, it is read from
28 The format of the combined initrd image is microcode in (uncompressed)
32 The microcode files in cpio name space are:
35 kernel/x86/microcode/GenuineIntel.bin
37 kernel/x86/microcode/AuthenticAMD.bin
40 scans the microcode file in the initrd. If microcode matching the
44 The loader also saves the matching microcode for the CPU in memory.
45 Thus, the cached microcode patch is applied when CPUs resume from a
48 Here's a crude example how to prepare an initrd with microcode (this is
63 DSTDIR=kernel/x86/microcode
88 The system needs to have the microcode packages installed into
96 You simply install the microcode packages your distro supplies and
99 # echo 1 > /sys/devices/system/cpu/microcode/reload
103 The loading mechanism looks for microcode blobs in
109 The /dev/cpu/microcode method has been removed in 5.19.
117 The microcode engine which receives the microcode update is shared
122 Since the microcode can "simulate" MSRs too, while the microcode update
181 When thread0 of a core is doing the microcode update, if thread1 is
188 Is the microcode suitable for late loading?
207 Basically there is no way to declare a new microcode update suitable
211 Builtin microcode
214 The loader supports also loading of a builtin microcode supplied through
239 requires rebuilding the kernel each time updated microcode from the CPU