From nobody Tue Jul 25 14:44:39 2023 X-Original-To: freebsd-questions@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4R9KYg3QpZz4p9pd for ; Tue, 25 Jul 2023 14:44:39 +0000 (UTC) (envelope-from mike@sentex.net) Received: from smarthost1.sentex.ca (smarthost1.sentex.ca [IPv6:2607:f3e0:0:1::12]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smarthost1.sentex.ca", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4R9KYg1l9Xz4Pbn; Tue, 25 Jul 2023 14:44:39 +0000 (UTC) (envelope-from mike@sentex.net) Authentication-Results: mx1.freebsd.org; none Received: from pyroxene2a.sentex.ca (pyroxene19.sentex.ca [199.212.134.19]) by smarthost1.sentex.ca (8.17.1/8.16.1) with ESMTPS id 36PEicTW048587 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=FAIL); Tue, 25 Jul 2023 10:44:38 -0400 (EDT) (envelope-from mike@sentex.net) Received: from [IPV6:2607:f3e0:0:4::29] ([IPv6:2607:f3e0:0:4:0:0:0:29]) by pyroxene2a.sentex.ca (8.16.1/8.15.2) with ESMTPS id 36PEicnf010061 (version=TLSv1.3 cipher=TLS_AES_128_GCM_SHA256 bits=128 verify=NO); Tue, 25 Jul 2023 10:44:38 -0400 (EDT) (envelope-from mike@sentex.net) Message-ID: Date: Tue, 25 Jul 2023 10:44:39 -0400 List-Id: User questions List-Archive: https://lists.freebsd.org/archives/freebsd-questions List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-questions@freebsd.org X-BeenThere: freebsd-questions@freebsd.org MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101 Thunderbird/102.13.0 Subject: Re: AMD microcode updates (sysutils/devcpu-data-amd) Content-Language: en-US To: infoomatic , FreeBSD Questions References: From: mike tancsa In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.84 X-Rspamd-Queue-Id: 4R9KYg1l9Xz4Pbn X-Spamd-Bar: ---- X-Spamd-Result: default: False [-4.00 / 15.00]; REPLY(-4.00)[]; ASN(0.00)[asn:11647, ipnet:2607:f3e0::/32, country:CA] X-Rspamd-Pre-Result: action=no action; module=replies; Message is reply to one we originated On 7/25/2023 10:17 AM, infoomatic wrote: > Hi, > > you can "kldload cpuctl" and then use the pkg x86info with "x86info > --microcode" to list the currently running cpu firmware version. > Thanks very much, that was exactly what I was looking for! before and after Microcode patch level: 0x8301052 Microcode patch level: 0x830107a     ---Mike > Regards, > Robert > > > On 25.07.23 14:42, mike tancsa wrote: >> Hi All, >> >>      Was looking to update the handful of AMD based servers I have for >> the Zenbleed patch.  I am used to Intel CPUs where they get updated at >> boot time in /boot/firmware.  But when I install the AMD port, I dont >> see it ever installed there.  If I do a userland start >> >> # /usr/local/etc/rc.d/microcode_update start >> Updating CPU Microcode... >> Done. >> # >> >> it seems to work, in that dmesg shows >> >> CPU: AMD EPYC 7302P 16-Core Processor (3000.06-MHz >> K8-class CPU) >>    Origin="AuthenticAMD"  Id=0x830f10  Family=0x17  Model=0x31 >> Stepping=0 >> Features=0x178bfbff >> >> Features2=0x7ed8320b >> >>    AMD Features=0x2e500800 >>    AMD >> Features2=0x75c237ff> >> >>    Structured Extended >> Features=0x219c91a9 >> >>    Structured Extended Features2=0x400004 >>    XSAVE Features=0xf >>    AMD Extended Feature Extensions ID >> EBX=0x18cf757 >>    SVM: NP,NRIP,VClean,AFlush,DAssist,NAsids=32768 >>    TSC: P-state invariant, performance statistics >> >> >> But how do I know if the microcode got updated ? The dmesg displaying >> the features are the same. Is there a command to show the microcode >> version before and after  for AMD CPUs ? >> >> Thanks! >> >>      ---Mike >> >> > >