[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAP1mzZS7=Vpc0wXeD259S02WP2KTHd3CcnwJrKqzxBJTVZ-b_A@mail.gmail.com>
Date: Sun, 9 Mar 2025 18:46:43 -0400
From: Avraham Hollander <anhollander516@...il.com>
To: x86@...nel.org
Cc: linux-kernel@...r.kernel.org
Subject: microcode: You should not be seeing this. Please send the following
couple of lines to x86-<at>-kernel.org
After upgrading to Linux 6.13.6 (built myself with a tarball from kernel.org)
with the microcode loading patches for the AMD vulnerability, I am getting
the following at the beginning of dmesg output:
microcode: You should not be seeing this. Please send the following couple
of lines to x86-<at>-kernel.org
microcode: CPUID(1).EAX: 0xa50f00, current revision: 0xa500011
Looking at arch/x86/kernel/cpu/microcode, it's triggering the default
condition in the switch statement in need_sha_check(), but I'm not sure
exactly what's being compared to what with cur_rev.
I am running a Ryzen 5 5600G, family 19h, for which patch 0xa500011 is the
latest microcode. My BIOS already applies this version before Linux boots,
so no runtime microcode update is actually needed, but it seems it's trying
anyways?
I have not had an opportunity to update my BIOS+PSP because ASUS has not
released a firmware update for my board (PRIME B550M-A AC) yet. Could that
be related?
Powered by blists - more mailing lists