CPUMicrocodes VS Microcode

Compare CPUMicrocodes vs Microcode and see what are their differences.

CPUMicrocodes

Intel, AMD, VIA & Freescale CPU Microcode Repositories (by platomav)

Microcode

Microcode Updates for the USENIX 2017 paper: Reverse Engineering x86 Processor Microcode (by RUB-SysSec)
Sevalla - Deploy and host your apps and databases, now with $50 credit!
Sevalla is the PaaS you have been looking for! Advanced deployment pipelines, usage-based pricing, preview apps, templates, human support by developers, and much more!
sevalla.com
featured
InfluxDB – Built for High-Performance Time Series Workloads
InfluxDB 3 OSS is now GA. Transform, enrich, and act on time series data directly in the database. Automate critical tasks and eliminate the need to move data externally. Download now.
www.influxdata.com
featured
CPUMicrocodes Microcode
7 4
978 342
0.3% 0.0%
7.3 0.0
2 days ago almost 7 years ago
Python
- -
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

CPUMicrocodes

Posts with mentions or reviews of CPUMicrocodes. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-01-30.

Microcode

Posts with mentions or reviews of Microcode. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-06-18.
  • The legend of “x86 CPUs decode instructions into RISC form internally”
    6 projects | news.ycombinator.com | 18 Jun 2023
  • On “I don't trust microcode”
    4 projects | news.ycombinator.com | 30 Jan 2023
    For the Intel stuff you're talking about, there's three classes keys in play, two of which have been leaked, but not the one that allows you to impersonate Intel. What we have are the keys shipped on every actual system (that has been cracked, I think that's just for Goldmont), the symmetric encrypt/decrypt key (AES IIRC), and the public signing key to verify that it came from Intel. Intel's private keys behind the signature haven't been leaked.

    Interestingly though, it turns out that AMD K10 microcode updates weren't signed and had only the laziest form of encryption, allowing some security researchers to make custom ucode updates using this toolchain they posted on github: https://github.com/RUB-SysSec/Microcode

  • Simulating the IBM 360/50 mainframe from its microcode
    2 projects | news.ycombinator.com | 25 Jan 2022
    From what little we know of recent designs (the best public documentation being the fantastic work to reverse engineer AMD K8 and K10 microcode here https://github.com/RUB-SysSec/Microcode ), I'd describe x86 microcode as particularly wide vertical microcode of 64 bit ops.

    The bit width is more a heuristic. With horizontal microcode you can look at each group of bits and it's clear 'these three bits are the selection input to this mux', 'this bit is an enable for the buffer linking these two buses', etc. Vertical microcode in contrast is further decoded with bit fields having different meanings based on opcode style fields.

    Pretty universally, OoO superscalar cores will use vertical microcode (or vertical microcode looking micro-ops in cores without microcode) because that's the right abstraction you want at the most expensive part of the design: the tracking of in flight and undispatched operations in the reorder buffer, and how the results route in the bypass network. Any additional wodtch there really starts to hit your power budget, and it's the wrong level for horizontal microcode because the execution units will make different choices on even how many control signals they want.

  • Looking for a processor with no backdoors but has VT-x and VT-d (or equivalent). Thoughts?
    1 project | /r/TOR | 22 Jan 2021
    any chip that you can't physically inspect might have backdoors. and if a CPU has updatable microcode, it's possible to implement a backdoor in microcode. there's no way to make a verifiably safe CPU with the features you want.

What are some alternatives?

When comparing CPUMicrocodes and Microcode you can also consider the following projects:

PSPTool - Display, extract, and manipulate PSP firmware inside UEFI images

ghidra_a29k - Ghidra AMD 29000 (a29k) Processor Module

Intel-Linux-Processor-Microcode-Dat

uCodeDisasm

Intel-Linux-Processor-Microcode-Data-Files

Clever-ISA - A specification for a new ISA

Sevalla - Deploy and host your apps and databases, now with $50 credit!
Sevalla is the PaaS you have been looking for! Advanced deployment pipelines, usage-based pricing, preview apps, templates, human support by developers, and much more!
sevalla.com
featured
InfluxDB – Built for High-Performance Time Series Workloads
InfluxDB 3 OSS is now GA. Transform, enrich, and act on time series data directly in the database. Automate critical tasks and eliminate the need to move data externally. Download now.
www.influxdata.com
featured