Hacker News with Generative AI: Microcode

Undocumented 8086 instructions, explained by the microcode (righto.com)
What happens if you give the Intel 8086 processor an instruction that doesn't exist?
Notes on the Pentium's microcode circuitry (righto.com)
Most people think of machine instructions as the fundamental steps that a computer performs. However, many processors have another layer of software underneath: microcode. With microcode, instead of building the processor's control circuitry from complex logic gates, the control logic is implemented with code known as microcode, stored in the microcode ROM. To execute a machine instruction, the computer internally executes several simpler micro-instructions, specified by the microcode.
Zentool – AMD Zen Microcode Manipulation Utility (github.com/google)
This package provides a suite of tools for analyzing, manipulating and generating microcode patches for AMD Zen processors.
Zen and the Art of Microcode Hacking (bughunters.google.com)
The biggest microcode attack in our history is underway (theregister.com)
When your state machines are vulnerable, all bets are off
The biggest microcode attack in our history is underway (theregister.com)
When your state machines are vulnerable, all bets are off
AMD: Microcode Signature Verification Vulnerability (github.com/google)
Google Security Team has identified a security vulnerability in some AMD Zen-based CPUs. This vulnerability allows an adversary with local administrator privileges (ring 0 from outside a VM) to load malicious microcode patches. We have demonstrated the ability to craft arbitrary malicious microcode patches on Zen 1 through Zen 4 CPUs. The vulnerability is that the CPU uses an insecure hash function in the signature validation for microcode updates.
Intel Raptor Lake 0x129 CPU Microcode Performance Impact on Linux (phoronix.com)
Intel confirms no recall for Raptor Lake CPUs,microcode won't fix affected units (videocardz.com)