1 |
On 7/14/19 8:26 AM, Mick wrote: |
2 |
> Then I came across this old message regarding Piledriver CPUs: |
3 |
> https://lists.debian.org/debian-security/2016/03/msg00084.html The |
4 |
> post refers to model 2 of cpu family 21. Not all models in the same |
5 |
> family, only model 2. So I am thinking although patch files are named |
6 |
> per CPU family, whether they are applicable and applied as an update |
7 |
> to the CPU is probably determined by the particular CPU *model*. |
8 |
> Logically, errata in previous CPU revisions may have been fixed in |
9 |
> later models of the same family and therefore such microcode updates |
10 |
> would not be needed. When offered by the OS the CPU won't select to |
11 |
> have them applied. This explains why my AMD models, which are later |
12 |
> revisions of the same 15h family do not apply any microcode updates - |
13 |
> they don't need them. Please share if you know differently and thank |
14 |
> you all for your responses. |
15 |
Remember a while back when I mentioned that "lwp" had disappeared from |
16 |
my /proc/cpuinfo? |
17 |
They restored "lwp" with this commit : |
18 |
> https://git.kernel.org/pub/scm/linux/kernel/git/firmware/linux-firmware.git/commit/?id=7518922bd5b98b137af7aaf3c836f5a498e91609 |
19 |
So it stands to reason that the microcode only applies specific patches |
20 |
to specific problems per CPU. |
21 |
|
22 |
|
23 |
Reference : |
24 |
> Darkstar ~ # cat /proc/cpuinfo |
25 |
> processor : 0 |
26 |
> vendor_id : AuthenticAMD |
27 |
> cpu family : 21 |
28 |
> model : 2 |
29 |
> model name : AMD FX(tm)-9590 Eight-Core Processor |
30 |
> stepping : 0 |
31 |
> microcode : 0x6000852 |
32 |
> cpu MHz : 4685.390 |
33 |
> cache size : 2048 KB |
34 |
Output of /sys/devices/system/cpu/vulnerabilities : |
35 |
> |
36 |
> Darkstar ~ # cat /sys/devices/system/cpu/vulnerabilities/l1tf |
37 |
> Not affected |
38 |
> Darkstar ~ # cat /sys/devices/system/cpu/vulnerabilities/mds |
39 |
> Not affected |
40 |
> Darkstar ~ # cat /sys/devices/system/cpu/vulnerabilities/meltdown |
41 |
> Not affected |
42 |
> Darkstar ~ # cat |
43 |
> /sys/devices/system/cpu/vulnerabilities/spec_store_bypass |
44 |
> Mitigation: Speculative Store Bypass disabled |
45 |
> Darkstar ~ # cat /sys/devices/system/cpu/vulnerabilities/spectre_v1 |
46 |
> Mitigation: __user pointer sanitization |
47 |
> Darkstar ~ # cat /sys/devices/system/cpu/vulnerabilities/spectre_v2 |
48 |
> Mitigation: Full AMD retpoline, IBPB: always-on, STIBP: disabled, RSB |
49 |
> filling |
50 |
|
51 |
Corbin |