If someone is interested:
https://github.com/kolargol/apu2_firmware
of course for testing bins, OpenBSD reports IBPB:
cpu0:
FPU,VME,DE,PSE,TSC,MSR,PAE,MCE,CX8,APIC,SEP,MTRR,PGE,MCA,CMOV,PAT,PSE36,CFLUSH,MMX,FXSR,SSE,SSE2,HTT,SSE3,PCLMUL,MWAIT,SSSE3,CX16,SSE4.1,SSE4.2,MOVBE,POPCNT,AES,XSAVE,AVX,F
On 21:11 Mon 10 Sep, Zbyszek Żółkiewski wrote:
>
> > Wiadomość napisana przez Consus w dniu 25.08.2018, o
> > godz. 17:08:
> >
> > Seems like APU2 board is vulnerable to Spectre:
>
> seems there is microcode update with mitigations but looks like none want to
> claim where that microcode come
> Wiadomość napisana przez Consus w dniu 25.08.2018, o godz.
> 17:08:
>
> Seems like APU2 board is vulnerable to Spectre:
seems there is microcode update with mitigations but looks like none want to
claim where that microcode comes from:
https://github.com/pcengines/apu2-documentation/issue
On Sat, Aug 25, 2018 at 06:08:49PM +0300, Consus wrote:
> Hi,
>
> Seems like APU2 board is vulnerable to Spectre:
>
> $ uname -r
> 6.3
> $ dmesg | grep cpu0 | grep AMD
> cpu0: AMD GX-412TC SOC, 998.27 MHz
> $ git clone https://github.com/crozone/SpectrePoC
> $
Hi,
Seems like APU2 board is vulnerable to Spectre:
$ uname -r
6.3
$ dmesg | grep cpu0 | grep AMD
cpu0: AMD GX-412TC SOC, 998.27 MHz
$ git clone https://github.com/crozone/SpectrePoC
$ cd SpectrePoC
$ gmake
$ ./spectre.out 85
5 matches
Mail list logo