[435975.155078] platform microcode: firmware: direct-loading firmware amd-ucode/microcode_amd_fam16h.bin[435975.167741] microcode: CPU0: new patch_level=0x07030106[435975.176174] microcode: CPU1: new patch_level=0x07030106[435975.184785] microcode: CPU2: new patch_level=0x07030106[435975.193171] microcode: CPU3: new patch_level=0x07030106
Spectre and Meltdown mitigation detection tool v0.35 Checking for vulnerabilities on current system Kernel is Linux 4.9.0-6-amd64 #1 SMP Debian 4.9.82-1+deb9u3 (2018-03-02) x86_64 CPU is AMD GX-412TC SOC Hardware check * Hardware support (CPU microcode) for mitigation techniques * Indirect Branch Restricted Speculation (IBRS) * SPEC_CTRL MSR is available: NO * CPU indicates IBRS capability: NO * Indirect Branch Prediction Barrier (IBPB) * PRED_CMD MSR is available: YES * CPU indicates IBPB capability: YES (IBPB_SUPPORT feature bit) * Single Thread Indirect Branch Predictors (STIBP) * SPEC_CTRL MSR is available: NO * CPU indicates STIBP capability: NO * Enhanced IBRS (IBRS_ALL) * CPU indicates ARCH_CAPABILITIES MSR availability: NO * ARCH_CAPABILITIES MSR advertises IBRS_ALL capability: NO * CPU explicitly indicates not being vulnerable to Meltdown (RDCL_NO): NO * CPU microcode is known to cause stability problems: NO * CPU vulnerability to the three speculative execution attacks variants * Vulnerable to Variant 1: YES * Vulnerable to Variant 2: YES * Vulnerable to Variant 3: NO CVE-2017-5753 [bounds check bypass] aka 'Spectre Variant 1' * Mitigated according to the /sys interface: YES (kernel confirms that the mitigation is active)* Kernel has array_index_mask_nospec: YES (1 occurence(s) found of 64 bits array_index_mask_nospec())* Kernel has the Red Hat/Ubuntu patch: NO > STATUS: NOT VULNERABLE (Mitigation: __user pointer sanitization)CVE-2017-5715 [branch target injection] aka 'Spectre Variant 2'* Mitigated according to the /sys interface: YES (kernel confirms that the mitigation is active)* Mitigation 1 * Kernel is compiled with IBRS/IBPB support: NO * Currently enabled features * IBRS enabled for Kernel space: NO * IBRS enabled for User space: NO * IBPB enabled: NO * Mitigation 2 * Kernel compiled with retpoline option: YES * Kernel compiled with a retpoline-aware compiler: YES (kernel reports full retpoline compilation)> STATUS: NOT VULNERABLE (Mitigation: Full AMD retpoline)CVE-2017-5754 [rogue data cache load] aka 'Meltdown' aka 'Variant 3'* Mitigated according to the /sys interface: YES (kernel confirms that your CPU is unaffected)* Kernel supports Page Table Isolation (PTI): YES * PTI enabled and active: NO * Running as a Xen PV DomU: NO > STATUS: NOT VULNERABLE (your CPU vendor reported your CPU model as not vulnerable)
pkg install devcpu-dataecho 'microcode_update_enable="YES"' >>/etc/rc.confservice microcode_update startcpucontrol -v -u /dev/cpuctl0cpucontrol -v -u /dev/cpuctl1cpucontrol -v -u /dev/cpuctl2cpucontrol -v -u /dev/cpuctl3