If someone is interested:
https://github.com/kolargol/apu2_firmware

of course for testing bins, OpenBSD reports IBPB:

cpu0: 
FPU,VME,DE,PSE,TSC,MSR,PAE,MCE,CX8,APIC,SEP,MTRR,PGE,MCA,CMOV,PAT,PSE36,CFLUSH,MMX,FXSR,SSE,SSE2,HTT,SSE3,PCLMUL,MWAIT,SSSE3,CX16,SSE4.1,SSE4.2,MOVBE,POPCNT,AES,XSAVE,AVX,F16C,NXE,MMXX,FFXSR,PAGE1GB,RDTSCP,LONG,LAHF,CMPLEG,SVM,EAPICSP,AMCR8,ABM,SSE4A,MASSE,3DNOWP,OSVW,IBS,SKINIT,TOPEXT,DBKP,PERFTSC,PCTRL3,ITSC,BMI1,IBPB,XSAVEOPT

On 21:11 Mon 10 Sep, Zbyszek Żółkiewski wrote:
>
> > Wiadomość napisana przez Consus <
con...@ftml.net
> w dniu 25.08.2018, o godz. 17:08:
> >
> > Seems like APU2 board is vulnerable to Spectre:
>
> seems there is microcode update with mitigations but looks like none want to 
> claim where that microcode comes from:
>
>
https://github.com/pcengines/apu2-documentation/issues/75
>
> did someone try to load it from obsd? is it possible?

>> There is an unofficial binary with unknown origin. Seems like AMD have
>> sent microcode updates to some motherboard manufacturers, but there is
>> no hard proof though.

Reply via email to