试图用以下步骤将Intel微码更新到03/12/2018版本(版本: 20180312):
1. extract files from downloaded tarball
2. cp -v intel-ucode/* /lib/firmware/intel-ucode/
3. echo 1 > /sys/devices/system/cpu/microcode/reload
4. dracut -vvf
5. reboot但什么都没变。更新前:
# cat /proc/cpuinfo | grep microcode
microcode : 0x13更新后:
# dmesg | grep microcode
[ 1.096790] microcode: CPU0 sig=0x206c2, pf=0x1, revision=0x13
[ 1.096829] microcode: CPU1 sig=0x206c2, pf=0x1, revision=0x13
[ 1.096851] microcode: CPU2 sig=0x206c2, pf=0x1, revision=0x13
[ 1.096875] microcode: CPU3 sig=0x206c2, pf=0x1, revision=0x13
[ 1.096965] microcode: Microcode Update Driver: v2.01 <tigran@aivazian.fsnet.co.uk>, Peter Oruba我这么做是为了修复“幽灵变体2”。幽灵熔毁检查器. The显示了以下内容:
CVE-2017-5715 [branch target injection] aka 'Spectre Variant 2'
* Mitigation 1
* Kernel is compiled with IBRS/IBPB support: YES
* Currently enabled features
* IBRS enabled for Kernel space: NO
* IBRS enabled for User space: NO
* IBPB enabled: NO
* Mitigation 2
* Kernel has branch predictor hardening (arm): NO
* Kernel compiled with retpoline option: NO
* Kernel compiled with a retpoline-aware compiler: NO
> STATUS: VULNERABLE (Your kernel is compiled with IBRS but your CPU microcode is lacking support to successfully mitigate the vulnerability)CPU如下: Intel(R) Xeon(R) CPU E5620 @ 2.40GHz
发布于 2018-04-05 16:01:32
自2017年11月上一次发布以来,最新的微码包不包含对韦斯特米尔EP CPU的任何更新;详情请参见变革之路。因此,它不包含任何针对特定CPU的幽灵修复程序。
根据英特尔通讯的说法,幽灵v2的威斯特米尔修复程序是可用的,但它们可能遵循了以前建立的模式,将它们运往原始设备制造商,然后才能在微码包中使用。最新的微码修订指南 (从4月2日起)表明,韦斯特米尔EP将得到修订0x1E,大概在下一个微码包更新。先前的指导性将韦斯特米尔EP列为具有0x1D修订版的β。
https://unix.stackexchange.com/questions/435791
复制相似问题