Posted: Mon 18 Nov 2019, 11:17
I've made an early-load 64bit .cpio 15-Nov-2019 microcode update file. * Superseded - see below
READ-ONLY Archive
https://oldforum.puppylinux.com/
Loads fine on the 2nd gen i5, Sandy Bridge. Nothing new in the intel release for that CPU as of yet. I think they are focussing on vulns in much newer processors at this point. Mitigation on my hardware running a 64b 5.3.10 kernel in the current LxPupSc remains at:ozsouth wrote:I've made an early-load 64bit .cpio 15-Nov-2019 microcode update file. For usage, see first post in thread. Have had no success making 32bit files (64bit x86_64 kernel with 64bit cpu works). http://s000.tinyupload.com/?file_id=019 ... 0255832594
Code: Select all
l1tf:Mitigation: PTE Inversion
mds:Mitigation: Clear CPU buffers; SMT vulnerable
meltdown:Mitigation: PTI
spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp
swapgs barriers and __user pointer sanitization
spectre_v2:Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: conditional, RSB filling