Hello there, hope this is useful.

System information:
  Machine:
  Type: Desktop System: ASUS product: N/A v: N/A serial: <superuser
required>
  Mobo: ASUSTeK model: TUF GAMING B550M-PLUS v: Rev X.0x
  UEFI: American Megatrends v: 3607

CPU:
  Info: 12-core model: AMD Ryzen 9 5900X bits: 64 type: MT MCP cache:
    L2: 6 MiB


  journalctl before removing adm64-microcode:
    Sep 14 14:20:34 debian kernel: CPU6 failed to report alive state
    Sep 14 14:20:34 debian kernel: CPU18 failed to report alive state
    Sep 14 14:20:34 debian kernel: ccp 0000:09:00.1: enabling device (0000
-> 0002)
    Sep 14 14:20:34 debian kernel: ccp 0000:09:00.1: ccp: unable to access
the device: you might be running a broken BIOS.
    Sep 14 14:20:34 debian kernel: ccp 0000:09:00.1: psp enabled
    Sep 14 14:20:34 debian kernel: Transient Scheduler Attacks: Vulnerable:
Clear CPU buffers attempted, no microcode
    Sep 14 14:20:34 debian kernel: microcode: Current revision: 0x0a201210
    Sep 14 14:20:34 debian kernel: microcode: Updated early from: 0x0a20120e

  journalctl after removing adm64-microcode:
    Sep 15 12:37:34 debian kernel: Transient Scheduler Attacks: Vulnerable:
Clear CPU buffers attempted, no microcode
    Sep 15 12:37:34 debian kernel: microcode: Current revision: 0x0a20120e


lscpu before removing adm64-microcode:

Architecture:                            x86_64
CPU op-mode(s):                          32-bit, 64-bit
Address sizes:                           48 bits physical, 48 bits virtual
Byte Order:                              Little Endian
CPU(s):                                  24
On-line CPU(s) list:                     0-5,7-17,19-23
Off-line CPU(s) list:                    6,18
Vendor ID:                               AuthenticAMD
Model name:                              AMD Ryzen 9 5900X 12-Core Processor
CPU family:                              25
Model:                                   33
Thread(s) per core:                      2
Core(s) per socket:                      11
Socket(s):                               1
Stepping:                                2
Frequency boost:                         enabled
CPU(s) scaling MHz:                      50%
CPU max MHz:                             4951.5332
CPU min MHz:                             2200.0000
BogoMIPS:                                7385.84
Flags:                                   fpu vme de pse tsc msr pae mce cx8
apic sep mtrr pge mca cmov pat pse36 clflush mmx fxsr sse sse2 ht syscall
nx mmxext fxsr_opt pdpe1gb rdtscp lm constant_tsc rep_good nopl xtopology
nonstop_tsc cpuid extd_apicid aperfmperf rapl pni pclmulqdq monitor ssse3
fma cx16 sse4_1 sse4_2 x2apic movbe popcnt aes xsave avx f16c rdrand
lahf_lm cmp_legacy extapic cr8_legacy abm sse4a misalignsse 3dnowprefetch
osvw ibs skinit wdt tce topoext perfctr_core perfctr_nb bpext perfctr_llc
mwaitx cpb cat_l3 cdp_l3 hw_pstate ssbd mba ibrs ibpb stibp vmmcall
fsgsbase bmi1 avx2 smep bmi2 erms invpcid cqm rdt_a rdseed adx smap
clflushopt clwb sha_ni xsaveopt xsavec xgetbv1 xsaves cqm_llc cqm_occup_llc
cqm_mbm_total cqm_mbm_local user_shstk clzero irperf xsaveerptr rdpru
wbnoinvd arat npt lbrv svm_lock nrip_save tsc_scale vmcb_clean flushbyasid
decodeassists pausefilter pfthreshold avic v_vmsave_vmload vgif v_spec_ctrl
umip pku ospke vaes vpclmulqdq rdpid overflow_recov succor smca fsrm
debug_swap
L1d cache:                               352 KiB (11 instances)
L1i cache:                               352 KiB (11 instances)
L2 cache:                                5.5 MiB (11 instances)
L3 cache:                                64 MiB (2 instances)
NUMA node(s):                            1
NUMA node0 CPU(s):                       0-5,7-17,19-23
Vulnerability Gather data sampling:      Not affected
Vulnerability Indirect target selection: Not affected
Vulnerability Itlb multihit:             Not affected
Vulnerability L1tf:                      Not affected
Vulnerability Mds:                       Not affected
Vulnerability Meltdown:                  Not affected
Vulnerability Mmio stale data:           Not affected
Vulnerability Reg file data sampling:    Not affected
Vulnerability Retbleed:                  Not affected
Vulnerability Spec rstack overflow:      Mitigation; Safe RET
Vulnerability Spec store bypass:         Mitigation; Speculative Store
Bypass disabled via prctl
Vulnerability Spectre v1:                Mitigation; usercopy/swapgs
barriers and __user pointer sanitization
Vulnerability Spectre v2:                Mitigation; Retpolines; IBPB
conditional; IBRS_FW; STIBP always-on; RSB filling; PBRSB-eIBRS Not
affected; BHI Not affected
Vulnerability Srbds:                     Not affected
Vulnerability Tsa:                       Vulnerable: Clear CPU buffers
attempted, no microcode
Vulnerability Tsx async abort:           Not affected



lscpu after removing adm64-microcode:

Architecture:                x86_64
  CPU op-mode(s):            32-bit, 64-bit
  Address sizes:             48 bits physical, 48 bits virtual
  Byte Order:                Little Endian
CPU(s):                      24
  On-line CPU(s) list:       0-23
Vendor ID:                   AuthenticAMD
  Model name:                AMD Ryzen 9 5900X 12-Core Processor
    CPU family:              25
    Model:                   33
    Thread(s) per core:      2
    Core(s) per socket:      12
    Socket(s):               1
    Stepping:                2
    Frequency boost:         enabled
    CPU(s) scaling MHz:      21%
    CPU max MHz:             4951.0000
    CPU min MHz:             550.0000
    BogoMIPS:                7385.85
    Flags:                   fpu vme de pse tsc msr pae mce cx8 apic sep
mtrr pge mca cmov pat pse36 clflush mmx fxsr sse sse2 ht syscall nx
                              mmxext fxsr_opt pdpe1gb rdtscp lm
constant_tsc rep_good nopl xtopology nonstop_tsc cpuid extd_apicid aperfmper
                             f rapl pni pclmulqdq monitor ssse3 fma cx16
sse4_1 sse4_2 x2apic movbe popcnt aes xsave avx f16c rdrand lahf_lm
                              cmp_legacy extapic cr8_legacy abm sse4a
misalignsse 3dnowprefetch osvw ibs skinit wdt tce topoext perfctr_core
                              perfctr_nb bpext perfctr_llc mwaitx cpb
cat_l3 cdp_l3 hw_pstate ssbd mba ibrs ibpb stibp vmmcall fsgsbase bmi1
                              avx2 smep bmi2 erms invpcid cqm rdt_a rdseed
adx smap clflushopt clwb sha_ni xsaveopt xsavec xgetbv1 xsaves cq
                             m_llc cqm_occup_llc cqm_mbm_total
cqm_mbm_local user_shstk clzero irperf xsaveerptr rdpru wbnoinvd arat npt
lbr
                             v svm_lock nrip_save tsc_scale vmcb_clean
flushbyasid decodeassists pausefilter pfthreshold avic v_vmsave_vmloa
                             d vgif v_spec_ctrl umip pku ospke vaes
vpclmulqdq rdpid overflow_recov succor smca fsrm debug_swap
Caches (sum of all):
  L1d:                       384 KiB (12 instances)
  L1i:                       384 KiB (12 instances)
  L2:                        6 MiB (12 instances)
  L3:                        64 MiB (2 instances)
NUMA:
  NUMA node(s):              1
  NUMA node0 CPU(s):         0-23
Vulnerabilities:
  Gather data sampling:      Not affected
  Indirect target selection: Not affected
  Itlb multihit:             Not affected
  L1tf:                      Not affected
  Mds:                       Not affected
  Meltdown:                  Not affected
  Mmio stale data:           Not affected
  Reg file data sampling:    Not affected
  Retbleed:                  Not affected
  Spec rstack overflow:      Mitigation; Safe RET
  Spec store bypass:         Mitigation; Speculative Store Bypass disabled
via prctl
  Spectre v1:                Mitigation; usercopy/swapgs barriers and
__user pointer sanitization
  Spectre v2:                Mitigation; Retpolines; IBPB conditional;
IBRS_FW; STIBP always-on; RSB filling; PBRSB-eIBRS Not affected; BHI
                             Not affected
  Srbds:                     Not affected
  Tsa:                       Vulnerable: Clear CPU buffers attempted, no
microcode
  Tsx async abort:           Not affected

Reply via email to