[arch-proaudio] 4.14.18-rt15 Intel Spectre v2 broken microcode detected
Ralf Mardorf
ralf.mardorf at alice-dsl.net
Sat Feb 10 15:00:14 UTC 2018
On Sat, 10 Feb 2018 15:49:45 +0100, Joakim Hernberg wrote:
>I think that refers to the fact that you have ucode loaded that was
>determined to cause problems on some systems.
>
>To check if you have mitigations enabled, cat the files
>in /sys/devices/system/cpu/vulnerabilities, none ought to say
>vulnerable.
Thank you,
so...
[rocketmouse at archlinux ~]$ ls -hAl /sys/devices/system/cpu/vulnerabilities/
total 0
-r--r--r-- 1 root root 4.0K Feb 10 15:52 meltdown
-r--r--r-- 1 root root 4.0K Feb 10 15:52 spectre_v1
-r--r--r-- 1 root root 4.0K Feb 10 15:52 spectre_v2
[rocketmouse at archlinux ~]$ cat /sys/devices/system/cpu/vulnerabilities/*
Mitigation: PTI
Mitigation: __user pointer sanitization
Mitigation: Full generic retpoline
...means that they are enabled?
Regards,
Ralf
More information about the arch-proaudio
mailing list