[arch-proaudio] 4.14.18-rt15 Intel Spectre v2 broken microcode detected

Ralf Mardorf ralf.mardorf at alice-dsl.net
Sat Feb 10 15:00:14 UTC 2018

On Sat, 10 Feb 2018 15:49:45 +0100, Joakim Hernberg wrote:
>I think that refers to the fact that you have ucode loaded that was
>determined to cause problems on some systems.
>To check if you have mitigations enabled, cat the files
>in /sys/devices/system/cpu/vulnerabilities, none ought to say

Thank you,


[rocketmouse at archlinux ~]$ ls -hAl /sys/devices/system/cpu/vulnerabilities/
total 0
-r--r--r-- 1 root root 4.0K Feb 10 15:52 meltdown
-r--r--r-- 1 root root 4.0K Feb 10 15:52 spectre_v1
-r--r--r-- 1 root root 4.0K Feb 10 15:52 spectre_v2
[rocketmouse at archlinux ~]$ cat /sys/devices/system/cpu/vulnerabilities/*
Mitigation: PTI
Mitigation: __user pointer sanitization
Mitigation: Full generic retpoline

...means that they are enabled?


More information about the arch-proaudio mailing list