[arch-proaudio] 4.14.18-rt15 Intel Spectre v2 broken microcode detected

Ralf Mardorf ralf.mardorf at alice-dsl.net
Sat Feb 10 15:00:14 UTC 2018


On Sat, 10 Feb 2018 15:49:45 +0100, Joakim Hernberg wrote:
>I think that refers to the fact that you have ucode loaded that was
>determined to cause problems on some systems.
>
>To check if you have mitigations enabled, cat the files
>in /sys/devices/system/cpu/vulnerabilities, none ought to say
>vulnerable.

Thank you,

so...

[rocketmouse at archlinux ~]$ ls -hAl /sys/devices/system/cpu/vulnerabilities/
total 0
-r--r--r-- 1 root root 4.0K Feb 10 15:52 meltdown
-r--r--r-- 1 root root 4.0K Feb 10 15:52 spectre_v1
-r--r--r-- 1 root root 4.0K Feb 10 15:52 spectre_v2
[rocketmouse at archlinux ~]$ cat /sys/devices/system/cpu/vulnerabilities/*
Mitigation: PTI
Mitigation: __user pointer sanitization
Mitigation: Full generic retpoline

...means that they are enabled?

Regards,
Ralf


More information about the arch-proaudio mailing list