Re: 4.14.18-rt15 Intel Spectre v2 broken microcode detected

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Sat, 10 Feb 2018 15:49:45 +0100, Joakim Hernberg wrote:
>I think that refers to the fact that you have ucode loaded that was
>determined to cause problems on some systems.
>
>To check if you have mitigations enabled, cat the files
>in /sys/devices/system/cpu/vulnerabilities, none ought to say
>vulnerable.

Thank you,

so...

[rocketmouse@archlinux ~]$ ls -hAl /sys/devices/system/cpu/vulnerabilities/
total 0
-r--r--r-- 1 root root 4.0K Feb 10 15:52 meltdown
-r--r--r-- 1 root root 4.0K Feb 10 15:52 spectre_v1
-r--r--r-- 1 root root 4.0K Feb 10 15:52 spectre_v2
[rocketmouse@archlinux ~]$ cat /sys/devices/system/cpu/vulnerabilities/*
Mitigation: PTI
Mitigation: __user pointer sanitization
Mitigation: Full generic retpoline

...means that they are enabled?

Regards,
Ralf



[Index of Archives]     [LM Sensors]     [Linux Sound]     [ALSA Users]     [ALSA Devel]     [Linux Audio Users]     [Linux Media]     [Kernel]     [Gimp]     [Yosemite News]     [Linux Media]

  Powered by Linux