ArcoLinux -D -B 19.11 has been released

[SOLVED] How to remove amd-ucode.img (grub) and how to install intel-ucode depending on cpu you have

First check the forums - Do not know where to put it then put it here
User avatar
erikdubois
Captain
Posts: 2628
Joined: Tue Nov 07, 2017 3:45 pm
Location: Belgium
Contact:
Belgium
Re: [SOLVED] How to remove amd-ucode.img (grub) and how to install intel-ucode depending on cpu you have

Post by erikdubois » Thu Nov 07, 2019 6:17 am

It is all good.
Take care.
Learn, have fun and enjoy.
But first use the power of the Arch Wiki
use the tutorials on https://www.youtube.com/erikdubois
then use the power of google
then use the power of our moderators.

Ragerock
Crewman
Posts: 8
Joined: Tue Nov 05, 2019 11:37 pm
Location: Germany
Germany
Re: [SOLVED] How to remove amd-ucode.img (grub) and how to install intel-ucode depending on cpu you have

Post by Ragerock » Thu Nov 07, 2019 10:44 am

Using lightdm login-screen for gnome from now on - looks like the fastest and best variant.

User avatar
erikdubois
Captain
Posts: 2628
Joined: Tue Nov 07, 2017 3:45 pm
Location: Belgium
Contact:
Belgium
Re: [SOLVED] How to remove amd-ucode.img (grub) and how to install intel-ucode depending on cpu you have

Post by erikdubois » Thu Nov 07, 2019 12:19 pm

rocking already 3 years
Learn, have fun and enjoy.
But first use the power of the Arch Wiki
use the tutorials on https://www.youtube.com/erikdubois
then use the power of google
then use the power of our moderators.

Ragerock
Crewman
Posts: 8
Joined: Tue Nov 05, 2019 11:37 pm
Location: Germany
Germany
Re: [SOLVED] How to remove amd-ucode.img (grub) and how to install intel-ucode depending on cpu you have

Post by Ragerock » Fri Nov 08, 2019 5:25 pm

Good to know ;)

One more time back to topic / startup post:
After did it well with intel-ucode via grub loading process I was thinking about
to disable SMT (via BIOS/UEFI) or not. After reading this:

https://www.theregister.co.uk/2019/10/2 ... aintainer/

I did it. Also the output of lscpu looks fine now:

Vulnerability L1tf: Mitigation; PTE Inversion; VMX conditional cache flushes, SMT disabled
Vulnerability Mds: Mitigation; Clear CPU buffers; SMT disabled
Vulnerability Meltdown: Mitigation; PTI
Vulnerability Spec store bypass: Mitigation; Speculative Store Bypass disabled via prctl and seccomp
Vulnerability Spectre v1: Mitigation; usercopy/swapgs barriers and __user pointer sanitization
Vulnerability Spectre v2: Mitigation; Full generic retpoline, IBPB conditional, IBRS_FW, RSB filling


Post Reply

Return to “General Questions”