(In reply to Suse User from comment #6) > (1) After the above clarification, I suppose you can have a second look to > my previous question. Hardly a clarification because I still have no clue what exactly you're asking. If you want an answer to something, please formulate it as an exact question. > (2) My other question is: > > https://lkml.org/lkml/2019/12/8/205 > > *I understand (2) and the answer to it may be considered off-topic to this > bug report but I still hope you could shed some light on it too (in direct > email is fine too, if you think it would be more appropriate). AFAIU, you're asking whether you can do something additional as a user in case Spectre and Meltdown are not mitigated on your CPU. But they *are* mitigated, on *your* machine: /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full generic retpoline, STIBP: disabled, RSB filling