On Sat, 10 Feb 2018 15:49:45 +0100, Joakim Hernberg wrote:
I think that refers to the fact that you have ucode loaded that was determined to cause problems on some systems.
To check if you have mitigations enabled, cat the files in /sys/devices/system/cpu/vulnerabilities, none ought to say vulnerable.
Thank you, so... [rocketmouse@archlinux ~]$ ls -hAl /sys/devices/system/cpu/vulnerabilities/ total 0 -r--r--r-- 1 root root 4.0K Feb 10 15:52 meltdown -r--r--r-- 1 root root 4.0K Feb 10 15:52 spectre_v1 -r--r--r-- 1 root root 4.0K Feb 10 15:52 spectre_v2 [rocketmouse@archlinux ~]$ cat /sys/devices/system/cpu/vulnerabilities/* Mitigation: PTI Mitigation: __user pointer sanitization Mitigation: Full generic retpoline ...means that they are enabled? Regards, Ralf