On Sat, 10 Feb 2018 15:49:45 +0100, Joakim Hernberg wrote: >I think that refers to the fact that you have ucode loaded that was >determined to cause problems on some systems. > >To check if you have mitigations enabled, cat the files >in /sys/devices/system/cpu/vulnerabilities, none ought to say >vulnerable. Thank you, so... [rocketmouse@archlinux ~]$ ls -hAl /sys/devices/system/cpu/vulnerabilities/ total 0 -r--r--r-- 1 root root 4.0K Feb 10 15:52 meltdown -r--r--r-- 1 root root 4.0K Feb 10 15:52 spectre_v1 -r--r--r-- 1 root root 4.0K Feb 10 15:52 spectre_v2 [rocketmouse@archlinux ~]$ cat /sys/devices/system/cpu/vulnerabilities/* Mitigation: PTI Mitigation: __user pointer sanitization Mitigation: Full generic retpoline ...means that they are enabled? Regards, Ralf