
http://bugzilla.opensuse.org/show_bug.cgi?id=1117833 http://bugzilla.opensuse.org/show_bug.cgi?id=1117833#c26 --- Comment #26 from Victor Zhestkov <victor.zhestkov@suse.com> --- Some more data from me: Here is output about vulnerabilities from proc: grep . /sys/devices/system/cpu/vulnerabilities/* /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Indirect Branch Restricted Speculation, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling The kernel is 4.20.0-1-default, TW 20190115 installed. But the laptop T470p with i5-7440HQ CPU, the system is much more responsive and looks not affected with this issue. I've never changed kernel boot options on this laptop. dmesg output is also attached. -- You are receiving this mail because: You are on the CC list for the bug.