Comment # 26 on bug 1117833 from
Some more data from me:
Here is output about vulnerabilities from proc:
grep . /sys/devices/system/cpu/vulnerabilities/*
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX:
conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation:
Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer
sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Indirect Branch
Restricted Speculation, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB
filling
The kernel is 4.20.0-1-default, TW 20190115 installed.
But the laptop T470p with i5-7440HQ CPU, the system is much more responsive and
looks not affected with this issue.
I've never changed kernel boot options on this laptop.
dmesg output is also attached.


You are receiving this mail because: