http://bugzilla.opensuse.org/show_bug.cgi?id=1117833
http://bugzilla.opensuse.org/show_bug.cgi?id=1117833#c26
--- Comment #26 from Victor Zhestkov ---
Some more data from me:
Here is output about vulnerabilities from proc:
grep . /sys/devices/system/cpu/vulnerabilities/*
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX:
conditional cache flushes, SMT disabled
/sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation:
Speculative Store Bypass disabled via prctl and seccomp
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer
sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Indirect Branch
Restricted Speculation, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB
filling
The kernel is 4.20.0-1-default, TW 20190115 installed.
But the laptop T470p with i5-7440HQ CPU, the system is much more responsive and
looks not affected with this issue.
I've never changed kernel boot options on this laptop.
dmesg output is also attached.
--
You are receiving this mail because:
You are on the CC list for the bug.