http://bugzilla.opensuse.org/show_bug.cgi?id=1117833 http://bugzilla.opensuse.org/show_bug.cgi?id=1117833#c21 --- Comment #21 from Victor Zhestkov <victor.zhestkov@suse.com> --- Hi. It seems nosmt=force and disabling HT in BIOS is different in behaviour. Not sure, but system looks more responsive with nosmt=force. And spectre_v2_user=off really makes sense. /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled /sys/devices/system/cpu/vulnerabilities/meltdown:Mitigation: PTI /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl and seccomp /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: __user pointer sanitization /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Indirect Branch Restricted Speculation, IBPB: disabled, IBRS_FW, STIBP: disabled, RSB filling I'll also attach my dmesg output. Now I'm using 4.20.3-2.g4b478de-default kernel from https://download.opensuse.org/repositories/Kernel:/stable/standard/ and with no boot options it seems to work slightly better than 4.20.0 from TW 20190115. I've tried the other Linux distribs and it seems only openSUSE is affected while using GNOME, I don't see the issue with other WMs. Wayland behavior is different than in XOrg. bug#1112824 seems really the same issue. -- You are receiving this mail because: You are on the CC list for the bug.