Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp20825056rwd; Thu, 29 Jun 2023 07:29:00 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ4UI9kd+TT1TQF8HCP+6y51Jntf+hSoUUFsq+4L/adxMp6IoNRYKWchAqnYVNHo9Kl+pQ1u X-Received: by 2002:a17:902:bb89:b0:1ac:7345:f254 with SMTP id m9-20020a170902bb8900b001ac7345f254mr15751702pls.33.1688048940158; Thu, 29 Jun 2023 07:29:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1688048940; cv=none; d=google.com; s=arc-20160816; b=ofqu5ClmIC+y6Vw9lMoPhSI7gm5y+sBGFZcFthJhEabOHXNtaiWA2uWuo3pq4RdQ9f TSxNJoEzPjv6YOUOLcnQPSqHeVjH4exlrjFuAQpiBVe8oROAS+Cbj/11LmC24TFLtF7E pcV4rn9K7uRKHRnRpBTPH1qq1Mx5ctrX+oDKj3IfRo2+0TecNR3VpW55r3y7aJC4rACx 7iWRJaXp1cRSHr6IU94jfltgaWj1m+PrjQ6GQVuYrwd596AebI6E4JYBaKDmu7WRJOZS y155uXIuEVB6tHTEb04098rUnOPzuY4rc1UVeABdgbRLWzhE6BP0mi87RShmyEV9kBG1 0w/Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:message-id:date:references :in-reply-to:subject:cc:to:dkim-signature:dkim-signature:from; bh=tcsyILS54G9Ylc5jhOd6kkhT9PsNGi7DVVNg0xcX1kQ=; fh=8k0fnYH5fMDyILmtRxUaHCrzT6bkeJ1zGzcjtv11GZk=; b=gUPyOu0w7wCq17W3l7yFc0uftOK2LRSK/Wx+72FYKAhR//OAckngBqx5U/nqjxKBXY tt80FvCT9KIjf7UoziCqnki74gohfodYJO5SrXNeSa/7hqmT3D76ajszar4qbg6dKAL3 85thA7F5DJ54oe53WBGDctVLm9qcxIJqQ2BPKlSjW4KQZtFOOb0aSOrSFCZT2uvy1JVy NtlV/py6Lqe4vJA27KwiCdeJLUEZo87+RDcdbpUeklSNjMKk3T0aj7nxZwmOOv7pXrAe Oked1/J91OoGszqG17tk5qQSpzWQPpz1vJcDoJh/Ca3WdmyR5FEUBMl0zfLLcdwmHbsV 1zlw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linutronix.de header.s=2020 header.b=UCd+zetd; dkim=neutral (no key) header.i=@linutronix.de header.s=2020e header.b=eVh4xcwU; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=linutronix.de Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id u13-20020a170903124d00b001ae7f85061bsi11455037plh.609.2023.06.29.07.28.45; Thu, 29 Jun 2023 07:29:00 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linutronix.de header.s=2020 header.b=UCd+zetd; dkim=neutral (no key) header.i=@linutronix.de header.s=2020e header.b=eVh4xcwU; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=linutronix.de Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232003AbjF2OTJ (ORCPT + 99 others); Thu, 29 Jun 2023 10:19:09 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57240 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231952AbjF2OTB (ORCPT ); Thu, 29 Jun 2023 10:19:01 -0400 Received: from galois.linutronix.de (Galois.linutronix.de [193.142.43.55]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 9615035A9; Thu, 29 Jun 2023 07:19:00 -0700 (PDT) From: Thomas Gleixner DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linutronix.de; s=2020; t=1688048338; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=tcsyILS54G9Ylc5jhOd6kkhT9PsNGi7DVVNg0xcX1kQ=; b=UCd+zetdFtrupJKCxOImcOxEEYVwTwTvmkKbn8hKvfSyKXqMbmVcR1zCTJi+G+RViUHK4E Y9q0thPUWYdOXqChC/StMKF2R2w4nD0hiz4xNKzNr4M2EtQ9NRRA8SVB5G9U9ACtk2xCsc PPQzJRvOsyumV/NC0gxfmVzaLNrKIl7HMEum0BbZMP+z4ACCuvbpH/8tFtYyphMuz/I3Ef hJOKYUpeUcjpNpPvaR1IqKCZ8GNIwkjTdsfwv/jJzLmQWNviBAypnN++2aPu2bzOejUv2m s7vhMr6wZ13FsN0P7As3VIpwdBaOvI+TTGMvDuwJnHlIM4s5ANGzLA0w1l5wwg== DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=linutronix.de; s=2020e; t=1688048338; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=tcsyILS54G9Ylc5jhOd6kkhT9PsNGi7DVVNg0xcX1kQ=; b=eVh4xcwU+ECp7+of3b7renU0kjswNCBP4itYsa/RB7p1Pb1FjkVIcc8e0ibcsLlhES1S79 66vXMUDddUHapCCQ== To: Vivek Anand , Peter Zijlstra Cc: Bagas Sanjaya , "Steven Rostedt (Google)" , Pablo Neira Ayuso , Jozsef Kadlecsik , Florian Westphal , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Lingutla Chandrasekhar , Frederic Weisbecker , "J. Avila" , "Rafael J. Wysocki" , Thomas Renninger , Shuah Khan , Borislav Petkov , Josh Poimboeuf , Linux Kernel Mailing List , Linux Regressions , Linux Netfilter Development , Netfilter Core Developers , Linux Networking , Linux Power Management , x86@kernel.org Subject: Re: Fwd: High cpu usage caused by kernel process when upgraded to linux 5.19.17 or later In-Reply-To: References: <01ac399d-f793-49d4-844b-72cd8e0034df@gmail.com> <20230627073035.GV4253@hirez.programming.kicks-ass.net> <99b64dfd-be4a-2248-5c42-8eb9197824e1@gmail.com> <20230627101939.GZ4253@hirez.programming.kicks-ass.net> Date: Thu, 29 Jun 2023 16:18:57 +0200 Message-ID: <878rc22vxq.ffs@tglx> MIME-Version: 1.0 Content-Type: text/plain X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Jun 29 2023 at 12:05, Vivek Anand wrote: > I've tried booting with "spectre_v2=retpoline retbleed=off". > This change didn't work. Still CPU is 100% This does not make sense. retbleed=off has the same effect as CONFIG_X86_IBRS_ENTRY=n. The only difference is that with CONFIG_X86_IBRS_ENTRY=y and retbleed=off there is one extra jump in the low level entry code (syscall, interrupts, exceptions) and one extra jump on the exit side. But those extra jumps are completely irrelevant for the kworker threads. Can you please provide dmesg and the content of the files in /sys/devices/system/cpu/vulnerabilities/ on a kernel booted with "spectre_v2=retpoline retbleed=off" ? Thanks, tglx