lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:	Thu, 17 Mar 2016 10:28:48 +0800
From:	kernel test robot <ying.huang@...ux.intel.com>
TO:	Andy Lutomirski <luto@...nel.org>
CC:	LKML <linux-kernel@...r.kernel.org>
Subject: [lkp] [intel_idle] ed026804dd: WARNING: CPU: 0 PID: 596 at
 kernel/smp.c:417 smp_call_function_many+0xb0/0x250()

FYI, we noticed the below changes on

https://git.kernel.org/pub/scm/linux/kernel/git/luto/linux.git intel_idle
commit ed026804ddffb3b6f840822f645c04045da0e2ef ("intel_idle: Fix MSRs after resume")



<6>[   27.494032] ACPI : EC: EC started
<6>[   27.494033] PM: Restoring platform NVS memory
<4>[   27.494365] ------------[ cut here ]------------
<4>[   27.494369] WARNING: CPU: 0 PID: 596 at kernel/smp.c:417 smp_call_function_many+0xb0/0x250()
<4>[   27.494393] Modules linked in: rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver btrfs xor raid6_pq sg snd_hda_codec_hdmi sd_mod x86_pkg_temp_thermal coretemp kvm_intel kvm irqbypass crct10dif_pclmul i2c_hid crc32_pclmul ppdev crc32c_intel ghash_clmulni_intel aesni_intel lrw gf128mul glue_helper ablk_helper cryptd serio_raw pcspkr snd_hda_intel snd_hda_codec snd_hda_core snd_hwdep snd_pcm ahci libahci snd_timer snd i915 libata drm_kms_helper shpchp soundcore syscopyarea sysfillrect sysimgblt fb_sys_fops drm sdhci_acpi winbond_cir dw_dmac video dw_dmac_core rc_core sdhci parport_pc parport mmc_core i2c_designware_platform i2c_designware_core spi_pxa2xx_platform acpi_pad
<4>[   27.494395] CPU: 0 PID: 596 Comm: rtcwake Not tainted 4.5.0-00003-ged02680 #1
<4>[   27.494395] Hardware name: Intel Corporation Broadwell Client platform/WhiteTip Mountain 1, BIOS BDW-E1R1.86C.0120.R00.1504020241 04/02/2015
<4>[   27.494398]  0000000000000000 ffff8801376bbc30 ffffffff8142605a 0000000000000000
<4>[   27.494399]  ffffffff81be03bf ffff8801376bbc68 ffffffff81079fe6 0000000000000000
<4>[   27.494400]  ffffffff814a1d60 0000000000000000 0000000000000000 ffffffff81eafac0
<4>[   27.494401] Call Trace:
<4>[   27.494405]  [<ffffffff8142605a>] dump_stack+0x63/0x89
<4>[   27.494408]  [<ffffffff81079fe6>] warn_slowpath_common+0x86/0xc0
<4>[   27.494410]  [<ffffffff814a1d60>] ? efifb_probe+0x1c0/0x1c0
<4>[   27.494412]  [<ffffffff8107a0da>] warn_slowpath_null+0x1a/0x20
<4>[   27.494413]  [<ffffffff810fafd0>] smp_call_function_many+0xb0/0x250
<4>[   27.494414]  [<ffffffff814a1d60>] ? efifb_probe+0x1c0/0x1c0
<4>[   27.494415]  [<ffffffff810fb1eb>] on_each_cpu+0x3b/0x80
<4>[   27.494417]  [<ffffffff814a1e1c>] intel_idle_resume+0x1c/0x20
<4>[   27.494419]  [<ffffffff81575620>] syscore_resume+0x50/0x1b0
<4>[   27.494421]  [<ffffffff810c866d>] suspend_devices_and_enter+0x67d/0x780
<4>[   27.494423]  [<ffffffff810c8af2>] pm_suspend+0x382/0x400
<4>[   27.494425]  [<ffffffff810c728c>] state_store+0x7c/0xe0
<4>[   27.494426]  [<ffffffff814280df>] kobj_attr_store+0xf/0x20
<4>[   27.494428]  [<ffffffff81273667>] sysfs_kf_write+0x37/0x40
<4>[   27.494430]  [<ffffffff812731c2>] kernfs_fop_write+0x132/0x180
<4>[   27.494432]  [<ffffffff811f34e8>] __vfs_write+0x28/0xe0
<4>[   27.494433]  [<ffffffff8109e889>] ? __might_sleep+0x49/0x80
<4>[   27.494435]  [<ffffffff810c3ec2>] ? percpu_down_read+0x32/0x70
<4>[   27.494436]  [<ffffffff811f4379>] vfs_write+0xa9/0x190
<4>[   27.494438]  [<ffffffff811f51f6>] SyS_write+0x46/0xa0
<4>[   27.494440]  [<ffffffff818e57ae>] entry_SYSCALL_64_fastpath+0x12/0x6d
<4>[   27.494441] ---[ end trace 5a9eb599ae4d571c ]---
<4>[   27.494441] ---[ end trace 5a9eb599ae4d571c ]---


To reproduce:

        git clone git://git.kernel.org/pub/scm/linux/kernel/git/wfg/lkp-tests.git
        cd lkp-tests
        bin/lkp install job.yaml  # job file is attached in this email
        bin/lkp run     job.yaml


Thanks,
Kernel Test Robot

View attachment "config-4.5.0-00003-ged02680" of type "text/plain" (145409 bytes)

Download attachment "kmsg.xz" of type "application/x-xz" (24256 bytes)

View attachment "job.yaml" of type "text/plain" (2983 bytes)

View attachment "reproduce" of type "text/plain" (196 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ