lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <87h9j34c42.fsf@yhuang-dev.intel.com>
Date:	Mon, 28 Dec 2015 09:04:45 +0800
From:	kernel test robot <ying.huang@...ux.intel.com>
TO:	Andy Lutomirski <luto@...nel.org>
CC:	LKML <linux-kernel@...r.kernel.org>
Subject: [lkp] [x86/mm] d9da2c95d7: WARNING: CPU: 0 PID: 0 at
 arch/x86/kernel/cpu/common.c:1498 warn_pre_alternatives+0x1c/0x1e()

FYI, we noticed the below changes on

https://git.kernel.org/pub/scm/linux/kernel/git/luto/linux.git x86/pcid
commit d9da2c95d77fd14360cd902ff1bc3859452bb5bc ("x86/mm: If INVPCID is available, use it to flush global mappings")


[    0.000000] BRK [0x0355d000, 0x0355dfff] PGTABLE
[    0.000000] BRK [0x0355e000, 0x0355efff] PGTABLE
[    0.000000] ------------[ cut here ]------------
[    0.000000] WARNING: CPU: 0 PID: 0 at arch/x86/kernel/cpu/common.c:1498 warn_pre_alternatives+0x1c/0x1e()
[    0.000000] You're using static_cpu_has before alternatives have run!
[    0.000000] Modules linked in:
[    0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted 4.4.0-rc5-00003-gd9da2c9 #1
[    0.000000] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Debian-1.8.2-1 04/01/2014
[    0.000000]  0000000000000000 ffffffff81a03c80 ffffffff81267ba8 ffffffff81a03cb8
[    0.000000]  ffffffff81057366 ffffffff8100eb09 ffff88000355cff8 0000007fc0000000
[    0.000000]  0000000000100000 0000008000000000 ffffffff81a03d20 ffffffff810573c2
[    0.000000] Call Trace:
[    0.000000]  [<ffffffff81267ba8>] dump_stack+0x19/0x1b
[    0.000000]  [<ffffffff81057366>] warn_slowpath_common+0x89/0xa2
[    0.000000]  [<ffffffff8100eb09>] ? warn_pre_alternatives+0x1c/0x1e
[    0.000000]  [<ffffffff810573c2>] warn_slowpath_fmt+0x43/0x4b
[    0.000000]  [<ffffffff8100eb09>] warn_pre_alternatives+0x1c/0x1e
[    0.000000]  [<ffffffff8102cd04>] native_flush_tlb_global+0x31/0x5e
[    0.000000]  [<ffffffff814d5f89>] ? _raw_spin_unlock+0x22/0x2b
[    0.000000]  [<ffffffff814ceeae>] phys_pud_init+0x287/0x2af
[    0.000000]  [<ffffffff814cf0a2>] kernel_physical_mapping_init+0x10b/0x1bd
[    0.000000]  [<ffffffff814ccbb7>] init_memory_mapping+0x24b/0x2e8
[    0.000000]  [<ffffffff81add18a>] init_mem_mapping+0x118/0x21f
[    0.000000]  [<ffffffff81acf10f>] setup_arch+0x65a/0xb6a
[    0.000000]  [<ffffffff812685f1>] ? idr_init+0x27/0x29
[    0.000000]  [<ffffffff81acbb86>] start_kernel+0xce/0x42e
[    0.000000]  [<ffffffff81acb120>] ? early_idt_handler_array+0x120/0x120
[    0.000000]  [<ffffffff81acb315>] x86_64_start_reservations+0x2a/0x2c
[    0.000000]  [<ffffffff81acb3fc>] x86_64_start_kernel+0xe5/0xf2
[    0.000000] ---[ end trace 44e73404887f7749 ]---
[    0.000000] ------------[ cut here ]------------





Thanks,
Kernel Test Robot

View attachment "config-4.4.0-rc5-00003-gd9da2c9" of type "text/plain" (87615 bytes)

Download attachment "dmesg.xz" of type "application/x-xz" (12440 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ