lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20160406025644.GA3501@yexl-desktop>
Date:	Wed, 6 Apr 2016 10:56:44 +0800
From:	kernel test robot <xiaolong.ye@...el.com>
To:	Len Brown <len.brown@...el.com>
Cc:	LKML <linux-kernel@...r.kernel.org>, linux-pm@...r.kernel.org,
	lkp@...org
Subject: [lkp] [UPDATE DEBUG aperf/mperf patch for overflow] b9462882cd:
 kmsg.unsafe_for_production_use.**

FYI, we noticed the below warning log showed with your commit.

https://git.kernel.org/pub/scm/linux/kernel/git/lenb/linux.git x86
commit b9462882cd0ea0e5ef7ac25dd91c9db5b44ecf4d ("UPDATE DEBUG aperf/mperf patch for overflow")


[    0.000000] Hierarchical RCU implementation.
[    0.000000] RCU: Adjusting geometry for rcu_fanout_leaf=64, nr_cpu_ids=2
[    0.000000] 
[    0.000000] **********************************************************
[    0.000000] **   NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE   **
[    0.000000] **                                                      **
[    0.000000] ** trace_printk() being used. Allocating extra memory.  **
[    0.000000] **                                                      **
[    0.000000] ** This means that this is a DEBUG kernel and it is     **
[    0.000000] ** unsafe for production use.                           **
[    0.000000] **                                                      **
[    0.000000] ** If you see this message and you are not debugging    **
[    0.000000] ** the kernel, report this immediately to your vendor!  **
[    0.000000] **                                                      **
[    0.000000] **   NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE   **
[    0.000000] **********************************************************
[    0.000000] NR_IRQS:524544 nr_irqs:440 16
[    0.000000] Console: colour VGA+ 80x25
[    0.000000] console [tty0] enabled





FYI, raw QEMU command line is:

	qemu-system-x86_64 -enable-kvm -cpu host -kernel /pkg/linux/x86_64-rhel/gcc-4.9/b9462882cd0ea0e5ef7ac25dd91c9db5b44ecf4d/vmlinuz-4.6.0-rc1-00011-gb946288 -append 'root=/dev/ram0 user=lkp job=/lkp/scheduled/vm-lkp-wsx03-4G-2/bisect_boot-1-debian-x86_64-2015-02-07.cgz-x86_64-rhel-b9462882cd0ea0e5ef7ac25dd91c9db5b44ecf4d-20160406-116079-1pgwx0s-0.yaml ARCH=x86_64 kconfig=x86_64-rhel branch=linux-devel/devel-hourly-2016040517 commit=b9462882cd0ea0e5ef7ac25dd91c9db5b44ecf4d BOOT_IMAGE=/pkg/linux/x86_64-rhel/gcc-4.9/b9462882cd0ea0e5ef7ac25dd91c9db5b44ecf4d/vmlinuz-4.6.0-rc1-00011-gb946288 max_uptime=600 RESULT_ROOT=/result/boot/1/vm-lkp-wsx03-4G/debian-x86_64-2015-02-07.cgz/x86_64-rhel/gcc-4.9/b9462882cd0ea0e5ef7ac25dd91c9db5b44ecf4d/0 LKP_SERVER=inn earlyprintk=ttyS0,115200 systemd.log_level=err debug apic=debug sysrq_always_enabled rcupdate.rcu_cpu_stall_timeout=100 panic=-1 softlockup_panic=1 nmi_watchdog=panic oops=panic load_ramdisk=2 prompt_ramdisk=0 console=ttyS0,115200 console=tty0 vga=normal rw ip=::::vm-lkp-wsx03-4G-2::dhcp'  -initrd /fs/sdc1/initrd-vm-lkp-wsx03-4G-2 -m 4096 -smp 2 -device e1000,netdev=net0 -netdev user,id=net0,hostfwd=tcp::23641-:22 -boot order=nc -no-reboot -watchdog i6300esb -rtc base=localtime -drive file=/fs/sdc1/disk0-vm-lkp-wsx03-4G-2,media=disk,if=virtio -drive file=/fs/sdc1/disk1-vm-lkp-wsx03-4G-2,media=disk,if=virtio -pidfile /dev/shm/kboot/pid-vm-lkp-wsx03-4G-2 -serial file:/dev/shm/kboot/serial-vm-lkp-wsx03-4G-2 -daemonize -display none -monitor null 





Thanks,
Xiaolong Ye

View attachment "config-4.6.0-rc1-00011-gb946288" of type "text/plain" (146980 bytes)

Download attachment "dmesg.xz" of type "application/octet-stream" (12636 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ