Bug 1319 - [Anolis OS 8.6][x86_64][anck&rhck]qcow2 镜像 启动 dmesg 信息异常
Summary: [Anolis OS 8.6][x86_64][anck&rhck]qcow2 镜像 启动 dmesg 信息异常
Status: CONFIRMED
Alias: None
Product: Anolis OS 8
Classification: Anolis OS
Component: Images&Installations (show other bugs) Images&Installations
Version: 8.6
Hardware: x86_64 Linux
: P3-Medium S3-normal
Target Milestone: ---
Assignee: gumi
QA Contact: shuming
URL:
Whiteboard:
Keywords:
: 4279 (view as bug list)
Depends on:
Blocks: 1338
  Show dependency tree
 
Reported: 2022-05-24 16:23 UTC by wanqian
Modified: 2023-03-05 13:50 UTC (History)
8 users (show)

See Also:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description wanqian alibaba_cloud_group 2022-05-24 16:23:18 UTC
Description of problem:
qcow2镜像地址:
https://build.openanolis.cn/kojifiles/output/an-8-6-Beta-new/compose/BaseOS/x86_64/images/Anolis-8-GenericCloud-8.6-20220521.0.x86_64.qcow2

异常信息:
[Tue May 24 15:03:45 2022] unchecked MSR access error: WRMSR to 0x1fc (tried to write 0x0000000000000000) at rIP: 0xffffffff8206c104 (native_write_msr+0x4/0x20)
[Tue May 24 15:03:45 2022] Call Trace:
[Tue May 24 15:03:45 2022]  intel_idle_cpu_online+0x88/0xf3
[Tue May 24 15:03:45 2022]  cpuhp_invoke_callback+0x9b/0x540
[Tue May 24 15:03:45 2022]  ? sort_range+0x20/0x20
[Tue May 24 15:03:45 2022]  cpuhp_thread_fun+0xb0/0x110
[Tue May 24 15:03:45 2022]  smpboot_thread_fn+0xc5/0x160
[Tue May 24 15:03:45 2022]  kthread+0x112/0x130
[Tue May 24 15:03:45 2022]  ? kthread_park+0x80/0x80
[Tue May 24 15:03:45 2022]  ret_from_fork+0x35/0x40
[Tue May 24 15:03:45 2022] integrity: Unable to open file: /etc/keys/x509_ima.der (-2)
[Tue May 24 15:03:45 2022] integrity: Unable to open file: /etc/keys/x509_evm.der (-2)
[Tue May 24 15:03:45 2022] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=108 sclass=netlink_route_socket pid=337 comm=systemd-udevd
[Tue May 24 15:03:46 2022] systemd: 17 output lines suppressed due to 

启动方式: qemu-kvm 

宿机器信息: 
#dmidecode  | grep -i version
# SMBIOS implementations newer than version 3.1.1 are not
# fully supported by this version of dmidecode.
  Version: 1.0.PL.IP.P.022.03
  Version: 0
  Version: SA5112H5
  Version: F62M1.92
  Specification Version: 2.0
  Version: Intel(R) Xeon(R) Platinum 8269CY CPU @ 2.50GHz
  Version: Intel(R) Xeon(R) Platinum 8269CY CPU @ 2.50GHz
Comment 1 wanqian alibaba_cloud_group 2022-06-10 16:05:42 UTC
x86_64  RC anck qcow2的镜像, 显示如下: 

[anuser@localhost ~]$ dmesg -l warn -T
[Sat Jun 11 00:01:16 2022] MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details.
[Sat Jun 11 00:01:16 2022] TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details.
[Sat Jun 11 00:01:16 2022]  #2
[Sat Jun 11 00:01:16 2022]  #3
[Sat Jun 11 00:01:16 2022]  #4
[Sat Jun 11 00:01:16 2022]  #5
[Sat Jun 11 00:01:16 2022]  #6
[Sat Jun 11 00:01:16 2022]  #7
[Sat Jun 11 00:01:16 2022] acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge.
[Sat Jun 11 00:01:17 2022] unchecked MSR access error: RDMSR from 0x1fc at rIP: 0xffffffffb306c093 (native_read_msr+0x3/0x30)
[Sat Jun 11 00:01:17 2022] Call Trace:
[Sat Jun 11 00:01:17 2022]  intel_idle_cpu_online+0x71/0xf3
[Sat Jun 11 00:01:17 2022]  cpuhp_invoke_callback+0x9b/0x540
[Sat Jun 11 00:01:17 2022]  ? sort_range+0x20/0x20
[Sat Jun 11 00:01:17 2022]  cpuhp_thread_fun+0xb0/0x110
[Sat Jun 11 00:01:17 2022]  smpboot_thread_fn+0xc5/0x160
[Sat Jun 11 00:01:17 2022]  kthread+0x112/0x130
[Sat Jun 11 00:01:17 2022]  ? kthread_park+0x80/0x80
[Sat Jun 11 00:01:17 2022]  ret_from_fork+0x35/0x40
[Sat Jun 11 00:01:17 2022] unchecked MSR access error: WRMSR to 0x1fc (tried to write 0x0000000000000000) at rIP: 0xffffffffb306c104 (native_write_msr+0x4/0x20)
[Sat Jun 11 00:01:17 2022] Call Trace:
[Sat Jun 11 00:01:17 2022]  intel_idle_cpu_online+0x88/0xf3
[Sat Jun 11 00:01:17 2022]  cpuhp_invoke_callback+0x9b/0x540
[Sat Jun 11 00:01:17 2022]  ? sort_range+0x20/0x20
[Sat Jun 11 00:01:17 2022]  cpuhp_thread_fun+0xb0/0x110
[Sat Jun 11 00:01:17 2022]  smpboot_thread_fn+0xc5/0x160
[Sat Jun 11 00:01:17 2022]  kthread+0x112/0x130
[Sat Jun 11 00:01:17 2022]  ? kthread_park+0x80/0x80
[Sat Jun 11 00:01:17 2022]  ret_from_fork+0x35/0x40
[Sat Jun 11 00:01:17 2022] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=108 sclass=netlink_route_socket pid=344 comm=systemd-udevd
[Sat Jun 11 00:01:18 2022] systemd: 20 output lines suppressed due to ratelimiting
Comment 2 wanqian alibaba_cloud_group 2022-06-10 16:13:57 UTC
RC rhck 同样问题: 

[anuser@localhost ~]$ dmesg -l warn -T
[Sat Jun 11 00:09:40 2022] Spectre V2 : Using retpoline on Skylake-generation processors may not fully mitigate the vulnerability.
[Sat Jun 11 00:09:40 2022] Spectre V2 : Add the "spectre_v2=ibrs" kernel boot flag to enable IBRS on Skylake systems that need full mitigation.
[Sat Jun 11 00:09:40 2022] MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details.
[Sat Jun 11 00:09:40 2022] TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details.
[Sat Jun 11 00:09:40 2022]  #2
[Sat Jun 11 00:09:40 2022]  #3
[Sat Jun 11 00:09:40 2022]  #4
[Sat Jun 11 00:09:40 2022]  #5
[Sat Jun 11 00:09:40 2022]  #6
[Sat Jun 11 00:09:40 2022]  #7
[Sat Jun 11 00:09:40 2022] acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge.
[Sat Jun 11 00:09:40 2022] unchecked MSR access error: RDMSR from 0xe2 at rIP: 0xffffffffb226db93 (native_read_msr+0x3/0x30)
[Sat Jun 11 00:09:40 2022] Call Trace:
[Sat Jun 11 00:09:40 2022]  intel_idle_init+0x3e8/0x81b
[Sat Jun 11 00:09:40 2022]  ? intel_idle_acpi_cst_extract+0x11b/0x11b
[Sat Jun 11 00:09:40 2022]  ? do_early_param+0x91/0x91
[Sat Jun 11 00:09:40 2022]  do_one_initcall+0x46/0x1d0
[Sat Jun 11 00:09:40 2022]  ? do_early_param+0x91/0x91
[Sat Jun 11 00:09:40 2022]  kernel_init_freeable+0x1b4/0x22d
[Sat Jun 11 00:09:40 2022]  ? rest_init+0xaa/0xaa
[Sat Jun 11 00:09:40 2022]  kernel_init+0xa/0xf8
[Sat Jun 11 00:09:40 2022]  ret_from_fork+0x35/0x40
[Sat Jun 11 00:09:40 2022] unchecked MSR access error: WRMSR to 0x1fc (tried to write 0x0000000000000000) at rIP: 0xffffffffb226dcf4 (native_write_msr+0x4/0x20)
[Sat Jun 11 00:09:40 2022] Call Trace:
[Sat Jun 11 00:09:40 2022]  intel_idle_cpu_online+0x7a/0xf0
[Sat Jun 11 00:09:40 2022]  cpuhp_invoke_callback+0x8d/0x500
[Sat Jun 11 00:09:40 2022]  ? sort_range+0x20/0x20
[Sat Jun 11 00:09:40 2022]  cpuhp_thread_fun+0xb0/0x110
[Sat Jun 11 00:09:40 2022]  smpboot_thread_fn+0xb5/0x150
[Sat Jun 11 00:09:40 2022]  kthread+0x10a/0x120
[Sat Jun 11 00:09:40 2022]  ? set_kthread_struct+0x40/0x40
[Sat Jun 11 00:09:40 2022]  ret_from_fork+0x35/0x40
[Sat Jun 11 00:09:42 2022] printk: systemd: 20 output lines suppressed due to ratelimiting
Comment 3 liuyaqing alibaba_cloud_group 2022-07-13 10:22:22 UTC
anolis8.4 anck镜像  ecs.g5.large实例,显示如下:
[root@iZbp1fhnpd2ao5xhdgl2ytZ ~]# dmesg -l warn
[    0.083040] unchecked MSR access error: WRMSR to 0x3a (tried to write 0x0000000000000001) at rIP: 0xffffffff9c06c104 (native_write_msr+0x4/0x20)
[    0.083041] Call Trace:
[    0.083046]  init_ia32_feat_ctl+0x6a/0xc9
[    0.083049]  init_intel+0x107/0x4f0
[    0.083052]  identify_cpu+0x2b5/0x5d0
[    0.083057]  identify_boot_cpu+0xc/0x74
[    0.083060]  check_bugs+0x28/0xa66
[    0.083064]  ? __slab_alloc+0x29/0x30
[    0.083065]  ? kmem_cache_alloc+0x188/0x190
[    0.083069]  start_kernel+0x4f4/0x523
[    0.083073]  secondary_startup_64+0xb5/0xc0
[    0.085768] MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details.
[    0.085768] TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details.
[    0.094147] acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge.
[    2.346268] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=108 sclass=netlink_route_socket pid=312 comm=systemd-udevd
[    3.677212] systemd: 19 output lines suppressed due to ratelimiting
Comment 4 Janos alibaba_cloud_group 2022-08-04 15:27:04 UTC
线下VM  下载 ANCK-5.10 2208 an8内核rpm安装重启后,dmesg有类似报错:
升级前内核:
# uname -r
4.19.91-23.4.an8.x86_64
升级后内核:
# uname -r
5.10.134-12_rc1.an8.x86_64
# dmesg -l warn -T
[Thu Aug  4 14:41:55 2022] crashkernel: memory value expected
[Thu Aug  4 14:41:55 2022] MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details.
[Thu Aug  4 14:41:55 2022] TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details.
[Thu Aug  4 14:41:55 2022] MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details.
[Thu Aug  4 14:41:55 2022]  #2
[Thu Aug  4 14:41:55 2022]  #3
[Thu Aug  4 14:41:55 2022] acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge.
[Thu Aug  4 14:41:56 2022] unchecked MSR access error: RDMSR from 0xe2 at rIP: 0xffffffff935fecb3 (native_read_msr+0x3/0x30)
[Thu Aug  4 14:41:56 2022] Call Trace:
[Thu Aug  4 14:41:56 2022]  intel_idle_init+0x391/0x810
[Thu Aug  4 14:41:56 2022]  ? intel_idle_acpi_cst_extract+0x11f/0x11f
[Thu Aug  4 14:41:56 2022]  ? rdinit_setup+0x30/0x30
[Thu Aug  4 14:41:56 2022]  do_one_initcall+0x41/0x1d0
[Thu Aug  4 14:41:56 2022]  kernel_init_freeable+0x1f1/0x23f
[Thu Aug  4 14:41:56 2022]  ? rest_init+0xb4/0xb4
[Thu Aug  4 14:41:56 2022]  kernel_init+0xa/0x11c
[Thu Aug  4 14:41:56 2022]  ret_from_fork+0x1f/0x30
[Thu Aug  4 14:41:56 2022] unchecked MSR access error: WRMSR to 0x1fc (tried to write 0x0000000000000000) at rIP: 0xffffffff935fedef (intel_idle_cpu_online+0xef/0x190)
[Thu Aug  4 14:41:56 2022] Call Trace:
[Thu Aug  4 14:41:56 2022]  cpuhp_invoke_callback+0x80/0x3f0
[Thu Aug  4 14:41:56 2022]  ? sort_range+0x20/0x20
[Thu Aug  4 14:41:56 2022]  cpuhp_thread_fun+0xa8/0x110
[Thu Aug  4 14:41:56 2022]  smpboot_thread_fn+0xc2/0x160
[Thu Aug  4 14:41:56 2022]  kthread+0x114/0x130
[Thu Aug  4 14:41:56 2022]  ? __kthread_cancel_work+0x50/0x50
[Thu Aug  4 14:41:56 2022]  ret_from_fork+0x1f/0x30
[Thu Aug  4 14:41:59 2022] printk: systemd: 18 output lines suppressed due to ratelimiting
Comment 5 zhixin01 2022-08-06 15:18:31 UTC
线下VM  下载 ANCK-5.10 2208 an8 debug内核rpm安装重启后,dmesg有类似报错:
升级后:
[root@VM20210305-16 ~]# uname -r
5.10.134-12_rc1.an8.x86_64+debug

[root@VM20210305-16 ~]# dmesg -l warn -T
[Sat Aug  6 15:09:16 2022] Lock dependency validator: Copyright (c) 2006 Red Hat, Inc., Ingo Molnar
[Sat Aug  6 15:09:16 2022] ... MAX_LOCKDEP_SUBCLASSES:  8
[Sat Aug  6 15:09:16 2022] ... MAX_LOCK_DEPTH:          48
[Sat Aug  6 15:09:16 2022] ... MAX_LOCKDEP_KEYS:        8192
[Sat Aug  6 15:09:16 2022] ... CLASSHASH_SIZE:          4096
[Sat Aug  6 15:09:16 2022] ... MAX_LOCKDEP_ENTRIES:     32768
[Sat Aug  6 15:09:16 2022] ... MAX_LOCKDEP_CHAINS:      65536
[Sat Aug  6 15:09:16 2022] ... CHAINHASH_SIZE:          32768
[Sat Aug  6 15:09:16 2022]  memory used by lock dependency info: 6877 kB
[Sat Aug  6 15:09:16 2022]  memory used for stack traces: 4224 kB
[Sat Aug  6 15:09:16 2022]  per task-struct memory footprint: 2688 bytes
[Sat Aug  6 15:09:16 2022] MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details.
[Sat Aug  6 15:09:16 2022] TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details.
[Sat Aug  6 15:09:16 2022] MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details.
[Sat Aug  6 15:09:16 2022]  #2
[Sat Aug  6 15:09:16 2022]  #3

[Sat Aug  6 15:09:16 2022] *************************************************************
[Sat Aug  6 15:09:16 2022] **     NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE    **
[Sat Aug  6 15:09:16 2022] **                                                         **
[Sat Aug  6 15:09:16 2022] **  IOMMU DebugFS SUPPORT HAS BEEN ENABLED IN THIS KERNEL  **
[Sat Aug  6 15:09:16 2022] **                                                         **
[Sat Aug  6 15:09:16 2022] ** This means that this kernel is built to expose internal **
[Sat Aug  6 15:09:16 2022] ** IOMMU data structures, which may compromise security on **
[Sat Aug  6 15:09:16 2022] ** your system.                                            **
[Sat Aug  6 15:09:16 2022] **                                                         **
[Sat Aug  6 15:09:16 2022] ** If you see this message and you are not debugging the   **
[Sat Aug  6 15:09:16 2022] ** kernel, report this immediately to your vendor!         **
[Sat Aug  6 15:09:16 2022] **                                                         **
[Sat Aug  6 15:09:16 2022] **     NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE    **
[Sat Aug  6 15:09:16 2022] *************************************************************
[Sat Aug  6 15:09:17 2022] acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge.
[Sat Aug  6 15:09:23 2022] unchecked MSR access error: RDMSR from 0xe2 at rIP: 0xffffffff9c3a2f53 (native_read_msr+0x3/0x30)
[Sat Aug  6 15:09:23 2022] Call Trace:
[Sat Aug  6 15:09:23 2022]  intel_idle_init+0x615/0x10e2
[Sat Aug  6 15:09:23 2022]  ? rcu_read_lock_bh_held+0xb0/0xb0
[Sat Aug  6 15:09:23 2022]  ? intel_idle_acpi_cst_extract+0x23f/0x23f
[Sat Aug  6 15:09:23 2022]  do_one_initcall+0xf9/0x550
[Sat Aug  6 15:09:23 2022]  ? perf_trace_initcall_level+0x460/0x460
[Sat Aug  6 15:09:23 2022]  ? rcu_read_lock_sched_held+0xa3/0xd0
[Sat Aug  6 15:09:23 2022]  ? __kasan_kmalloc.constprop.11+0x107/0x120
[Sat Aug  6 15:09:23 2022]  ? rcu_read_lock_bh_held+0xb0/0xb0
[Sat Aug  6 15:09:23 2022]  ? kernel_init_freeable+0x4d0/0x6ed
[Sat Aug  6 15:09:23 2022]  ? __kmalloc+0x174/0x2a0
[Sat Aug  6 15:09:23 2022]  kernel_init_freeable+0x672/0x6ed
[Sat Aug  6 15:09:23 2022]  ? console_on_rootfs+0x52/0x52
[Sat Aug  6 15:09:23 2022]  ? rest_init+0x345/0x345
[Sat Aug  6 15:09:23 2022]  kernel_init+0xc/0x13b
[Sat Aug  6 15:09:23 2022]  ? rest_init+0x345/0x345
[Sat Aug  6 15:09:23 2022]  ret_from_fork+0x1f/0x30
[Sat Aug  6 15:09:23 2022] unchecked MSR access error: WRMSR to 0x1fc (tried to write 0x0000000000000000) at rIP: 0xffffffff9c3a315f (intel_idle_cpu_online+0x1bf/0x2c0)
[Sat Aug  6 15:09:23 2022] Call Trace:
[Sat Aug  6 15:09:23 2022]  ? native_write_msr+0x20/0x20
[Sat Aug  6 15:09:23 2022]  cpuhp_invoke_callback+0x1f4/0x1640
[Sat Aug  6 15:09:23 2022]  cpuhp_thread_fun+0x3c9/0x600
[Sat Aug  6 15:09:23 2022]  ? __cpuhp_state_remove_instance+0x500/0x500
[Sat Aug  6 15:09:23 2022]  smpboot_thread_fn+0x30c/0x780
[Sat Aug  6 15:09:23 2022]  ? smpboot_register_percpu_thread+0x260/0x260
[Sat Aug  6 15:09:23 2022]  ? trace_hardirqs_on+0x1c/0x150
[Sat Aug  6 15:09:23 2022]  ? __kthread_parkme+0xd1/0x1a0
[Sat Aug  6 15:09:23 2022]  ? smpboot_register_percpu_thread+0x260/0x260
[Sat Aug  6 15:09:23 2022]  kthread+0x35d/0x430
[Sat Aug  6 15:09:23 2022]  ? __kthread_cancel_work+0x170/0x170
[Sat Aug  6 15:09:23 2022]  ret_from_fork+0x1f/0x30
[Sat Aug  6 15:09:40 2022] printk: systemd: 18 output lines suppressed due to ratelimiting
Comment 6 yunmeng365524 2023-03-05 13:50:39 UTC
*** Bug 4279 has been marked as a duplicate of this bug. ***