Description of problem: qcow2镜像地址: https://build.openanolis.cn/kojifiles/output/an-8-6-Beta-new/compose/BaseOS/x86_64/images/Anolis-8-GenericCloud-8.6-20220521.0.x86_64.qcow2 异常信息: [Tue May 24 15:03:45 2022] unchecked MSR access error: WRMSR to 0x1fc (tried to write 0x0000000000000000) at rIP: 0xffffffff8206c104 (native_write_msr+0x4/0x20) [Tue May 24 15:03:45 2022] Call Trace: [Tue May 24 15:03:45 2022] intel_idle_cpu_online+0x88/0xf3 [Tue May 24 15:03:45 2022] cpuhp_invoke_callback+0x9b/0x540 [Tue May 24 15:03:45 2022] ? sort_range+0x20/0x20 [Tue May 24 15:03:45 2022] cpuhp_thread_fun+0xb0/0x110 [Tue May 24 15:03:45 2022] smpboot_thread_fn+0xc5/0x160 [Tue May 24 15:03:45 2022] kthread+0x112/0x130 [Tue May 24 15:03:45 2022] ? kthread_park+0x80/0x80 [Tue May 24 15:03:45 2022] ret_from_fork+0x35/0x40 [Tue May 24 15:03:45 2022] integrity: Unable to open file: /etc/keys/x509_ima.der (-2) [Tue May 24 15:03:45 2022] integrity: Unable to open file: /etc/keys/x509_evm.der (-2) [Tue May 24 15:03:45 2022] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=108 sclass=netlink_route_socket pid=337 comm=systemd-udevd [Tue May 24 15:03:46 2022] systemd: 17 output lines suppressed due to 启动方式: qemu-kvm 宿机器信息: #dmidecode | grep -i version # SMBIOS implementations newer than version 3.1.1 are not # fully supported by this version of dmidecode. Version: 1.0.PL.IP.P.022.03 Version: 0 Version: SA5112H5 Version: F62M1.92 Specification Version: 2.0 Version: Intel(R) Xeon(R) Platinum 8269CY CPU @ 2.50GHz Version: Intel(R) Xeon(R) Platinum 8269CY CPU @ 2.50GHz
x86_64 RC anck qcow2的镜像, 显示如下: [anuser@localhost ~]$ dmesg -l warn -T [Sat Jun 11 00:01:16 2022] MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. [Sat Jun 11 00:01:16 2022] TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. [Sat Jun 11 00:01:16 2022] #2 [Sat Jun 11 00:01:16 2022] #3 [Sat Jun 11 00:01:16 2022] #4 [Sat Jun 11 00:01:16 2022] #5 [Sat Jun 11 00:01:16 2022] #6 [Sat Jun 11 00:01:16 2022] #7 [Sat Jun 11 00:01:16 2022] acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. [Sat Jun 11 00:01:17 2022] unchecked MSR access error: RDMSR from 0x1fc at rIP: 0xffffffffb306c093 (native_read_msr+0x3/0x30) [Sat Jun 11 00:01:17 2022] Call Trace: [Sat Jun 11 00:01:17 2022] intel_idle_cpu_online+0x71/0xf3 [Sat Jun 11 00:01:17 2022] cpuhp_invoke_callback+0x9b/0x540 [Sat Jun 11 00:01:17 2022] ? sort_range+0x20/0x20 [Sat Jun 11 00:01:17 2022] cpuhp_thread_fun+0xb0/0x110 [Sat Jun 11 00:01:17 2022] smpboot_thread_fn+0xc5/0x160 [Sat Jun 11 00:01:17 2022] kthread+0x112/0x130 [Sat Jun 11 00:01:17 2022] ? kthread_park+0x80/0x80 [Sat Jun 11 00:01:17 2022] ret_from_fork+0x35/0x40 [Sat Jun 11 00:01:17 2022] unchecked MSR access error: WRMSR to 0x1fc (tried to write 0x0000000000000000) at rIP: 0xffffffffb306c104 (native_write_msr+0x4/0x20) [Sat Jun 11 00:01:17 2022] Call Trace: [Sat Jun 11 00:01:17 2022] intel_idle_cpu_online+0x88/0xf3 [Sat Jun 11 00:01:17 2022] cpuhp_invoke_callback+0x9b/0x540 [Sat Jun 11 00:01:17 2022] ? sort_range+0x20/0x20 [Sat Jun 11 00:01:17 2022] cpuhp_thread_fun+0xb0/0x110 [Sat Jun 11 00:01:17 2022] smpboot_thread_fn+0xc5/0x160 [Sat Jun 11 00:01:17 2022] kthread+0x112/0x130 [Sat Jun 11 00:01:17 2022] ? kthread_park+0x80/0x80 [Sat Jun 11 00:01:17 2022] ret_from_fork+0x35/0x40 [Sat Jun 11 00:01:17 2022] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=108 sclass=netlink_route_socket pid=344 comm=systemd-udevd [Sat Jun 11 00:01:18 2022] systemd: 20 output lines suppressed due to ratelimiting
RC rhck 同样问题: [anuser@localhost ~]$ dmesg -l warn -T [Sat Jun 11 00:09:40 2022] Spectre V2 : Using retpoline on Skylake-generation processors may not fully mitigate the vulnerability. [Sat Jun 11 00:09:40 2022] Spectre V2 : Add the "spectre_v2=ibrs" kernel boot flag to enable IBRS on Skylake systems that need full mitigation. [Sat Jun 11 00:09:40 2022] MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. [Sat Jun 11 00:09:40 2022] TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. [Sat Jun 11 00:09:40 2022] #2 [Sat Jun 11 00:09:40 2022] #3 [Sat Jun 11 00:09:40 2022] #4 [Sat Jun 11 00:09:40 2022] #5 [Sat Jun 11 00:09:40 2022] #6 [Sat Jun 11 00:09:40 2022] #7 [Sat Jun 11 00:09:40 2022] acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. [Sat Jun 11 00:09:40 2022] unchecked MSR access error: RDMSR from 0xe2 at rIP: 0xffffffffb226db93 (native_read_msr+0x3/0x30) [Sat Jun 11 00:09:40 2022] Call Trace: [Sat Jun 11 00:09:40 2022] intel_idle_init+0x3e8/0x81b [Sat Jun 11 00:09:40 2022] ? intel_idle_acpi_cst_extract+0x11b/0x11b [Sat Jun 11 00:09:40 2022] ? do_early_param+0x91/0x91 [Sat Jun 11 00:09:40 2022] do_one_initcall+0x46/0x1d0 [Sat Jun 11 00:09:40 2022] ? do_early_param+0x91/0x91 [Sat Jun 11 00:09:40 2022] kernel_init_freeable+0x1b4/0x22d [Sat Jun 11 00:09:40 2022] ? rest_init+0xaa/0xaa [Sat Jun 11 00:09:40 2022] kernel_init+0xa/0xf8 [Sat Jun 11 00:09:40 2022] ret_from_fork+0x35/0x40 [Sat Jun 11 00:09:40 2022] unchecked MSR access error: WRMSR to 0x1fc (tried to write 0x0000000000000000) at rIP: 0xffffffffb226dcf4 (native_write_msr+0x4/0x20) [Sat Jun 11 00:09:40 2022] Call Trace: [Sat Jun 11 00:09:40 2022] intel_idle_cpu_online+0x7a/0xf0 [Sat Jun 11 00:09:40 2022] cpuhp_invoke_callback+0x8d/0x500 [Sat Jun 11 00:09:40 2022] ? sort_range+0x20/0x20 [Sat Jun 11 00:09:40 2022] cpuhp_thread_fun+0xb0/0x110 [Sat Jun 11 00:09:40 2022] smpboot_thread_fn+0xb5/0x150 [Sat Jun 11 00:09:40 2022] kthread+0x10a/0x120 [Sat Jun 11 00:09:40 2022] ? set_kthread_struct+0x40/0x40 [Sat Jun 11 00:09:40 2022] ret_from_fork+0x35/0x40 [Sat Jun 11 00:09:42 2022] printk: systemd: 20 output lines suppressed due to ratelimiting
anolis8.4 anck镜像 ecs.g5.large实例,显示如下: [root@iZbp1fhnpd2ao5xhdgl2ytZ ~]# dmesg -l warn [ 0.083040] unchecked MSR access error: WRMSR to 0x3a (tried to write 0x0000000000000001) at rIP: 0xffffffff9c06c104 (native_write_msr+0x4/0x20) [ 0.083041] Call Trace: [ 0.083046] init_ia32_feat_ctl+0x6a/0xc9 [ 0.083049] init_intel+0x107/0x4f0 [ 0.083052] identify_cpu+0x2b5/0x5d0 [ 0.083057] identify_boot_cpu+0xc/0x74 [ 0.083060] check_bugs+0x28/0xa66 [ 0.083064] ? __slab_alloc+0x29/0x30 [ 0.083065] ? kmem_cache_alloc+0x188/0x190 [ 0.083069] start_kernel+0x4f4/0x523 [ 0.083073] secondary_startup_64+0xb5/0xc0 [ 0.085768] MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. [ 0.085768] TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. [ 0.094147] acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. [ 2.346268] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=108 sclass=netlink_route_socket pid=312 comm=systemd-udevd [ 3.677212] systemd: 19 output lines suppressed due to ratelimiting
线下VM 下载 ANCK-5.10 2208 an8内核rpm安装重启后,dmesg有类似报错: 升级前内核: # uname -r 4.19.91-23.4.an8.x86_64 升级后内核: # uname -r 5.10.134-12_rc1.an8.x86_64 # dmesg -l warn -T [Thu Aug 4 14:41:55 2022] crashkernel: memory value expected [Thu Aug 4 14:41:55 2022] MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. [Thu Aug 4 14:41:55 2022] TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. [Thu Aug 4 14:41:55 2022] MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. [Thu Aug 4 14:41:55 2022] #2 [Thu Aug 4 14:41:55 2022] #3 [Thu Aug 4 14:41:55 2022] acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. [Thu Aug 4 14:41:56 2022] unchecked MSR access error: RDMSR from 0xe2 at rIP: 0xffffffff935fecb3 (native_read_msr+0x3/0x30) [Thu Aug 4 14:41:56 2022] Call Trace: [Thu Aug 4 14:41:56 2022] intel_idle_init+0x391/0x810 [Thu Aug 4 14:41:56 2022] ? intel_idle_acpi_cst_extract+0x11f/0x11f [Thu Aug 4 14:41:56 2022] ? rdinit_setup+0x30/0x30 [Thu Aug 4 14:41:56 2022] do_one_initcall+0x41/0x1d0 [Thu Aug 4 14:41:56 2022] kernel_init_freeable+0x1f1/0x23f [Thu Aug 4 14:41:56 2022] ? rest_init+0xb4/0xb4 [Thu Aug 4 14:41:56 2022] kernel_init+0xa/0x11c [Thu Aug 4 14:41:56 2022] ret_from_fork+0x1f/0x30 [Thu Aug 4 14:41:56 2022] unchecked MSR access error: WRMSR to 0x1fc (tried to write 0x0000000000000000) at rIP: 0xffffffff935fedef (intel_idle_cpu_online+0xef/0x190) [Thu Aug 4 14:41:56 2022] Call Trace: [Thu Aug 4 14:41:56 2022] cpuhp_invoke_callback+0x80/0x3f0 [Thu Aug 4 14:41:56 2022] ? sort_range+0x20/0x20 [Thu Aug 4 14:41:56 2022] cpuhp_thread_fun+0xa8/0x110 [Thu Aug 4 14:41:56 2022] smpboot_thread_fn+0xc2/0x160 [Thu Aug 4 14:41:56 2022] kthread+0x114/0x130 [Thu Aug 4 14:41:56 2022] ? __kthread_cancel_work+0x50/0x50 [Thu Aug 4 14:41:56 2022] ret_from_fork+0x1f/0x30 [Thu Aug 4 14:41:59 2022] printk: systemd: 18 output lines suppressed due to ratelimiting
线下VM 下载 ANCK-5.10 2208 an8 debug内核rpm安装重启后,dmesg有类似报错: 升级后: [root@VM20210305-16 ~]# uname -r 5.10.134-12_rc1.an8.x86_64+debug [root@VM20210305-16 ~]# dmesg -l warn -T [Sat Aug 6 15:09:16 2022] Lock dependency validator: Copyright (c) 2006 Red Hat, Inc., Ingo Molnar [Sat Aug 6 15:09:16 2022] ... MAX_LOCKDEP_SUBCLASSES: 8 [Sat Aug 6 15:09:16 2022] ... MAX_LOCK_DEPTH: 48 [Sat Aug 6 15:09:16 2022] ... MAX_LOCKDEP_KEYS: 8192 [Sat Aug 6 15:09:16 2022] ... CLASSHASH_SIZE: 4096 [Sat Aug 6 15:09:16 2022] ... MAX_LOCKDEP_ENTRIES: 32768 [Sat Aug 6 15:09:16 2022] ... MAX_LOCKDEP_CHAINS: 65536 [Sat Aug 6 15:09:16 2022] ... CHAINHASH_SIZE: 32768 [Sat Aug 6 15:09:16 2022] memory used by lock dependency info: 6877 kB [Sat Aug 6 15:09:16 2022] memory used for stack traces: 4224 kB [Sat Aug 6 15:09:16 2022] per task-struct memory footprint: 2688 bytes [Sat Aug 6 15:09:16 2022] MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. [Sat Aug 6 15:09:16 2022] TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. [Sat Aug 6 15:09:16 2022] MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. [Sat Aug 6 15:09:16 2022] #2 [Sat Aug 6 15:09:16 2022] #3 [Sat Aug 6 15:09:16 2022] ************************************************************* [Sat Aug 6 15:09:16 2022] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [Sat Aug 6 15:09:16 2022] ** ** [Sat Aug 6 15:09:16 2022] ** IOMMU DebugFS SUPPORT HAS BEEN ENABLED IN THIS KERNEL ** [Sat Aug 6 15:09:16 2022] ** ** [Sat Aug 6 15:09:16 2022] ** This means that this kernel is built to expose internal ** [Sat Aug 6 15:09:16 2022] ** IOMMU data structures, which may compromise security on ** [Sat Aug 6 15:09:16 2022] ** your system. ** [Sat Aug 6 15:09:16 2022] ** ** [Sat Aug 6 15:09:16 2022] ** If you see this message and you are not debugging the ** [Sat Aug 6 15:09:16 2022] ** kernel, report this immediately to your vendor! ** [Sat Aug 6 15:09:16 2022] ** ** [Sat Aug 6 15:09:16 2022] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [Sat Aug 6 15:09:16 2022] ************************************************************* [Sat Aug 6 15:09:17 2022] acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. [Sat Aug 6 15:09:23 2022] unchecked MSR access error: RDMSR from 0xe2 at rIP: 0xffffffff9c3a2f53 (native_read_msr+0x3/0x30) [Sat Aug 6 15:09:23 2022] Call Trace: [Sat Aug 6 15:09:23 2022] intel_idle_init+0x615/0x10e2 [Sat Aug 6 15:09:23 2022] ? rcu_read_lock_bh_held+0xb0/0xb0 [Sat Aug 6 15:09:23 2022] ? intel_idle_acpi_cst_extract+0x23f/0x23f [Sat Aug 6 15:09:23 2022] do_one_initcall+0xf9/0x550 [Sat Aug 6 15:09:23 2022] ? perf_trace_initcall_level+0x460/0x460 [Sat Aug 6 15:09:23 2022] ? rcu_read_lock_sched_held+0xa3/0xd0 [Sat Aug 6 15:09:23 2022] ? __kasan_kmalloc.constprop.11+0x107/0x120 [Sat Aug 6 15:09:23 2022] ? rcu_read_lock_bh_held+0xb0/0xb0 [Sat Aug 6 15:09:23 2022] ? kernel_init_freeable+0x4d0/0x6ed [Sat Aug 6 15:09:23 2022] ? __kmalloc+0x174/0x2a0 [Sat Aug 6 15:09:23 2022] kernel_init_freeable+0x672/0x6ed [Sat Aug 6 15:09:23 2022] ? console_on_rootfs+0x52/0x52 [Sat Aug 6 15:09:23 2022] ? rest_init+0x345/0x345 [Sat Aug 6 15:09:23 2022] kernel_init+0xc/0x13b [Sat Aug 6 15:09:23 2022] ? rest_init+0x345/0x345 [Sat Aug 6 15:09:23 2022] ret_from_fork+0x1f/0x30 [Sat Aug 6 15:09:23 2022] unchecked MSR access error: WRMSR to 0x1fc (tried to write 0x0000000000000000) at rIP: 0xffffffff9c3a315f (intel_idle_cpu_online+0x1bf/0x2c0) [Sat Aug 6 15:09:23 2022] Call Trace: [Sat Aug 6 15:09:23 2022] ? native_write_msr+0x20/0x20 [Sat Aug 6 15:09:23 2022] cpuhp_invoke_callback+0x1f4/0x1640 [Sat Aug 6 15:09:23 2022] cpuhp_thread_fun+0x3c9/0x600 [Sat Aug 6 15:09:23 2022] ? __cpuhp_state_remove_instance+0x500/0x500 [Sat Aug 6 15:09:23 2022] smpboot_thread_fn+0x30c/0x780 [Sat Aug 6 15:09:23 2022] ? smpboot_register_percpu_thread+0x260/0x260 [Sat Aug 6 15:09:23 2022] ? trace_hardirqs_on+0x1c/0x150 [Sat Aug 6 15:09:23 2022] ? __kthread_parkme+0xd1/0x1a0 [Sat Aug 6 15:09:23 2022] ? smpboot_register_percpu_thread+0x260/0x260 [Sat Aug 6 15:09:23 2022] kthread+0x35d/0x430 [Sat Aug 6 15:09:23 2022] ? __kthread_cancel_work+0x170/0x170 [Sat Aug 6 15:09:23 2022] ret_from_fork+0x1f/0x30 [Sat Aug 6 15:09:40 2022] printk: systemd: 18 output lines suppressed due to ratelimiting
*** Bug 4279 has been marked as a duplicate of this bug. ***