linux-kernel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Jeffrin Jose T <jeffrin@rajagiritech.edu.in>
To: Thomas Gleixner <tglx@linutronix.de>,
	"mingo@redhat.com" <mingo@redhat.com>,
	Borislav Petkov <bp@alien8.de>, "x86@kernel.org" <x86@kernel.org>,
	"hpa@zytor.com" <hpa@zytor.com>,
	jpoimboe@redhat.com, mbenes@suse.cz,
	"peterz@infradead.org" <peterz@infradead.org>,
	shile.zhang@linux.alibaba.com
Cc: lkml <linux-kernel@vger.kernel.org>
Subject: Fwd: [WARNING AND ERROR]  may be  system slow and  audio and video breaking
Date: Sun, 18 Oct 2020 22:42:39 +0530	[thread overview]
Message-ID: <b4533bcbb095cf11f01d0adfd50912c52242eb02.camel@rajagiritech.edu.in> (raw)
In-Reply-To: 959da1eee73f58a824fe4913b5cacda6de0f392e.camel@rajagiritech.edu.in

[-- Attachment #1: Type: text/plain, Size: 3 bytes --]




[-- Attachment #2: Forwarded message — [WARNING AND ERROR]  may be  system slow and  audio and video breaking --]
[-- Type: message/rfc822, Size: 8475 bytes --]

[-- Attachment #2.1.1: Type: text/plain, Size: 1943 bytes --]

hello,
System was slow and  audio and video
was breaking. I was compiling a kernel and also
played a youtube video in firefox and  maybe evolution.

meminfo.txt  and lscpu.txt files are attached.

The following is a part from "dmesg -l warn"

-------------------x--------------x-------------x------------
smpboot: Scheduler frequency invariance went wobbly, disabling!
[ 1112.592866] unchecked MSR access error: RDMSR from 0x123 at rIP:
0xffffffffb5c9a184 (native_read_msr+0x4/0x30)
[ 1112.592869] Call Trace:
[ 1112.592876]  update_srbds_msr+0x6f/0xb0
[ 1112.592880]  smp_store_cpu_info+0x8e/0xb0
[ 1112.592883]  start_secondary+0x93/0x200
[ 1112.592887]  ? set_cpu_sibling_map+0xcb0/0xcb0
[ 1112.592891]  secondary_startup_64+0xa4/0xb0
[ 1112.592898] unchecked MSR access error: WRMSR to 0x123 (tried to
write 0x0000000000000000) at rIP: 0xffffffffb5c9a264
(native_write_msr+0x4/0x20)
[ 1112.592899] Call Trace:
[ 1112.592902]  update_srbds_msr+0x98/0xb0
[ 1112.592904]  smp_store_cpu_info+0x8e/0xb0
[ 1112.592907]  start_secondary+0x93/0x200
[ 1112.592911]  ? set_cpu_sibling_map+0xcb0/0xcb0
[ 1112.592914]  secondary_startup_64+0xa4/0xb0
[ 2915.106879] show_signal: 6 callbacks suppressed
[ 6089.209343] WARNING: stack going in the wrong direction? at
i915_gem_close_object+0x2fb/0x560 [i915]
$
-----------------x---------------x----------------x------------
Linux debian 5.9.1-rc1+ #4 SMP Fri Oct 16 16:48:04 IST 2020 x86_64
GNU/Linux

GNU Make            	4.3
Binutils            	2.35.1
Util-linux          	2.36
Mount               	2.36
Bison               	3.7.2
Flex                	2.6.4
Dynamic linker (ldd)	2.30
Procps              	3.3.16
Kbd                 	2.3.0
Console-tools       	2.3.0
Sh-utils            	8.32
Udev                	246


Reported-by: Jeffrin Jose T <jeffrin@rajagiritech.edu.in

-- 
software engineer
rajagiri school of engineering and technology
\r

[-- Attachment #2.1.2: meminfo.txt --]
[-- Type: text/plain, Size: 1419 bytes --]

MemTotal:        6952576 kB
MemFree:          299000 kB
MemAvailable:    2964748 kB
Buffers:          169024 kB
Cached:          3447336 kB
SwapCached:          108 kB
Active:          1996356 kB
Inactive:        3315820 kB
Active(anon):     643748 kB
Inactive(anon):  1950892 kB
Active(file):    1352608 kB
Inactive(file):  1364928 kB
Unevictable:       57668 kB
Mlocked:             160 kB
SwapTotal:       8263676 kB
SwapFree:        8261092 kB
Dirty:             16632 kB
Writeback:             0 kB
AnonPages:       1736772 kB
Mapped:           520572 kB
Shmem:            898760 kB
KReclaimable:     264048 kB
Slab:            1045968 kB
SReclaimable:     264048 kB
SUnreclaim:       781920 kB
KernelStack:       28320 kB
PageTables:        27856 kB
NFS_Unstable:          0 kB
Bounce:                0 kB
WritebackTmp:          0 kB
CommitLimit:    11739964 kB
Committed_AS:    7741848 kB
VmallocTotal:   34359738367 kB
VmallocUsed:       60544 kB
VmallocChunk:          0 kB
Percpu:             2672 kB
HardwareCorrupted:     0 kB
AnonHugePages:    763904 kB
ShmemHugePages:        0 kB
ShmemPmdMapped:        0 kB
FileHugePages:         0 kB
FilePmdMapped:         0 kB
HugePages_Total:       0
HugePages_Free:        0
HugePages_Rsvd:        0
HugePages_Surp:        0
Hugepagesize:       2048 kB
Hugetlb:               0 kB
DirectMap4k:      891756 kB
DirectMap2M:     7372800 kB
DirectMap1G:     1048576 kB

[-- Attachment #2.1.3: lscpu.txt --]
[-- Type: text/plain, Size: 2536 bytes --]

Architecture:                    x86_64
CPU op-mode(s):                  32-bit, 64-bit
Byte Order:                      Little Endian
Address sizes:                   39 bits physical, 48 bits virtual
CPU(s):                          4
On-line CPU(s) list:             0-3
Thread(s) per core:              2
Core(s) per socket:              2
Socket(s):                       1
NUMA node(s):                    1
Vendor ID:                       GenuineIntel
CPU family:                      6
Model:                           142
Model name:                      Intel(R) Core(TM) i3-7020U CPU @ 2.30GHz
Stepping:                        9
CPU MHz:                         2299.999
CPU max MHz:                     2300.0000
CPU min MHz:                     400.0000
BogoMIPS:                        4599.93
Virtualization:                  VT-x
L1d cache:                       64 KiB
L1i cache:                       64 KiB
L2 cache:                        512 KiB
L3 cache:                        3 MiB
NUMA node0 CPU(s):               0-3
Vulnerability Itlb multihit:     KVM: Mitigation: VMX disabled
Vulnerability L1tf:              Mitigation; PTE Inversion; VMX conditional cache flushes, SMT vulnerable
Vulnerability Mds:               Mitigation; Clear CPU buffers; SMT vulnerable
Vulnerability Meltdown:          Mitigation; PTI
Vulnerability Spec store bypass: Mitigation; Speculative Store Bypass disabled via prctl and seccomp
Vulnerability Spectre v1:        Mitigation; usercopy/swapgs barriers and __user pointer sanitization
Vulnerability Spectre v2:        Mitigation; Full generic retpoline, IBPB conditional, IBRS_FW, STIBP conditional, RSB filling
Vulnerability Srbds:             Mitigation; Microcode
Vulnerability Tsx async abort:   Not affected
Flags:                           fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx pdpe1gb rdtscp lm constant_tsc art arch_perfmon pebs bts rep_good nopl xtopology nonstop_tsc cpuid aperfmperf pni pclmulqdq dtes64 monitor ds_cpl vmx est tm2 ssse3 sdbg fma cx16 xtpr pdcm pcid sse4_1 sse4_2 x2apic movbe popcnt tsc_deadline_timer aes xsave avx f16c rdrand lahf_lm abm 3dnowprefetch cpuid_fault epb invpcid_single pti ssbd ibrs ibpb stibp tpr_shadow vnmi flexpriority ept vpid ept_ad fsgsbase tsc_adjust bmi1 avx2 smep bmi2 erms invpcid mpx rdseed adx smap clflushopt intel_pt xsaveopt xsavec xgetbv1 xsaves dtherm arat pln pts hwp hwp_notify hwp_act_window hwp_epp md_clear flush_l1d

[-- Attachment #3: meminfo.txt --]
[-- Type: text/plain, Size: 1419 bytes --]

MemTotal:        6952576 kB
MemFree:          299000 kB
MemAvailable:    2964748 kB
Buffers:          169024 kB
Cached:          3447336 kB
SwapCached:          108 kB
Active:          1996356 kB
Inactive:        3315820 kB
Active(anon):     643748 kB
Inactive(anon):  1950892 kB
Active(file):    1352608 kB
Inactive(file):  1364928 kB
Unevictable:       57668 kB
Mlocked:             160 kB
SwapTotal:       8263676 kB
SwapFree:        8261092 kB
Dirty:             16632 kB
Writeback:             0 kB
AnonPages:       1736772 kB
Mapped:           520572 kB
Shmem:            898760 kB
KReclaimable:     264048 kB
Slab:            1045968 kB
SReclaimable:     264048 kB
SUnreclaim:       781920 kB
KernelStack:       28320 kB
PageTables:        27856 kB
NFS_Unstable:          0 kB
Bounce:                0 kB
WritebackTmp:          0 kB
CommitLimit:    11739964 kB
Committed_AS:    7741848 kB
VmallocTotal:   34359738367 kB
VmallocUsed:       60544 kB
VmallocChunk:          0 kB
Percpu:             2672 kB
HardwareCorrupted:     0 kB
AnonHugePages:    763904 kB
ShmemHugePages:        0 kB
ShmemPmdMapped:        0 kB
FileHugePages:         0 kB
FilePmdMapped:         0 kB
HugePages_Total:       0
HugePages_Free:        0
HugePages_Rsvd:        0
HugePages_Surp:        0
Hugepagesize:       2048 kB
Hugetlb:               0 kB
DirectMap4k:      891756 kB
DirectMap2M:     7372800 kB
DirectMap1G:     1048576 kB

[-- Attachment #4: lscpu.txt --]
[-- Type: text/plain, Size: 2536 bytes --]

Architecture:                    x86_64
CPU op-mode(s):                  32-bit, 64-bit
Byte Order:                      Little Endian
Address sizes:                   39 bits physical, 48 bits virtual
CPU(s):                          4
On-line CPU(s) list:             0-3
Thread(s) per core:              2
Core(s) per socket:              2
Socket(s):                       1
NUMA node(s):                    1
Vendor ID:                       GenuineIntel
CPU family:                      6
Model:                           142
Model name:                      Intel(R) Core(TM) i3-7020U CPU @ 2.30GHz
Stepping:                        9
CPU MHz:                         2299.999
CPU max MHz:                     2300.0000
CPU min MHz:                     400.0000
BogoMIPS:                        4599.93
Virtualization:                  VT-x
L1d cache:                       64 KiB
L1i cache:                       64 KiB
L2 cache:                        512 KiB
L3 cache:                        3 MiB
NUMA node0 CPU(s):               0-3
Vulnerability Itlb multihit:     KVM: Mitigation: VMX disabled
Vulnerability L1tf:              Mitigation; PTE Inversion; VMX conditional cache flushes, SMT vulnerable
Vulnerability Mds:               Mitigation; Clear CPU buffers; SMT vulnerable
Vulnerability Meltdown:          Mitigation; PTI
Vulnerability Spec store bypass: Mitigation; Speculative Store Bypass disabled via prctl and seccomp
Vulnerability Spectre v1:        Mitigation; usercopy/swapgs barriers and __user pointer sanitization
Vulnerability Spectre v2:        Mitigation; Full generic retpoline, IBPB conditional, IBRS_FW, STIBP conditional, RSB filling
Vulnerability Srbds:             Mitigation; Microcode
Vulnerability Tsx async abort:   Not affected
Flags:                           fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx pdpe1gb rdtscp lm constant_tsc art arch_perfmon pebs bts rep_good nopl xtopology nonstop_tsc cpuid aperfmperf pni pclmulqdq dtes64 monitor ds_cpl vmx est tm2 ssse3 sdbg fma cx16 xtpr pdcm pcid sse4_1 sse4_2 x2apic movbe popcnt tsc_deadline_timer aes xsave avx f16c rdrand lahf_lm abm 3dnowprefetch cpuid_fault epb invpcid_single pti ssbd ibrs ibpb stibp tpr_shadow vnmi flexpriority ept vpid ept_ad fsgsbase tsc_adjust bmi1 avx2 smep bmi2 erms invpcid mpx rdseed adx smap clflushopt intel_pt xsaveopt xsavec xgetbv1 xsaves dtherm arat pln pts hwp hwp_notify hwp_act_window hwp_epp md_clear flush_l1d

  reply	other threads:[~2020-10-18 17:13 UTC|newest]

Thread overview: 6+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2020-10-18 14:54 [WARNING AND ERROR] may be system slow and audio and video breaking Jeffrin Jose T
2020-10-18 17:12 ` Jeffrin Jose T [this message]
2020-10-18 17:49   ` Fwd: " Borislav Petkov
     [not found]     ` <328218dc46c4f883dad44d6fb53746c5f35f055d.camel@rajagiritech.edu.in>
2020-10-18 21:03       ` Borislav Petkov
2020-10-18 21:57         ` Jeffrin Jose T
2020-10-18 22:31           ` Borislav Petkov

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=b4533bcbb095cf11f01d0adfd50912c52242eb02.camel@rajagiritech.edu.in \
    --to=jeffrin@rajagiritech.edu.in \
    --cc=bp@alien8.de \
    --cc=hpa@zytor.com \
    --cc=jpoimboe@redhat.com \
    --cc=linux-kernel@vger.kernel.org \
    --cc=mbenes@suse.cz \
    --cc=mingo@redhat.com \
    --cc=peterz@infradead.org \
    --cc=shile.zhang@linux.alibaba.com \
    --cc=tglx@linutronix.de \
    --cc=x86@kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).