[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20080815090733.GA22209@elte.hu>
Date: Fri, 15 Aug 2008 11:07:33 +0200
From: Ingo Molnar <mingo@...e.hu>
To: David Witbrodt <dawitbro@...global.net>
Cc: Yinghai Lu <yhlu.kernel@...il.com>, linux-kernel@...r.kernel.org,
"Paul E. McKenney" <paulmck@...ux.vnet.ibm.com>,
Peter Zijlstra <peterz@...radead.org>,
Thomas Gleixner <tglx@...utronix.de>,
"H. Peter Anvin" <hpa@...or.com>, netdev <netdev@...r.kernel.org>
Subject: Re: HPET regression in 2.6.26 versus 2.6.25 -- retried 2.6.27-rc3
patch (and patch method)
* David Witbrodt <dawitbro@...global.net> wrote:
> I found something very interesting about the commit that first causes
> the lockup (3def3d6d...), and the very next commit (1e934dda...) -- if
> I checkout 1e94... and try to revert the changes made in 3def..., the
> kernel freezes in spite of the revert.
>
> Because of this, I would conclude that your patch for 2.6.27-rc3 was
> doomed before you began, and we should look more carefully at the
> commits from February instead of trying to revert at the 2.6.27 HEAD.
i'm still wondering whether we could try to figure out something about
the nature of the hard lockup itself.
Have you tried to activate the NMI watchdog? It _usually_ works fine if
you use a boot option along the lines of:
"lapic nmi_watchdog=2 idle=poll"
The best test would be to first boot the broken kernel with also
hpet=disable and the above options, and check in /proc/interrupts
whether the NMI count is increasing. If the NMI watchdog is working, you
should see a steady trickle of NMI irqs:
rhea:~> while sleep 1; do grep NMI /proc/interrupts ; done
NMI: 4395 Non-maskable interrupts
NMI: 4396 Non-maskable interrupts
NMI: 4397 Non-maskable interrupts
NMI: 4398 Non-maskable interrupts
^C
if it does not work, you'll see:
pluto:~> while sleep 1; do grep NMI /proc/interrupts ; done
NMI: 0 Non-maskable interrupts
NMI: 0 Non-maskable interrupts
NMI: 0 Non-maskable interrupts
NMI: 0 Non-maskable interrupts
^C
NOTE: the NMI watchdog disables high-res timers so it might change your
test enough to make the lockup go away. Hopefully it wont :-)
So, in the ideal situation, your test of the NMI watchdog will show a
steady trickle of watchdog NMI. Then i'd suggest to remove the
hpet=disable, to provoke the lockup. Hopefully it occurs, _and_ after
the hard lockup has happened, you should see a nice stack backtrace
printed out by the NMI watchdog. That gives us the exact location of
lockup.
One theory is that the changed resource allocations are buggy in certain
circumstances and cause us to stomp over key kernel data structures. We
could for example overwrite a networking lock - that's why you lock up
in the networking code. hpet=disable deactivates those resource
allocations and works around the symptoms of the bug.
Ingo
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists