Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1758051Ab2FFS2s (ORCPT ); Wed, 6 Jun 2012 14:28:48 -0400 Received: from mx1.redhat.com ([209.132.183.28]:62011 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755212Ab2FFS2q (ORCPT ); Wed, 6 Jun 2012 14:28:46 -0400 Date: Wed, 6 Jun 2012 14:28:27 -0400 From: Don Zickus To: Ingo Molnar Cc: Jan Beulich , x86@kernel.org, zhong@linux.vnet.ibm.com, LKML Subject: Re: [PATCH] x86,nmi: Fix section mismatch warnings on 32-bit Message-ID: <20120606182827.GC32472@redhat.com> References: <1338839763-11140-1-git-send-email-dzickus@redhat.com> <4FCDDB7D0200007800088390@nat28.tlf.novell.com> <20120605144734.GU32472@redhat.com> <4FCE44FC0200007800088524@nat28.tlf.novell.com> <20120605183539.GA32472@redhat.com> <4FCF57B902000078000887EA@nat28.tlf.novell.com> <20120606140357.GB32472@redhat.com> <20120606154550.GA28071@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20120606154550.GA28071@gmail.com> User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 3509 Lines: 79 On Wed, Jun 06, 2012 at 05:45:50PM +0200, Ingo Molnar wrote: > > btw., to hijack a NMI watchdog thread, I'm sometimes getting > these: Sure. :-) > > initcall flow_cache_init_global+0x0/0x17a returned 0 after 346 usecs > calling pg_init+0x0/0x31b @ 1 > pktgen: Packet Generator for packet performance testing. Version: 2.74 > hub 2-0:1.0: state 7 ports 10 chg 0000 evt 0000 > ------------[ cut here ]------------ > WARNING: at kernel/watchdog.c:242 watchdog_overflow_callback+0xa4/0xd0() > Watchdog detected hard LOCKUP on cpu 1Pid: 93, comm: kworker/u:1 Not tainted 3.5.0-rc1-01411-gb2f5ce5-dirty #188912 > Call Trace: > [] ? watchdog_overflow_callback+0xa4/0xd0 > [] warn_slowpath_common+0x6b/0x90 > [] warn_slowpath_fmt+0x46/0x50 > [] ? proc_dohung_task_timeout_secs+0x40/0x40 > [] watchdog_overflow_callback+0xa4/0xd0 > [] __perf_event_overflow+0x158/0x240 > [] ? perf_event_task_disable+0x90/0x90 > [] perf_event_overflow+0x14/0x20 > [] x86_pmu_handle_irq+0xe3/0x130 > [] perf_event_nmi_handler+0x19/0x20 > [] nmi_handle.isra.1+0x89/0xd0 > [] ? die+0x80/0x80 > [] do_nmi+0x331/0x350 > [] end_repeat_nmi+0x1a/0x1e > [] ? early_serial_putc+0x2c/0x50 > [] ? early_serial_putc+0x2c/0x50 > [] ? early_serial_putc+0x2c/0x50 > <> [] early_serial_write+0x3c/0x50 > [] console_unlock+0x267/0x360 > [] vprintk_emit+0x533/0x540 > [] printk+0x4d/0x4f > [] ? ata_port_probe+0x40/0x40 > [] async_run_entry_fn+0x99/0x160 > [] process_one_work+0x2c1/0x550 > [] ? process_one_work+0x210/0x550 > [] ? put_lock_stats.isra.16+0xe/0x40 > [] ? __async_schedule+0x180/0x180 > [] worker_thread+0x18a/0x290 > [] ? rescuer_thread+0x2c0/0x2c0 > [] kthread+0xb2/0xc0 > [] kernel_thread_helper+0x4/0x10 > [] ? kthread_flush_work_fn+0x20/0x20 > [] ? gs_change+0xb/0xb > ---[ end trace 34a2acc48c10e4d7 ]--- > initcall pg_init+0x0/0x31b returned 0 after 49580351 usecs 49 seconds eh? Sounds like a candidate. > calling init_net_drop_monitor+0x0/0x164 @ 1 > drop_monitor: Initializing network drop monitor service > initcall init_net_drop_monitor+0x0/0x164 returned 0 after 96956 usecs > ata1.00: ATA-6: HDS722525VLAT80, V36OA60A, max UDMA/100 > calling llc_init+0x0/0x20 @ 1 > > Which I suspect is the pg_init() in net/core/pktgen.c. > > So it does its performance testing with all irqs disabled? It seems worker_thread disables irqs, so maybe the pkt generator is ignorant of it. But it seems like this should have always been a problem. I am not sure how that code is supposed to work, but I suspect the person who wrote the test did not expect it to run for 49 seconds? Ingo, how many cpus do you have on your machine? Cheers, Don -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/