From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754120Ab3BPT0L (ORCPT ); Sat, 16 Feb 2013 14:26:11 -0500 Received: from e36.co.us.ibm.com ([32.97.110.154]:41228 "EHLO e36.co.us.ibm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754060Ab3BPT0I (ORCPT ); Sat, 16 Feb 2013 14:26:08 -0500 Date: Sat, 16 Feb 2013 11:25:54 -0800 From: "Paul E. McKenney" To: Linus Torvalds Cc: Frederic Weisbecker , Thomas Gleixner , Ingo Molnar , Peter Zijlstra , Dave Jones , Hugh Dickins , Linux Kernel Mailing List , Paul McKenney Subject: Re: Debugging Thinkpad T430s occasional suspend failure. Message-ID: <20130216192554.GB7035@linux.vnet.ibm.com> Reply-To: paulmck@linux.vnet.ibm.com References: <20130213041629.GA28622@redhat.com> <20130213193411.GA15928@redhat.com> <20130215011503.GA11914@redhat.com> <20130215174435.GA2792@linux.vnet.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.21 (2010-09-15) X-Content-Scanned: Fidelis XPS MAILER x-cbid: 13021619-7606-0000-0000-0000087745B1 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Feb 15, 2013 at 10:50:31AM -0800, Linus Torvalds wrote: > On Fri, Feb 15, 2013 at 10:35 AM, Linus Torvalds > wrote: > > On Fri, Feb 15, 2013 at 10:34 AM, Linus Torvalds > > wrote: > >> > >> Something like this ENTIRELY UNTESTED patch. > > > > .. and let's actually attach the patch this time. > > That's odd. I got a "server error" from gmail. And again no attachment. > > Maybe THIS time. Sorry for the delay in testing this, but there was a need to upgrade my laptop, and bozo here figured "why not go to 64 bits while I am at it?" -- and then proceeded to learn the hard way that it is necessary to do "make mrproper" before doing a build in 64-bit mode. :-/ The kernel build system's way of telling you this at the moment is: arch/x86/built-in.o:(.rodata+0x4990): undefined reference to `stub32_sigaltstack' Anyway, with this patch, I see CPU stall warnings when running rcutorture as shown below. This is not a hard failure: [ 32.553647] rcu-torture: rtc: ffffffff836a57a0 ver: 131 tfle: 0 rta: 131 rtaf: 0 rtf: 93 rtmbe: 0 rtbke: 0 rtbre: 0 rtbf: 0 rtb: 0 nt: 27 onoff: 0/0:0/0 -1,0:-1,0 0:0 (HZ=1000) barrier: 6/7:0 Note the "ver: 131", which means that rcutorture successfully did 131 grace periods before the failure. It manages to offline a CPU subsequently, but then appears to hang while onlining it. Thanx, Paul [ 23.706051] INFO: rcu_preempt self-detected stall on CPU[ 23.707053] INFO: rcu_preempt self-detected stall on CPU [ 23.707053] 1: (20976 ticks this GP) idle=883/140000000000001/0 drain=5 . timer not pending [ 23.707053] (t=21000 jiffies g=85 c=84 q=6756) [ 23.707053] Pid: 606, comm: rcu_torture_rea Not tainted 3.8.0-rc7+ #2 [ 23.707053] Call Trace: [ 23.707053] [] rcu_pending+0x192/0x7a0 [ 23.707053] [] rcu_check_callbacks+0xbb/0x220 [ 23.707053] [] update_process_times+0x43/0x80 [ 23.707053] [] tick_sched_handle.isra.8+0x31/0x40 [ 23.707053] [] tick_sched_timer+0x47/0x70 [ 23.707053] [] __run_hrtimer+0x7c/0x240 [ 23.707053] [] ? tick_nohz_handler+0xa0/0xa0 [ 23.707053] [] ? ktime_get_update_offsets+0x47/0xd0 [ 23.707053] [] hrtimer_interrupt+0xf7/0x240 [ 23.707053] [] smp_apic_timer_interrupt+0x63/0xa0 [ 23.707053] [] apic_timer_interrupt+0x6a/0x70 [ 23.707053] [] ? _raw_spin_unlock_irq+0xd/0x40 [ 23.707053] [] __schedule+0x68a/0x790 [ 23.707053] [] schedule+0x24/0x70 [ 23.707053] [] rcu_torture_reader+0xd7/0x2d0 [ 23.707053] [] ? rcu_torture_reader+0x2d0/0x2d0 [ 23.707053] [] ? rcutorture_trace_dump+0x50/0x50 [ 23.707053] [] kthread+0xbb/0xc0 [ 23.707053] [] ? timer_cpu_notify+0x1e9/0x300 [ 23.707053] [] ? flush_kthread_worker+0xa0/0xa0 [ 23.707053] [] ret_from_fork+0x7c/0xb0 [ 23.707053] [] ? flush_kthread_worker+0xa0/0xa0 [ 23.706051] [ 23.706051] 0: (1 GPs behind) idle=429/140000000000001/0 drain=5 . timer not pending [ 23.706051] (t=21000 jiffies g=85 c=84 q=6756) [ 23.706051] Pid: 603, comm: rcu_torture_rea Not tainted 3.8.0-rc7+ #2 [ 23.706051] Call Trace: [ 23.706051] [] rcu_pending+0x192/0x7a0 [ 23.706051] [] rcu_check_callbacks+0xbb/0x220 [ 23.706051] [] update_process_times+0x43/0x80 [ 23.706051] [] tick_sched_handle.isra.8+0x31/0x40 [ 23.706051] [] tick_sched_timer+0x47/0x70 [ 23.706051] [] __run_hrtimer+0x7c/0x240 [ 23.706051] [] ? tick_nohz_handler+0xa0/0xa0 [ 23.706051] [] ? ktime_get_update_offsets+0x47/0xd0 [ 23.706051] [] hrtimer_interrupt+0xf7/0x240 [ 23.706051] [] smp_apic_timer_interrupt+0x63/0xa0 [ 23.706051] [] apic_timer_interrupt+0x6a/0x70 [ 23.706051] [] ? add_preempt_count+0x30/0x90 [ 23.706051] [] __schedule+0x3d/0x790 [ 23.706051] [] schedule+0x24/0x70 [ 23.706051] [] rcu_torture_reader+0xd7/0x2d0 [ 23.706051] [] ? rcu_torture_reader+0x2d0/0x2d0 [ 23.706051] [] ? rcutorture_trace_dump+0x50/0x50 [ 23.706051] [] kthread+0xbb/0xc0 [ 23.706051] [] ? timer_cpu_notify+0x1e9/0x300 [ 23.706051] [] ? flush_kthread_worker+0xa0/0xa0 [ 23.706051] [] ret_from_fork+0x7c/0xb0 [ 23.706051] [] ? flush_kthread_worker+0xa0/0xa0