Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp1267865ybl; Fri, 23 Aug 2019 16:33:50 -0700 (PDT) X-Google-Smtp-Source: APXvYqxZaI/R1aTjmF+qoYW69Rk1KdZV9g5gZEX07AdhrnNNHDMz3P90BaYKNNzTE+EHroAJdQ5A X-Received: by 2002:a17:902:e48d:: with SMTP id cj13mr7406448plb.177.1566603230702; Fri, 23 Aug 2019 16:33:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1566603230; cv=none; d=google.com; s=arc-20160816; b=YnUjOOrkvud+dSCTHtMcrWd9qBkTOJ7PrHcsFGfQRrDidX608688CgsWNZZXmgrf7h YFq00JHw6dpj5u2T+nzvFMCTe3xFytlYQUcZoQlFydOPi6RFX3Dip/S5lX2tcdCCcywx B+Z28rr3WHxG0LnrocJH8fynwN0OFc1AH7XHOzwHY7T6lpXU8t1HBogxtfO5MFzwLVrX mvEjiBm4qtJRqwo3cz9P/Eml7bkGst7+qbZt8DQqAwZGdPd8WhGJ2zQQ0qsz7iRPVXsA 44r77+Uy0fLrjFULEqFMEq0RBKk6WE5geUxWGBZRXKNjGQw3pvPYEQXNKuFgrof2siOr CurQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=mdEJvbzDtQ/Z4+F1txCf7jEhBop/wtmU5XY4UtQ8BEY=; b=C+BNDPjzXMfveyOHa/R24e7FODzOaEUxdr+JpxEsi4wYgRfXLTsPNuJ9Q0HY6BMXcs YLwdQD1cytcwtublX9/KiGbtIvKtJQCX86KjNoFj9cxNjh3aYhvPM4j7WnTOehmoOv0Y wUXLbtlcIVxbwi47aASwTXDU+9gMcTKWpw1LB4/hPhOd7T0v/sGdewYgMhE+MTZYFbly gm/lqZTJ5C7HZ0RHT/NL6pFl+izMRonPKdKUNgKKC5HHPf2ShdkyvhyWrtRvHIPer0tb sbpXmI6khXbemJmfFmoLn3DYC+h90/FnhXMa7jr74J0npQAp6QSeuRI5lyL+Txo/S/Bt 82ZQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n21si3464764pjt.33.2019.08.23.16.33.36; Fri, 23 Aug 2019 16:33:50 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2436701AbfHWQU0 (ORCPT + 99 others); Fri, 23 Aug 2019 12:20:26 -0400 Received: from Galois.linutronix.de ([193.142.43.55]:36216 "EHLO Galois.linutronix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389701AbfHWQU0 (ORCPT ); Fri, 23 Aug 2019 12:20:26 -0400 Received: from bigeasy by Galois.linutronix.de with local (Exim 4.80) (envelope-from ) id 1i1CIa-0005sk-7l; Fri, 23 Aug 2019 18:20:24 +0200 Date: Fri, 23 Aug 2019 18:20:24 +0200 From: Sebastian Andrzej Siewior To: Scott Wood Cc: linux-rt-users@vger.kernel.org, linux-kernel@vger.kernel.org, "Paul E . McKenney" , Joel Fernandes , Thomas Gleixner , Peter Zijlstra , Juri Lelli , Clark Williams Subject: Re: [PATCH RT v2 2/3] sched: migrate_enable: Use sleeping_lock to indicate involuntary sleep Message-ID: <20190823162024.47t7br6ecfclzgkw@linutronix.de> References: <20190821231906.4224-1-swood@redhat.com> <20190821231906.4224-3-swood@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <20190821231906.4224-3-swood@redhat.com> User-Agent: NeoMutt/20180716 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2019-08-21 18:19:05 [-0500], Scott Wood wrote: > Without this, rcu_note_context_switch() will complain if an RCU read > lock is held when migrate_enable() calls stop_one_cpu(). > > Signed-off-by: Scott Wood > --- > v2: Added comment. > > If my migrate disable changes aren't taken, then pin_current_cpu() > will also need to use sleeping_lock_inc() because calling > __read_rt_lock() bypasses the usual place it's done. > > include/linux/sched.h | 4 ++-- > kernel/rcu/tree_plugin.h | 2 +- > kernel/sched/core.c | 8 ++++++++ > 3 files changed, 11 insertions(+), 3 deletions(-) > > --- a/kernel/sched/core.c > +++ b/kernel/sched/core.c > @@ -7405,7 +7405,15 @@ void migrate_enable(void) > unpin_current_cpu(); > preempt_lazy_enable(); > preempt_enable(); > + > + /* > + * sleeping_lock_inc suppresses a debug check for > + * sleeping inside an RCU read side critical section > + */ > + sleeping_lock_inc(); > stop_one_cpu(task_cpu(p), migration_cpu_stop, &arg); > + sleeping_lock_dec(); this looks like an ugly hack. This sleeping_lock_inc() is used where we actually hold a sleeping lock and schedule() which is okay. But this would mean we hold a RCU lock and schedule() anyway. Is that okay? > + > return; > } > } Sebastian