Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754140AbYHEHbl (ORCPT ); Tue, 5 Aug 2008 03:31:41 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1752802AbYHEHZB (ORCPT ); Tue, 5 Aug 2008 03:25:01 -0400 Received: from casper.infradead.org ([85.118.1.10]:43292 "EHLO casper.infradead.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751142AbYHEHZA (ORCPT ); Tue, 5 Aug 2008 03:25:00 -0400 Subject: Re: [PATCH RFC] pm_qos_requirement might sleep From: Peter Zijlstra To: John Kacur Cc: LKML , rt-users , Steven Rostedt , Ingo Molnar , Thomas Gleixner , mark gross , arjan In-Reply-To: <520f0cf10808041352h78bd4319x1802f018aeffe6dc@mail.gmail.com> References: <520f0cf10808041352h78bd4319x1802f018aeffe6dc@mail.gmail.com> Content-Type: text/plain Date: Tue, 05 Aug 2008 09:25:01 +0200 Message-Id: <1217921101.3589.98.camel@twins> Mime-Version: 1.0 X-Mailer: Evolution 2.22.3.1 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2733 Lines: 69 On Mon, 2008-08-04 at 22:52 +0200, John Kacur wrote: > Even after applying some fixes posted by Chirag and Peter Z, I'm still > getting some messages in my log like this > BUG: sleeping function called from invalid context swapper(0) at > kernel/rtmutex.c:743 > in_atomic():1 [00000001], irqs_disabled():1 > Pid: 0, comm: swapper Tainted: G W 2.6.26.1-rt1.jk #2 > > Call Trace: > [] __might_sleep+0x12d/0x132 > [] __rt_spin_lock+0x34/0x7d > [] rt_spin_lock+0xe/0x10 > [] pm_qos_requirement+0x1f/0x3c > [] menu_select+0x7b/0x9c > [] ? default_idle+0x0/0x5a > [] ? default_idle+0x0/0x5a > [] cpuidle_idle_call+0x68/0xd8 > [] ? cpuidle_idle_call+0x0/0xd8 > [] ? default_idle+0x0/0x5a > [] cpu_idle+0xb2/0x12d > [] start_secondary+0x186/0x18b > > --------------------------- > | preempt count: 00000001 ] > | 1-level deep critical section nesting: > ---------------------------------------- > ... [] .... cpu_idle+0x11b/0x12d > ......[] .. ( <= start_secondary+0x186/0x18b) > > The following simple patch makes the messages disappear - however, > there may be a better more fine grained solution, but the problem is > also that all the functions are designed to use the same lock. Hmm, I think you're right - its called from the idle routine so we can't go about sleeping there. The only trouble I have is with kernel/pm_qos_params.c:update_target()'s use of this lock - that is decidedly not O(1). Mark, would it be possible to split that lock in two, one lock protecting pm_qos_array[], and one lock protecting the requirements.list ? [ NOTE: this is the -rt kernel we're talking about ] > Signed-off-by: John Kacur > > Index: linux-2.6.26.1-jk-rt1/kernel/pm_qos_params.c > =================================================================== > --- linux-2.6.26.1-jk-rt1.orig/kernel/pm_qos_params.c > +++ linux-2.6.26.1-jk-rt1/kernel/pm_qos_params.c > @@ -110,7 +110,7 @@ static struct pm_qos_object *pm_qos_arra > &network_throughput_pm_qos > }; > > -static DEFINE_SPINLOCK(pm_qos_lock); > +static DEFINE_RAW_SPINLOCK(pm_qos_lock); > > static ssize_t pm_qos_power_write(struct file *filp, const char > __user *buf, > size_t count, loff_t *f_pos); > -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/