From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1032872AbbKEImX (ORCPT ); Thu, 5 Nov 2015 03:42:23 -0500 Received: from mail-pa0-f46.google.com ([209.85.220.46]:33889 "EHLO mail-pa0-f46.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1032578AbbKEImS (ORCPT ); Thu, 5 Nov 2015 03:42:18 -0500 Date: Thu, 5 Nov 2015 14:12:14 +0530 From: Viresh Kumar To: Stephen Boyd Cc: Rafael Wysocki , mturquette@baylibre.com, linaro-kernel@lists.linaro.org, linux-pm@vger.kernel.org, Bartlomiej Zolnierkiewicz , Dan Carpenter , Dmitry Torokhov , Greg Kroah-Hartman , Len Brown , open list , Nishanth Menon , Pavel Machek Subject: Re: [PATCH] PM / OPP: Protect updates to list_dev with mutex Message-ID: <20151105084214.GC3773@ubuntu> References: <5f8fac4ad84716ef68fc50ab0b78e11ad2837524.1446205160.git.viresh.kumar@linaro.org> <20151030170604.GD19782@codeaurora.org> <20151031021409.GT3716@ubuntu> <20151102191435.GN19782@codeaurora.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20151102191435.GN19782@codeaurora.org> User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 02-11-15, 11:14, Stephen Boyd wrote: > On 10/31, Viresh Kumar wrote: > > I don't know what is wrong (or right) with my exynos 5250 board, but I > > didn't got any splat here even with the right config options (yes I > > should have mentioned that earlier). I have seen this at other times > > as well, while we were running after some cpufreq traces.. > > > > But, the case in hand is pretty straight forward and Mike T. did get a > > splat as that's what he told me. We are calling a sleep-able function > > from rcu_lock and that's obviously wrong. > > That's slightly concerning. Given that the bug is so straight > forward but we can't reproduce it doesn't instill a lot of > confidence that the patch is correct. Good that I spent some time debugging why I wasn't able to hit the lockdep. And that's because by default CONFIG_PREEMPT_RCU was selected on exynos and so the dummy function was getting enabled, and so no WARN. #if defined(CONFIG_PROVE_RCU) && !defined(CONFIG_PREEMPT_RCU) static inline void rcu_preempt_sleep_check(void) { RCU_LOCKDEP_WARN(lock_is_held(&rcu_lock_map), "Illegal context switch in RCU read-side critical section"); } #else /* #ifdef CONFIG_PROVE_RCU */ static inline void rcu_preempt_sleep_check(void) { } #endif /* #else #ifdef CONFIG_PROVE_RCU */ Whereas for omap, that's not the case :) So, with some config changes, I was able to hit the lockdep :) And just to confirm, they got fixed by the $Subject patch :) -- viresh