On Tuesday 03 December 2002 13:01, Takashi Iwai wrote:
> At Tue, 3 Dec 2002 04:07:52 +0100,
>
> Duncan Sands wrote:
> > Got this with today 2.5 BK tree:
> >
> > Debug: sleeping function called from illegal context at
> > include/asm/semaphore.h:119 Call Trace:
> >  [<c0113f1a>] __might_sleep+0x52/0x58
> >  [<c024291a>] snd_cs46xx_iec958_put+0x36/0xf8
> >  [<c0217f28>] snd_ctl_elem_write+0xe0/0x1a4
> >  [<c0218360>] snd_ctl_ioctl+0x184/0x2c8
> >  [<c01462e6>] sys_ioctl+0x1fa/0x244
> >  [<c01088f7>] syscall_call+0x7/0xb
>
> ouch, we are using rwlock in the control ioctls.
>
> mutex is necessary for many controls, so we cannot suppress the use of
> mutex in control callbacks.
> but temporary unlocking looks ad-hoc, too...

If I understand right, the problem is that snd_ctl_elem_write
acquires control_rwlock, which is a rw spinlock.  It then calls
snd_cs46xx_iec958_put which acquires chip->spos_mutex,
which is a semaphore.  Thus the message.  Now I deduce
from the fact that  you don't use read_lock_irqsave that the
data structure is not read from interrupt context.  That means
you are only protecting against other CPUs.  So why not use
a semaphore instead of a spinlock?

All the best,

Duncan.


-------------------------------------------------------
This SF.net email is sponsored by: Get the new Palm Tungsten T 
handheld. Power & Color in a compact size! 
http://ads.sourceforge.net/cgi-bin/redirect.pl?palm0002en
_______________________________________________
Alsa-devel mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/alsa-devel

Reply via email to