[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20100804195723.GA3553@srcf.ucam.org>
Date: Wed, 4 Aug 2010 20:57:23 +0100
From: Matthew Garrett <mjg59@...f.ucam.org>
To: david@...g.hm
Cc: "Paul E. McKenney" <paulmck@...ux.vnet.ibm.com>,
Arjan van de Ven <arjan@...radead.org>,
Arve Hjønnevåg <arve@...roid.com>,
linux-pm@...ts.linux-foundation.org, linux-kernel@...r.kernel.org,
pavel@....cz, florian@...kler.org, rjw@...k.pl,
stern@...land.harvard.edu, swetland@...gle.com,
peterz@...radead.org, tglx@...utronix.de, alan@...rguk.ukuu.org.uk
Subject: Re: Attempted summary of suspend-blockers LKML thread
On Wed, Aug 04, 2010 at 12:29:36PM -0700, david@...g.hm wrote:
> why would you trust it to take a wakelock, but not trust it the rest of
> the time?
Because I trust that when the application author says "I explicitly need
the machine to stay awake" that they mean it, whereas I don't trust the
application author to write an application that avoids consuming
background CPU. The distinction is pretty important.
> in my proposal I'm saying that if you would trust the application to take
> a wakelock, you instead trust it to be sane in the rest of it's power
> activity (avoiding polling, etc) and so you consider it for sleep
> decisions.
When we say "trust", we're not using the same meaning as we do with
security. Yes, it's possible that an application that can block suspend
will do so at inopportune times. But given that blocking suspend is an
explicit act it's much more likely that the developer will only use it
in reasonable ways, while it's still entirely plausible that the
application will generate unnecessary wakeups. Pretending otherwise is
unrealistic. I recently had to fix the fact that the kernel IPMI layer
would generate a constant 1000 wakeups a second even if it had an
interrupt-driven controller or was entirely idle.
>> The second is that the incoming network packet causes
>> the kernel to take a wakelock that will be released once userspace has
>> processed the network packet. This ensures that at least one wakelock is
>> held for the entire relevant period of time.
>
> how do you determine that userspace has processed the network packet so
> that the kernel can release the wakelock (or is this one of the cases
> where there is a timer related to the wakelock)
The current implementation uses a timer, but Rafael's implementation
should allow userspace to explicitly acknowledge it.
> two things here,
>
> on the dirty networks that I see as common, refusing to sleep if network
> packets are arriving will mean that you never go to sleep.
Cell networks typically have no background traffic, for obvious reasons.
> secondly, nothing stops the code doing the idle/suspend decision from
> considering network activity. I would be surprised if there weren't
> already options to support this today.
If you proxy every potential wakeup event through some central server
then this becomes much easier, but it's also a performance hit. The
alternative is that you poll for network activity, but that's a power
hit.
--
Matthew Garrett | mjg59@...f.ucam.org
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists