From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752195AbdKGIv3 (ORCPT ); Tue, 7 Nov 2017 03:51:29 -0500 Received: from merlin.infradead.org ([205.233.59.134]:55148 "EHLO merlin.infradead.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751783AbdKGIv2 (ORCPT ); Tue, 7 Nov 2017 03:51:28 -0500 Date: Tue, 7 Nov 2017 09:51:07 +0100 From: Peter Zijlstra To: Fengguang Wu Cc: Al Viro , linux-kernel@vger.kernel.org, Linus Torvalds , David Howells , Miklos Szeredi , lkp@01.org, Sasha Levin , Thomas Gleixner , Ingo Molnar , Byungchul Park , Paul McKenney Subject: Re: [d_alloc_parallel] WARNING: bad unlock balance detected! Message-ID: <20171107085107.GH3326@worktop> References: <20171107020113.52ws4cqhonhk2zvw@wfg-t540p.sh.intel.com> <20171107023328.GU21978@ZenIV.linux.org.uk> <20171107040329.yftf6ceduet4zaph@wfg-t540p.sh.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20171107040329.yftf6ceduet4zaph@wfg-t540p.sh.intel.com> User-Agent: Mutt/1.5.22.1 (2013-10-16) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Nov 07, 2017 at 12:03:29PM +0800, Fengguang Wu wrote: > >>[ 428.512005] e1000: eth0 NIC Link is Up 1000 Mbps Full Duplex, Flow Control: RX > >>LKP: HOSTNAME vm-lkp-wsx03-openwrt-i386-8, MAC , kernel 4.14.0-rc8 158, serial console /dev/ttyS0 > >>[ 429.798345] Kernel tests: Boot OK! > >>[ 430.761760] [ 430.766166] ===================================== > >>[ 430.775297] WARNING: bad unlock balance detected! > >>[ 430.784342] 4.14.0-rc8 #158 Not tainted > >>[ 430.792153] ------------------------------------- > >>[ 430.801319] pidof/1024 is trying to release lock (rcu_preempt_state) at: > >>[ 430.813514] [] rcu_read_unlock_special+0x5f8/0x620 > >>[ 430.824041] but there are no more locks to release! > > > >Er... yes? What of that? Since when is rcu_read_lock() not allowed to > >be used under an rwsem? That's not what it says, it is.. The warning is about trying to release a lock that's not held. And its right, RCU was doing that. It would acquire a lock without lockdep knowing about it and then telling lockdep about freeing it. This is fixed by commit: 02a7c234e540 ("rcu: Suppress lockdep false-positive ->boost_mtx complaints") The problem is that RCU boosting was mixing futex and !futex rt_mutex ops.