[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <18295.1485811542@jrobl>
Date:   Tue, 31 Jan 2017 06:25:42 +0900
From:   "J. R. Okajima" <hooanon05g@...il.com>
To:     peterz@...radead.org
cc:     linux-kernel@...r.kernel.org, axboe@...com,
        darrick.wong@...cle.com, david@...morbit.com
Subject: Q: lockdep_assert_held_read() after downgrade_write()
Peter Zijlstra,
May I ask you a question?
v4.10-rc1 got a commit
	f831948 2016-11-30 locking/lockdep: Provide a type check for lock_is_held
I've tested a little and lockdep splat a stack trace.
{
	DECLARE_RWSEM(rw);
	static struct lock_class_key key;
	lockdep_set_class(&rw, &key);
	down_read(&rw);
	lockdep_assert_held_read(&rw);
	up_read(&rw);
	down_write(&rw);
	lockdep_assert_held_exclusive(&rw);
	up_write(&rw);
	downgrade_write(&rw);
	lockdep_assert_held_read(&rw);	<-- here
	up_read(&rw);
}
I was expecting that lockdep_assert_held_read() splat nothing after
downgrade_write(). Is this warning an intentional behaviour?
Also the final up_read() gives me a warning too. It is produced at
	lockdep.c:3514:lock_release(): DEBUG_LOCKS_WARN_ON(depth <= 0)
As an additional information, I increased some lockdep constants.
Do you think this is related?
include/linux/lockdep.h
+#define MAX_LOCKDEP_SUBCLASSES		(8UL + 4)
+#define MAX_LOCKDEP_KEYS_BITS		(13 + 3)
kernel/locking/lockdep_internals.h
+#define MAX_LOCKDEP_ENTRIES	(32768UL << 5)
+#define MAX_LOCKDEP_CHAINS_BITS	(16 + 5)
+#define MAX_STACK_TRACE_ENTRIES	(524288UL << 5)
J. R. Okajima
Powered by blists - more mailing lists
 
