Hello, While running the srp tests from the blktests suite I encountered the below lockdep splat with kernel v4.18-rc8. Does this mean that downgrade+AF8-write() was called on a reader lock? Thanks, Bart. ------------+AFs- cut here +AF0------------- downgrading a read lock WARNING: CPU: 27 PID: 11664 at kernel/locking/lockdep.c:3647 lock+AF8-downgrade+-0x240/0x2d0 Modules linked in: ib+AF8-srp scsi+AF8-transport+AF8-srp rdma+AF8-rxe(-) ip6+AF8-udp+AF8-tunnel udp+AF8-tunnel null+AF8-blk dm+AF8-service+AF8-time ib+AF8-umad ib+AF8-uverbs mq+AF8-deadline kyber+AF8-iosched deadline+AF8-iosched cfq+AF8-iosched bfq scsi+AF8-dh+AF8-rdac scsi+AF8-dh+AF8-emc scsi+AF8-dh+AF8-alua dm+AF8-multipath dm+AF8-mod crct10dif+AF8-pclmul crc32+AF8-pclmul ghash+AF8-clmulni+AF8-intel pcbc aesni+AF8-intel aes+AF8-x86+AF8-64 crypto+AF8-simd cryptd joydev serio+AF8-raw glue+AF8-helper sg virtio+AF8-console virtio+AF8-balloon button af+AF8-packet ib+AF8-iser rdma+AF8-cm iw+AF8-cm ib+AF8-cm ib+AF8-core configfs iscsi+AF8-tcp libiscsi+AF8-tcp libiscsi scsi+AF8-transport+AF8-iscsi virtio+AF8-scsi virtio+AF8-blk virtio+AF8-rng rng+AF8-core ip+AF8-tables x+AF8-tables ipv6 autofs4 ext4 crc32c+AF8-generic crc16 mbcache jbd2 hid+AF8-generic usbhid sr+AF8-mod cdrom sd+AF8-mod virtio+AF8-net net+AF8-failover failover virtio+AF8-gpu drm+AF8-kms+AF8-helper syscopyarea sysfillrect sysimgblt fb+AF8-sys+AF8-fops ttm drm drm+AF8-panel+AF8-orientation+AF8-quirks sym53c8xx scsi+AF8-transport+AF8-spi uhci+AF8-hcd ahci libahci ehci+AF8-pci libata ehci+AF8-hcd psmouse intel+AF8-agp virtio+AF8-pci intel+AF8-gtt virtio+AF8-ring usbcore crc32c+AF8-intel scsi+AF8-mod atkbd usb+AF8-common agpgart virtio +AFs-last unloaded: scsi+AF8-debug+AF0- CPU: 27 PID: 11664 Comm: modprobe Not tainted 4.18.0-rc8-dbg+- +ACM-10 Hardware name: QEMU Standard PC (Q35 +- ICH9, 2009), BIOS 1.0.0-prebuilt.qemu-project.org 04/01/2014 RIP: 0010:lock+AF8-downgrade+-0x240/0x2d0 Code: 41 5c 41 5d 41 5e 41 5f 5d c3 48 8b 95 70 ff ff ff 4c 89 fe 48 89 df e8 0e bd ff ff eb 95 48 c7 c7 60 72 e6 81 e8 c0 11 f6 ff +ADw-0f+AD4- 0b 44 8b 7d 98 e9 11 ff ff ff e8 20 57 3c 00 85 c0 0f 84 71 ff RSP: 0018:ffff88010cdffcf0 EFLAGS: 00010086 RAX: dffffc0000000008 RBX: ffff880152514000 RCX: 0000000000000000 RDX: 0000000000000001 RSI: dffffc0000000000 RDI: ffffffff83509840 RBP: ffff88010cdffd98 R08: ffffed002b6dbcdf R09: ffffed002b6dbcdf R10: 0000000000000001 R11: ffffed002b6dbcde R12: 1ffff100219bffa2 R13: 0000000000000002 R14: ffff8801525148a8 R15: 0000000000000001 FS: 00007f5f0c700540(0000) GS:ffff88015b6c0000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ffd913ce398 CR3: 000000010af7d001 CR4: 00000000003606e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: downgrade+AF8-write+-0x20/0xd0 ib+AF8-unregister+AF8-device+-0x12d/0x270 +AFs-ib+AF8-core+AF0- rxe+AF8-unregister+AF8-device+-0x28/0x30 +AFs-rdma+AF8-rxe+AF0- rxe+AF8-remove+-0x12/0x30 +AFs-rdma+AF8-rxe+AF0- rxe+AF8-remove+AF8-all+-0xca/0x110 +AFs-rdma+AF8-rxe+AF0- rxe+AF8-module+AF8-exit+-0x9/0x24 +AFs-rdma+AF8-rxe+AF0- +AF8AXw-x64+AF8-sys+AF8-delete+AF8-module+-0x1c1/0x280 do+AF8-syscall+AF8-64+-0x77/0x230 entry+AF8-SYSCALL+AF8-64+AF8-after+AF8-hwframe+-0x49/0xbe RIP: 0033:0x7f5f0c2191b7 Code: 73 01 c3 48 8b 0d d1 8c 2c 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 b0 00 00 00 0f 05 +ADw-48+AD4- 3d 01 f0 ff ff 73 01 c3 48 8b 0d a1 8c 2c 00 f7 d8 64 89 01 48 RSP: 002b:00007ffd913d14c8 EFLAGS: 00000206 ORIG+AF8-RAX: 00000000000000b0 RAX: ffffffffffffffda RBX: 000055e889d8daf0 RCX: 00007f5f0c2191b7 RDX: 0000000000000000 RSI: 0000000000000800 RDI: 000055e889d8db58 RBP: 000055e889d8daf0 R08: 00007ffd913d0471 R09: 0000000000000000 R10: 00007f5f0c295cc0 R11: 0000000000000206 R12: 000055e889d8db58 R13: 0000000000000001 R14: 000055e889d8db58 R15: 00007ffd913d28b0 irq event stamp: 4250 hardirqs last enabled at (4249): +AFsAPA-ffffffff81972f8c+AD4AXQ- +AF8-raw+AF8-spin+AF8-unlock+AF8-irq+-0x2c/0x60 hardirqs last disabled at (4250): +AFsAPA-ffffffff81966b39+AD4AXQ- +AF8AXw-schedule+-0x109/0xfe0 softirqs last enabled at (4034): +AFsAPA-ffffffff817d78b0+AD4AXQ- peernet2id+-0x90/0xc0 softirqs last disabled at (4032): +AFsAPA-ffffffff817d7892+AD4AXQ- peernet2id+-0x72/0xc0 ---+AFs- end trace 88c9c9aa4dc78164 +AF0---- rdma+AF8-rxe: unloaded run blktests srp/010 at 2018-08-10 13:25:46