Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp1956251ybl; Thu, 9 Jan 2020 04:35:36 -0800 (PST) X-Google-Smtp-Source: APXvYqzPChiMkflkWLRLYEVmKfoQAh6LCUKVDdigg31Pqlj1twuBF7FyBWjCxo7inA3vVftsNWOa X-Received: by 2002:aca:d903:: with SMTP id q3mr2892910oig.12.1578573336804; Thu, 09 Jan 2020 04:35:36 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1578573336; cv=none; d=google.com; s=arc-20160816; b=wS0byw/z2ZjVWAtPRYHCzGH6g2wnejDt8BM4sOFZTi5xuFdJ/eGL3VhGl9RTxM32x/ FtMAvRF1ry/xwwiGt7dxtvroHyTm8/9dNMv/ZcD4hziouUBtKv3RZ0HlIJQYVmBvF+3P BUMijvw3fZsZTX6OLjnu8fiEj1mbp3srRFMG6TlmZojtxptgmimSfyIKPSLUenLeQuxU s30e+woNvfQIRzhrI+IDSctWnPrfskWHOZC41ADFZQ3pASsZxDhmY+ZCnM9P+GXQbvt5 LpwNPiDUdv+VGVpotqG8FuumSJNR2hXkVO7qrmM3Ma+ZXdEKOSrKPpDUBCRlAG9bRcnX BpXQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=dCNOcIvcdKs5VnegyeyX0voUYsS8MT1fv2QnGIGtFeg=; b=jXEUxq/3oSZufxk30017HYgclMnFMXqyDblSwzAXqhj2nCIh2VLyGRYtCoamcVZtGl Hj8nSk3sqIEPAC3yRyf21KDVsMtssCMj/aLcDTv7tzkvS6s5LzfnE7dxwsQ4NgFLeoWQ 11V4+V593jOJOcQuZiS4NtcRFXnPCSVHXnhBRJsP1f8EoVsZZXE+qEFqRr7NcC/5REON toz5IDvCGmQL/zX15ncxwL+mjbSTCNWv+OurNWOgILfHeWvmUXRRJdAaIXITz/u6oa4m VS/ApZE2tYYlHJBPlE2TJ+PIgllTSKOa1RvHFMoZDdnTguyY+Wus6yPgbNyzjrClxt1C 4PTQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=PXIZJXWg; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m90si4050891otc.259.2020.01.09.04.35.25; Thu, 09 Jan 2020 04:35:36 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=PXIZJXWg; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730488AbgAIK7h (ORCPT + 99 others); Thu, 9 Jan 2020 05:59:37 -0500 Received: from mail-qk1-f194.google.com ([209.85.222.194]:35001 "EHLO mail-qk1-f194.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728635AbgAIK7h (ORCPT ); Thu, 9 Jan 2020 05:59:37 -0500 Received: by mail-qk1-f194.google.com with SMTP id z76so5558174qka.2 for ; Thu, 09 Jan 2020 02:59:37 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=dCNOcIvcdKs5VnegyeyX0voUYsS8MT1fv2QnGIGtFeg=; b=PXIZJXWgB9pqyWBTYsCQeatEYlOikQeEY2u3jun0UEbnKKJjr4NnNjKXhN0t++c/k9 rrNyekbDvEj0z9SWw05LZ3nc1LeunA6+iNV4dQtAV0q5ijf/2Ko/QpfIkLNbkFdFPJnG scLo5fdzuNAeHRU78GoSa5uYRjFLF3oHqrRnecdB8JYHlWUwkZRAS6LLq0E3N3M53ZKg 0+oCwW+s2kdo6mG6pd2Amdas9nyYlA5MTehIi4eAlsxawfSB5Hkt6HajPMf1cn71qEI6 KrtVDzQdjayB+dNoXdUdFoKSOWGKw3/2Lh2IHscwRIwS/voDXKAHvdLn+gSvMF52yxbx GaFA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=dCNOcIvcdKs5VnegyeyX0voUYsS8MT1fv2QnGIGtFeg=; b=LO5TAdKYidEFxXSUwot2HFXb2Ic+CGcYGTVThysG7XWqmeqDvUfB5zt0cB3tueST+s 7KaxRDuOIT8C8zt371A9jUCuswvVYpNL/G8kJ9cZrAHXkM0zWgt3t8e+YqIKB4WfanTm WDj58/3213YXRAAisuLnhEnc3+WgrxtcRturyWviGR48BueVgCVA2AhPx8uv93b1fITX AstVu0l2ZCjfhxCXROU6NLNnn/+iFQyX1UXJsU8RqjruUaHKdS6SPNSd/nhhB6PqmFnN Y7I8tC4sOo79WzvstRHpqiNhh4ldG4elmTQoixr1sU0kXQLLjo0Cyyjzku/6b/wKZUPU KuWQ== X-Gm-Message-State: APjAAAVtHA7qhlLcgQUTOKOJSBpvmUTIcCwmkVBWpPCkpO03QUJUwtRk vhXC+wbd5Xo+GDMeaPZDJLp7hJk8+UJ9XK0ZPuUbKQ== X-Received: by 2002:a37:5841:: with SMTP id m62mr8705070qkb.256.1578567576238; Thu, 09 Jan 2020 02:59:36 -0800 (PST) MIME-Version: 1.0 References: <0000000000007523a60576e80a47@google.com> <20180928070042.GF3439@hirez.programming.kicks-ass.net> In-Reply-To: From: Dmitry Vyukov Date: Thu, 9 Jan 2020 11:59:25 +0100 Message-ID: Subject: Re: BUG: MAX_LOCKDEP_CHAINS too low! To: Peter Zijlstra Cc: syzbot , Ingo Molnar , Will Deacon , LKML , syzkaller-bugs , Thomas Gleixner Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Sep 28, 2018 at 9:56 AM Dmitry Vyukov wrote: > >> > Hello, > >> > > >> > syzbot found the following crash on: > >> > > >> > HEAD commit: c307aaf3eb47 Merge tag 'iommu-fixes-v4.19-rc5' of git://gi.. > >> > git tree: upstream > >> > console output: https://syzkaller.appspot.com/x/log.txt?x=13810df1400000 > >> > kernel config: https://syzkaller.appspot.com/x/.config?x=dfb440e26f0a6f6f > >> > dashboard link: https://syzkaller.appspot.com/bug?extid=aaa6fa4949cc5d9b7b25 > >> > compiler: gcc (GCC) 8.0.1 20180413 (experimental) > >> > > >> > Unfortunately, I don't have any reproducer for this crash yet. > >> > > >> > IMPORTANT: if you fix the bug, please add the following tag to the commit: > >> > Reported-by: syzbot+aaa6fa4949cc5d9b7b25@syzkaller.appspotmail.com > >> > >> +LOCKDEP maintainers, > >> > >> What does this BUG mean? And how should it be fixed? > >> > >> Thanks > >> > >> > BUG: MAX_LOCKDEP_CHAINS too low! > > > > Is the his result of endlessly loading and unloading modules? > > > > In which case, the fix is: don't do that then. > > No modules involved, we don't have any modules in the image. Must be > something else. > Perhaps syzkaller just produced a workload so diverse that nobody ever produced. Peter, Ingo, This really plagues syzbot testing for more than a year now. These four: BUG: MAX_LOCKDEP_KEYS too low! https://syzkaller.appspot.com/bug?id=8a18efe79140782a88dcd098808d6ab20ed740cc BUG: MAX_LOCKDEP_ENTRIES too low! https://syzkaller.appspot.com/bug?id=3d97ba93fb3566000c1c59691ea427370d33ea1b BUG: MAX_LOCKDEP_CHAINS too low! https://syzkaller.appspot.com/bug?id=bf037f4725d40a8d350b2b1b3b3e0947c6efae85 BUG: MAX_LOCKDEP_CHAIN_HLOCKS too low! https://syzkaller.appspot.com/bug?id=381cb436fe60dc03d7fd2a092b46d7f09542a72a Now running testing I only see a stream of different lockdep bugs mostly: 2020/01/09 11:41:51 vm-13: crash: BUG: MAX_LOCKDEP_ENTRIES too low! 2020/01/09 11:43:09 vm-9: crash: INFO: task hung in register_netdevice_notifier 2020/01/09 11:44:00 vm-26: crash: no output from test machine 2020/01/09 11:44:11 vm-8: crash: BUG: MAX_LOCKDEP_ENTRIES too low! 2020/01/09 11:44:28 vm-19: crash: BUG: MAX_LOCKDEP_ENTRIES too low! 2020/01/09 11:46:20 vm-27: crash: BUG: MAX_LOCKDEP_ENTRIES too low! 2020/01/09 11:46:41 vm-15: crash: BUG: MAX_LOCKDEP_CHAIN_HLOCKS too low! 2020/01/09 11:46:45 vm-28: crash: BUG: MAX_LOCKDEP_ENTRIES too low! 2020/01/09 11:46:47 vm-29: crash: BUG: MAX_LOCKDEP_CHAIN_HLOCKS too low! 2020/01/09 11:46:49 vm-22: crash: BUG: MAX_LOCKDEP_ENTRIES too low! 2020/01/09 11:46:50 vm-10: crash: no output from test machine 2020/01/09 11:46:52 vm-18: crash: BUG: MAX_LOCKDEP_CHAIN_HLOCKS too low! 2020/01/09 11:46:53 vm-23: crash: BUG: MAX_LOCKDEP_CHAIN_HLOCKS too low! 2020/01/09 11:47:17 vm-20: crash: lost connection to test machine 2020/01/09 11:47:48 vm-5: crash: BUG: MAX_LOCKDEP_CHAIN_HLOCKS too low! 2020/01/09 11:47:56 vm-14: crash: WARNING in restore_regulatory_settings 2020/01/09 11:48:19 vm-2: crash: BUG: MAX_LOCKDEP_ENTRIES too low! 2020/01/09 11:48:21 vm-7: crash: BUG: MAX_LOCKDEP_ENTRIES too low! 2020/01/09 11:48:22 vm-3: crash: BUG: MAX_LOCKDEP_CHAIN_HLOCKS too low! 2020/01/09 11:48:40 vm-25: crash: BUG: MAX_LOCKDEP_CHAINS too low! Should we just bump the limits there? Or are there some ID leaks in lockdep? syzbot has a bunch of very simple reproducers for these bugs, so not really a maximally diverse load. And I think I saw these bugs massively when testing just a single subsystem too, e.g. netfilter.