Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp882837pxj; Fri, 14 May 2021 19:43:39 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzoKPkgBQxzk+2eiF8NOTyJeXEfHJPIipH/29Cck6JDrz6Eu2TbYV4alx97uia1gF29r/Pd X-Received: by 2002:a05:6402:341:: with SMTP id r1mr59272986edw.113.1621046618996; Fri, 14 May 2021 19:43:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1621046618; cv=none; d=google.com; s=arc-20160816; b=c/PyvL15Fj0lq02axDtUATMqJehDmw/2fOLqWRMoFXCAaNJv6u28H7TtyIS8bV60TC gaDymPRa3/mb6Qj/q2PDq/VLHVXpIF5qZ07YICAHOmSKmcgnCgYe92CPdXkQWzpE1q87 ouJPAnUu71+1p0FMTTsLZxvobB46fNSKIhC1uYOY+17qfROLgzvldsa0C3xozaFbZPps RQ+Qqwf1toGZzklg8RWR1cjzZecgBp5lAJH0Gpbr6iTtI6DYGjGy9llhRy6nKMWckIKe mvrVFhBkNJg2QwqT72hlYOgmczQ+p/H4TmBhVXnNhYttGE+Up6nPX/kp1P77XhlJQqiw rpSg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=ztGwtkClYq/XcQyKgT3xML1LB9nF2UCEN0JVRUxhmao=; b=K6O+2YFq9SpWBaxCAJ+LETZkmDIJS3lPZXjUaEai6vtUk/fr2hdHLOX2IHGaMvM+Mg E+gW2s8VAOGw/GMs8BN8vO2u6ImI5lnoUKRsA4e8KD3A3m7yHZl6llwcZjH957UYOCH3 mik/7Bq0GvjNYkaoSV2mB6MnwemdPP62TmYK9bL1ny0vwHEo0KkUB5FPthaFMgTPeM+j /LqjUibxZTRx74HqxiABmj1dzkLHZauGwZxRhCLNBz/+zPKmdevP0fhaw1qpKXHuFChG zIr6AdRcAzTc6655Uzdija3w0Ca8TFvc8XYQAI41jWzJL1nF09mC5HvNZvtOSZpKnO56 MycA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b16si1902623ede.392.2021.05.14.19.43.16; Fri, 14 May 2021 19:43:38 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234079AbhENWmb (ORCPT + 99 others); Fri, 14 May 2021 18:42:31 -0400 Received: from www262.sakura.ne.jp ([202.181.97.72]:52592 "EHLO www262.sakura.ne.jp" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232876AbhENWma (ORCPT ); Fri, 14 May 2021 18:42:30 -0400 Received: from fsav107.sakura.ne.jp (fsav107.sakura.ne.jp [27.133.134.234]) by www262.sakura.ne.jp (8.15.2/8.15.2) with ESMTP id 14EMf6PJ096996; Sat, 15 May 2021 07:41:06 +0900 (JST) (envelope-from penguin-kernel@i-love.sakura.ne.jp) Received: from www262.sakura.ne.jp (202.181.97.72) by fsav107.sakura.ne.jp (F-Secure/fsigk_smtp/550/fsav107.sakura.ne.jp); Sat, 15 May 2021 07:41:06 +0900 (JST) X-Virus-Status: clean(F-Secure/fsigk_smtp/550/fsav107.sakura.ne.jp) Received: from [192.168.1.9] (M106072142033.v4.enabler.ne.jp [106.72.142.33]) (authenticated bits=0) by www262.sakura.ne.jp (8.15.2/8.15.2) with ESMTPSA id 14EMf67u096993 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NO); Sat, 15 May 2021 07:41:06 +0900 (JST) (envelope-from penguin-kernel@i-love.sakura.ne.jp) Subject: Re: PATCH: Re: LOCKDEP customizable numbers upper limit To: hooanon05g@gmail.com Cc: linux-kernel@vger.kernel.org, peterz@infradead.org References: <30795.1620913191@jrobl> <19935.1621016564@jrobl> From: Tetsuo Handa Message-ID: <11faf952-c0f8-6e1d-3560-12d77847a8ac@i-love.sakura.ne.jp> Date: Sat, 15 May 2021 07:41:02 +0900 User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:78.0) Gecko/20100101 Thunderbird/78.10.1 MIME-Version: 1.0 In-Reply-To: <19935.1621016564@jrobl> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2021/05/15 3:22, hooanon05g@gmail.com wrote: > Tetsuo Handa: >> Please submit a patch that avoids only BUILD_BUG_ON(). > > Here it is. Thank you. In practice, nobody will increase by more than 5 bits. Acked-by: Tetsuo Handa > > J. R. Okajima > > ---------------------------------------- > commit 43e103e1a5975c61334811d16e207e6d0ac57b77 > Author: J. R. Okajima > Date: Sat May 15 03:17:10 2021 +0900 > > LOCKDEP: upper limit LOCKDEP_CHAINS_BITS > > CONFIG_LOCKDEP_CHAINS_BITS value decides the size of chain_hlocks[] in > kernel/locking/lockdep.c, and it is checked by add_chain_cache() with > BUILD_BUG_ON((1UL << 24) <= ARRAY_SIZE(chain_hlocks)); > This patch is just to silence BUILD_BUG_ON(). > > See-also: https://marc.info/?l=linux-kernel&m=162091320503900&w=2 > Cc: Tetsuo Handa > Cc: Peter Zijlstra > Signed-off-by: J. R. Okajima > > diff --git a/lib/Kconfig.debug b/lib/Kconfig.debug > index 678c13967580e..999ed5aa6bcee 100644 > --- a/lib/Kconfig.debug > +++ b/lib/Kconfig.debug > @@ -1390,7 +1390,7 @@ config LOCKDEP_BITS > config LOCKDEP_CHAINS_BITS > int "Bitsize for MAX_LOCKDEP_CHAINS" > depends on LOCKDEP && !LOCKDEP_SMALL > - range 10 30 > + range 10 21 > default 16 > help > Try increasing this value if you hit "BUG: MAX_LOCKDEP_CHAINS too low!" message. >