Received: by 2002:a05:6358:7058:b0:131:369:b2a3 with SMTP id 24csp8856570rwp; Wed, 19 Jul 2023 17:01:20 -0700 (PDT) X-Google-Smtp-Source: APBJJlEw8P+l5P+cgep6f7pAC/ao4E02WcoZyaRiljvHf7bqjgqS1GZcBhSVOMWGEDIj7eXB/SIY X-Received: by 2002:a17:906:7c0f:b0:993:fe68:569d with SMTP id t15-20020a1709067c0f00b00993fe68569dmr3214083ejo.17.1689811279783; Wed, 19 Jul 2023 17:01:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1689811279; cv=none; d=google.com; s=arc-20160816; b=nSzieymAqSjXwZ2GI8EvpfIPr8blwrKmoJ5rpb9qgKRlrIif3dU5aAxzucasEeWjLP VzPas2ajbG2eKFbmFwunH8ZNNoGG0vlmVmCZCvruVFsw9pBR70lEtzg5SNhhUtgPYRzm HwnJbnoS+g+M04bskbw7K7wook2Ou7LH+MbxHnkUkbM9w7Rr94dWxm6NLyNse6BT8BSa hMtIvTif48BtHfdwKZ5MObiL2CG7Gk6kd8+lqGgQa+g4eiAfpTmSTzzVmDOEJvvF8t8I lb48xwufDO2iOHbUkGmODY7bM4jqw5Z6KFPw9CLPXR6zAWahEEEJR8TCYbY9+Ok8SLQ9 XDSg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=Nv/ldtKjDTibjQW3eyA2kcleXUSKgRZCn9wh06TqQxw=; fh=bhLa+xm/jT1+oC64xCma+oX7uHmLqAgxDvgouD9BXMc=; b=racKmB/qHJ/WH3QBRxfCRM+RgCIGJ1poly4DkUiAxpUz/IZKihwFHhBoTZ/WU/YP0f GP8BR7Y4fFpI3mC5E/WT/C+TLcN12uGAiEIavX+lBp/nkrHDPbhzi/zaOv6+BCrl80F6 fmFQ4kIbfNlTh3VOxEaQvMwvrUFdggTSZz1YES969Efee4Kb5lJPOYrd/sV1wGRgiTjQ ETzIgNYLy785+pyyDGLBbxq6eQ6K2pVoYzG5II5fn98ZPENYZinBjdl4mnXzwHKGnFr9 7gHQ7LNavfsCnuwijfQZKyQx78U4rxdHBpV4wapxONrXgtI+MvRc1QjEXomASjwXIeB7 2IPA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id lh17-20020a170906f8d100b0098d6097599esi3731213ejb.872.2023.07.19.17.00.52; Wed, 19 Jul 2023 17:01:19 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230180AbjGSXMg (ORCPT + 99 others); Wed, 19 Jul 2023 19:12:36 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:59844 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229571AbjGSXMf (ORCPT ); Wed, 19 Jul 2023 19:12:35 -0400 Received: from Chamillionaire.breakpoint.cc (Chamillionaire.breakpoint.cc [IPv6:2a0a:51c0:0:237:300::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 7FC401701; Wed, 19 Jul 2023 16:12:34 -0700 (PDT) Received: from fw by Chamillionaire.breakpoint.cc with local (Exim 4.92) (envelope-from ) id 1qMGL1-0003Yx-B2; Thu, 20 Jul 2023 01:12:07 +0200 Date: Thu, 20 Jul 2023 01:12:07 +0200 From: Florian Westphal To: Aleksandr Nogikh Cc: syzbot , dsterba@suse.cz, bakmitopiacibubur@boga.indosterling.com, clm@fb.com, davem@davemloft.net, dsahern@kernel.org, dsterba@suse.com, fw@strlen.de, gregkh@linuxfoundation.org, jirislaby@kernel.org, josef@toxicpanda.com, kadlec@netfilter.org, kuba@kernel.org, linux-btrfs@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, linux-serial@vger.kernel.org, linux@armlinux.org.uk, netdev@vger.kernel.org, netfilter-devel@vger.kernel.org, pablo@netfilter.org, syzkaller-bugs@googlegroups.com, yoshfuji@linux-ipv6.org Subject: Re: [syzbot] [btrfs?] [netfilter?] BUG: MAX_LOCKDEP_CHAIN_HLOCKS too low! (2) Message-ID: <20230719231207.GF32192@breakpoint.cc> References: <20230719170446.GR20457@twin.jikos.cz> <00000000000042a3ac0600da1f69@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) X-Spam-Status: No, score=-4.1 required=5.0 tests=BAYES_00,PLING_QUERY, RCVD_IN_DNSWL_MED,SPF_HELO_PASS,SPF_PASS,T_SCC_BODY_TEXT_LINE, URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Aleksandr Nogikh wrote: > On Wed, Jul 19, 2023 at 7:11 PM syzbot > wrote: > > > > > On Wed, Jul 19, 2023 at 02:32:51AM -0700, syzbot wrote: > > >> syzbot has found a reproducer for the following issue on: > > >> > > >> HEAD commit: e40939bbfc68 Merge branch 'for-next/core' into for-kernelci > > >> git tree: git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci > > >> console output: https://syzkaller.appspot.com/x/log.txt?x=15d92aaaa80000 > > >> kernel config: https://syzkaller.appspot.com/x/.config?x=c4a2640e4213bc2f > > >> dashboard link: https://syzkaller.appspot.com/bug?extid=9bbbacfbf1e04d5221f7 > > >> compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 > > >> userspace arch: arm64 > > >> syz repro: https://syzkaller.appspot.com/x/repro.syz?x=149b2d66a80000 > > >> C reproducer: https://syzkaller.appspot.com/x/repro.c?x=1214348aa80000 > > >> > > >> Downloadable assets: > > >> disk image: https://storage.googleapis.com/syzbot-assets/9d87aa312c0e/disk-e40939bb.raw.xz > > >> vmlinux: https://storage.googleapis.com/syzbot-assets/22a11d32a8b2/vmlinux-e40939bb.xz > > >> kernel image: https://storage.googleapis.com/syzbot-assets/0978b5788b52/Image-e40939bb.gz.xz > > > > > > #syz unset btrfs > > > > The following labels did not exist: btrfs > > #syz set subsystems: netfilter I don't see any netfilter involvement here. The repro just creates a massive amount of team devices. At the time it hits the LOCKDEP limits on my test vm it has created ~2k team devices, system load is at +14 because udev is also busy spawing hotplug scripts for the new devices. After reboot and suspending the running reproducer after about 1500 devices (before hitting lockdep limits), followed by 'ip link del' for the team devices gets the lockdep entries down to ~8k (from 40k), which is in the range that it has on this VM after a fresh boot. So as far as I can see this workload is just pushing lockdep past what it can handle with the configured settings and is not triggering any actual bug.