Received: by 2002:a05:6358:7058:b0:131:369:b2a3 with SMTP id 24csp9038669rwp; Wed, 19 Jul 2023 21:15:51 -0700 (PDT) X-Google-Smtp-Source: APBJJlEFTmG5gaSMTcZYiRhezsDpvOJY91OYevODkM/HoT/oFJqp1DjUuKkcyr9cnVCkffu2bM09 X-Received: by 2002:a17:906:224b:b0:994:555a:e49f with SMTP id 11-20020a170906224b00b00994555ae49fmr4608702ejr.31.1689826551439; Wed, 19 Jul 2023 21:15:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1689826551; cv=none; d=google.com; s=arc-20160816; b=WVaEkSniCxfR3T75mUWgTBID/jcTUh48RjmSPJPS6haCbg6xdKEq98/1cFFi/GcdC7 KdaGW3+yWJHTV7re7G4+SQ4Oan9zs4S20eUISOHYUessX3NkcWiO7nY4GUYNkPKeCEPa WvUnuRimXC3TmpeukYysU8WjEeKFgziJXIhozt0VT+isoSY20/bsEOFXKU9M5yvvOETu 6CqmDZAQw//iUCMazRs+qzwxKRbjwJacIS+aVP32fIKvpUMxfmZktcma9ihw/3Zep8GV EvvQvRDPInXIFFovMg+1jCXSWEf1ykDIcNR29OgXPQuprfXGlmEohVop8dCIWseo+7nm dQgg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date :dkim-signature; bh=C+m9gMkROjZMfSbrQQU0XPIP/V8wJAwqTqaOzLLEb4E=; fh=vv8sMujhD4H61PC5L9W3dGFTa5gxacrCinsWiHOTCsk=; b=xWo9vZuX9tJbfj/GJ+C/LGhxr2ms2Wa9kDA89bzcXFMrsL0IJEnJY2AzhTLaDsQ3+n zgJgTwjGijTy4vWm3rM4EuByWiFfpUe772fSEPcz8h6WingMjWBa+EFy00CTtv7DCEll rOtBK9cZaaAmUE79ne10k9IWYXLa61JPxRbMmQ81lt4Pb/5rYV02qBWvWMngD74UGnyV I7Kq50EceQhoLz90v4Vg5sZlWm++5xO+ymdB1jh6Jm6QfYVczCBD4GLqIRRu+9DMOu1L UUhRpC2QVeXpfVpO+v3HhqzFl+lk6gV+g12dqQm4Bv7i18cVkpGG/SjhWTkJ71ADqkvv duJA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=DLP0S+lH; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id f7-20020a170906824700b00991cbb3d4a6si83560ejx.115.2023.07.19.21.15.27; Wed, 19 Jul 2023 21:15:51 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=DLP0S+lH; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229891AbjGTDaf (ORCPT + 99 others); Wed, 19 Jul 2023 23:30:35 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44682 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229451AbjGTDae (ORCPT ); Wed, 19 Jul 2023 23:30:34 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 56CB41B9; Wed, 19 Jul 2023 20:30:33 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id B222F6126D; Thu, 20 Jul 2023 03:30:32 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 3F35FC433C8; Thu, 20 Jul 2023 03:30:31 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1689823832; bh=OnSRL/M/dbuk991nGBrfC0/pCCMwx2qMx5t/Th8WDY4=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=DLP0S+lHKonruVV95NGNwFLFr5aWNx45vINgAd1CVjDbI/PxvcmUv57niu5feAGkY AWElUA7x+ISFrYGq/jkvkfn4q6t04zKRia/WReyo9T88T6CNd+m2heMlul2896iWth JguL4emjfN7RreQNklhpOSKt4TGwUgNqssc7rhrAOqGdUy0Ixax1p0M54pRFVuyGwE i7dgQlwm0YcCQHmSiMSik+TgPhgoWfrExGhO4xVhNqw1sBDlfaokr/47tixTw3D+mM IrJc2AQzdNVRpO4QDu4TdwbOA4T2hESliP6LNvOgpqRdMk7YriQ3UqnC9d8w085jmB EIvkZAqeEpKSg== Date: Wed, 19 Jul 2023 20:30:30 -0700 From: Jakub Kicinski To: netdev@vger.kernel.org Cc: Florian Westphal , Aleksandr Nogikh , syzbot , dsterba@suse.cz, bakmitopiacibubur@boga.indosterling.com, clm@fb.com, davem@davemloft.net, dsahern@kernel.org, dsterba@suse.com, gregkh@linuxfoundation.org, jirislaby@kernel.org, josef@toxicpanda.com, kadlec@netfilter.org, linux-btrfs@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, linux-serial@vger.kernel.org, linux@armlinux.org.uk, netfilter-devel@vger.kernel.org, pablo@netfilter.org, syzkaller-bugs@googlegroups.com Subject: Re: [syzbot] [btrfs?] [netfilter?] BUG: MAX_LOCKDEP_CHAIN_HLOCKS too low! (2) Message-ID: <20230719203030.1296596a@kernel.org> In-Reply-To: <20230719231207.GF32192@breakpoint.cc> References: <20230719170446.GR20457@twin.jikos.cz> <00000000000042a3ac0600da1f69@google.com> <20230719231207.GF32192@breakpoint.cc> MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,PLING_QUERY, RCVD_IN_DNSWL_BLOCKED,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 20 Jul 2023 01:12:07 +0200 Florian Westphal wrote: > I don't see any netfilter involvement here. > > The repro just creates a massive amount of team devices. > > At the time it hits the LOCKDEP limits on my test vm it has > created ~2k team devices, system load is at +14 because udev > is also busy spawing hotplug scripts for the new devices. > > After reboot and suspending the running reproducer after about 1500 > devices (before hitting lockdep limits), followed by 'ip link del' for > the team devices gets the lockdep entries down to ~8k (from 40k), > which is in the range that it has on this VM after a fresh boot. > > So as far as I can see this workload is just pushing lockdep > past what it can handle with the configured settings and is > not triggering any actual bug. The lockdep splat because of netdevice stacking is one of our top reports from syzbot. Is anyone else feeling like we should add an artificial but very high limit on netdev stacking? :(