* WARN in do_rt_tgsigqueueinfo() @ 2014-05-15 13:38 Peter Zijlstra 2014-05-15 14:27 ` Mateusz Guzik 0 siblings, 1 reply; 8+ messages in thread From: Peter Zijlstra @ 2014-05-15 13:38 UTC (permalink / raw) To: Oleg Nesterov; +Cc: Thomas Gleixner, linux-kernel [-- Attachment #1: Type: text/plain, Size: 1511 bytes --] Hi Thomas, Oleg, trinity$ MALLOC_CHECK_=0 ./trinity -xinit_module -xreboot -xshutdown -xunshare -xnfsservctl -xclock_nanosleep -xuselib -xumount -xmount -m --quiet -C 400 -l off -xmremap [watchdog] kernel became tainted! (512/0) Last seed was 4072360471 [15908.562512] ------------[ cut here ]------------ [15908.567245] WARNING: CPU: 22 PID: 3312 at /usr/src/linux-2.6/kernel/signal.c:3060 do_rt_tgsigqueueinfo+0xb4/0xc0() [15908.577715] Modules linked in: [15908.580857] CPU: 22 PID: 3312 Comm: trinity-c198 Not tainted 3.15.0-rc5-01700-g505011124ad0-dirty #1070 [15908.590412] Hardware name: Supermicro X8DTN/X8DTN, BIOS 4.6.3 01/08/2010 [15908.597228] 0000000000000009 ffff880428715e40 ffffffff81682052 0000000000000000 [15908.604834] ffff880428715e78 ffffffff8109808c 0000000000000001 000000000000ffff [15908.612402] 00000000efdcefbf 00000000efdcefbf 0000000000000129 ffff880428715e88 [15908.619941] Call Trace: [15908.622423] [<ffffffff81682052>] dump_stack+0x4e/0x7a [15908.627600] [<ffffffff8109808c>] warn_slowpath_common+0x8c/0xc0 [15908.633658] [<ffffffff810980da>] warn_slowpath_null+0x1a/0x20 [15908.639535] [<ffffffff810a9914>] do_rt_tgsigqueueinfo+0xb4/0xc0 [15908.645591] [<ffffffff810a99f1>] SYSC_rt_tgsigqueueinfo+0x61/0x80 [15908.651851] [<ffffffff810abb2e>] SyS_rt_tgsigqueueinfo+0xe/0x10 [15908.657946] [<ffffffff8168a842>] system_call_fastpath+0x16/0x1b [15908.664036] ---[ end trace 02450728e2526283 ]--- This is apparently a very common thing to hit according to google. [-- Attachment #2: Type: application/pgp-signature, Size: 836 bytes --] ^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: WARN in do_rt_tgsigqueueinfo() 2014-05-15 13:38 WARN in do_rt_tgsigqueueinfo() Peter Zijlstra @ 2014-05-15 14:27 ` Mateusz Guzik 2014-05-15 15:04 ` Peter Zijlstra 0 siblings, 1 reply; 8+ messages in thread From: Mateusz Guzik @ 2014-05-15 14:27 UTC (permalink / raw) To: Peter Zijlstra; +Cc: Oleg Nesterov, Thomas Gleixner, linux-kernel On Thu, May 15, 2014 at 03:38:34PM +0200, Peter Zijlstra wrote: > Hi Thomas, Oleg, > > > trinity$ MALLOC_CHECK_=0 ./trinity -xinit_module -xreboot -xshutdown -xunshare -xnfsservctl -xclock_nanosleep -xuselib -xumount -xmount -m --quiet -C 400 -l off -xmremap > > [watchdog] kernel became tainted! (512/0) Last seed was 4072360471 > > [15908.562512] ------------[ cut here ]------------ > [15908.567245] WARNING: CPU: 22 PID: 3312 at /usr/src/linux-2.6/kernel/signal.c:3060 do_rt_tgsigqueueinfo+0xb4/0xc0() > [15908.577715] Modules linked in: > [15908.580857] CPU: 22 PID: 3312 Comm: trinity-c198 Not tainted 3.15.0-rc5-01700-g505011124ad0-dirty #1070 > [15908.590412] Hardware name: Supermicro X8DTN/X8DTN, BIOS 4.6.3 01/08/2010 > [15908.597228] 0000000000000009 ffff880428715e40 ffffffff81682052 0000000000000000 > [15908.604834] ffff880428715e78 ffffffff8109808c 0000000000000001 000000000000ffff > [15908.612402] 00000000efdcefbf 00000000efdcefbf 0000000000000129 ffff880428715e88 > [15908.619941] Call Trace: > [15908.622423] [<ffffffff81682052>] dump_stack+0x4e/0x7a > [15908.627600] [<ffffffff8109808c>] warn_slowpath_common+0x8c/0xc0 > [15908.633658] [<ffffffff810980da>] warn_slowpath_null+0x1a/0x20 > [15908.639535] [<ffffffff810a9914>] do_rt_tgsigqueueinfo+0xb4/0xc0 > [15908.645591] [<ffffffff810a99f1>] SYSC_rt_tgsigqueueinfo+0x61/0x80 > [15908.651851] [<ffffffff810abb2e>] SyS_rt_tgsigqueueinfo+0xe/0x10 > [15908.657946] [<ffffffff8168a842>] system_call_fastpath+0x16/0x1b > [15908.664036] ---[ end trace 02450728e2526283 ]--- > > > This is apparently a very common thing to hit according to google. Well, it warns about an argument received from userland, so nothing fishy going on as far as kernel consistency is concerned if that's what you mean. -- Mateusz Guzik ^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: WARN in do_rt_tgsigqueueinfo() 2014-05-15 14:27 ` Mateusz Guzik @ 2014-05-15 15:04 ` Peter Zijlstra 2014-05-15 15:54 ` Dave Jones 0 siblings, 1 reply; 8+ messages in thread From: Peter Zijlstra @ 2014-05-15 15:04 UTC (permalink / raw) To: Mateusz Guzik; +Cc: Oleg Nesterov, Thomas Gleixner, linux-kernel [-- Attachment #1: Type: text/plain, Size: 2048 bytes --] On Thu, May 15, 2014 at 04:27:24PM +0200, Mateusz Guzik wrote: > On Thu, May 15, 2014 at 03:38:34PM +0200, Peter Zijlstra wrote: > > Hi Thomas, Oleg, > > > > > > trinity$ MALLOC_CHECK_=0 ./trinity -xinit_module -xreboot -xshutdown -xunshare -xnfsservctl -xclock_nanosleep -xuselib -xumount -xmount -m --quiet -C 400 -l off -xmremap > > > > [watchdog] kernel became tainted! (512/0) Last seed was 4072360471 > > > > [15908.562512] ------------[ cut here ]------------ > > [15908.567245] WARNING: CPU: 22 PID: 3312 at /usr/src/linux-2.6/kernel/signal.c:3060 do_rt_tgsigqueueinfo+0xb4/0xc0() > > [15908.577715] Modules linked in: > > [15908.580857] CPU: 22 PID: 3312 Comm: trinity-c198 Not tainted 3.15.0-rc5-01700-g505011124ad0-dirty #1070 > > [15908.590412] Hardware name: Supermicro X8DTN/X8DTN, BIOS 4.6.3 01/08/2010 > > [15908.597228] 0000000000000009 ffff880428715e40 ffffffff81682052 0000000000000000 > > [15908.604834] ffff880428715e78 ffffffff8109808c 0000000000000001 000000000000ffff > > [15908.612402] 00000000efdcefbf 00000000efdcefbf 0000000000000129 ffff880428715e88 > > [15908.619941] Call Trace: > > [15908.622423] [<ffffffff81682052>] dump_stack+0x4e/0x7a > > [15908.627600] [<ffffffff8109808c>] warn_slowpath_common+0x8c/0xc0 > > [15908.633658] [<ffffffff810980da>] warn_slowpath_null+0x1a/0x20 > > [15908.639535] [<ffffffff810a9914>] do_rt_tgsigqueueinfo+0xb4/0xc0 > > [15908.645591] [<ffffffff810a99f1>] SYSC_rt_tgsigqueueinfo+0x61/0x80 > > [15908.651851] [<ffffffff810abb2e>] SyS_rt_tgsigqueueinfo+0xe/0x10 > > [15908.657946] [<ffffffff8168a842>] system_call_fastpath+0x16/0x1b > > [15908.664036] ---[ end trace 02450728e2526283 ]--- > > > > > > This is apparently a very common thing to hit according to google. > > Well, it warns about an argument received from userland, so nothing fishy > going on as far as kernel consistency is concerned if that's what you mean. I hadn't looked that far.. I just manged to hit it two times in a row while waiting for my bug to trigger. [-- Attachment #2: Type: application/pgp-signature, Size: 836 bytes --] ^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: WARN in do_rt_tgsigqueueinfo() 2014-05-15 15:04 ` Peter Zijlstra @ 2014-05-15 15:54 ` Dave Jones 2014-05-15 15:56 ` Peter Zijlstra ` (2 more replies) 0 siblings, 3 replies; 8+ messages in thread From: Dave Jones @ 2014-05-15 15:54 UTC (permalink / raw) To: Peter Zijlstra Cc: Mateusz Guzik, Oleg Nesterov, Thomas Gleixner, linux-kernel On Thu, May 15, 2014 at 05:04:12PM +0200, Peter Zijlstra wrote: > > > trinity$ MALLOC_CHECK_=0 ./trinity -xinit_module -xreboot -xshutdown -xunshare -xnfsservctl -xclock_nanosleep -xuselib -xumount -xmount -m --quiet -C 400 -l off -xmremap > > > > > > [watchdog] kernel became tainted! (512/0) Last seed was 4072360471 > > > > > > [15908.562512] ------------[ cut here ]------------ > > > [15908.567245] WARNING: CPU: 22 PID: 3312 at /usr/src/linux-2.6/kernel/signal.c:3060 do_rt_tgsigqueueinfo+0xb4/0xc0() > > > > > > This is apparently a very common thing to hit according to google. > > > > Well, it warns about an argument received from userland, so nothing fishy > > going on as far as kernel consistency is concerned if that's what you mean. > > I hadn't looked that far.. I just manged to hit it two times in a row > while waiting for my bug to trigger. There's a ton of 'noise' like this that fuzzing turns up. I've been collecting some of the stuff to shut it up.. http://codemonkey.org.uk/junk/silence-fuzz-testing-noise.patch http://codemonkey.org.uk/junk/silence-noisy-deprecated-warnings-while-fuzzing.patch I'm of the opinion that a user-triggerable WARN is a bug, but aparently not everyone else feels that way. Dave ^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: WARN in do_rt_tgsigqueueinfo() 2014-05-15 15:54 ` Dave Jones @ 2014-05-15 15:56 ` Peter Zijlstra 2014-05-15 16:09 ` Mateusz Guzik 2014-05-15 16:46 ` Thomas Gleixner 2 siblings, 0 replies; 8+ messages in thread From: Peter Zijlstra @ 2014-05-15 15:56 UTC (permalink / raw) To: Dave Jones, Mateusz Guzik, Oleg Nesterov, Thomas Gleixner, linux-kernel [-- Attachment #1: Type: text/plain, Size: 473 bytes --] On Thu, May 15, 2014 at 11:54:15AM -0400, Dave Jones wrote: > There's a ton of 'noise' like this that fuzzing turns up. > I've been collecting some of the stuff to shut it up.. > > http://codemonkey.org.uk/junk/silence-fuzz-testing-noise.patch > http://codemonkey.org.uk/junk/silence-noisy-deprecated-warnings-while-fuzzing.patch > > I'm of the opinion that a user-triggerable WARN is a bug, but aparently > not everyone else feels that way. Awesome, thanks! [-- Attachment #2: Type: application/pgp-signature, Size: 836 bytes --] ^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: WARN in do_rt_tgsigqueueinfo() 2014-05-15 15:54 ` Dave Jones 2014-05-15 15:56 ` Peter Zijlstra @ 2014-05-15 16:09 ` Mateusz Guzik 2014-05-15 18:04 ` Oleg Nesterov 2014-05-15 16:46 ` Thomas Gleixner 2 siblings, 1 reply; 8+ messages in thread From: Mateusz Guzik @ 2014-05-15 16:09 UTC (permalink / raw) To: Dave Jones, Peter Zijlstra, Oleg Nesterov, Thomas Gleixner, linux-kernel On Thu, May 15, 2014 at 11:54:15AM -0400, Dave Jones wrote: > On Thu, May 15, 2014 at 05:04:12PM +0200, Peter Zijlstra wrote: > > > > > trinity$ MALLOC_CHECK_=0 ./trinity -xinit_module -xreboot -xshutdown -xunshare -xnfsservctl -xclock_nanosleep -xuselib -xumount -xmount -m --quiet -C 400 -l off -xmremap > > > > > > > > [watchdog] kernel became tainted! (512/0) Last seed was 4072360471 > > > > > > > > [15908.562512] ------------[ cut here ]------------ > > > > [15908.567245] WARNING: CPU: 22 PID: 3312 at /usr/src/linux-2.6/kernel/signal.c:3060 do_rt_tgsigqueueinfo+0xb4/0xc0() > > > > > > > > This is apparently a very common thing to hit according to google. > > > > > > Well, it warns about an argument received from userland, so nothing fishy > > > going on as far as kernel consistency is concerned if that's what you mean. > > > > I hadn't looked that far.. I just manged to hit it two times in a row > > while waiting for my bug to trigger. > > There's a ton of 'noise' like this that fuzzing turns up. > I've been collecting some of the stuff to shut it up.. > > http://codemonkey.org.uk/junk/silence-fuzz-testing-noise.patch > http://codemonkey.org.uk/junk/silence-noisy-deprecated-warnings-while-fuzzing.patch > > I'm of the opinion that a user-triggerable WARN is a bug, but aparently > not everyone else feels that way. > imho warning sysadmins about userspace using deprecated stuff is fine as long as users are not able to spam the console with it. Warning reported here just looks scary and provides no information for sysadmins so I guess it hould be changed. I see no value in removing this stuff. If it shows up in production you most likely want to know. Filtering this out during fuzzing should be an issue. my $0,03 -- Mateusz Guzik ^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: WARN in do_rt_tgsigqueueinfo() 2014-05-15 16:09 ` Mateusz Guzik @ 2014-05-15 18:04 ` Oleg Nesterov 0 siblings, 0 replies; 8+ messages in thread From: Oleg Nesterov @ 2014-05-15 18:04 UTC (permalink / raw) To: Mateusz Guzik; +Cc: Dave Jones, Peter Zijlstra, Thomas Gleixner, linux-kernel On 05/15, Mateusz Guzik wrote: > > On Thu, May 15, 2014 at 11:54:15AM -0400, Dave Jones wrote: > > > > I'm of the opinion that a user-triggerable WARN is a bug, but aparently > > not everyone else feels that way. I didn't really like this WARN_ONCE() when I looked at the patch which added it, but I didn't try to argue. > imho warning sysadmins about userspace using deprecated stuff is fine as > long as users are not able to spam the console with it. Agreed, > Warning reported here just looks scary and provides no information for > sysadmins so I guess it hould be changed. Again, agreed. So imo we should either remove it, ot turn it into pr_warn_once("something meaningful"); Oleg. ^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: WARN in do_rt_tgsigqueueinfo() 2014-05-15 15:54 ` Dave Jones 2014-05-15 15:56 ` Peter Zijlstra 2014-05-15 16:09 ` Mateusz Guzik @ 2014-05-15 16:46 ` Thomas Gleixner 2 siblings, 0 replies; 8+ messages in thread From: Thomas Gleixner @ 2014-05-15 16:46 UTC (permalink / raw) To: Dave Jones; +Cc: Peter Zijlstra, Mateusz Guzik, Oleg Nesterov, linux-kernel On Thu, 15 May 2014, Dave Jones wrote: > On Thu, May 15, 2014 at 05:04:12PM +0200, Peter Zijlstra wrote: > > > > > trinity$ MALLOC_CHECK_=0 ./trinity -xinit_module -xreboot -xshutdown -xunshare -xnfsservctl -xclock_nanosleep -xuselib -xumount -xmount -m --quiet -C 400 -l off -xmremap > > > > > > > > [watchdog] kernel became tainted! (512/0) Last seed was 4072360471 > > > > > > > > [15908.562512] ------------[ cut here ]------------ > > > > [15908.567245] WARNING: CPU: 22 PID: 3312 at /usr/src/linux-2.6/kernel/signal.c:3060 do_rt_tgsigqueueinfo+0xb4/0xc0() > > > > > > > > This is apparently a very common thing to hit according to google. > > > > > > Well, it warns about an argument received from userland, so nothing fishy > > > going on as far as kernel consistency is concerned if that's what you mean. > > > > I hadn't looked that far.. I just manged to hit it two times in a row > > while waiting for my bug to trigger. > > There's a ton of 'noise' like this that fuzzing turns up. > I've been collecting some of the stuff to shut it up.. > > http://codemonkey.org.uk/junk/silence-fuzz-testing-noise.patch > http://codemonkey.org.uk/junk/silence-noisy-deprecated-warnings-while-fuzzing.patch > > I'm of the opinion that a user-triggerable WARN is a bug, but aparently > not everyone else feels that way. I agree. It returns -EPERM which is the right answer Thanks, tglx ^ permalink raw reply [flat|nested] 8+ messages in thread
end of thread, other threads:[~2014-05-15 18:04 UTC | newest] Thread overview: 8+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2014-05-15 13:38 WARN in do_rt_tgsigqueueinfo() Peter Zijlstra 2014-05-15 14:27 ` Mateusz Guzik 2014-05-15 15:04 ` Peter Zijlstra 2014-05-15 15:54 ` Dave Jones 2014-05-15 15:56 ` Peter Zijlstra 2014-05-15 16:09 ` Mateusz Guzik 2014-05-15 18:04 ` Oleg Nesterov 2014-05-15 16:46 ` Thomas Gleixner
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox