Date: Fri, 22 May 2009 09:31:44 +0200 From: Thomas Backman <serenity@exscape.org> To: Mel Flynn <mel.flynn+fbsd.current@mailing.thruhere.net> Cc: freebsd-current@freebsd.org Subject: Re: DTrace panic while probing syscall::open (and possibly many others) Message-ID: <44F486FA-E798-448D-BE31-F7A51EF1F612@exscape.org> In-Reply-To: <200905212129.47892.mel.flynn%2Bfbsd.current@mailing.thruhere.net> References: <949B5884-5303-4EFF-AC7D-293640FFA012@exscape.org> <0C235698-3ED2-4AE9-A7D1-5DC56D8324A4@exscape.org> <200905212129.47892.mel.flynn%2Bfbsd.current@mailing.thruhere.net>
next in thread | previous in thread | raw e-mail | index | archive | help
On May 21, 2009, at 09:29 PM, Mel Flynn wrote:
> On Thursday 21 May 2009 18:53:56 Thomas Backman wrote:
>> On May 13, 2009, at 03:19 PM, Thomas Backman wrote:
>
> <snip electrons>
>
>>> #11 0xffffffff8123c200 in dtrace_copycheck
>>> (uaddr=3D18446744071581326184, kaddr=3DVariable "kaddr" is not =20
>>> available.
>>> ) at dtrace_isa.c:527
>
>> In /sys/cddl/dev/dtrace/amd64/dtrace_isa.c:
>> static int
>> dtrace_copycheck(uintptr_t uaddr, uintptr_t kaddr, size_t size)
>> {
>> printf("in dtrace_copycheck(), pre-ASSERT:\n");
>> printf("kaddr =3D %u, kernelbase =3D %u, size =3D %d, kaddr+size =
=3D %u\n
>> \n",
>> (unsigned int)kaddr, (unsigned int)kernelbase, (unsigned
>> int)size, (unsigned int)(kaddr+size));
>> ASSERT(kaddr >=3D kernelbase && kaddr + size >=3D kaddr);
>>
>> if (uaddr + size >=3D kernelbase || uaddr + size < uaddr) {
>> ...
>>
>> So, I added two printf statements. What happens? IT BECOMES STABLE.
>
> I'm no kernel hacker, but.. if you apply the patch below, does it =20
> still panic?
> Make sure to get rid of the printf() you added.
>
> The theory behind this patch is that kernbase isn't initialized at =20
> the time of
> that assert, yet code from printf initializes it.
>
> --- dtrace_isa.c.orig 2009-05-21 21:18:54.000000000 +0200
> +++ dtrace_isa.c 2009-05-21 21:23:40.000000000 +0200
> @@ -40,7 +40,8 @@
> #include <vm/vm_param.h>
> #include <vm/pmap.h>
>
> -extern uintptr_t kernbase;
> +//extern uintptr_t kernbase;
> +static uintptr_t kernbase =3D KERNBASE;
> uintptr_t kernelbase =3D (uintptr_t) &kernbase;
>
> #define INKERNEL(va) (((vm_offset_t)(va)) >=3D USRSTACK && \
Hmmmmm. Nope, still panics with your patch, unfortunately. So I =20
reverted to my hack, but that doesn't work anymore, either! I did a =20
full buildworld/buildkernel yesterday, WITHOUT csup'ing before, so the =20=
source should have stayed the same.
Now I get this:
# dtrace -n 'syscall::open:entry { trace(copyinstr(arg0)); }'
dtrace: description 'syscall::open:entry ' matched 1 probe
CPU ID FUNCTION:NAME
0 38977 open:entry
0 1 2 3 4 5 6 7 8 9 a b c d e f =20
0123456789abcdef
0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =20
00 ................
10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =20
00 ................
[...snip...]
dtrace: error on enabled probe ID 1 (ID 38977: syscall::open:entry): =20
invalid address (0xffffff803e9afae0) in action #1 at DIF offset 28
dtrace: error on enabled probe ID 1 (ID 38977: syscall::open:entry): =20
invalid address (0xffffff803e9afae0) in action #1 at DIF offset 28
dtrace: error on enabled probe ID 1 (ID 38977: syscall::open:entry): =20
invalid address (0xffffff803e9afae0) in action #1 at DIF offset 28
Same error using opensnoop and/or printing and copying in =20
in :::return, so something happened with the kernel (modules):
dtrace: error on enabled probe ID 3 (ID 38978: syscall::open:return): =20=
invalid address (0xffffff803e9faae0) in action #10 at DIF offset 28
710400 1970 Jan 1 01:00:00 0 1370 5509120 =20
2 vnstat\0
718047 1970 Jan 1 01:00:00 0 1370 5509120 =20
0 vnstat\0
dtrace: error on enabled probe ID 3 (ID 38978: syscall::open:return): =20=
invalid address (0xffffff803e9afae0) in action #10 at DIF offset 28
dtrace: error on enabled probe ID 3 (ID 38978: syscall::open:return): =20=
invalid address (0xffffff803e9afae0) in action #10 at DIF offset 28
742667 1970 Jan 1 01:00:00 0 1370 46927872 2 =20
=EF=BF=BD;=EF=BF=BD=EF=BF=BD=EF=BF=BD=EF=BF=BD=EF=BF=BDX=C4=BB =
vnstat\0
750430 1970 Jan 1 01:00:00 0 1370 46927872 0 =20
=EF=BF=BD;=EF=BF=BD=EF=BF=BD=EF=BF=BD=EF=BF=BD=EF=BF=BDX=C4=BB =
vnstat\0
(If this appears broken, beyond a few characters, that's because it IS =20=
on my screen as well.)
The address (0xffffff803e9afae0) changes without restarting dtrace, =20
but it appears fairly constant.
-----------
Now, after reinstalling the modules and rebooting (rather than =20
kldunload dtraceall && make install && kldload dtraceall), it works =20
with my ugly hack again. Weird. Since it's all modules, why would it =20
not work to unload, recompile and reload?
Regards,
Thomas=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?44F486FA-E798-448D-BE31-F7A51EF1F612>
