Date: Tue, 25 Sep 2001 04:35:25 -0700 From: Julian Elischer <julian@elischer.org> To: Peter Wemm <peter@wemm.org> Cc: Matt Dillon <dillon@earth.backplane.com>, Ian Dowse <iedowse@maths.tcd.ie>, hackers@FreeBSD.ORG Subject: Re: Patch to test kstack usage. Message-ID: <3BB06BFD.F1870676@elischer.org> References: <20010925051923.6CA2F3808@overcee.netplex.com.au>
next in thread | previous in thread | raw e-mail | index | archive | help
Peter Wemm wrote: > > Matt Dillon wrote: > > This isn't perfect but it should be a good start in regards to > > testing kstack use. This patch is against -stable. It reports > > kernel stack use on process exit and will generate a 'Kernel stack > > underflow' message if it detects an underflow. It doesn't panic, > > so for a fun time you can leave UPAGES at 2 and watch in horror. > > It is checking against the wrong guard value. It should be u_guard2. > > FWIW; the max stack available is 4688 bytes on a standard 4.x system. Yes, > that is too freaking close. Also, the maximum usage depends on what sort > of cards you have in the system.. If you have a heavy tty user (eg: a 32+ > port serial card) then you have lots of tty interrupts nesting as well. > Having the ppp/sl/plip drivers in the system partly negates the effect of > this though since it wires the net/tty interrupt masks together. usb devices allocate 2K on the stack so if you have them too....... so does openning an atapi cdrom... so a combination of interrupts and those, might consume 4K > > peter@thunder[10:13pm]~-111> ./tu > stack base = 3504 > stack size = 4688 > peter@thunder[10:13pm]~-112> cat tu.c > #include <sys/param.h> > #include <sys/user.h> > #include <stdio.h> > #include <stddef.h> > > int > main(int ac, char **av) > { > int stack_base = offsetof(struct user, u_kproc); > > printf("stack base = %d\n", stack_base); > printf("stack size = %d\n", UPAGES * PAGE_SIZE - stack_base); > } > > > --- sys/user.h 1999/12/29 04:24:49 1.24 > > +++ sys/user.h 2001/09/25 03:41:04 > > @@ -109,9 +109,13 @@ > > * Remaining fields only for core dump and/or ptrace-- > > * not valid at other times! > > */ > > + u_int32_t u_guard2; /* guard the base of the kstack */ > > struct kinfo_proc u_kproc; /* proc + eproc */ > > struct md_coredump u_md; /* machine dependent glop */ > > + u_int32_t u_guard; /* guard the base of the kstack */ > > }; > > Cheers, > -Peter > -- > Peter Wemm - peter@FreeBSD.org; peter@yahoo-inc.com; peter@netplex.com.au > "All of this is for nothing if we don't go to the stars" - JMS/B5 -- +------------------------------------+ ______ _ __ | __--_|\ Julian Elischer | \ U \/ / hard at work in | / \ julian@elischer.org +------>x USA \ a very strange | ( OZ ) \___ ___ | country ! +- X_.---._/ presently in San Francisco \_/ \\ v To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3BB06BFD.F1870676>