This is the mail archive of the systemtap@sourceware.org mailing list for the systemtap project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

[Bug translator/11151] Leakage of stap_uprobes slots


------- Additional Comments From wcohen at redhat dot com  2010-01-12 20:26 -------
Created an attachment (id=4509)
 --> (http://sourceware.org/bugzilla/attachment.cgi?id=4509&action=view)
output of problem script with  -DDEBUG_UPROBES

The pr11151.log has the output from running the following commands in separate
windows:

stap -v -m x -k pytrace2.stp -DDEBUG_UPROBES >& /tmp/pr11151.log

and:

~/pyloop.sh

Unlike the debug output for the probed ls in comment #3, the pr11151.log 
doesn't appear to have the probes removed while the script is running. Only see
them removed in the systemtap_module_exit.

I am wondering when task finder reports that the shared library's memory is
being unmapped. If task_finder reports that the memory is being unmapped after
the unmap operation is complete then the instrumentation is going to have a
hard time changing the semaphore value and the entry will not be removed from
stap_uprobes. Reran with:

stap -v -m x -k pytrace2.stp -DDEBUG_UPROBES -DDEBUG_TASK_FINDER_VMA >&
/tmp/pr11151b.log

Looked for +mmap and -mmap in log.



__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7c21000
__stp_call_mmap_callbacks:581: pid 13229, a/l/o/p/path 0x7ffff7c21000  0x3b6000
 0x0  r-xp  /usr/lib64/libpython2.6.so.1.0
stap_uprobe_mmap_found:622: +mmap R-X pid 13229 path
/usr/lib64/libpython2.6.so.1.0 addr 00007ffff7c21000 length 3891200 offset
(null) stf ffffffffa039d1a0 ffffffffa039d1a0 path
/usr/lib64/libpython2.6.so.1.0
stap_uprobe_change_plus:494: +uprobe spec 0 idx 0 process python[13229] addr
00007ffff7cf8cc4 pp process("/usr/lib64/libpython2.6.so.1.0").statement(883908)

stap_uprobe_change_plus:494: +uprobe spec 1 idx 1 process python[13229] addr
00007ffff7cf9394 pp process("/usr/lib64/libpython2.6.so.1.0").statement(885652)

__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7c21000
__stp_call_mmap_callbacks:581: pid 13229, a/l/o/p/path 0x7ffff7c21000  0x3b6000
 0x0  r-xp  /usr/lib64/libpython2.6.so.1.0
_stp_tf_mmap_cb:50: mmap_cb: tsk 13229:13229 path
/usr/lib64/libpython2.6.so.1.0, addr 0x7ffff7c21000, length 0x003b6000, offset
0x0, flags 0x8000075
_stp_tf_mmap_cb:61: vm_cb: matched path /usr/lib64/libpython2.6.so.1.0 to
module (for sec: .dynamic)
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7f8e000
__stp_call_mmap_callbacks:581: pid 13229, a/l/o/p/path 0x7ffff7f8e000  0x3b000 
0x16d000  rw-p	/usr/lib64/libpython2.6.so.1.0
stap_uprobe_mmap_found:627: +mmap RW- pid 13229 path
/usr/lib64/libpython2.6.so.1.0 addr 00007ffff7f8e000 length 241664 offset
000000000016d000 stf ffffffffa039d1a0 ffffffffa039d1a0 path
/usr/lib64/libpython2.6.so.1.0
stap_uprobe_change_semaphore_plus:557: +semaphore 0x1 @ 0x7ffff7fc865c spec 0
idx 0 task 13229
stap_uprobe_change_semaphore_plus:557: +semaphore 0x1 @ 0x7ffff7fc865e spec 1
idx 1 task 13229
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7f8e000
__stp_call_mmap_callbacks:581: pid 13229, a/l/o/p/path 0x7ffff7f8e000  0x3b000 
0x16d000  rw-p	/usr/lib64/libpython2.6.so.1.0

Do not see matching -semaphore operations for the -mmap:

__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7fd7000), returned 0x0
stap_uprobe_munmap_found:636: -mmap pid 13229 addr 00007ffff7fd7000 length
154176 stf ffffffffa039d1a0 ffffffffa039d1a0 path
/usr/lib64/libpython2.6.so.1.0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7fd7000), returned 0x0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7bdb000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7bdb000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7ffc000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7ffc000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7ffc000), returned 0x0
stap_uprobe_munmap_found:636: -mmap pid 13229 addr 00007ffff7ffc000 length 4096
stf ffffffffa039d1a0 ffffffffa039d1a0 path /usr/lib64/libpython2.6.so.1.0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7ffc000), returned 0x0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7ffc000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7ffc000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7ffc000), returned 0x0
stap_uprobe_munmap_found:636: -mmap pid 13229 addr 00007ffff7ffc000 length 4096
stf ffffffffa039d1a0 ffffffffa039d1a0 path /usr/lib64/libpython2.6.so.1.0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7ffc000), returned 0x0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7ffb000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7ffb000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b9a000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b9a000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7ffb000), returned 0x0
stap_uprobe_munmap_found:636: -mmap pid 13229 addr 00007ffff7ffb000 length 4096
stf ffffffffa039d1a0 ffffffffa039d1a0 path /usr/lib64/libpython2.6.so.1.0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7ffb000), returned 0x0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7ffb000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7ffb000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7ffb000), returned 0x0
stap_uprobe_munmap_found:636: -mmap pid 13229 addr 00007ffff7ffb000 length 4096
stf ffffffffa039d1a0 ffffffffa039d1a0 path /usr/lib64/libpython2.6.so.1.0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7ffb000), returned 0x0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7ffb000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7ffb000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7ffb000), returned 0x0
stap_uprobe_munmap_found:636: -mmap pid 13229 addr 00007ffff7ffb000 length 4096
stf ffffffffa039d1a0 ffffffffa039d1a0 path /usr/lib64/libpython2.6.so.1.0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7ffb000), returned 0x0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7ffb000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7ffb000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7ffb000), returned 0x0
stap_uprobe_munmap_found:636: -mmap pid 13229 addr 00007ffff7ffb000 length 4096
stf ffffffffa039d1a0 ffffffffa039d1a0 path /usr/lib64/libpython2.6.so.1.0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7ffb000), returned 0x0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7ffb000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7ffb000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7ffb000), returned 0x0
stap_uprobe_munmap_found:636: -mmap pid 13229 addr 00007ffff7ffb000 length 4096
stf ffffffffa039d1a0 ffffffffa039d1a0 path /usr/lib64/libpython2.6.so.1.0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7ffb000), returned 0x0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7ffb000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7ffb000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7ffb000), returned 0x0
stap_uprobe_munmap_found:636: -mmap pid 13229 addr 00007ffff7ffb000 length 4096
stf ffffffffa039d1a0 ffffffffa039d1a0 path /usr/lib64/libpython2.6.so.1.0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7ffb000), returned 0x0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7ffb000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7ffb000
_stp_tf_exec_cb:28: tsk 13226:13226 , register_p: 0, process_p: 1
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7ffb000), returned 0x0
stap_uprobe_munmap_found:636: -mmap pid 13229 addr 00007ffff7ffb000 length 4096
stf ffffffffa039d1a0 ffffffffa039d1a0 path /usr/lib64/libpython2.6.so.1.0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7ffb000), returned 0x0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b69000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b69000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b68000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b68000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b68000), returned 0x0
stap_uprobe_munmap_found:636: -mmap pid 13229 addr 00007ffff7b68000 length 4096
stf ffffffffa039d1a0 ffffffffa039d1a0 path /usr/lib64/libpython2.6.so.1.0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b68000), returned 0x0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b68000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b68000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b68000), returned 0x0
stap_uprobe_munmap_found:636: -mmap pid 13229 addr 00007ffff7b68000 length 4096
stf ffffffffa039d1a0 ffffffffa039d1a0 path /usr/lib64/libpython2.6.so.1.0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b68000), returned 0x0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b68000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b68000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b68000), returned 0x0
stap_uprobe_munmap_found:636: -mmap pid 13229 addr 00007ffff7b68000 length 4096
stf ffffffffa039d1a0 ffffffffa039d1a0 path /usr/lib64/libpython2.6.so.1.0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b68000), returned 0x0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b28000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b28000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b27000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b27000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b27000), returned 0x0
stap_uprobe_munmap_found:636: -mmap pid 13229 addr 00007ffff7b27000 length 4096
stf ffffffffa039d1a0 ffffffffa039d1a0 path /usr/lib64/libpython2.6.so.1.0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b27000), returned 0x0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b27000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b27000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b27000), returned 0x0
stap_uprobe_munmap_found:636: -mmap pid 13229 addr 00007ffff7b27000 length 4096
stf ffffffffa039d1a0 ffffffffa039d1a0 path /usr/lib64/libpython2.6.so.1.0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b27000), returned 0x0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b27000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b27000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b27000), returned 0x0
stap_uprobe_munmap_found:636: -mmap pid 13229 addr 00007ffff7b27000 length 4096
stf ffffffffa039d1a0 ffffffffa039d1a0 path /usr/lib64/libpython2.6.so.1.0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b27000), returned 0x0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b27000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b27000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b27000), returned 0x0
stap_uprobe_munmap_found:636: -mmap pid 13229 addr 00007ffff7b27000 length 4096
stf ffffffffa039d1a0 ffffffffa039d1a0 path /usr/lib64/libpython2.6.so.1.0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b27000), returned 0x0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b27000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b27000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b27000), returned 0x0
stap_uprobe_munmap_found:636: -mmap pid 13229 addr 00007ffff7b27000 length 4096
stf ffffffffa039d1a0 ffffffffa039d1a0 path /usr/lib64/libpython2.6.so.1.0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b27000), returned 0x0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b27000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b27000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b26000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b26000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b26000), returned 0x0
stap_uprobe_munmap_found:636: -mmap pid 13229 addr 00007ffff7b26000 length 4096
stf ffffffffa039d1a0 ffffffffa039d1a0 path /usr/lib64/libpython2.6.so.1.0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b26000), returned 0x0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b27000), returned 0x0
stap_uprobe_munmap_found:636: -mmap pid 13229 addr 00007ffff7b27000 length 4096
stf ffffffffa039d1a0 ffffffffa039d1a0 path /usr/lib64/libpython2.6.so.1.0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b27000), returned 0x0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b27000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b27000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b27000), returned 0x0
stap_uprobe_munmap_found:636: -mmap pid 13229 addr 00007ffff7b27000 length 4096
stf ffffffffa039d1a0 ffffffffa039d1a0 path /usr/lib64/libpython2.6.so.1.0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b27000), returned 0x0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b27000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b27000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b27000), returned 0x0
stap_uprobe_munmap_found:636: -mmap pid 13229 addr 00007ffff7b27000 length 4096
stf ffffffffa039d1a0 ffffffffa039d1a0 path /usr/lib64/libpython2.6.so.1.0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b27000), returned 0x0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b27000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b27000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b27000), returned 0x0
stap_uprobe_munmap_found:636: -mmap pid 13229 addr 00007ffff7b27000 length 4096
stf ffffffffa039d1a0 ffffffffa039d1a0 path /usr/lib64/libpython2.6.so.1.0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b27000), returned 0x0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b27000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b27000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b27000), returned 0x0
stap_uprobe_munmap_found:636: -mmap pid 13229 addr 00007ffff7b27000 length 4096
stf ffffffffa039d1a0 ffffffffa039d1a0 path /usr/lib64/libpython2.6.so.1.0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b27000), returned 0x0


-- 


http://sourceware.org/bugzilla/show_bug.cgi?id=11151

------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]