This is the mail archive of the
systemtap@sourceware.org
mailing list for the systemtap project.
[Bug translator/11151] Leakage of stap_uprobes slots
- From: "wcohen at redhat dot com" <sourceware-bugzilla at sourceware dot org>
- To: systemtap at sources dot redhat dot com
- Date: 12 Jan 2010 20:26:20 -0000
- Subject: [Bug translator/11151] Leakage of stap_uprobes slots
- References: <20100108221421.11151.wcohen@redhat.com>
- Reply-to: sourceware-bugzilla at sourceware dot org
------- Additional Comments From wcohen at redhat dot com 2010-01-12 20:26 -------
Created an attachment (id=4509)
--> (http://sourceware.org/bugzilla/attachment.cgi?id=4509&action=view)
output of problem script with -DDEBUG_UPROBES
The pr11151.log has the output from running the following commands in separate
windows:
stap -v -m x -k pytrace2.stp -DDEBUG_UPROBES >& /tmp/pr11151.log
and:
~/pyloop.sh
Unlike the debug output for the probed ls in comment #3, the pr11151.log
doesn't appear to have the probes removed while the script is running. Only see
them removed in the systemtap_module_exit.
I am wondering when task finder reports that the shared library's memory is
being unmapped. If task_finder reports that the memory is being unmapped after
the unmap operation is complete then the instrumentation is going to have a
hard time changing the semaphore value and the entry will not be removed from
stap_uprobes. Reran with:
stap -v -m x -k pytrace2.stp -DDEBUG_UPROBES -DDEBUG_TASK_FINDER_VMA >&
/tmp/pr11151b.log
Looked for +mmap and -mmap in log.
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7c21000
__stp_call_mmap_callbacks:581: pid 13229, a/l/o/p/path 0x7ffff7c21000 0x3b6000
0x0 r-xp /usr/lib64/libpython2.6.so.1.0
stap_uprobe_mmap_found:622: +mmap R-X pid 13229 path
/usr/lib64/libpython2.6.so.1.0 addr 00007ffff7c21000 length 3891200 offset
(null) stf ffffffffa039d1a0 ffffffffa039d1a0 path
/usr/lib64/libpython2.6.so.1.0
stap_uprobe_change_plus:494: +uprobe spec 0 idx 0 process python[13229] addr
00007ffff7cf8cc4 pp process("/usr/lib64/libpython2.6.so.1.0").statement(883908)
stap_uprobe_change_plus:494: +uprobe spec 1 idx 1 process python[13229] addr
00007ffff7cf9394 pp process("/usr/lib64/libpython2.6.so.1.0").statement(885652)
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7c21000
__stp_call_mmap_callbacks:581: pid 13229, a/l/o/p/path 0x7ffff7c21000 0x3b6000
0x0 r-xp /usr/lib64/libpython2.6.so.1.0
_stp_tf_mmap_cb:50: mmap_cb: tsk 13229:13229 path
/usr/lib64/libpython2.6.so.1.0, addr 0x7ffff7c21000, length 0x003b6000, offset
0x0, flags 0x8000075
_stp_tf_mmap_cb:61: vm_cb: matched path /usr/lib64/libpython2.6.so.1.0 to
module (for sec: .dynamic)
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7f8e000
__stp_call_mmap_callbacks:581: pid 13229, a/l/o/p/path 0x7ffff7f8e000 0x3b000
0x16d000 rw-p /usr/lib64/libpython2.6.so.1.0
stap_uprobe_mmap_found:627: +mmap RW- pid 13229 path
/usr/lib64/libpython2.6.so.1.0 addr 00007ffff7f8e000 length 241664 offset
000000000016d000 stf ffffffffa039d1a0 ffffffffa039d1a0 path
/usr/lib64/libpython2.6.so.1.0
stap_uprobe_change_semaphore_plus:557: +semaphore 0x1 @ 0x7ffff7fc865c spec 0
idx 0 task 13229
stap_uprobe_change_semaphore_plus:557: +semaphore 0x1 @ 0x7ffff7fc865e spec 1
idx 1 task 13229
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7f8e000
__stp_call_mmap_callbacks:581: pid 13229, a/l/o/p/path 0x7ffff7f8e000 0x3b000
0x16d000 rw-p /usr/lib64/libpython2.6.so.1.0
Do not see matching -semaphore operations for the -mmap:
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7fd7000), returned 0x0
stap_uprobe_munmap_found:636: -mmap pid 13229 addr 00007ffff7fd7000 length
154176 stf ffffffffa039d1a0 ffffffffa039d1a0 path
/usr/lib64/libpython2.6.so.1.0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7fd7000), returned 0x0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7bdb000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7bdb000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7ffc000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7ffc000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7ffc000), returned 0x0
stap_uprobe_munmap_found:636: -mmap pid 13229 addr 00007ffff7ffc000 length 4096
stf ffffffffa039d1a0 ffffffffa039d1a0 path /usr/lib64/libpython2.6.so.1.0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7ffc000), returned 0x0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7ffc000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7ffc000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7ffc000), returned 0x0
stap_uprobe_munmap_found:636: -mmap pid 13229 addr 00007ffff7ffc000 length 4096
stf ffffffffa039d1a0 ffffffffa039d1a0 path /usr/lib64/libpython2.6.so.1.0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7ffc000), returned 0x0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7ffb000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7ffb000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b9a000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b9a000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7ffb000), returned 0x0
stap_uprobe_munmap_found:636: -mmap pid 13229 addr 00007ffff7ffb000 length 4096
stf ffffffffa039d1a0 ffffffffa039d1a0 path /usr/lib64/libpython2.6.so.1.0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7ffb000), returned 0x0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7ffb000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7ffb000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7ffb000), returned 0x0
stap_uprobe_munmap_found:636: -mmap pid 13229 addr 00007ffff7ffb000 length 4096
stf ffffffffa039d1a0 ffffffffa039d1a0 path /usr/lib64/libpython2.6.so.1.0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7ffb000), returned 0x0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7ffb000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7ffb000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7ffb000), returned 0x0
stap_uprobe_munmap_found:636: -mmap pid 13229 addr 00007ffff7ffb000 length 4096
stf ffffffffa039d1a0 ffffffffa039d1a0 path /usr/lib64/libpython2.6.so.1.0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7ffb000), returned 0x0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7ffb000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7ffb000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7ffb000), returned 0x0
stap_uprobe_munmap_found:636: -mmap pid 13229 addr 00007ffff7ffb000 length 4096
stf ffffffffa039d1a0 ffffffffa039d1a0 path /usr/lib64/libpython2.6.so.1.0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7ffb000), returned 0x0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7ffb000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7ffb000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7ffb000), returned 0x0
stap_uprobe_munmap_found:636: -mmap pid 13229 addr 00007ffff7ffb000 length 4096
stf ffffffffa039d1a0 ffffffffa039d1a0 path /usr/lib64/libpython2.6.so.1.0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7ffb000), returned 0x0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7ffb000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7ffb000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7ffb000), returned 0x0
stap_uprobe_munmap_found:636: -mmap pid 13229 addr 00007ffff7ffb000 length 4096
stf ffffffffa039d1a0 ffffffffa039d1a0 path /usr/lib64/libpython2.6.so.1.0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7ffb000), returned 0x0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7ffb000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7ffb000
_stp_tf_exec_cb:28: tsk 13226:13226 , register_p: 0, process_p: 1
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7ffb000), returned 0x0
stap_uprobe_munmap_found:636: -mmap pid 13229 addr 00007ffff7ffb000 length 4096
stf ffffffffa039d1a0 ffffffffa039d1a0 path /usr/lib64/libpython2.6.so.1.0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7ffb000), returned 0x0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b69000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b69000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b68000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b68000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b68000), returned 0x0
stap_uprobe_munmap_found:636: -mmap pid 13229 addr 00007ffff7b68000 length 4096
stf ffffffffa039d1a0 ffffffffa039d1a0 path /usr/lib64/libpython2.6.so.1.0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b68000), returned 0x0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b68000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b68000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b68000), returned 0x0
stap_uprobe_munmap_found:636: -mmap pid 13229 addr 00007ffff7b68000 length 4096
stf ffffffffa039d1a0 ffffffffa039d1a0 path /usr/lib64/libpython2.6.so.1.0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b68000), returned 0x0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b68000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b68000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b68000), returned 0x0
stap_uprobe_munmap_found:636: -mmap pid 13229 addr 00007ffff7b68000 length 4096
stf ffffffffa039d1a0 ffffffffa039d1a0 path /usr/lib64/libpython2.6.so.1.0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b68000), returned 0x0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b28000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b28000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b27000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b27000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b27000), returned 0x0
stap_uprobe_munmap_found:636: -mmap pid 13229 addr 00007ffff7b27000 length 4096
stf ffffffffa039d1a0 ffffffffa039d1a0 path /usr/lib64/libpython2.6.so.1.0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b27000), returned 0x0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b27000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b27000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b27000), returned 0x0
stap_uprobe_munmap_found:636: -mmap pid 13229 addr 00007ffff7b27000 length 4096
stf ffffffffa039d1a0 ffffffffa039d1a0 path /usr/lib64/libpython2.6.so.1.0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b27000), returned 0x0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b27000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b27000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b27000), returned 0x0
stap_uprobe_munmap_found:636: -mmap pid 13229 addr 00007ffff7b27000 length 4096
stf ffffffffa039d1a0 ffffffffa039d1a0 path /usr/lib64/libpython2.6.so.1.0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b27000), returned 0x0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b27000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b27000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b27000), returned 0x0
stap_uprobe_munmap_found:636: -mmap pid 13229 addr 00007ffff7b27000 length 4096
stf ffffffffa039d1a0 ffffffffa039d1a0 path /usr/lib64/libpython2.6.so.1.0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b27000), returned 0x0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b27000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b27000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b27000), returned 0x0
stap_uprobe_munmap_found:636: -mmap pid 13229 addr 00007ffff7b27000 length 4096
stf ffffffffa039d1a0 ffffffffa039d1a0 path /usr/lib64/libpython2.6.so.1.0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b27000), returned 0x0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b27000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b27000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b26000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b26000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b26000), returned 0x0
stap_uprobe_munmap_found:636: -mmap pid 13229 addr 00007ffff7b26000 length 4096
stf ffffffffa039d1a0 ffffffffa039d1a0 path /usr/lib64/libpython2.6.so.1.0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b26000), returned 0x0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b27000), returned 0x0
stap_uprobe_munmap_found:636: -mmap pid 13229 addr 00007ffff7b27000 length 4096
stf ffffffffa039d1a0 ffffffffa039d1a0 path /usr/lib64/libpython2.6.so.1.0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b27000), returned 0x0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b27000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b27000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b27000), returned 0x0
stap_uprobe_munmap_found:636: -mmap pid 13229 addr 00007ffff7b27000 length 4096
stf ffffffffa039d1a0 ffffffffa039d1a0 path /usr/lib64/libpython2.6.so.1.0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b27000), returned 0x0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b27000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b27000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b27000), returned 0x0
stap_uprobe_munmap_found:636: -mmap pid 13229 addr 00007ffff7b27000 length 4096
stf ffffffffa039d1a0 ffffffffa039d1a0 path /usr/lib64/libpython2.6.so.1.0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b27000), returned 0x0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b27000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b27000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b27000), returned 0x0
stap_uprobe_munmap_found:636: -mmap pid 13229 addr 00007ffff7b27000 length 4096
stf ffffffffa039d1a0 ffffffffa039d1a0 path /usr/lib64/libpython2.6.so.1.0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b27000), returned 0x0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b27000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found mmap(0x0),
returned 0x7ffff7b27000
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b27000), returned 0x0
stap_uprobe_munmap_found:636: -mmap pid 13229 addr 00007ffff7b27000 length 4096
stf ffffffffa039d1a0 ffffffffa039d1a0 path /usr/lib64/libpython2.6.so.1.0
__stp_utrace_task_finder_target_syscall_exit:1400: tsk 13229 found
munmap(0x7ffff7b27000), returned 0x0
--
http://sourceware.org/bugzilla/show_bug.cgi?id=11151
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.