Re: enhance bt command

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Ming Zhang wrote:
On Mon, 2008-03-03 at 14:56 -0500, Dave Anderson wrote:
Ming Zhang wrote:
On Mon, 2008-03-03 at 14:04 -0500, Dave Anderson wrote:
Ming Zhang wrote:

my English sucks...

this is what i got. my side size-512 or size-1024 also works. just stuff
like dentry cache or inode cache does not work.


crash> rd 10078b2bca0 2
     10078b2bca0:  000001007877c8d4 00000100710fd5c8   ..wx.......q....
crash> rd -S 10078b2bca0 2
10078b2bca0: [dentry_cache] 00000100710fd5c8 crash> kmem -s 10078b2bca0
kmem: address is not allocated in slab subsystem: 10078b2bca0
No, your English is fine -- it's your command-entering that sucks!

Above, when you entered "kmem -s 10078b2bca0", you're incorrectly entering
the *address* where the dentry_cache reference (1007877c8d4) is located.
And so it's telling you that 10078b2bca0 is not allocated in the slab
subsystem, which it isn't...

But if you entered "kmem -s 1007877c8d4", you'd see the dentry_cache
information.
yes. i noticed that. need some tea when handling 3 bugs at the same
time...

so here is my understanding. it actually shows the slab object that
contain that address. it might not be the address of that object. so
here is what i need to do

crash> rd -x 10078b2bca0
10078b2bca0: 000001007877c8d4 crash> rd -S 10078b2bca0 10078b2bca0: [dentry_cache]
crash> kmem -s 000001007877c8d4
CACHE            NAME                 OBJSIZE  ALLOCATED     TOTAL
SLABS  SSIZE
10037ffc080      dentry_cache             240       9429     10560
660     4k
SLAB              MEMORY            TOTAL  ALLOCATED  FREE
1007877c040       1007877c088          16          9     7
FREE / [ALLOCATED]
  [1007877c8d4]

this only tell me that it belongs to one dentry object, but no idea
which one

then i have to use kmem -S dentry_cache, find out this piece

SLAB              MEMORY            TOTAL  ALLOCATED  FREE
1007877c040       1007877c088          16          9     7
FREE / [ALLOCATED]
  [1007877c088]
  [1007877c178]
   1007877c268  (cpu 1 cache)
   1007877c358  (cpu 1 cache)
  [1007877c448]
   1007877c538  (cpu 1 cache)
  [1007877c628]
  [1007877c718]
  [1007877c808]
~~~~~~~~~~~~~~~~~~~~ then find out it is here.
  [1007877c8f8]
   1007877c9e8  (cpu 1 cache)
   1007877cad8  (cpu 1 cache)
  [1007877cbc8]
  [1007877ccb8]
   1007877cda8  (cpu 1 cache)
   1007877ce98  (cpu 1 cache)

then i know the object contain this address is 1007877c808.
then
crash> dentry.d_iname
struct dentry {
  [0xcc] unsigned char d_iname[36];
}
crash> eval c808+cc
hexadecimal: c8d4 decimal: 51412 octal: 144324

show me that variable in stack actually is d_iname.

then can we have the output format as

10078b2bca0: [000001007877c808+cc: dentry_cache]
so we know the object address, which slab it is in, and the offset,
(thus can derive the raw value), all in one shot?

You've done a fine bit of debugging your issue...

But I think that's a bit of overkill for each address reference.

To do it right it would have to walk slab chains to gather all of the
information needed by the "kmem -S" output, which can be extremely
time-consuming, and potentially error-prone if the slab chain is
corrupt or being modified while running on a live system.

full agree. realized now.

then here is my question, how "kmem -s <addr>" find out which slab this
address belong to? by only looking at the page?

The kmem_cache and containing slab addresses are stashed in unused
fields of the page structure of the object's virtual address.


then here is my revised suggestion. can we split this into 2 steps?

(1) rd -S show [raw address: cache name]

(this is a great to have since do rd 2 times, one with -S and another
without -S is tedious.)

But in your case, for example, I'm presuming you've done a "bt -f",
and simply would like a symbols/slab translation of a chunk of memory
making up one of the stack frames, so you do a subsequent "rd -S" of
that memory area.  Doesn't seem that tedious to me...


(2) and kmem -s <address>

show which slab it is in and optionally (with a new option like -O) show
the object?

Not following -- "kmem -s <address>" does show which slab it's in.
And if you're asking whether the object can be dumped as the structure
type it is (?), well, how would it be possible from the crash utility's
viewpoint to even know what type of data structure it is?

If you want to look at all of the objects in a slab represented
as data structures, you're going to have supply the knowledge of
what data structure they are.  It's simple enough, just do a "kmem -S"
into a file, delete everything except the object addresses that you're
interested in, insert "struct whatever" in front of each address, save
the file -- and run it as crash input file.


(this is nice to have).

thanks.

Look, you can have it do anything you want...

However, keep in mind that there are 4 diffenent kmem slab paradigms
supported (the "original", the first verion with per-cpu objects, the
second version with per-cpu objects, and now the completely new CONFIG_SLUB
subsystem).  All of them would have to be supported.  And the code that does
the object dumping is somewhat replicated and embedded in the "kmem -S" support
code, so it's not a simple re-use of an existing function, which I've done
to get the simple "rd -S" output.

Dave

--
Crash-utility mailing list
Crash-utility@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/crash-utility

[Index of Archives]     [Fedora Development]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]

 

Powered by Linux