[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH] xenstore: set READ_THREAD_STACKSIZE to a sane value
On 11/03/14 15:12, Ian Campbell wrote: > On Tue, 2014-03-11 at 14:52 +0100, Roger Pau Monnà wrote: >> On 11/03/14 14:24, Ian Campbell wrote: >>> On Mon, 2014-03-10 at 17:12 +0000, Ian Jackson wrote: >>>> Roger Pau Monne writes ("[PATCH] xenstore: set READ_THREAD_STACKSIZE to a >>>> sane value"): >>>>> On FreeBSD PTHREAD_STACK_MIN is 2048 by default, which is obviously >>>>> too low. > > It occurs to me that 2048 is < PAGE_SIZE. Which makes this seem like an > interesting choice of stack min, especially combined with the fact that > the failure seems to involve malloc. > > Perhaps the stack is malloc'd (rather than coming from brk or an anon > mmap), so overrunning would cause heap corruption which seems to be what > you are seeing. > >>> How does this manifest itself? (I suppose this may be answered as part >>> of answering Ian J) >> >> Yes, I'm still looking into it, this gdb output: >> >> Starting program: /usr/local/bin/xenstore-watch /foo >> [New LWP 100169] >> [New Thread 801406800 (LWP 100182/xenstore-watch)] >> >> Program received signal SIGSEGV, Segmentation fault. >> [Switching to Thread 801406800 (LWP 100182/xenstore-watch)] >> 0x0000000800ac1258 in sbrk () from /lib/libc.so.7 >> (gdb) bt >> #0 0x0000000800ac1258 in sbrk () from /lib/libc.so.7 >> #1 0x0000000800ac110e in sbrk () from /lib/libc.so.7 >> #2 0x0000000800ac9ee8 in sbrk () from /lib/libc.so.7 >> #3 0x0000000800ac456b in sbrk () from /lib/libc.so.7 >> #4 0x0000000800ac447d in sbrk () from /lib/libc.so.7 >> #5 0x0000000800aaf6ce in syscall () from /lib/libc.so.7 >> #6 0x0000000800acb37b in malloc () from /lib/libc.so.7 >> #7 0x00000008008202b9 in read_message (h=0x801417080, nonblocking=0) at >> xs.c:313 >> #8 0x0000000800820a06 in read_thread (arg=0x801417080) at xs.c:313 >> #9 0x0000000800dc64a4 in pthread_create () from /lib/libthr.so.3 >> #10 0x0000000000000000 in ?? () > > Does > frame 1 ; print $sp > frame 2 ; print $sp > etc > tell you anything useful about the stack usage at each level? Thanks, I've been able to get the stack pointer at each frame, here are the results (from frame 0 to frame 10): 0x7fffffbfcff0 0x7fffffbfd0a0 0x7fffffbfd0e0 0x7fffffbfd120 0x7fffffbfd160 0x7fffffbfd1a0 0x7fffffbfd1e0 0x7fffffbfd6a0 0x7fffffbfd7a0 0x7fffffbfd7c0 0x7fffffbfd800 Doing: 0x7fffffbfd800 - 0x7fffffbfcff0 = 0x810 Which is 2064 in decimal. The biggest culprit seems to be malloc, which is using 1216 bytes of the stack. > >> I've also tried to debug it using valgrind, > > Under BSD? Did someone wire up the dom0 OS specific bit? If so: Neat! No, I don't think anyone has wired the Dom0 specific bits, maybe they don't show up because this is just the xenstore client, which is not using any ioctls? > >> and here's what I got: >> >> [root@loki ~/xen/xen]# valgrind xenstore-watch /foo >> ==1901== Memcheck, a memory error detector >> ==1901== Copyright (C) 2002-2012, and GNU GPL'd, by Julian Seward et al. >> ==1901== Using Valgrind-3.8.1 and LibVEX; rerun with -h for copyright info >> ==1901== Command: xenstore-watch /foo >> ==1901== >> ==1901== Syscall param socketcall.connect(serv_addr..sa_len) points to >> uninitialised byte(s) >> ==1901== at 0x152A14A: connect (in /lib/libc.so.7) >> ==1901== by 0x1210B46: get_handle (xs.c:205) >> ==1901== by 0x1210CEC: xs_open (xs.c:297) >> ==1901== by 0x4027B1: main (xenstore_client.c:635) >> ==1901== Address 0x7ff000a70 is on thread 1's stack >> ==1901== >> /foo >> >> Strangely enough, when running under valgrind it doesn't segfault, > > valgrind interposes it's own malloc and stuff which will change > behaviour, and I wouldn't be all that surprised if it were gettings its > fingers into some of the pthread stuff too. > >> and >> I'm still trying to figure out why valgrind complains. > > It seems to be an unrelated issue though? I think so, it seems like valgrind doesn't really like the cast done in connect from sockaddr_un to sockaddr. Roger. _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |