Displaying 20 results from an estimated 100 matches similar to: "access to errno when using pid provider"
2006 Feb 15
4
Script for Stackdepth by Thread/LWP?
I''m interested in monitoring the amount of stack used by a multi-threaded program. I assume ''stackdepth'' built-in would be useful...but not sure. Been through demo''s, ToolKit, and internals..but it''s just not clicking for me yet.
Not sure how to measure start/end of stack size dynamically...Anyone know how to break this down?
This message posted from
2006 Aug 08
9
Handling userland char ** pointers
I''ve been trying to get access to a userland string that''s behind a
second level pointer using DTrace, but I can''t seem to get it to work.
I started with the example on the Team DTrace Tips and Tricks slides:
trace(copyinstr(*(uintptr_t *)copyin(arg0, curpsinfo->pr_dmodel ==
PR_MODEL_ILP32 ? 4 : 8)));
And when I couldn''t get it to work, I started
2008 Mar 04
0
Determining curthread pointer (ulwp_t) via libproc on i386
How would I determine the address of the ulwp_t structure for the
current thread of a process from a 32-bit i386 executable looking at a
32-bit executable? (This is in support of a fix for 6593259:
"libdtrace should prefer pid probes to breakpoints".)
For example, if I compile the following code 64-bit snippet, I can get
that address from 32-bit or 64-bit executables:
2010 Mar 19
2
Using DTrace in 32-bit to handle 64-bit parameters [72631230]
Hi all,
OK, so this at first looked like a clear cut "Don''t do it, or at worst
handle the results" issue my customer has come to me with, but the more
we discuss it, the more it looks like we should have better ways of
dealing with this issue.
> We have user defined dtrace probe points in the application which use
> as parameter 64 bit values:
>
> provider adv {
2007 Feb 14
10
Asynchronous signal handling in fasttrap provider
Hi,
I was going through the implementation of the fasttrap provider. I found
that when displaced execution happens (ie., when the instruction traced is
being executed out of the scratch space) if an asynchrnous signal comes we
need to defer the delivery.
Can somebody explain why this is necessary and how is it implemented?
Thanks in advance
Saravanan S
-------------- next part --------------
An
2006 Jun 03
8
dtrace causing sigtrap?
Just to let people know what my big picture is, I''m trying to write a script
that will let me run a program, and name a progeny of that program
that I want to debug. My script should find the first occurrence
of that progeny, and run it until it finishes initializing the
runtime linker, but stop it before it runs any shared library startup
routines. (Failing that, I''d be okay
2007 Feb 21
6
CPU stats problem
HI there,
I?ve discovered DTrace few days ago and I?m currently stuck on a cpu stats problem. I?m trying to poll the cpu_t.cpu_acct[] array to pull idle, system and user values.
So, I made this little script:
------------------------------------------------------------------------------------------------------
#!/usr/sbin/dtrace -s
#pragma D option quiet
this uint64_t start;
this hrtime_t
2013 Jun 06
1
Reproducable Infiniband panic
Hello,
I see a reproducable panic when doing ibping and aborting it with ^C. My
setup is two machines with Mellanox Infinihost III HCAs (one Linux one
FreeBSD) connected back-to-back.
Details below. I can upload 2 crash dumps, if this is useful. For some
reason the port doesn't become ACTIVE, so no packets arrive, but that is
probably unrelated.
% uname -a
FreeBSD cosel.inf.tu-dresden.de
2009 Jan 27
5
Replacing HDD in x4500
The vendor wanted to come in and replace an HDD in the 2nd X4500, as it
was "constantly busy", and since our x4500 has always died miserably in
the past when a HDD dies, they wanted to replace it before the HDD
actually died.
The usual was done, HDD replaced, resilvering started and ran for about
50 minutes. Then the system hung, same as always, all ZFS related
commands would just
2009 Sep 17
5
"this" variables being overridden?
Hi
I encountered this problem a few times in the past, but only now it is
consistent enough so I can write this email. In short, the problem is
that after I copy some structure from the profiled program to the dtrace
space, and set a "this-dataP" variable to point to the local copy, after
a while some of the fields of the local structure are overridden with
junk values. In
2009 Jul 24
9
getting extra characters with printf(copyin(a, b))
Hi,
I have a situation where a DTrace script is printing out extra characters, despite the copyin() call giving a specific length. Can anyone think of why this might be? It''s fine the first time all of the probes fire, but on a second run of my generating operations, I get junk in there. For example:
set setop length 5, FOUND KEY, STORED
set setop length 5, FOUND KEY, STORED
get
2005 Aug 12
3
Funny output from write syscall
I have a clause that look like this:
syscall::write:entry
/execname == "ntpd" && self->recspec/
{
speculate(self->recspec);
printf(" fd=%d buf=%d\n%s",arg0,arg2,
stringof(copyin(arg1,arg2-1)));
}
The ntpd program always write a \n trminated string in this
context, so I used the "arg2-1" to drop the \n.
This works
2008 Oct 01
5
ustack()s of SIGSEGV''ed programs
Hi all,
I am trying to write a D script which would print ustack() for every
program in the system receiving SIGSEGV. All the stacks printed in
trap()/sigtoproc() context do not have meaningful symbols.
The following solves the problem to some degree but I''d much rather have
a self-contained D script.
dtrace -w -n ''fbt:genunix:sigtoproc:entry/arg2 == 11/ {
2008 May 20
6
Dtrace queries - predicates & func arg tracing
[1] Predicates in one-liners
I would like to list the probe modules in my executable and then
dynamically create a dscript to trace execution of those modules alone
(by excluding the 3rd party and system libraries). I tried the below
script without success. The conditional given in the predicate is not
taking effect. Why is this so ?
$ dtrace -ln ''pid$target:::
2006 Jul 31
5
use tracemem to dump content in function read/write
Hi Expert
I want to use dtrace to monitor the content change of one file. I made following scripts,
#!/usr/sbin/dtrace -s
inline int MYPID = $1;
syscall::write:entry
/pid == MYPID/
{
tracemem(arg1, arg2);
printf("\n");
}
It always has an following error
bash-3.00$ sudo dumpFIFO.dtrace 3836
dtrace: failed to compile script ./dumpFIFO.dtrace: line 19: tracemem( ) argument #2
2007 Aug 29
6
How do I look up syscall name
I''m using a fbt probe where I get a system call id as an argument, how do I look up the name of it? At the moment I''m post-processing the output using /etc/name/to_sysnum but that doesn''t feel right :)
cheers,
/Martin
--
This message posted from opensolaris.org
2015 Mar 23
1
[PATCH] customize: add --copy
From: Maros Zatko <hacxman@gmail.com>
This adds --copy SOURCE:DEST, equivalent of calling g#cp_a src dst.
RFE: RHBZ#1203817
Maros Zatko (1):
customize: add --copy
builder/cmdline.ml | 2 +-
customize/customize_run.ml | 4 ++++
generator/customize.ml | 10 ++++++++++
3 files changed, 15 insertions(+), 1 deletion(-)
--
1.9.3
2008 Feb 20
12
no luck with Xen....
Perhaps someone has ideas on this topic, a recent attempt to play with Xen was a reather unlucky event, all what I will be able to demonstrate on that system is a PV ONNV domU which
ikely will not be very attractive to the audience :(
HW: U40M2, 2 x 2 core AMD revF procs, 8GB MEM, Phonix BIOS 1.5 (latest)
1 x 200GB internal SATA drive
SW: dom0 ONNV build 82, latest VirtManager from
2007 Apr 18
3
dtrace-discuss: cannot get a ''string'' to print...
hi,
I''m using the PID provider to trace a 32-bit app, prtdiag.
I''m trying to print the value of "propname" (arg1) in the
following func:
int
picl_get_propval_by_name(picl_nodehdl_t nodeh, const char *propname,
void *valbuf, size_t nbytes)
...
i''ve tried many versions, but this is a representative one:
53 this string propname;
54
55
2007 Aug 09
9
Is DTrace Vulnerable?
There is a Slashdot discussion today titled "Cambridge Researcher Breaks
OpenBSD Systrace". Slashdot anonymous member has a comment "Even Sun''s
Dtrace might be vulnerable." I don''t think it is. Comments?
Exploiting Concurrency Vulnerabilities in System Call Wrappers
http://www.watson.org/~robert/2007woot/2007usenixwoot-exploitingconcurrency.pdf
Abstract