svn commit: r326758 - in head/sys/i386: conf include
Rodney W. Grimes
freebsd at pdx.rh.CN85.dnsmgr.net
Tue Dec 12 20:49:59 UTC 2017
> On 13.12.2017 00:01, Rodney W. Grimes wrote:
>
> >> But many other parts of kernel think it's OK to allocate big arrays or
> >> structures on stack.
> >
> > We should probably start looking for those, something someone who is
> > offerring help but doesnt know what they might be good at, but can
> > read C code. They could be utililized t simply scan through the
> > code looking for this type of thing and bring it to the attention
> > of a area of expertise commiter.
>
> These can be found with simple script:
>
> cd /usr/src
> make TARGET_ARCH=i386 KERNCONF=GENERIC buildkernel
>
> cd /usr/obj/i386.i386/home/src/sys/GENERIC
> for o in *.o
> do
> objdump -d $o | awk -vn=$o '/sub .*,%esp/ {split ($NF,a,/[,$]/); printf "%u %s %s\n", a[2], a[2], n}'
> done | sort -rn > top.sub
>
> head -50 top.sub | while read d h o
> do
> objdump -d $o | fgrep -B7 "$h,%esp" | awk -vo=$o -vd=$d '/>:$/ {print d, o, $2}'
> done > top2.sub
>
> Here is what do we get in top2.sub:
>
> 4328 in6_proto.o <icmp6stat_sysctl>:
> 3312 in6_proto.o <ip6stat_sysctl>:
> 2232 sctp_pcb.o <sctp_load_addresses_from_init>:
...
Thank you Thank you THANK YOU! And imp has already removed one of these.
I wonder if fxing some of these sctp*.o would lead to the removal of the complaints
about that feature filling the stack.
> ...
>
> First column is total stack usage of kernel function (decimal),
> second is module name and third contains function name it question.
Can we get this put into a CI job?
Output anything that gets added to the list of things with a stack
usage greater than some N to an email sent. That way new violators
get flagged quickly and can be cleaned up by the commiter, then
slowly work down this list until things are stable again.
--
Rod Grimes rgrimes at freebsd.org
More information about the svn-src-all
mailing list