When I run dtrace script (attached) on 9.0 amd64 with kde4 I see a lot of failed read(2) calls from the xorg socket /tmp/.X11-unix/X0 . This can't be right in my opinion. This means that code keeps reading from this socket and failing, instead of using select(2) or kquere(2). Requests mostly come from kdeinit4 but some also from kwin, chrome and even Xorg itself.
Rate of failure for read(2) calls is ~2500/sec systemwide.

This is of course not a deadly problem.
But is this situation considered to be normal?

Yuri

--- dtrace script---
!/usr/bin/perl
use Getopt::Std;

#
#  Defaults
#
$FILTER = "";
$COUNT = 0;

#
#  Command line arguments
#
&Usage() if $ARGV[0] eq "--help";
getopts('ch:n:p:') || &Usage();
&Usage() if $opt_h;
$COUNT = 1 if $opt_c;
$FILTER = "&& execname == \"$opt_n\"" if defined $opt_n;
$FILTER = "&& pid == $opt_p" if defined $opt_p;

#
#  Load errno descriptions
#
open(ERRNO,"/usr/include/sys/errno.h") || die "ERROR1: reading errno.h: $!\n";
while (chomp($line = <ERRNO>)) {
        next unless $line =~ /^#define/;
        ($errno,$desc) = $line =~ /^#define\s+\S+\s+(\d+)\s+\/\*(.*)\*\//;
        $Errno{$errno} = $desc;
}
close ERRNO;

#
#  Declare DTrace script
#
 if ($COUNT) {          # aggregate style
$dtrace = <<END;
/usr/sbin/dtrace -n '
        #pragma D option quiet
        syscall:::return
        /errno != 0 && pid != \$pid $FILTER/
        {
                \@Errs[execname, probefunc, errno] = count();
        }
        dtrace:::END {
                printa("%s %s %d %\@d\\n", \@Errs);
        }'
END
 } else {               # snoop style
$dtrace = <<END;
/usr/sbin/dtrace -n '
        #pragma D option quiet
        #pragma D option switchrate=5hz
        syscall::read:entry
        {
          self->fd = arg0;
        }
        syscall::read:return
        /errno != 0 && pid != \$pid $FILTER/
        {
                printf("%d %s %s %d\\n", pid, execname, probefunc, errno);
                printf("fd=%d\\n",self->fd);
        }'
END
 }

#
#  Cleanup on signals
#
$SIG{INT} = \&Cleanup_Signal;    # Ctrl-C
$SIG{QUIT} = \&Cleanup_Signal;   # Ctrl-\
$SIG{TERM} = \&Cleanup_Signal;   # TERM

#
#  Run DTrace, process output
#

if ($COUNT) {
        print STDERR "Sampling... Hit Ctrl-C to end.\n";
        $header = 1;
} else {
        printf("%16s %16s %4s  %s\n","EXEC","SYSCALL","ERR","DESC");
}

### Open DTrace
open(DTRACE,"$dtrace |") || die "ERROR2: Can't start dtrace (perms?): $!\n";

### Process DTrace output
while (chomp($line = <DTRACE>)) {

        ### Print count header
        if ($COUNT && $header) {
                printf("\n%16s %16s %16s %4s %6s  %s\n",
                 "PID", "EXEC","SYSCALL","ERR","COUNT","DESC");
                $header = 0;
        }

        ### Split data
        ($pid,$execname,$syscall,$errno,$counts) = split(' ',$line);
        if ($errno eq "") {printf("DESCR %s\n", $line);}
        next if $errno eq "";

        ### Fetch errno description
        $desc = $Errno{$errno};

        ### Print output line
        if ($COUNT) {
                printf("%16s %16s %16s %4d %6d %s\n",
                 $pid, $execname,$syscall,$errno,$counts,$desc);
        } else {
printf("%16s %16s %16s %4d %s\n",$pid,$execname,$syscall,$errno,$desc);
        }
}
close(DTRACE);

#
#  Triggered by signals
#
sub Cleanup_Signal {
}

#
#  Usage message
#
sub Usage {
        print STDERR "USAGE: errinfo [-ch] [-p PID] [-n name]\n";
        print STDERR <<ENDUSAGE;
     eg,
       errinfo       # default output - snoop event style
          -c         # counts - aggregate style
          -p 871     # examine PID 871 only
          -n ssh     # examine processes with the name "ssh" only
          -cn ssh    # examine "ssh" using counts
ENDUSAGE
        exit(1);
}

_______________________________________________
freebsd-hackers@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to "freebsd-hackers-unsubscr...@freebsd.org"

Reply via email to