You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
1333 lines
37 KiB
1333 lines
37 KiB
/*++
|
|
|
|
Copyright (c) Microsoft Corporation. All rights reserved.
|
|
|
|
Module Name:
|
|
|
|
deadlock.c
|
|
|
|
Abstract:
|
|
|
|
This module implements the debug extension for the deadlock
|
|
verification package for critical section operations.
|
|
|
|
Environment:
|
|
|
|
User Mode
|
|
|
|
Author:
|
|
|
|
Silviu Calinoiu (SilviuC) 6-Feb-2002
|
|
|
|
Revision History:
|
|
|
|
--*/
|
|
|
|
#include "precomp.h"
|
|
#pragma hdrstop
|
|
|
|
//
|
|
// This has to be in sync with the definition from
|
|
// base\win32\vrifier\deadlock.c
|
|
//
|
|
|
|
#define AVRF_DEADLOCK_HASH_BINS 0x1F
|
|
|
|
#if 0
|
|
typedef enum _AVRF_DEADLOCK_RESOURCE_TYPE {
|
|
AVrfpDeadlockTypeUnknown = 0,
|
|
AVrfpDeadlockTypeCriticalSection = 1,
|
|
AVrfpDeadlockTypeMaximum = 2
|
|
} AVRF_DEADLOCK_RESOURCE_TYPE, *PAVRF_DEADLOCK_RESOURCE_TYPE;
|
|
#endif
|
|
|
|
PUCHAR ResourceTypes[] =
|
|
{
|
|
"Unknown",
|
|
"Critical Section",
|
|
};
|
|
|
|
#define RESOURCE_TYPE_MAXIMUM 5
|
|
|
|
#define DEADLOCK_EXT_FLAG_DUMP_STACKS 1
|
|
#define DEADLOCK_EXT_FLAG_DUMP_NODES 2
|
|
#define DEADLOCK_EXT_FLAG_ANALYZE 4
|
|
|
|
extern
|
|
VOID
|
|
DumpSymbolicAddress(
|
|
ULONG64 Address,
|
|
PUCHAR Buffer,
|
|
BOOL AlwaysShowHex
|
|
);
|
|
|
|
#define MAX_DEADLOCK_PARTICIPANTS 32
|
|
|
|
|
|
#define VI_MAX_STACK_DEPTH 8
|
|
typedef struct _DEADLOCK_VECTOR
|
|
{
|
|
ULONG64 Thread;
|
|
ULONG64 Node;
|
|
ULONG64 ResourceAddress;
|
|
ULONG64 StackAddress;
|
|
ULONG64 ParentStackAddress;
|
|
ULONG64 ThreadEntry;
|
|
ULONG Type;
|
|
BOOLEAN TryAcquire;
|
|
} DEADLOCK_VECTOR, *PDEADLOCK_VECTOR;
|
|
|
|
//
|
|
// Functions from `verifier.c'
|
|
//
|
|
|
|
extern
|
|
ULONG64
|
|
ReadPVOID (
|
|
ULONG64 Address
|
|
);
|
|
|
|
extern
|
|
ULONG
|
|
ReadULONG(
|
|
ULONG64 Address
|
|
);
|
|
|
|
#define ReadPvoid ReadPVOID
|
|
#define ReadUlong ReadULONG
|
|
|
|
//
|
|
// Forward declarations for local functions
|
|
//
|
|
|
|
VOID
|
|
PrintGlobalStatistics (
|
|
ULONG64 GlobalsAddress
|
|
);
|
|
|
|
BOOLEAN
|
|
SearchForResource (
|
|
ULONG64 GlobalsAddress,
|
|
ULONG64 ResourceAddress
|
|
);
|
|
|
|
BOOLEAN
|
|
SearchForThread (
|
|
ULONG64 GlobalsAddress,
|
|
ULONG64 ThreadAddress
|
|
);
|
|
|
|
BOOLEAN
|
|
AnalyzeResource (
|
|
ULONG64 Resource,
|
|
BOOLEAN Verbose
|
|
);
|
|
|
|
BOOLEAN
|
|
AnalyzeResources (
|
|
ULONG64 GlobalsAddress
|
|
);
|
|
|
|
/////////////////////////////////////////////////////////////////////
|
|
/////////////////////////////////////////////////////////// Deadlocks
|
|
/////////////////////////////////////////////////////////////////////
|
|
|
|
//
|
|
// Defines copied from nt\base\ntos\verifier\vfdeadlock.c .
|
|
//
|
|
|
|
#define AVRF_DEADLOCK_ISSUE_SELF_DEADLOCK 0x1000
|
|
#define AVRF_DEADLOCK_ISSUE_DEADLOCK_DETECTED 0x1001
|
|
#define AVRF_DEADLOCK_ISSUE_UNINITIALIZED_RESOURCE 0x1002
|
|
#define AVRF_DEADLOCK_ISSUE_UNEXPECTED_RELEASE 0x1003
|
|
#define AVRF_DEADLOCK_ISSUE_UNEXPECTED_THREAD 0x1004
|
|
#define AVRF_DEADLOCK_ISSUE_MULTIPLE_INITIALIZATION 0x1005
|
|
#define AVRF_DEADLOCK_ISSUE_THREAD_HOLDS_RESOURCES 0x1006
|
|
#define AVRF_DEADLOCK_ISSUE_UNACQUIRED_RESOURCE 0x1007
|
|
|
|
|
|
|
|
#define DUMP_FIELD(Name) dprintf ("%-20s %I64u \n", #Name, ReadField (Name))
|
|
|
|
DECLARE_API( udeadlock )
|
|
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
Verifier deadlock detection module extension.
|
|
|
|
Arguments:
|
|
|
|
arg - not used for now.
|
|
|
|
Return Value:
|
|
|
|
None.
|
|
|
|
--*/
|
|
|
|
{
|
|
ULONG64 GlobalsPointer;
|
|
ULONG64 GlobalsAddress;
|
|
ULONG64 InitializedAddress;
|
|
ULONG64 EnabledAddress;
|
|
ULONG64 InstigatorAddress;
|
|
ULONG64 ParticipantAddress;
|
|
ULONG64 LastResourceAddress;
|
|
ULONG64 RootAddress;
|
|
ULONG64 CurrentResourceAddress;
|
|
ULONG64 CurrentThread;
|
|
ULONG64 ThreadForChain;
|
|
ULONG64 CurrentStack;
|
|
ULONG64 NextStack;
|
|
ULONG64 SymbolOffset;
|
|
|
|
ULONG StackTraceSize;
|
|
|
|
ULONG Processor=0;
|
|
ULONG ParticipantOffset;
|
|
ULONG StackOffset;
|
|
ULONG ParentStackOffset;
|
|
ULONG InitializedValue;
|
|
ULONG EnabledValue;
|
|
ULONG NumberOfParticipants;
|
|
ULONG NumberOfResources;
|
|
ULONG NumberOfThreads;
|
|
ULONG ThreadNumber;
|
|
ULONG ResourceNumber;
|
|
ULONG ResourceType;
|
|
ULONG TryAcquireUsed;
|
|
|
|
|
|
ULONG PtrSize;
|
|
ULONG J, I;
|
|
|
|
BOOLEAN DumpStacks = FALSE;
|
|
BOOLEAN DumpNodes = FALSE;
|
|
BOOLEAN Analyze = FALSE;
|
|
|
|
ULONG64 Flags;
|
|
|
|
UCHAR SymbolName[512];
|
|
|
|
HANDLE CurrentThreadHandle = NULL;
|
|
|
|
DEADLOCK_VECTOR Participants[MAX_DEADLOCK_PARTICIPANTS+1];
|
|
|
|
ULONG64 Issue[4];
|
|
ULONG64 SearchAddress = 0;
|
|
|
|
INIT_API();
|
|
|
|
//
|
|
// Check if help requested
|
|
//
|
|
|
|
if (strstr (args, "?")) {
|
|
|
|
dprintf ("\n");
|
|
dprintf ("!deadlock Statistics and deadlock layout \n");
|
|
dprintf ("!deadlock 3 Detailed deadlock layout \n");
|
|
dprintf ("!deadlock ADDRESS Search for ADDRESS among deadlock verifier data \n");
|
|
dprintf ("\n");
|
|
Status = S_OK;
|
|
goto Exit;
|
|
}
|
|
|
|
Flags = GetExpression(args);
|
|
|
|
if (Flags > 0x10000000) {
|
|
|
|
SearchAddress = Flags;
|
|
}
|
|
else {
|
|
|
|
if (Flags & DEADLOCK_EXT_FLAG_DUMP_STACKS) {
|
|
DumpStacks = TRUE;
|
|
}
|
|
|
|
if (Flags & DEADLOCK_EXT_FLAG_DUMP_NODES) {
|
|
DumpNodes = TRUE;
|
|
}
|
|
|
|
if (Flags & DEADLOCK_EXT_FLAG_ANALYZE) {
|
|
Analyze = TRUE;
|
|
}
|
|
}
|
|
|
|
GlobalsPointer = (ULONG64) GetExpression ("verifier!AVrfpDeadlockGlobals");
|
|
EnabledAddress = (ULONG64) GetExpression ("verifier!AVrfpDeadlockDetectionEnabled");
|
|
|
|
if (GlobalsPointer == 0 || EnabledAddress == 0) {
|
|
dprintf ("Error: incorrect symbols for kernel \n");
|
|
Status = E_INVALIDARG;
|
|
goto Exit;
|
|
}
|
|
|
|
GlobalsAddress = 0;
|
|
ReadPointer (GlobalsPointer, &GlobalsAddress);
|
|
EnabledValue = ReadUlong (EnabledAddress);
|
|
|
|
if (GlobalsAddress == 0) {
|
|
dprintf ("Deadlock detection not initialized \n");
|
|
Status = E_INVALIDARG;
|
|
goto Exit;
|
|
}
|
|
|
|
InitializedValue = 1;
|
|
|
|
if (EnabledValue == 0) {
|
|
dprintf ("Deadlock detection not enabled \n");
|
|
Status = E_INVALIDARG;
|
|
goto Exit;
|
|
}
|
|
|
|
//
|
|
// Do a search if this is requested.
|
|
//
|
|
|
|
if (SearchAddress) {
|
|
|
|
BOOLEAN FoundSomething = FALSE;
|
|
|
|
dprintf ("Searching for %p ... \n", SearchAddress);
|
|
|
|
if (FoundSomething == FALSE) {
|
|
FoundSomething = SearchForResource (GlobalsAddress, SearchAddress);
|
|
}
|
|
|
|
if (FoundSomething == FALSE) {
|
|
FoundSomething = SearchForThread (GlobalsAddress, SearchAddress);
|
|
}
|
|
|
|
Status = S_OK;
|
|
goto Exit;
|
|
}
|
|
|
|
//
|
|
// Analyze if this is needed.
|
|
//
|
|
|
|
if (Analyze) {
|
|
|
|
AnalyzeResources (GlobalsAddress);
|
|
|
|
Status = S_OK;
|
|
goto Exit;
|
|
}
|
|
|
|
//
|
|
// Get the AVrfpDeadlockIssue[0..3] vector.
|
|
//
|
|
|
|
{
|
|
ULONG ValueSize;
|
|
ULONG64 IssueAddress;
|
|
|
|
ValueSize = IsPtr64()? 8: 4;
|
|
|
|
IssueAddress = GetExpression ("verifier!AVrfpDeadlockIssue");
|
|
|
|
for (I = 0; I < 4; I += 1) {
|
|
|
|
ReadPointer (IssueAddress + I * ValueSize, &(Issue[I]));
|
|
}
|
|
|
|
if (Issue[0] == 0) {
|
|
|
|
dprintf ("\n");
|
|
PrintGlobalStatistics (GlobalsAddress);
|
|
dprintf ("\nNo deadlock verifier issues. \n");
|
|
|
|
Status = S_OK;
|
|
goto Exit;
|
|
}
|
|
else {
|
|
|
|
if (ValueSize == 4) {
|
|
dprintf ("issue: %08X %08X %08X %08X \n",
|
|
Issue[0], Issue[1], Issue[2], Issue[3]);
|
|
}
|
|
else {
|
|
dprintf ("issue: %I64X %I64X %I64X %I64X \n",
|
|
Issue[0], Issue[1], Issue[2], Issue[3]);
|
|
}
|
|
}
|
|
|
|
switch (Issue[0]) {
|
|
|
|
case AVRF_DEADLOCK_ISSUE_SELF_DEADLOCK:
|
|
dprintf ("Resource %I64X is acquired recursively. \n", Issue[1]);
|
|
Status = S_OK;
|
|
goto Exit;
|
|
|
|
case AVRF_DEADLOCK_ISSUE_DEADLOCK_DETECTED:
|
|
break;
|
|
|
|
case AVRF_DEADLOCK_ISSUE_UNINITIALIZED_RESOURCE:
|
|
dprintf ("Resource %I64X is used before being initialized. \n", Issue[1]);
|
|
Status = S_OK;
|
|
goto Exit;
|
|
|
|
case AVRF_DEADLOCK_ISSUE_UNEXPECTED_RELEASE:
|
|
dprintf ("Resource %I64X is released out of order. \n", Issue[2]);
|
|
Status = S_OK;
|
|
goto Exit;
|
|
|
|
case AVRF_DEADLOCK_ISSUE_UNEXPECTED_THREAD:
|
|
dprintf ("Current thread is releasing resource %I64X which was acquired in thread %I64X. \n",
|
|
Issue[1], Issue[2]);
|
|
Status = S_OK;
|
|
goto Exit;
|
|
|
|
case AVRF_DEADLOCK_ISSUE_MULTIPLE_INITIALIZATION:
|
|
dprintf ("Resource %I64X has already been initialized. \n", Issue[1]);
|
|
Status = S_OK;
|
|
goto Exit;
|
|
|
|
case AVRF_DEADLOCK_ISSUE_THREAD_HOLDS_RESOURCES:
|
|
if (Issue[3] == 0) {
|
|
dprintf ("Deleting thread %I64X (descriptor %I64X) "
|
|
"which still holds resources. \n",
|
|
Issue[1], Issue[2]);
|
|
} else {
|
|
dprintf ("Deleting thread %I64X which still holds resource %I64X "
|
|
"(descriptor %I64X). \n",
|
|
Issue[2], Issue[1], Issue[3]);
|
|
}
|
|
|
|
Status = S_OK;
|
|
goto Exit;
|
|
|
|
case AVRF_DEADLOCK_ISSUE_UNACQUIRED_RESOURCE:
|
|
dprintf ("Releasing resource %I64X that was never acquired. \n", Issue[1]);
|
|
Status = S_OK;
|
|
goto Exit;
|
|
|
|
default:
|
|
dprintf ("Unrecognized issue code %I64X ! \n", Issue[0]);
|
|
Status = S_OK;
|
|
goto Exit;
|
|
}
|
|
}
|
|
|
|
//
|
|
// Figure out how big a pointer is
|
|
//
|
|
|
|
PtrSize = IsPtr64()? 8: 4;
|
|
|
|
if (PtrSize == 0) {
|
|
dprintf ("Cannot get size of PVOID \n");
|
|
Status = E_INVALIDARG;
|
|
goto Exit;
|
|
}
|
|
|
|
//
|
|
// Dump the globals structure
|
|
//
|
|
|
|
InitTypeRead (GlobalsAddress, verifier!_AVRF_DEADLOCK_GLOBALS);
|
|
|
|
//
|
|
// Find out the address of the resource that causes the deadlock
|
|
//
|
|
|
|
InstigatorAddress = ReadField(Instigator);
|
|
|
|
NumberOfParticipants = (ULONG) ReadField(NumberOfParticipants);
|
|
|
|
if (NumberOfParticipants > MAX_DEADLOCK_PARTICIPANTS) {
|
|
dprintf("\nCannot have %x participants in a deadlock!\n",NumberOfParticipants);
|
|
Status = E_INVALIDARG;
|
|
goto Exit;
|
|
|
|
}
|
|
|
|
if (0 == NumberOfParticipants) {
|
|
dprintf("\nNo deadlock detected\n");
|
|
|
|
Status = S_OK;
|
|
goto Exit;
|
|
}
|
|
|
|
GetFieldOffset("verifier!_AVRF_DEADLOCK_GLOBALS",
|
|
"Participant",
|
|
&ParticipantOffset
|
|
);
|
|
ParticipantAddress = GlobalsAddress + ParticipantOffset;
|
|
|
|
//
|
|
// Read the vector of AVRF_DEADLOCK_NODEs that
|
|
// participate in the deadlock.
|
|
//
|
|
//
|
|
|
|
for (J = 0; J < NumberOfParticipants; J++) {
|
|
Participants[J].Node = ReadPvoid(ParticipantAddress + J * PtrSize);
|
|
// dprintf("Participant %c: %08x\n", 'A' + J, Participants[J].Node);
|
|
}
|
|
|
|
//
|
|
// Gather the information we'll need to print out exact
|
|
// context for the deadlock.
|
|
//
|
|
GetFieldOffset("verifier!_AVRF_DEADLOCK_NODE",
|
|
"StackTrace",
|
|
&StackOffset
|
|
);
|
|
GetFieldOffset("verifier!_AVRF_DEADLOCK_NODE",
|
|
"ParentStackTrace",
|
|
&ParentStackOffset
|
|
);
|
|
|
|
|
|
//
|
|
// The stack trace size is 1 on free builds and 6 (or bigger) on
|
|
// checked builds. We assume that the ParentStackTrace field comes
|
|
// immediately after StackTrace field in the NODE structure.
|
|
//
|
|
|
|
StackTraceSize = (ParentStackOffset - StackOffset) / PtrSize;
|
|
|
|
for (J = 0; J < NumberOfParticipants; J++) {
|
|
|
|
InitTypeRead (Participants[J].Node, verifier!_AVRF_DEADLOCK_NODE);
|
|
|
|
|
|
RootAddress = ReadField(Root);
|
|
|
|
GetFieldValue(RootAddress,
|
|
"verifier!_AVRF_DEADLOCK_RESOURCE",
|
|
"ResourceAddress" ,
|
|
Participants[J].ResourceAddress
|
|
);
|
|
|
|
GetFieldValue(RootAddress,
|
|
"verifier!_AVRF_DEADLOCK_RESOURCE",
|
|
"Type",
|
|
Participants[J].Type
|
|
);
|
|
|
|
|
|
if (Participants[J].Type > RESOURCE_TYPE_MAXIMUM) {
|
|
Participants[J].Type = 0;
|
|
}
|
|
|
|
Participants[J].ThreadEntry = ReadField(ThreadEntry);
|
|
Participants[J].StackAddress = Participants[J].Node + StackOffset;
|
|
Participants[J].ParentStackAddress = Participants[J].Node +
|
|
ParentStackOffset;
|
|
Participants[J].TryAcquire = (BOOLEAN) ReadField(OnlyTryAcquireUsed);
|
|
|
|
|
|
GetFieldValue(Participants[J].ThreadEntry,
|
|
"verifier!_AVRF_DEADLOCK_THREAD",
|
|
"Thread",
|
|
Participants[J].Thread
|
|
);
|
|
|
|
|
|
}
|
|
|
|
if (Participants[0].ResourceAddress != InstigatorAddress) {
|
|
dprintf("\nDeadlock Improperly formed participant list\n");
|
|
Status = E_INVALIDARG;
|
|
goto Exit;
|
|
}
|
|
|
|
//
|
|
// The last participant is the Instigator of the deadlock
|
|
//
|
|
|
|
Participants[NumberOfParticipants].Thread = 0;
|
|
Participants[NumberOfParticipants].Node = 0;
|
|
Participants[NumberOfParticipants].ResourceAddress = InstigatorAddress;
|
|
Participants[NumberOfParticipants].StackAddress = 0;
|
|
Participants[NumberOfParticipants].ParentStackAddress =
|
|
Participants[NumberOfParticipants-1].StackAddress;
|
|
Participants[NumberOfParticipants].Type =
|
|
Participants[0].Type;
|
|
Participants[NumberOfParticipants].TryAcquire = FALSE; // can't cause a deadlock with try
|
|
Participants[NumberOfParticipants].ThreadEntry = 0;
|
|
|
|
//
|
|
// At this point we have all of the raw data we need.
|
|
// We have to munge it up a bit so that we have the most
|
|
// recent data. For instance, take the simple deadlock AB-BA.
|
|
// The stack for A in the AB context may be wrong because
|
|
// another thread may have come and taken A at a different point.
|
|
// This is why we have the parent stack address.
|
|
//
|
|
// So the rules we have to adhere to are as follows:
|
|
// Where we have a chain, (eg ABC meaning A taken then B then C),
|
|
// the thread used will always be the thread for the last resource taken,
|
|
// and the stacks used will be the the childs parent stack where
|
|
// applicable.
|
|
//
|
|
// For example, if C was taken by thread 1, A & B would be munged
|
|
// to use thread 1. Since in order to get to C, A and B must have
|
|
// been taken by thread 1 at some point, even if the thread they
|
|
// have saved now is a different one. C would use its own stack,
|
|
// B would use C's parent stack, since that was the stack that
|
|
// B had been acquired with when C was taken, and A will use
|
|
// B's parent stack.
|
|
//
|
|
// We can identify the start of a chain when the same resource
|
|
// is on the participant list twice in a row.
|
|
//
|
|
|
|
LastResourceAddress = InstigatorAddress;
|
|
|
|
NumberOfResources = 0;
|
|
NumberOfThreads = 0;
|
|
|
|
for (J = 0; J <= NumberOfParticipants; J++) {
|
|
I = NumberOfParticipants - J;
|
|
|
|
CurrentResourceAddress = Participants[I].ResourceAddress;
|
|
|
|
if (CurrentResourceAddress == LastResourceAddress) {
|
|
|
|
//
|
|
// This is the beginning of a chain. Use the current
|
|
// stack and the current thread, and set the chain
|
|
// thread to ours
|
|
//
|
|
|
|
ThreadForChain = Participants[I].Thread;
|
|
CurrentStack = Participants[I].StackAddress;
|
|
NumberOfThreads++;
|
|
} else {
|
|
//
|
|
// This is a resource we haven't seen before
|
|
//
|
|
NumberOfResources++;
|
|
}
|
|
|
|
NextStack = Participants[I].ParentStackAddress;
|
|
|
|
|
|
Participants[I].StackAddress = CurrentStack;
|
|
Participants[I].Thread = ThreadForChain;
|
|
//
|
|
// Parent stack isn't used any more -- nullify it.
|
|
//
|
|
Participants[I].ParentStackAddress = 0;
|
|
|
|
CurrentStack = NextStack;
|
|
LastResourceAddress = CurrentResourceAddress;
|
|
}
|
|
|
|
//
|
|
// Now that we've munged the vectors, we can go ahead and print out the
|
|
// deadlock information.
|
|
//
|
|
|
|
dprintf("\nDeadlock detected (%d resources in %d threads):\n\n",NumberOfResources, NumberOfThreads);
|
|
|
|
if (! DumpStacks )
|
|
{
|
|
//
|
|
// Print out the 'short' form
|
|
// Example:
|
|
//
|
|
// !dealock detected:
|
|
// Thread 1: A B
|
|
// Thread 2: B C
|
|
// Thread 3: C A
|
|
//
|
|
// Thread 1 = <address>
|
|
// Thread 2 = <address>
|
|
// Thread 3 = <address>
|
|
//
|
|
// Lock A = <address> (spinlock)
|
|
// Lock B = <address> (mutex)
|
|
// Lock C = <address> (spinlock)
|
|
//
|
|
|
|
ThreadNumber = 0;
|
|
ResourceNumber = 0;
|
|
J=0;
|
|
|
|
//
|
|
// Dump out the deadlock topology
|
|
//
|
|
|
|
while (J <= NumberOfParticipants)
|
|
{
|
|
ThreadForChain = Participants[J].Thread;
|
|
dprintf("Thread %d: ",ThreadNumber);
|
|
|
|
do {
|
|
if (J == NumberOfParticipants) {
|
|
ResourceNumber = 0;
|
|
}
|
|
|
|
dprintf("%c ",
|
|
'A' + ResourceNumber
|
|
);
|
|
J++;
|
|
ResourceNumber++;
|
|
|
|
} while( J <= NumberOfParticipants && Participants[J].ResourceAddress != Participants[J-1].ResourceAddress);
|
|
|
|
dprintf("\n");
|
|
|
|
ThreadNumber++;
|
|
ResourceNumber--;
|
|
}
|
|
dprintf("\nWhere:\n");
|
|
|
|
//
|
|
// Dump out the thread addresses
|
|
//
|
|
|
|
ThreadNumber = 0;
|
|
ResourceNumber = 0;
|
|
J=0;
|
|
while (J <= NumberOfParticipants) {
|
|
|
|
ThreadForChain = Participants[J].Thread;
|
|
dprintf("Thread %d = %08x\n",ThreadNumber, ThreadForChain);
|
|
|
|
do {
|
|
|
|
if (J == NumberOfParticipants) {
|
|
ResourceNumber = 0;
|
|
}
|
|
J++;
|
|
ResourceNumber++;
|
|
|
|
} while( J <= NumberOfParticipants && Participants[J].ResourceAddress != Participants[J-1].ResourceAddress);
|
|
|
|
ThreadNumber++;
|
|
ResourceNumber--;
|
|
}
|
|
|
|
//
|
|
// Dump out the resource addresses
|
|
//
|
|
|
|
ThreadNumber = 0;
|
|
ResourceNumber = 0;
|
|
J=0;
|
|
#if 1
|
|
while (J < NumberOfParticipants)
|
|
{
|
|
while(J < NumberOfParticipants && Participants[J].ResourceAddress != Participants[J+1].ResourceAddress) {
|
|
|
|
if (Participants[J].ResourceAddress != Participants[J+1].ResourceAddress) {
|
|
CHAR Buffer[0xFF];
|
|
ULONG64 Displacement = 0;
|
|
GetSymbol(Participants[J].ResourceAddress, Buffer, &Displacement);
|
|
|
|
dprintf("Lock %c = %s", 'A' + ResourceNumber, Buffer );
|
|
if (Displacement != 0) {
|
|
dprintf("%s%x", (Displacement < 0xFFF)?"+0x":"",Displacement);
|
|
}
|
|
dprintf(" Type '%s' ",ResourceTypes[Participants[J].Type]);
|
|
dprintf("\n");
|
|
|
|
ResourceNumber++;
|
|
}
|
|
J++;
|
|
}
|
|
J++;
|
|
}
|
|
|
|
#endif
|
|
} else {
|
|
|
|
//
|
|
// Dump out verbose deadlock information -- with stacks
|
|
// Here is an exapmle:
|
|
//
|
|
// Deadlock detected (3 resources in 3 threads):
|
|
//
|
|
//Thread 0 (829785B0) took locks in the following order:
|
|
//
|
|
// Lock A (Spinlock) @ bfc7c254
|
|
// Node: 82887F88
|
|
// Stack: NDIS!ndisNotifyMiniports+0xC1
|
|
// NDIS!ndisPowerStateCallback+0x6E
|
|
// ntkrnlmp!ExNotifyCallback+0x72
|
|
// ntkrnlmp!PopDispatchCallback+0x13
|
|
// ntkrnlmp!PopPolicyWorkerNotify+0x8F
|
|
// ntkrnlmp!PopPolicyWorkerThread+0x10F
|
|
// ntkrnlmp!ExpWorkerThread+0x294
|
|
// ntkrnlmp!PspSystemThreadStartup+0x4B
|
|
//
|
|
// Lock B (Spinlock) @ 8283b87c
|
|
// Node: 82879148
|
|
// Stack: NDIS!ndisDereferenceRef+0x10F
|
|
// NDIS!ndisDereferenceDriver+0x3A
|
|
// NDIS!ndisNotifyMiniports+0xD1
|
|
// NDIS!ndisPowerStateCallback+0x6E
|
|
// ntkrnlmp!ExNotifyCallback+0x72
|
|
// ntkrnlmp!PopDispatchCallback+0x13
|
|
// ntkrnlmp!PopPolicyWorkerNotify+0x8F
|
|
// ntkrnlmp!PopPolicyWorkerThread+0x10F
|
|
//
|
|
//Thread 1 (829785B0) took locks in the following order:
|
|
//
|
|
// Lock B (Spinlock) @ 8283b87c
|
|
// Node: 82879008
|
|
// Stack: NDIS!ndisReferenceNextUnprocessedMiniport+0x3E
|
|
// NDIS!ndisNotifyMiniports+0xB3
|
|
// NDIS!ndisPowerStateCallback+0x6E
|
|
// ntkrnlmp!ExNotifyCallback+0x72
|
|
// ntkrnlmp!PopDispatchCallback+0x13
|
|
// ntkrnlmp!PopPolicyWorkerNotify+0x8F
|
|
// ntkrnlmp!PopPolicyWorkerThread+0x10F
|
|
// ntkrnlmp!ExpWorkerThread+0x294
|
|
//
|
|
// Lock C (Spinlock) @ 82862b48
|
|
// Node: 8288D008
|
|
// Stack: NDIS!ndisReferenceRef+0x10F
|
|
// NDIS!ndisReferenceMiniport+0x4A
|
|
// NDIS!ndisReferenceNextUnprocessedMiniport+0x70
|
|
// NDIS!ndisNotifyMiniports+0xB3
|
|
// NDIS!ndisPowerStateCallback+0x6E
|
|
// ntkrnlmp!ExNotifyCallback+0x72
|
|
// ntkrnlmp!PopDispatchCallback+0x13
|
|
// ntkrnlmp!PopPolicyWorkerNotify+0x8F
|
|
//
|
|
//Thread 2 (82978310) took locks in the following order:
|
|
//
|
|
// Lock C (Spinlock) @ 82862b48
|
|
// Node: 82904708
|
|
// Stack: NDIS!ndisPnPRemoveDevice+0x20B
|
|
// NDIS!ndisPnPDispatch+0x319
|
|
// ntkrnlmp!IopfCallDriver+0x62
|
|
// ntkrnlmp!IovCallDriver+0x9D
|
|
// ntkrnlmp!IopSynchronousCall+0xFA
|
|
// ntkrnlmp!IopRemoveDevice+0x11E
|
|
// ntkrnlmp!IopDeleteLockedDeviceNode+0x3AF
|
|
// ntkrnlmp!IopDeleteLockedDeviceNodes+0xF5
|
|
//
|
|
// Lock A (Spinlock) @ bfc7c254
|
|
// Stack: << Current stack >>
|
|
//
|
|
|
|
|
|
ThreadNumber = 0;
|
|
ResourceNumber = 0;
|
|
J=0;
|
|
|
|
while (J <= NumberOfParticipants) {
|
|
|
|
ThreadForChain = Participants[J].Thread;
|
|
dprintf("Thread %d: %08X",ThreadNumber, ThreadForChain);
|
|
if (DumpNodes && Participants[J].ThreadEntry) {
|
|
dprintf(" (ThreadEntry = %X)\n ", (ULONG) Participants[J].ThreadEntry);
|
|
}
|
|
dprintf(" took locks in the following order:\n\n");
|
|
|
|
|
|
//
|
|
// This is a do .. while so that we can never get an infinite loop.
|
|
//
|
|
do {
|
|
UINT64 CurrentStackAddress;
|
|
UINT64 StackFrame;
|
|
CHAR Buffer[0xFF];
|
|
ULONG64 Displacement = 0;
|
|
|
|
|
|
if (J == NumberOfParticipants) {
|
|
ResourceNumber = 0;
|
|
}
|
|
|
|
GetSymbol(Participants[J].ResourceAddress, Buffer, &Displacement);
|
|
|
|
dprintf(" Lock %c -- %s", 'A' + ResourceNumber, Buffer );
|
|
if (Displacement != 0) {
|
|
dprintf("%s%x", (Displacement < 0xFFF)?"+0x":"",Displacement);
|
|
}
|
|
dprintf(" (%s)\n",ResourceTypes[Participants[J].Type]);
|
|
|
|
|
|
if (DumpNodes && Participants[J].Node)
|
|
dprintf(" Node: %X\n", (ULONG) Participants[J].Node);
|
|
|
|
dprintf(" Stack: ");
|
|
|
|
CurrentStackAddress = Participants[J].StackAddress;
|
|
|
|
if (CurrentStackAddress == 0) {
|
|
|
|
dprintf ("<< Current stack >>\n");
|
|
|
|
} else {
|
|
|
|
for (I = 0; I < StackTraceSize; I++) {
|
|
|
|
ULONG SourceLine;
|
|
|
|
SymbolName[0] = '\0';
|
|
StackFrame = ReadPvoid(CurrentStackAddress);
|
|
if (0 == StackFrame)
|
|
break;
|
|
|
|
GetSymbol(StackFrame, SymbolName, &SymbolOffset);
|
|
|
|
if (I) {
|
|
dprintf(" ");
|
|
}
|
|
|
|
if ((LONG64) SymbolOffset > 0 ) {
|
|
dprintf ("%s+0x%X",
|
|
SymbolName, (ULONG) SymbolOffset);
|
|
} else {
|
|
dprintf ("%X", (ULONG) StackFrame);
|
|
}
|
|
|
|
if (SUCCEEDED(g_ExtSymbols->lpVtbl->GetLineByOffset
|
|
(g_ExtSymbols, StackFrame,
|
|
&SourceLine, SymbolName,
|
|
sizeof(SymbolName), NULL,
|
|
&Displacement))) {
|
|
dprintf (" [%s @ %d]", SymbolName, SourceLine);
|
|
}
|
|
|
|
dprintf ("\n");
|
|
|
|
CurrentStackAddress += PtrSize;
|
|
}
|
|
}
|
|
|
|
dprintf("\n");
|
|
J++;
|
|
ResourceNumber++;
|
|
|
|
} while( J <= NumberOfParticipants && Participants[J].ResourceAddress != Participants[J-1].ResourceAddress);
|
|
|
|
ThreadNumber++;
|
|
ResourceNumber--;
|
|
}
|
|
}
|
|
|
|
Status = S_OK;
|
|
|
|
Exit:
|
|
EXIT_API();
|
|
return Status;
|
|
}
|
|
|
|
|
|
VOID
|
|
PrintGlobalStatistics (
|
|
ULONG64 GlobalsAddress
|
|
)
|
|
{
|
|
ULONG AllocationFailures;
|
|
ULONG64 MemoryUsed;
|
|
ULONG NodesTrimmed;
|
|
ULONG MaxNodesSearched;
|
|
ULONG SequenceNumber;
|
|
|
|
//
|
|
// Dump the globals structure
|
|
//
|
|
|
|
InitTypeRead (GlobalsAddress, verifier!_AVRF_DEADLOCK_GLOBALS);
|
|
|
|
//
|
|
// Print some simple statistics
|
|
//
|
|
|
|
dprintf ("Resources: %u\n", (ULONG) ReadField (Resources[0]));
|
|
dprintf ("Nodes: %u\n", (ULONG) ReadField (Nodes[0]));
|
|
dprintf ("Threads: %u\n", (ULONG) ReadField (Threads[0]));
|
|
dprintf ("\n");
|
|
|
|
MemoryUsed = ReadField (BytesAllocated);
|
|
|
|
if (MemoryUsed > 1024 * 1024) {
|
|
dprintf ("%I64u bytes of kernel pool used.\n", MemoryUsed);
|
|
}
|
|
|
|
AllocationFailures = (ULONG) ReadField (AllocationFailures);
|
|
|
|
if (AllocationFailures > 0) {
|
|
dprintf ("Allocation failures encountered (%u).\n", AllocationFailures);
|
|
}
|
|
|
|
NodesTrimmed = (ULONG) ReadField (NodesTrimmedBasedOnAge);
|
|
dprintf ("Nodes trimmed based on age %u.\n", NodesTrimmed);
|
|
NodesTrimmed = (ULONG) ReadField (NodesTrimmedBasedOnCount);
|
|
dprintf ("Nodes trimmed based on count %u.\n", NodesTrimmed);
|
|
|
|
dprintf ("Analyze calls %u.\n", (ULONG) ReadField (SequenceNumber));
|
|
dprintf ("Maximum nodes searched %u.\n", (ULONG) ReadField (MaxNodesSearched));
|
|
}
|
|
|
|
|
|
BOOLEAN
|
|
SearchForResource (
|
|
ULONG64 GlobalsAddress,
|
|
ULONG64 ResourceAddress
|
|
)
|
|
{
|
|
ULONG I;
|
|
ULONG64 Bucket;
|
|
ULONG64 SizeOfBucket;
|
|
BOOLEAN ResourceFound = FALSE;
|
|
ULONG64 SizeOfResource;
|
|
ULONG FlinkOffset = 0;
|
|
ULONG64 Current;
|
|
ULONG64 CurrentResource;
|
|
ULONG Magic;
|
|
|
|
SizeOfBucket = GetTypeSize("LIST_ENTRY");
|
|
SizeOfResource = GetTypeSize("verifier!_AVRF_DEADLOCK_RESOURCE");
|
|
|
|
GetFieldOffset("verifier!_AVRF_DEADLOCK_RESOURCE",
|
|
"HashChainList",
|
|
&FlinkOffset);
|
|
|
|
if (SizeOfBucket == 0 || SizeOfResource == 0 || FlinkOffset == 0) {
|
|
dprintf ("Error: cannot get size for verifier types. \n");
|
|
return FALSE;
|
|
}
|
|
|
|
InitTypeRead (GlobalsAddress, verifier!_AVRF_DEADLOCK_GLOBALS);
|
|
|
|
Bucket = ReadField (ResourceDatabase);
|
|
|
|
if (Bucket == 0) {
|
|
dprintf ("Error: cannot get resource database address. \n");
|
|
return FALSE;
|
|
}
|
|
|
|
for (I = 0; I < AVRF_DEADLOCK_HASH_BINS; I += 1) {
|
|
|
|
// traverse it ...
|
|
|
|
Current = ReadPvoid(Bucket);
|
|
|
|
while (Current != Bucket) {
|
|
|
|
InitTypeRead (Current - FlinkOffset, verifier!_AVRF_DEADLOCK_RESOURCE);
|
|
CurrentResource = ReadField (ResourceAddress);
|
|
|
|
if (CurrentResource == ResourceAddress ||
|
|
ResourceAddress == Current - FlinkOffset) {
|
|
|
|
CurrentResource = Current - FlinkOffset;
|
|
ResourceFound = TRUE;
|
|
break;
|
|
}
|
|
|
|
Current = ReadPvoid(Current);
|
|
|
|
if (CheckControlC()) {
|
|
dprintf ("\nSearch interrupted ... \n");
|
|
return TRUE;
|
|
}
|
|
}
|
|
|
|
if (ResourceFound) {
|
|
break;
|
|
}
|
|
|
|
dprintf (".");
|
|
|
|
Bucket += SizeOfBucket;
|
|
|
|
}
|
|
|
|
dprintf ("\n");
|
|
|
|
if (ResourceFound == FALSE) {
|
|
|
|
dprintf ("No resource correspoding to %p has been found. \n",
|
|
ResourceAddress);
|
|
}
|
|
else {
|
|
|
|
dprintf ("Found a deadlock verifier resource descriptor @ %p \n",
|
|
CurrentResource);
|
|
|
|
}
|
|
|
|
return ResourceFound;
|
|
}
|
|
|
|
|
|
BOOLEAN
|
|
SearchForThread (
|
|
ULONG64 GlobalsAddress,
|
|
ULONG64 ThreadAddress
|
|
)
|
|
{
|
|
ULONG I;
|
|
ULONG64 Bucket;
|
|
ULONG64 SizeOfBucket;
|
|
BOOLEAN ThreadFound = FALSE;
|
|
ULONG64 SizeOfThread;
|
|
ULONG FlinkOffset = 0;
|
|
ULONG64 Current;
|
|
ULONG64 CurrentThread;
|
|
|
|
SizeOfBucket = GetTypeSize("LIST_ENTRY");
|
|
SizeOfThread = GetTypeSize("verifier!_AVRF_DEADLOCK_THREAD");
|
|
|
|
GetFieldOffset("verifier!_AVRF_DEADLOCK_THREAD",
|
|
"ListEntry",
|
|
&FlinkOffset);
|
|
|
|
if (SizeOfBucket == 0 || SizeOfThread == 0 || FlinkOffset == 0) {
|
|
dprintf ("Error: cannot get size for verifier types. \n");
|
|
return FALSE;
|
|
}
|
|
|
|
InitTypeRead (GlobalsAddress, verifier!_AVRF_DEADLOCK_GLOBALS);
|
|
|
|
Bucket = ReadField (ThreadDatabase);
|
|
|
|
if (Bucket == 0) {
|
|
dprintf ("Error: cannot get thread database address. \n");
|
|
return FALSE;
|
|
}
|
|
|
|
for (I = 0; I < AVRF_DEADLOCK_HASH_BINS; I += 1) {
|
|
|
|
// traverse it ...
|
|
|
|
Current = ReadPvoid(Bucket);
|
|
|
|
while (Current != Bucket) {
|
|
|
|
InitTypeRead (Current - FlinkOffset, verifier!_AVRF_DEADLOCK_THREAD);
|
|
CurrentThread = ReadField (ThreadAddress);
|
|
|
|
if (CurrentThread == ThreadAddress ||
|
|
ThreadAddress == Current - FlinkOffset) {
|
|
|
|
CurrentThread = Current - FlinkOffset;
|
|
ThreadFound = TRUE;
|
|
break;
|
|
}
|
|
|
|
Current = ReadPvoid(Current);
|
|
|
|
if (CheckControlC()) {
|
|
dprintf ("\nSearch interrupted ... \n");
|
|
return TRUE;
|
|
}
|
|
}
|
|
|
|
if (ThreadFound) {
|
|
break;
|
|
}
|
|
|
|
dprintf (".");
|
|
|
|
Bucket += SizeOfBucket;
|
|
|
|
}
|
|
|
|
dprintf ("\n");
|
|
|
|
if (ThreadFound == FALSE) {
|
|
|
|
dprintf ("No thread correspoding to %p has been found. \n",
|
|
ThreadAddress);
|
|
}
|
|
else {
|
|
|
|
dprintf ("Found a deadlock verifier thread descriptor @ %p \n",
|
|
CurrentThread);
|
|
|
|
}
|
|
|
|
return ThreadFound;
|
|
}
|
|
|
|
|
|
VOID
|
|
DumpResourceStructure (
|
|
)
|
|
{
|
|
|
|
}
|
|
|
|
|
|
ULONG
|
|
GetNodeLevel (
|
|
ULONG64 Node
|
|
)
|
|
{
|
|
ULONG Level = 0;
|
|
|
|
while (Node != 0) {
|
|
|
|
Level += 1;
|
|
|
|
if (Level > 12) {
|
|
dprintf ("Level > 12 !!! \n");
|
|
break;
|
|
}
|
|
|
|
InitTypeRead (Node, verifier!_AVRF_DEADLOCK_NODE);
|
|
Node = ReadField (Parent);
|
|
}
|
|
|
|
return Level;
|
|
}
|
|
|
|
BOOLEAN
|
|
AnalyzeResource (
|
|
ULONG64 Resource,
|
|
BOOLEAN Verbose
|
|
)
|
|
{
|
|
ULONG64 Start;
|
|
ULONG64 Current;
|
|
ULONG64 Node;
|
|
ULONG64 Parent;
|
|
ULONG FlinkOffset;
|
|
ULONG RootsCount = 0;
|
|
ULONG NodesCount = 0;
|
|
ULONG Levels[8];
|
|
ULONG ResourceFlinkOffset;
|
|
ULONG I;
|
|
ULONG Level;
|
|
ULONG NodeCounter = 0;
|
|
|
|
ZeroMemory (Levels, sizeof Levels);
|
|
|
|
GetFieldOffset("verifier!_AVRF_DEADLOCK_NODE",
|
|
"ResourceList",
|
|
&FlinkOffset);
|
|
|
|
GetFieldOffset("verifier!_AVRF_DEADLOCK_RESOURCE",
|
|
"ResourceList",
|
|
&ResourceFlinkOffset);
|
|
|
|
InitTypeRead (Resource, verifier!_AVRF_DEADLOCK_RESOURCE);
|
|
|
|
if (! Verbose) {
|
|
|
|
if (ReadField(NodeCount) < 4) {
|
|
return TRUE;
|
|
}
|
|
|
|
dprintf ("Resource (%p) : %I64u %I64u %I64u ",
|
|
Resource,
|
|
ReadField(Type),
|
|
ReadField(NodeCount),
|
|
ReadField(RecursionCount));
|
|
}
|
|
|
|
Start = Resource + ResourceFlinkOffset;
|
|
Current = ReadPvoid (Start);
|
|
|
|
while (Start != Current) {
|
|
|
|
Node = Current - FlinkOffset;
|
|
|
|
Level = (GetNodeLevel(Node) - 1) % 8;
|
|
Levels[Level] += 1;
|
|
|
|
NodesCount += 1;
|
|
|
|
if (NodesCount && NodesCount % 1000 == 0) {
|
|
dprintf (".");
|
|
}
|
|
|
|
Current = ReadPvoid (Current);
|
|
|
|
if (CheckControlC()) {
|
|
return FALSE;
|
|
}
|
|
}
|
|
|
|
dprintf ("[");
|
|
for (I = 0; I < 8; I += 1) {
|
|
dprintf ("%u ", Levels[I]);
|
|
}
|
|
dprintf ("]\n");
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
BOOLEAN
|
|
AnalyzeResources (
|
|
ULONG64 GlobalsAddress
|
|
)
|
|
/*++
|
|
|
|
This routine analyzes all resource to make sure we do not have
|
|
zombie nodes laying around.
|
|
|
|
--*/
|
|
{
|
|
ULONG I;
|
|
ULONG64 Bucket;
|
|
ULONG64 SizeOfBucket;
|
|
ULONG64 SizeOfResource;
|
|
ULONG FlinkOffset = 0;
|
|
ULONG64 Current;
|
|
ULONG64 CurrentResource;
|
|
ULONG Magic;
|
|
BOOLEAN Finished;
|
|
ULONG ResourceCount = 0;
|
|
|
|
dprintf ("Analyzing resources (%p) ... \n", GlobalsAddress);
|
|
|
|
SizeOfBucket = GetTypeSize("LIST_ENTRY");
|
|
SizeOfResource = GetTypeSize("verifier!_AVRF_DEADLOCK_RESOURCE");
|
|
|
|
GetFieldOffset("verifier!_AVRF_DEADLOCK_RESOURCE",
|
|
"HashChainList",
|
|
&FlinkOffset);
|
|
|
|
if (SizeOfBucket == 0 || SizeOfResource == 0 || FlinkOffset == 0) {
|
|
dprintf ("Error: cannot get size for verifier types. \n");
|
|
return FALSE;
|
|
}
|
|
|
|
InitTypeRead (GlobalsAddress, verifier!_AVRF_DEADLOCK_GLOBALS);
|
|
|
|
Bucket = ReadField (ResourceDatabase);
|
|
|
|
if (Bucket == 0) {
|
|
dprintf ("Error: cannot get resource database address. \n");
|
|
return FALSE;
|
|
}
|
|
|
|
for (I = 0; I < AVRF_DEADLOCK_HASH_BINS; I += 1) {
|
|
|
|
// traverse it ...
|
|
|
|
Current = ReadPvoid(Bucket);
|
|
|
|
while (Current != Bucket) {
|
|
|
|
Finished = AnalyzeResource (Current - FlinkOffset, FALSE);
|
|
ResourceCount += 1;
|
|
|
|
if (ResourceCount % 256 == 0) {
|
|
dprintf (".\n");
|
|
}
|
|
|
|
Current = ReadPvoid(Current);
|
|
|
|
if (CheckControlC() || !Finished) {
|
|
dprintf ("\nSearch interrupted ... \n");
|
|
return TRUE;
|
|
}
|
|
}
|
|
|
|
Bucket += SizeOfBucket;
|
|
}
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
|
|
|