http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=1292
------- Comment #2 from jfehlig@xxxxxxxxxx 2008-07-10 08:08 -------
I have built tools/libxc with CFLAGS suitable for valgrind hoping to find the
leak in libxenguest or libxenctl, which are loaded in xend process. I was able
to start xend in valgrind with
export XEND_DEBUG=1
export XEND_DAEMONIZE=0
valgrind --log-file=/tmp/xend-vg-out xend start
I then started/stopped some guests and attempted to terminate xend in order to
get a valgrind summary. ctl-c results in
Exception starting xend:
Traceback (most recent call last):
File "/usr/lib64/python2.4/site-packages/xen/xend/server/SrvDaemon.py", line
340, in run
servers.start(status)
File "/usr/lib64/python2.4/site-packages/xen/xend/server/SrvServer.py", line
159, in start
time.sleep(100000000)
KeyboardInterrupt
Sending SIGTERM to xend process running in valgrind results in
[xend] DEBUG (SrvServer:77) SrvServer.cleanup()
[xend] DEBUG (XMLRPCServer:228) XMLRPCServer.cleanup()
[xend] DEBUG (XMLRPCServer:228) XMLRPCServer.cleanup()
[xend] DEBUG (Hald:50) Hald.shutdown() pid:23302
[xend] DEBUG (XendDomain:611) cleanup_domains
Exception in thread HttpServer:
Traceback (most recent call last):
File "/usr/lib64/python2.4/threading.py", line 442, in __bootstrap
self.run()
File "/usr/lib64/python2.4/threading.py", line 422, in run
self.__target(*self.__args, **self.__kwargs)
File "/usr/lib64/python2.4/site-packages/xen/web/httpserver.py", line 312, in
run
(sock, addr) = self.accept()
File "/usr/lib64/python2.4/site-packages/xen/web/httpserver.py", line 331, in
accept
return self.socket.accept()
File "/usr/lib64/python2.4/socket.py", line 169, in accept
sock, addr = self._sock.accept()
error: (22, 'Invalid argument')
Any hints on how to run xend in valgrind would be appreciated. That said, if
the "leak" is in xend python code (e.g. ref not being released) any tips/tricks
on finding such leaks would also be greatly appreciated :-). valgrind
obviously won't be much use if the leak is in xend python code.
--
Configure bugmail:
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs
|