From: fche@redhat.com (Frank Ch. Eigler)
To: Jinhua Luo <luajit.io@gmail.com>
Cc: systemtap@sourceware.org
Subject: Re: [HELP] ubacktrace() problem
Date: Tue, 12 Jan 2016 14:32:00 -0000 [thread overview]
Message-ID: <y0m7fje98cy.fsf@fche.csb> (raw)
In-Reply-To: <CAAc9rOzFmkSKJCmi=0=Vggvaf3-VnwgfHFPfBxG475NKso3arQ@mail.gmail.com> (Jinhua Luo's message of "Tue, 12 Jan 2016 13:47:49 +0800")
Hi -
luajit.io wrote:
> [...]
> See https://github.com/openresty/nginx-systemtap-toolkit#sample-bt-off-cpu
> for the script.
It's a perl-generated stap script/invocation:
https://github.com/openresty/nginx-systemtap-toolkit/blob/master/sample-bt-off-cpu
> It fails to unwind some user backtrace (which is a big fraction of the
> total samples), and just show some hex adddress, e.g. 0xb77a5d40.
>
> I check that address belongs to the vdso mapping. [...]
Please check if your kernel dbgsym packages include the vdso debuginfo
files. In Fedora for example:
% rpm -ql kernel-debuginfo | grep vdso
/usr/lib/debug/lib/modules/4.2.6-200.fc22.x86_64/vdso
/usr/lib/debug/lib/modules/4.2.6-200.fc22.x86_64/vdso/vdso32-int80.so.debug
/usr/lib/debug/lib/modules/4.2.6-200.fc22.x86_64/vdso/vdso32-syscall.so.debug
/usr/lib/debug/lib/modules/4.2.6-200.fc22.x86_64/vdso/vdso32-sysenter.so.debug
/usr/lib/debug/lib/modules/4.2.6-200.fc22.x86_64/vdso/vdso64.so.debug
These may be necessary to be able to unwind through the kernel-user
transition (if a process is interrupted mid-syscall). I seem to
recall that, years ago, the Fedora kernel team had some struggles to
ensure that these userspace libraries' debug data was generated &
included properly. Maybe the Debian/Ubuntu folks are about to have
the same struggle.
> And, I am also get confused about the warnings:
>
> WARNING: Too many CFI instuctions
> WARNING: DWARF expression stack underflow in CFI
> WARNING: no or bad debug frame hdr
> WARNING: No binary search table for eh frame, doing slow linear search
> for stap_b9bfb422b7bd73acc448d7f775aaacd_37477
These generally reflect imperfections in the gcc-generated unwind
information. These are not something a user can do anything about; we
should probably stop warning about them (or give more information like
the suspect module name).
- FChE
next prev parent reply other threads:[~2016-01-12 14:32 UTC|newest]
Thread overview: 6+ messages / expand[flat|nested] mbox.gz Atom feed top
2016-01-12 5:47 Jinhua Luo
2016-01-12 14:32 ` Frank Ch. Eigler [this message]
2016-01-13 8:19 ` Jinhua Luo
2016-01-13 15:23 ` Frank Ch. Eigler
2016-01-14 3:40 ` Jinhua Luo
2016-01-14 8:31 ` Mark Wielaard
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=y0m7fje98cy.fsf@fche.csb \
--to=fche@redhat.com \
--cc=luajit.io@gmail.com \
--cc=systemtap@sourceware.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).