You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When profiling a process with perf_events I see some call stacks that are very deep, repeating a single address many times (usually around 100 or 125). The repeated addresses that I've checked always refer to a CALL runtime.deferreturn(SB) instruction, whereas non-repeated addresses refer to the instruction after a CALL to a different function.
The output of perf script -k $debugkernel -i perf.data includes some samples like the following:
redacted 1234 cycles:
5dabd5 sync/atomic.LoadUint64 (/redacted)
4a5557 net.(*netFD).readUnlock (/redacted)
4a5e51 net.(*netFD).Read (/redacted)
4a5e51 net.(*netFD).Read (/redacted)
4a5e51 net.(*netFD).Read (/redacted)
4a5e51 net.(*netFD).Read (/redacted)
4a5e51 net.(*netFD).Read (/redacted)
4a5e51 net.(*netFD).Read (/redacted)
// etc, for a total of 124 instances of address 4a5e51
The relevant section of go tool objdump output is as follows:
The function that appears to be called by the first instance of net.(*netFD).Read certainly shows up as a deferred function, but I don't believe net.(*netFD).Read should show up on the sampled stack this many times. It looks like the call stack would appear to be infinite if perf script didn't cut it off after 125 frames. The identity of net.(*netFD).Read's caller is lost.
My program is compiled with a Go toolchain that I built with GOEXPERIMENT=framepointer. I'm using Go version 30b9663, running the process on linux/amd64 with kernel version 3.13, and profiling it with perf_events, via perf record -g -F 977 -p 1234 -o perf.data -- sleep 300 and perf script -k $debugkernel -i perf.data
$ go version
go version devel +30b9663 Tue Oct 13 21:06:58 2015 +0000 linux/amd64
The text was updated successfully, but these errors were encountered:
Since we're planning to enable frame pointers by default for 1.7 (#15840), I'm putting this in a 1.7 milestone.
I'm not sure exactly what's happening yet, but I'm sure it's because the calling convention around deferreturn (and jmpdefer in particular) is very strange. I'm not surprised it screws up BP.
When profiling a process with perf_events I see some call stacks that are very deep, repeating a single address many times (usually around 100 or 125). The repeated addresses that I've checked always refer to a
CALL runtime.deferreturn(SB)
instruction, whereas non-repeated addresses refer to the instruction after aCALL
to a different function.The output of
perf script -k $debugkernel -i perf.data
includes some samples like the following:The relevant section of
go tool objdump
output is as follows:The function that appears to be called by the first instance of
net.(*netFD).Read
certainly shows up as a deferred function, but I don't believenet.(*netFD).Read
should show up on the sampled stack this many times. It looks like the call stack would appear to be infinite ifperf script
didn't cut it off after 125 frames. The identity ofnet.(*netFD).Read
's caller is lost.My program is compiled with a Go toolchain that I built with GOEXPERIMENT=framepointer. I'm using Go version 30b9663, running the process on linux/amd64 with kernel version 3.13, and profiling it with perf_events, via
perf record -g -F 977 -p 1234 -o perf.data -- sleep 300
andperf script -k $debugkernel -i perf.data
The text was updated successfully, but these errors were encountered: