From: Jiri Olsa <jolsa@redhat.com>
To: Milian Wolff <mail@milianw.de>
Cc: linux-perf-users@vger.kernel.org,
Arnaldo Carvalho de Melo <acme@kenel.org>
Subject: Re: missing mmap events in perf profiles without dwarf callgraph
Date: Wed, 13 Jan 2021 19:45:54 +0100 [thread overview]
Message-ID: <20210113184554.GB1358609@krava> (raw)
In-Reply-To: <3012158.k929uczAvT@milian-workstation>
On Wed, Jan 13, 2021 at 06:47:22PM +0100, Milian Wolff wrote:
> On Mittwoch, 13. Januar 2021 11:30:31 CET Jiri Olsa wrote:
> > On Mon, Jan 11, 2021 at 05:56:52PM +0100, Milian Wolff wrote:
> > > Hey there,
> > >
> > > in hotspot I noticed a symbolization bug for perf.data files that are
> > > recorded without `--call-graph dwarf`, i.e. something like this:
> > >
> > > ```
> > > $ cat test.c
> > > int main()
> > > {
> > >
> > > int sum = 0;
> > > for (int i = 0; i < 100000; ++i) sum += i;
> > > return sum > 0;
> > >
> > > }
> > > $ gcc -O0 -g test.c
> > > $ perf record ./a.out
> > > $ perf script --show-mmap-events | grep /a.out
> > >
> > > a.out 149719 18106.394277: PERF_RECORD_MMAP2 149719/149719:
> > > [0x55e0b3b5e000(0x1000) @ 0 00:31 22086 3699042272]: r-xp /tmp/a.out
> > >
> > > a.out 149719 18106.394748: 275254 cycles:u:
> > > 55e0b3b5e72e
> > >
> > > main+0x25 (/tmp/a.out)
> > >
> > > a.out 149719 18106.395011: 486078 cycles:u:
> > > 55e0b3b5e72e
> > >
> > > main+0x25 (/tmp/a.out)
> > > ```
> >
> > for some reason I can't reproduce this and also I'm not getting
> > randomized VA for your example, while I see it in other processes,
> > which is strange.. I'll check on it deeper
>
> Out of interest: what exactly are you not reproducing? And what do you mean by
> "randomized VA"?
that address 55e0b3b5e72e is randomized by kernel,
but I had to compile your example with -pie to get it,
otherwise I was seeing the standard 0x0400000 something
I'm now seeing:
ex 1381597 1084961.360877: PERF_RECORD_MMAP2 1381597/1381597: [0x558f08599000(0x1000) @ 0x1000 fd:03 155428 2806170740]: r-xp /home/jolsa/trash/ex
ex 1381597 1084961.360889: PERF_RECORD_MMAP2 1381597/1381597: [0x7f283cc80000(0x21000) @ 0x2000 fd:01 274841 3265102552]: r-xp /usr/lib64/ld-2.31.so
ex 1381597 1084961.360898: PERF_RECORD_MMAP2 1381597/1381597: [0x7ffc2cd9c000(0x2000) @ 0 00:00 0 0]: r-xp [vdso]
ex 1381597 1084961.360917: 1 cycles:u: ffffffffabc01007 [unknown] ([unknown])
ex 1381597 1084961.360920: 1 cycles:u: ffffffffabc01007 [unknown] ([unknown])
ex 1381597 1084961.360922: 9 cycles:u: ffffffffabc01007 [unknown] ([unknown])
ex 1381597 1084961.360924: 180 cycles:u: ffffffffabc01007 [unknown] ([unknown])
ex 1381597 1084961.360929: 3839 cycles:u: ffffffffabc01007 [unknown] ([unknown])
ex 1381597 1084961.361010: PERF_RECORD_MMAP2 1381597/1381597: [0x7f283caa4000(0x150000) @ 0x25000 fd:01 313184 1927740165]: r-xp /usr/lib64/libc-2.31.so
ex 1381597 1084961.361695: 22432 cycles:u: 558f08599140 main+0x17 (/home/jolsa/trash/ex)
ex 1381597 1084961.361702: 20545 cycles:u: 558f08599140 main+0x17 (/home/jolsa/trash/ex)
ex 1381597 1084961.361709: 99474 cycles:u: 558f08599140 main+0x17 (/home/jolsa/trash/ex)
and it seems to work because there's 0x1000 pgoffset (number behind @)
which for your test seems to be 0
I'm having sample with:
558f08599140 main+0x17
that falls into:
ex 1381597 1084961.360877: PERF_RECORD_MMAP2 1381597/1381597: [0x558f08599000(0x1000) @ 0x1000 fd:03 155428 2806170740]: r-xp /home/jolsa/trash/ex
0x558f08599140 - 0x558f08599000 + 0x1000 = 0x1140
with main symbol:
$ nm ex | grep main
U __libc_start_main@@GLIBC_2.2.5
0000000000001129 T main
0x1140 - 0x1129 = 0x17 which is correct
>
> > > How does perf resolve the address 0x55e0b3b5e72e to main+0x25 here? If we
> > > look at this purely from the singular mmap event, this shouldn't be the
> > > case:
> > >
> > > 1) The mmap event starts at 0x55e0b3b5e000, has size 0x1000, so its end is
> > > at 0x55e0b3b5f000.
> > >
> > > 2) Address 55e0b3b5e72e is thus contained in this map, and at offset
> > > 0x72e.
> > >
> > > 3) But main is not at this offset, it starts at 0x1709:
> > >
> > > ```
> > > $ nm ./a.out | grep main
> > >
> > > U __libc_start_main
> > >
> > > 0000000000001709 T main
> > > ```
> > >
> > > How does perf report/script still get the right answer here and knows that
> > > there's an offset of 0x1000?
> > >
> > > Note that in reality, multiple mmap events occur. And the first one maps
> > > the file at an address with the 0x1000 offset. This can be seen by:
> > >
> > > ```
> > > $ perf record --call-graph dwarf ./a.out
> > > $ perf script --show-mmap-events | grep /a.out
> > > a.out 149953 18488.265340: PERF_RECORD_MMAP2 149953/149953:
> > > [0x55b2f29d2000(0x4000) @ 0 00:31 22086 3699042272]: r--p /tmp/a.out
> > > a.out 149953 18488.265346: PERF_RECORD_MMAP2 149953/149953:
> > > [0x55b2f29d3000(0x1000) @ 0 00:31 22086 3699042272]: r-xp /tmp/a.out
> > > a.out 149953 18488.265348: PERF_RECORD_MMAP2 149953/149953:
> > > [0x55b2f29d4000(0x1000) @ 0 00:31 22086 3699042272]: rw-p /tmp/a.out
> > > a.out 149953 18488.265350: PERF_RECORD_MMAP2 149953/149953:
> > > [0x55b2f29d5000(0x1000) @ 0 00:31 22086 3699042272]: rw-p /tmp/a.out
> > > a.out 149953 18488.265706: PERF_RECORD_MMAP2 149953/149953:
> > > [0x55b2f29d4000(0x1000) @ 0 00:31 22086 3699042272]: r--p /tmp/a.out
> > >
> > > 55b2f29d372e main+0x25 (/tmp/a.out)
> > > 55b2f29d372e main+0x25 (/tmp/a.out)
> >
> > when you use '--call-graph dwarf' you also enable data mmaps,
> > so the extra mmap events are non-X mmaps
>
> I see, is this an optimization to reduce the overhead when doing this
> "shallow" sampling? Can one opt-in to the data mmaps without going the full
> `--call-graph dwarf` way?
5c0cf22477ea perf record: Store data mmaps for dwarf unwind
says:
But we've seen cases (softice) where DWARF unwinder went through non
executable mmaps, which we need to lookup in MAP__VARIABLE tree.
it's hardcoded
jirka
next prev parent reply other threads:[~2021-01-13 18:47 UTC|newest]
Thread overview: 9+ messages / expand[flat|nested] mbox.gz Atom feed top
2021-01-11 16:56 missing mmap events in perf profiles without dwarf callgraph Milian Wolff
2021-01-13 10:30 ` Jiri Olsa
2021-01-13 17:47 ` Milian Wolff
2021-01-13 18:45 ` Jiri Olsa [this message]
2021-01-13 19:18 ` Milian Wolff
2021-01-14 8:56 ` Namhyung Kim
2021-01-19 8:09 ` Milian Wolff
2021-01-19 9:36 ` Namhyung Kim
2021-01-19 11:33 ` Milian Wolff
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20210113184554.GB1358609@krava \
--to=jolsa@redhat.com \
--cc=acme@kenel.org \
--cc=linux-perf-users@vger.kernel.org \
--cc=mail@milianw.de \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).