Re: DTrace - capturing two userspace strack frames on top of system call
- In reply to: Martin Cracauer : "Re: DTrace - capturing two userspace strack frames on top of system call"
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Tue, 24 Jan 2023 16:15:46 UTC
On Mon, Jan 23, 2023 at 04:54:05PM -0500, Martin Cracauer wrote: > Mark Johnston wrote on Mon, Jan 23, 2023 at 11:52:12AM -0500: > > On Sun, Jan 22, 2023 at 10:04:50PM -0500, Martin Cracauer wrote: > > > Actually the error only appears on arm64 for me. I moved the script > > > to amd64 and it works as I thought. > > > > Support for userspace tracing on arm64 is definitely less mature than on > > amd64, so this isn't too surprising, unfortunately. > > > > Is the problem reproducible with a trivial program compiled with > > -fno-omit-frame-pointer? > > Yes: > $ gcc -O2 -fno-omit-frame-pointer -Wall -Werror -o crasparse crasparse.c > # dtrace -n 'syscall::write*:entry /arg1/ { @traces[ustack()] = count(); }' -c ./crasparse > dtrace: error on enabled probe ID 1 (ID 57136: syscall:freebsd:writev:entry): invalid address (0x0) in action #2 > [...] > > Should I make a bugzilla entry out of this? Yes please, that would be helpful.