mirror of
https://github.com/golang/go
synced 2024-11-11 16:41:37 -07:00
[release-branch.go1.22] runtime: use the correct M ID for syscalling goroutines in traces
Earlier in the development of the new tracer, m.id was used as a the
canonical ID for threads. Later, we switched to m.procid because it
matches the underlying OS resource. However, in that switch, we missed a
spot.
The tracer catches and emits statuses for goroutines that have remained
in either waiting or syscall across a whole generation, and emits a
thread ID for the latter set. The ID being used here, however, was m.id
instead of m.procid, like the rest of the tracer.
This CL also adds a regression test. In order to make the regression
test actually catch the failure, we also have to make the parser a
little less lenient about GoStatus events with GoSyscall: if this isn't
the first generation, then we should've seen the goroutine bound to an
M already when its status is getting emitted for its context. If we emit
the wrong ID, then we'll catch the issue when we emit the right ID when
the goroutine exits the syscall.
Fixes #65196.
Change-Id: I78b64fbea65308de5e1291c478a082a732a8bf9f
Reviewed-on: https://go-review.googlesource.com/c/go/+/557456
Reviewed-by: Michael Pratt <mpratt@google.com>
Auto-Submit: Michael Knyszek <mknyszek@google.com>
LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
(cherry picked from commit c46966653f
)
Reviewed-on: https://go-review.googlesource.com/c/go/+/557436
This commit is contained in:
parent
77e9c26960
commit
ba8e9e14f4
@ -302,6 +302,13 @@ func (o *ordering) advance(ev *baseEvent, evt *evTable, m ThreadID, gen uint64)
|
||||
// Otherwise, we're talking about a G sitting in a syscall on an M.
|
||||
// Validate the named M.
|
||||
if mid == curCtx.M {
|
||||
if gen != o.initialGen && curCtx.G != gid {
|
||||
// If this isn't the first generation, we *must* have seen this
|
||||
// binding occur already. Even if the G was blocked in a syscall
|
||||
// for multiple generations since trace start, we would have seen
|
||||
// a previous GoStatus event that bound the goroutine to an M.
|
||||
return curCtx, false, fmt.Errorf("inconsistent thread for syscalling goroutine %d: thread has goroutine %d", gid, curCtx.G)
|
||||
}
|
||||
newCtx.G = gid
|
||||
break
|
||||
}
|
||||
|
66
src/internal/trace/v2/testdata/testprog/wait-on-pipe.go
vendored
Normal file
66
src/internal/trace/v2/testdata/testprog/wait-on-pipe.go
vendored
Normal file
@ -0,0 +1,66 @@
|
||||
// Copyright 2023 The Go Authors. All rights reserved.
|
||||
// Use of this source code is governed by a BSD-style
|
||||
// license that can be found in the LICENSE file.
|
||||
|
||||
// Tests a goroutine sitting blocked in a syscall for
|
||||
// an entire generation. This is a regression test for
|
||||
// #65196.
|
||||
|
||||
//go:build ignore
|
||||
|
||||
package main
|
||||
|
||||
import (
|
||||
"log"
|
||||
"os"
|
||||
"runtime/trace"
|
||||
"syscall"
|
||||
"time"
|
||||
)
|
||||
|
||||
func main() {
|
||||
// Create a pipe to block on.
|
||||
var p [2]int
|
||||
if err := syscall.Pipe(p[:]); err != nil {
|
||||
log.Fatalf("failed to create pipe: %v", err)
|
||||
}
|
||||
rfd, wfd := p[0], p[1]
|
||||
|
||||
// Create a goroutine that blocks on the pipe.
|
||||
done := make(chan struct{})
|
||||
go func() {
|
||||
var data [1]byte
|
||||
_, err := syscall.Read(rfd, data[:])
|
||||
if err != nil {
|
||||
log.Fatalf("failed to read from pipe: %v", err)
|
||||
}
|
||||
done <- struct{}{}
|
||||
}()
|
||||
|
||||
// Give the goroutine ample chance to block on the pipe.
|
||||
time.Sleep(10 * time.Millisecond)
|
||||
|
||||
// Start tracing.
|
||||
if err := trace.Start(os.Stdout); err != nil {
|
||||
log.Fatalf("failed to start tracing: %v", err)
|
||||
}
|
||||
|
||||
// This isn't enough to have a full generation pass by default,
|
||||
// but it is generally enough in stress mode.
|
||||
time.Sleep(100 * time.Millisecond)
|
||||
|
||||
// Write to the pipe to unblock it.
|
||||
if _, err := syscall.Write(wfd, []byte{10}); err != nil {
|
||||
log.Fatalf("failed to write to pipe: %v", err)
|
||||
}
|
||||
|
||||
// Wait for the goroutine to unblock and start running.
|
||||
// This is helpful to catch incorrect information written
|
||||
// down for the syscall-blocked goroutine, since it'll start
|
||||
// executing, and that execution information will be
|
||||
// inconsistent.
|
||||
<-done
|
||||
|
||||
// Stop tracing.
|
||||
trace.Stop()
|
||||
}
|
@ -521,6 +521,15 @@ func TestTraceManyStartStop(t *testing.T) {
|
||||
testTraceProg(t, "many-start-stop.go", nil)
|
||||
}
|
||||
|
||||
func TestTraceWaitOnPipe(t *testing.T) {
|
||||
switch runtime.GOOS {
|
||||
case "dragonfly", "freebsd", "linux", "netbsd", "openbsd", "solaris":
|
||||
testTraceProg(t, "wait-on-pipe.go", nil)
|
||||
return
|
||||
}
|
||||
t.Skip("no applicable syscall.Pipe on " + runtime.GOOS)
|
||||
}
|
||||
|
||||
func testTraceProg(t *testing.T, progName string, extra func(t *testing.T, trace, stderr []byte, stress bool)) {
|
||||
testenv.MustHaveGoRun(t)
|
||||
|
||||
|
@ -334,7 +334,7 @@ func traceAdvance(stopTrace bool) {
|
||||
if !s.dead {
|
||||
ug.goid = s.g.goid
|
||||
if s.g.m != nil {
|
||||
ug.mid = s.g.m.id
|
||||
ug.mid = int64(s.g.m.procid)
|
||||
}
|
||||
ug.status = readgstatus(s.g) &^ _Gscan
|
||||
ug.waitreason = s.g.waitreason
|
||||
|
Loading…
Reference in New Issue
Block a user