@@ -180,7 +180,7 @@ index 0000000..78f4d8d
180
180
+
181
181
+ #endif /* _DEBUGINFOD_CLIENT_H */
182
182
diff --git a/elf.c b/elf.c
183
- index fb54165..0fcce38 100644
183
+ index fb54165..2eb2546 100644
184
184
--- a/elf.c
185
185
+++ b/elf.c
186
186
@@ -38,6 +38,7 @@ POSSIBILITY OF SUCH DAMAGE. */
@@ -199,10 +199,12 @@ index fb54165..0fcce38 100644
199
199
200
200
#ifndef S_ISLNK
201
201
#ifndef S_IFLNK
202
- @@ -851,6 +853,37 @@ elf_readlink (struct backtrace_state *state, const char *filename,
202
+ @@ -851,6 +853,39 @@ elf_readlink (struct backtrace_state *state, const char *filename,
203
203
204
204
#define SYSTEM_BUILD_ID_DIR "/usr/lib/debug/.build-id/"
205
205
206
+ + static int debuginfod_guard = 0;
207
+ +
206
208
+ static int
207
209
+ elf_open_debugfile_by_debuginfod (const char *buildid_data,
208
210
+ size_t buildid_size,
@@ -237,11 +239,11 @@ index fb54165..0fcce38 100644
237
239
/* Open a separate debug info file, using the build ID to find it.
238
240
Returns an open file descriptor, or -1.
239
241
240
- @@ -4422,6 +4455 ,14 @@ elf_add (struct backtrace_state *state, const char *filename, int descriptor,
242
+ @@ -4422,6 +4457 ,14 @@ elf_add (struct backtrace_state *state, const char *filename, int descriptor,
241
243
242
244
d = elf_open_debugfile_by_buildid (state, buildid_data, buildid_size,
243
245
error_callback, data);
244
- + if (d < 0) {
246
+ + if (d < 0 && !debuginfod_guard ) {
245
247
+ char* env = getenv(DEBUGINFOD_PROGRESS_ENV_VAR);
246
248
+ if (env) {
247
249
+ fprintf(stderr, "Trying to download debuginfo for %s\n", filename);
@@ -252,3 +254,32 @@ index fb54165..0fcce38 100644
252
254
if (d >= 0)
253
255
{
254
256
int ret;
257
+ @@ -4889,7 +4932,28 @@ backtrace_initialize (struct backtrace_state *state, const char *filename,
258
+ pd.exe_filename = filename;
259
+ pd.exe_descriptor = ret < 0 ? descriptor : -1;
260
+
261
+ + /* Here, There Be Dragons: we are about to call dl_iterate_phdr,
262
+ + which is a glibc-internal function that holds a libc internal
263
+ + lock. As this function needs to iterate over all the loaded
264
+ + modules, this lock is shared by dlopen so no new modules can be
265
+ + loaded while is iterating. This is a problem for us, as the
266
+ + debuginfod client will use libcurl to spawn threads to download
267
+ + debuginfo files, and libcurl uses dlopen to load a bunch of stuff
268
+ + for its backend in some versions. This can cause a deadlock because
269
+ + the debuginfod client will wait until the libcurl threads finish but
270
+ + they will never finish because they are waiting for the dlopen lock
271
+ + to be released, which will not happen until the call to dl_iterate_phdr
272
+ + finishes.
273
+ +
274
+ + To avoid this, we use a global variable to detect if we are already
275
+ + iterating over the modules, and if so, we skip the query to debuginfod
276
+ + and just try with the other default methods.
277
+ +
278
+ + Note this ONLY affects the symbol resolution when retrieving a backtrace,
279
+ + and it doesn't affect offline symbolication. */
280
+ + debuginfod_guard++;
281
+ dl_iterate_phdr (phdr_callback, (void *) &pd);
282
+ + debuginfod_guard--;
283
+
284
+ if (!state->threaded)
285
+ {
0 commit comments