[{"createTime":1735734952000,"id":1,"img":"hwy_ms_500_252.jpeg","link":"https://activity.huaweicloud.com/cps.html?fromacct=261f35b6-af54-4511-a2ca-910fa15905d1&utm_source=V1g3MDY4NTY=&utm_medium=cps&utm_campaign=201905","name":"华为云秒杀","status":9,"txt":"华为云38元秒杀","type":1,"updateTime":1735747411000,"userId":3},{"createTime":1736173885000,"id":2,"img":"txy_480_300.png","link":"https://cloud.tencent.com/act/cps/redirect?redirect=1077&cps_key=edb15096bfff75effaaa8c8bb66138bd&from=console","name":"腾讯云秒杀","status":9,"txt":"腾讯云限量秒杀","type":1,"updateTime":1736173885000,"userId":3},{"createTime":1736177492000,"id":3,"img":"aly_251_140.png","link":"https://www.aliyun.com/minisite/goods?userCode=pwp8kmv3","memo":"","name":"阿里云","status":9,"txt":"阿里云2折起","type":1,"updateTime":1736177492000,"userId":3},{"createTime":1735660800000,"id":4,"img":"vultr_560_300.png","link":"https://www.vultr.com/?ref=9603742-8H","name":"Vultr","status":9,"txt":"Vultr送$100","type":1,"updateTime":1735660800000,"userId":3},{"createTime":1735660800000,"id":5,"img":"jdy_663_320.jpg","link":"https://3.cn/2ay1-e5t","name":"京东云","status":9,"txt":"京东云特惠专区","type":1,"updateTime":1735660800000,"userId":3},{"createTime":1735660800000,"id":6,"img":"new_ads.png","link":"https://www.iodraw.com/ads","name":"发布广告","status":9,"txt":"发布广告","type":1,"updateTime":1735660800000,"userId":3},{"createTime":1735660800000,"id":7,"img":"yun_910_50.png","link":"https://activity.huaweicloud.com/discount_area_v5/index.html?fromacct=261f35b6-af54-4511-a2ca-910fa15905d1&utm_source=aXhpYW95YW5nOA===&utm_medium=cps&utm_campaign=201905","name":"底部","status":9,"txt":"高性能云服务器2折起","type":2,"updateTime":1735660800000,"userId":3}]
1.设置linux系统可以生成dump
ulimit -c unlimited
2.编译程序可以为debug版本
gcc utest.c -o utest -lpthread -lm -Wall -O0 -g
3.运行生成dump
非法指令 (核心已转储)
在目录下,生成core文件
4.用gdb打开core文件
gdb utest core
其中utest是我第2步编译处理的可执行文件
5.输入bt可见调用栈
(gdb) bt #0 0x00007f5dd6da8631 in com_funs_init_ip_filter () from
/usr/lib/libuavs2e.so #1 0x00007f5dd6dfa2a0 in avs2_lib_create () from
/usr/lib/libuavs2e.so #2 0x00000000004032f9 in main (argc=3,
argv=0x7fffbc1b8a98) at utest.c:668
6.查看汇编信息
x/30i $rip 或者直接地址 x/30i 0x00007f5dd6da8631
可见汇编指令是
vextracti128 $0x1,%ymm2,0x90(%rax)
7.编译c文件测试汇编指令
#include <stdio.h> int main() { int a = 0; asm volatile ( "vextracti128
$0x1,%%ymm2,0x90\n" : "=r"(a) ); return 0; }
8.执行发现同样问题,确认是汇编指令导致,查询cat /proc/cpuinfo的flags支持的指令集。
vextracti128是avx2,如果cpu的flags不支持该指令集,则会出现非法指令。