On Wed, Jan 23, 2013 at 06:37:56PM -0300, Ezequiel Garcia wrote:
> Hi Minchan,
> 
> On Wed, Jan 23, 2013 at 1:27 AM, Minchan Kim <minc...@kernel.org> wrote:
> > Hi Ezequiel,
> >
> > On Tue, Jan 22, 2013 at 06:46:58AM -0300, Ezequiel Garcia wrote:
> >> From: Ezequiel Garcia <elezegar...@gmail.com>
> >>
> >> The purpose of trace_analyze.py tool is to perform static
> >> and dynamic memory analysis using a kmem ftrace
> >> log file and a built kernel tree.
> >>
> >> This script and related work has been done on the CEWG/2012 project:
> >> "Kernel dynamic memory allocation tracking and reduction"
> >> (More info here [1])
> >>
> >> It produces mainly two kinds of outputs:
> >>  * an account-like output, similar to the one given by Perf, example below.
> >>  * a ring-char output, examples here [2].
> >>
> >> $ ./scripts/tracing/trace_analyze.py -k linux -f kmem.log --account-file 
> >> account.txt
> >> $ ./scripts/tracing/trace_analyze.py -k linux -f kmem.log -c account.txt
> >>
> >> This will produce an account file like this:
> >>
> >>     current bytes allocated:     669696
> >>     current bytes requested:     618823
> >>     current wasted bytes:         50873
> >>     number of allocs:              7649
> >>     number of frees:               2563
> >>     number of callers:              115
> >>
> >>      total    waste      net alloc/free  caller
> >>     ---------------------------------------------
> >>     299200        0   298928  1100/1     alloc_inode+0x4fL
> >>     189824        0   140544  1483/385   __d_alloc+0x22L
> >>      51904        0    47552   811/68    sysfs_new_dirent+0x4eL
> >>     [...]
> >>
> >> [1] http://elinux.org/Kernel_dynamic_memory_analysis
> >> [2] 
> >> http://elinux.org/Kernel_dynamic_memory_analysis#Current_dynamic_footprint
> >
> > First of all, Thanks for nice work! It could be very useful for
> > embedded side.
> >
> > Questions.
> >
> > 1. Can we detect different call path but same function?
> >    I mean
> >
> >         A       C
> >          \     /
> >           B   D
> >            \ /
> >             E
> >             |
> >          kmalloc
> >
> > In this case, E could be called by A or C. I would like to know the call 
> > path.
> > It could point out exact culprit of memory hogger.
> >
> 
> I'm sorry, I'm not following you:
> How can I know which caller in the call path is the 'real' responsible
> for the allocation?
> 
> The only way I can think of achieving something like this is by using
> kmalloc_track_caller() instead of kmalloc().
> This is done in cases where an allocer is known to alloc memory on
> behalf of its caller.

I mean following as.

It's a example from page_owner about alloc_pages.
I'm not sure it's good example but it could give my intent.

358 times:
Page allocated via order 1, mask 0x2852d0
 [<ffffffff811654f5>] new_slab+0x2d5/0x370
 [<ffffffff815705a8>] __slab_alloc+0x2bb/0x41c
 [<ffffffff811682ac>] kmem_cache_alloc+0x18c/0x1a0
 [<ffffffff8118ac07>] __d_alloc+0x27/0x180
 [<ffffffff8118b038>] d_alloc+0x28/0x80
 [<ffffffff8117d313>] lookup_dcache+0xa3/0xd0
 [<ffffffff8117d363>] __lookup_hash+0x23/0x50
 [<ffffffff8157076a>] lookup_slow+0x49/0xad

..
..

1 times:
Page allocated via order 1, mask 0x2852d0
 [<ffffffff811654f5>] new_slab+0x2d5/0x370
 [<ffffffff815705a8>] __slab_alloc+0x2bb/0x41c
 [<ffffffff811682ac>] kmem_cache_alloc+0x18c/0x1a0
 [<ffffffff8118ac07>] __d_alloc+0x27/0x180
 [<ffffffff8118b038>] d_alloc+0x28/0x80
 [<ffffffff8117d313>] lookup_dcache+0xa3/0xd0
 [<ffffffff8117d363>] __lookup_hash+0x23/0x50
 [<ffffffff81181126>] lookup_one_len+0xd6/0x130

>From above example, alloc_pages could be called from several path
The one path is lookup_slow and another is lookup_one_len so
I can investigate who asks lookup_slow frequently.

> 
> > 2. Does it support alloc_pages family?
> >    kmem event trace already supports it. If it supports, maybe we can 
> > replace
> >    CONFIG_PAGE_OWNER hack.
> >
> 
> Mmm.. no, it doesn't support alloc_pages and friends, for we found
> no reason to do it.
> However, it sounds like a nice idea, on a first thought.
> 
> I'll review CONFIG_PAGE_OWNER patches and see if I can come up with something.

Thanks!

> 
> Meantime, and given this is just a script submission, is there anything
> preventing to merge this? We can move it to perf, and/or add it
> features, etc. later,
> on top of this. Does this make sense?
> 
> -- 
>     Ezequiel
> 
> --
> To unsubscribe, send a message with 'unsubscribe linux-mm' in
> the body to majord...@kvack.org.  For more info on Linux MM,
> see: http://www.linux-mm.org/ .
> Don't email: <a href=mailto:"d...@kvack.org";> em...@kvack.org </a>

-- 
Kind regards,
Minchan Kim
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Reply via email to