blob: 1a11c0c4226eeaf69b020fd82c990599c01442ff [file] [log] [blame]
Sasha Goldshteindda47692016-02-08 03:10:13 -08001Demonstrations of memleak.
2
3
4memleak traces and matches memory allocation and deallocation requests, and
5collects call stacks for each allocation. memleak can then print a summary
6of which call stacks performed allocations that weren't subsequently freed.
7For example:
8
9# ./memleak.py -p $(pidof allocs)
10Attaching to malloc and free in pid 5193, Ctrl+C to quit.
11*** Outstanding allocations:
12 80 bytes in 5 allocations from stack
13 main+0x6d [/home/vagrant/allocs] (400862)
14 __libc_start_main+0xf0 [/usr/lib64/libc-2.21.so] (7fd460ac2790)
15
16*** Outstanding allocations:
17 160 bytes in 10 allocations from stack
18 main+0x6d [/home/vagrant/allocs] (400862)
19 __libc_start_main+0xf0 [/usr/lib64/libc-2.21.so] (7fd460ac2790)
20
21
Sasha Goldshteinb9b9ad32016-02-08 03:41:43 -080022Each entry printed is a set of allocations that originate from the same call
23stack, and that weren't freed yet. The number of bytes and number of allocs
24are followed by the call stack, top to bottom, of the allocation site.
25
Sasha Goldshtein33522d72016-02-08 03:39:44 -080026As time goes on, it becomes apparent that the main function in the allocs
27process is leaking memory, 16 bytes at a time. Fortunately, you don't have to
28inspect each allocation individually -- you get a nice summary of which stack
29is responsible for a large leak.
30
31Occasionally, you do want the individual allocation details. Perhaps the same
32stack is allocating various sizes and you want to confirm which sizes are
33prevalent. Use the -a switch:
34
35# ./memleak.py -p $(pidof allocs) -a
36Attaching to malloc and free in pid 5193, Ctrl+C to quit.
37*** Outstanding allocations:
38 addr = 948cd0 size = 16
39 addr = 948d10 size = 16
40 addr = 948d30 size = 16
41 addr = 948cf0 size = 16
42 64 bytes in 4 allocations from stack
43 main+0x6d [/home/vagrant/allocs] (400862)
44 __libc_start_main+0xf0 [/usr/lib64/libc-2.21.so] (7fd460ac2790)
45
46*** Outstanding allocations:
47 addr = 948d50 size = 16
48 addr = 948cd0 size = 16
49 addr = 948d10 size = 16
50 addr = 948d30 size = 16
51 addr = 948cf0 size = 16
52 addr = 948dd0 size = 16
53 addr = 948d90 size = 16
54 addr = 948db0 size = 16
55 addr = 948d70 size = 16
56 addr = 948df0 size = 16
57 160 bytes in 10 allocations from stack
58 main+0x6d [/home/vagrant/allocs] (400862)
59 __libc_start_main+0xf0 [/usr/lib64/libc-2.21.so] (7fd460ac2790)
60
61
Sasha Goldshteindda47692016-02-08 03:10:13 -080062When using the -p switch, memleak traces the allocations of a particular
63process. Without this switch, kernel allocations (kmalloc) are traced instead.
64For example:
65
66# ./memleak.py
67Attaching to kmalloc and kfree, Ctrl+C to quit.
68...
69 248 bytes in 4 allocations from stack
70 bpf_prog_load [kernel] (ffffffff8118c471)
71 sys_bpf [kernel] (ffffffff8118c8b5)
72
73 328 bytes in 1 allocations from stack
74 perf_mmap [kernel] (ffffffff811990fd)
75 mmap_region [kernel] (ffffffff811df5d4)
76 do_mmap [kernel] (ffffffff811dfb83)
77 vm_mmap_pgoff [kernel] (ffffffff811c494f)
78 sys_mmap_pgoff [kernel] (ffffffff811ddf02)
79 sys_mmap [kernel] (ffffffff8101b0ab)
80
81 464 bytes in 1 allocations from stack
82 traceprobe_command [kernel] (ffffffff81187cf2)
83 traceprobe_probes_write [kernel] (ffffffff81187d86)
84 probes_write [kernel] (ffffffff81181580)
85 __vfs_write [kernel] (ffffffff812237b7)
86 vfs_write [kernel] (ffffffff81223ec6)
87 sys_write [kernel] (ffffffff81224b85)
88 entry_SYSCALL_64_fastpath [kernel] (ffffffff8178182e)
89
90 8192 bytes in 1 allocations from stack
91 alloc_and_copy_ftrace_hash.constprop.59 [kernel] (ffffffff8115d17e)
92 ftrace_set_hash [kernel] (ffffffff8115e767)
93 ftrace_set_filter_ip [kernel] (ffffffff8115e9a8)
94 arm_kprobe [kernel] (ffffffff81148600)
95 enable_kprobe [kernel] (ffffffff811486f6)
96 kprobe_register [kernel] (ffffffff81182399)
97 perf_trace_init [kernel] (ffffffff8117c4e0)
98 perf_tp_event_init [kernel] (ffffffff81192479)
99
100
Sasha Goldshtein33522d72016-02-08 03:39:44 -0800101Here you can see that arming the kprobe to which our eBPF program is attached
102consumed 8KB of memory. Loading the BPF program also consumed a couple hundred
103bytes (in bpf_prog_load).
104
Sasha Goldshteindda47692016-02-08 03:10:13 -0800105memleak stores each allocated block along with its size, timestamp, and the
106stack that allocated it. When the block is deleted, this information is freed
107to reduce the memory overhead.
108
109To avoid false positives, allocations younger than a certain age (500ms by
110default) are not printed. To change this threshold, use the -o switch.
111
112By default, memleak prints its output every 5 seconds. To change this
Sasha Goldshtein75ba13f2016-02-09 06:03:46 -0800113interval, pass the interval as a positional parameter to memleak. You can
114also control the number of times the output will be printed before exiting.
115For example:
116
117# ./memleak.py 1 10
118
119... will print the outstanding allocation statistics every second, for ten
120times, and then exit.
Sasha Goldshteindda47692016-02-08 03:10:13 -0800121
Sasha Goldshteind2241f42016-02-09 06:23:10 -0800122memleak may introduce considerable overhead if your application or kernel is
123allocating and freeing memory at a very high rate. In that case, you can
124control the overhead by sampling every N-th allocation. For example, to sample
125roughly 10% of the allocations and print the outstanding allocations every 5
126seconds, 3 times before quitting:
127
128# ./memleak.py -p $(pidof allocs) -s 10 5 3
129Attaching to malloc and free in pid 2614, Ctrl+C to quit.
130*** Outstanding allocations:
131 16 bytes in 1 allocations from stack
132 main+0x6d [/home/vagrant/allocs] (400862)
133 __libc_start_main+0xf0 [/usr/lib64/libc-2.21.so] (7fdc11ce8790)
134
135*** Outstanding allocations:
136 16 bytes in 1 allocations from stack
137 main+0x6d [/home/vagrant/allocs] (400862)
138 __libc_start_main+0xf0 [/usr/lib64/libc-2.21.so] (7fdc11ce8790)
139
140*** Outstanding allocations:
141 32 bytes in 2 allocations from stack
142 main+0x6d [/home/vagrant/allocs] (400862)
143 __libc_start_main+0xf0 [/usr/lib64/libc-2.21.so] (7fdc11ce8790)
144
145Note that even though the application leaks 16 bytes of memory every second,
146the report (printed every 5 seconds) doesn't "see" all the allocations because
147of the sampling rate applied.
148
Sasha Goldshteindda47692016-02-08 03:10:13 -0800149
150USAGE message:
151
152# ./memleak.py -h
Sasha Goldshtein75ba13f2016-02-09 06:03:46 -0800153usage: memleak.py [-h] [-p PID] [-t] [-a] [-o OLDER] [-c COMMAND]
Sasha Goldshteinc8148c82016-02-09 11:15:41 -0800154 [-s SAMPLE_RATE] [-d STACK_DEPTH] [-T TOP]
Sasha Goldshtein75ba13f2016-02-09 06:03:46 -0800155 [interval] [count]
Sasha Goldshteindda47692016-02-08 03:10:13 -0800156
157Trace outstanding memory allocations that weren't freed.
158Supports both user-mode allocations made with malloc/free and kernel-mode
159allocations made with kmalloc/kfree.
160
Sasha Goldshtein75ba13f2016-02-09 06:03:46 -0800161 interval interval in seconds to print outstanding allocations
162 count number of times to print the report before exiting
163
Sasha Goldshteindda47692016-02-08 03:10:13 -0800164optional arguments:
165 -h, --help show this help message and exit
166 -p PID, --pid PID the PID to trace; if not specified, trace kernel
167 allocs
168 -t, --trace print trace messages for each alloc/free call
Sasha Goldshteindda47692016-02-08 03:10:13 -0800169 -a, --show-allocs show allocation addresses and sizes as well as call
170 stacks
171 -o OLDER, --older OLDER
172 prune allocations younger than this age in
173 milliseconds
174 -c COMMAND, --command COMMAND
175 execute and trace the specified command
Sasha Goldshtein521ab4f2016-02-08 05:48:31 -0800176 -s SAMPLE_RATE, --sample-rate SAMPLE_RATE
177 sample every N-th allocation to decrease the overhead
Sasha Goldshteind2241f42016-02-09 06:23:10 -0800178 -d STACK_DEPTH, --stack_depth STACK_DEPTH
179 maximum stack depth to capture
Sasha Goldshteinc8148c82016-02-09 11:15:41 -0800180 -T TOP, --top TOP display only this many top allocating stacks (by size)
Sasha Goldshteindda47692016-02-08 03:10:13 -0800181
182EXAMPLES:
183
184./memleak.py -p $(pidof allocs)
185 Trace allocations and display a summary of "leaked" (outstanding)
186 allocations every 5 seconds
187./memleak.py -p $(pidof allocs) -t
188 Trace allocations and display each individual call to malloc/free
Sasha Goldshtein75ba13f2016-02-09 06:03:46 -0800189./memleak.py -ap $(pidof allocs) 10
190 Trace allocations and display allocated addresses, sizes, and stacks
191 every 10 seconds for outstanding allocations
192./memleak.py -c "./allocs"
193 Run the specified command and trace its allocations
194./memleak.py
195 Trace allocations in kernel mode and display a summary of outstanding
196 allocations every 5 seconds
197./memleak.py -o 60000
198 Trace allocations in kernel mode and display a summary of outstanding
199 allocations that are at least one minute (60 seconds) old
Sasha Goldshtein521ab4f2016-02-08 05:48:31 -0800200./memleak.py -s 5
201 Trace roughly every 5th allocation, to reduce overhead