mallocstacks.php 1.6 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667
  1. <?php
  2. if ($argc < 2) {
  3. echo "USAGE: mallocstacks PID [NUM_STACKS=1024]\n";
  4. exit(1);
  5. }
  6. $pid = (int)$argv[1];
  7. $stacks = ($argc == 3 && is_numeric($argv[2]) && (int)$argv[2] > 0) ? $argv[2] : "1024";
  8. $bpf_text = <<<EOT
  9. #include <uapi/linux/ptrace.h>
  10. BPF_HASH(calls, int);
  11. BPF_STACK_TRACE(stack_traces, {$stacks});
  12. int alloc_enter(struct pt_regs *ctx, size_t size) {
  13. int key = stack_traces.get_stackid(ctx, BPF_F_USER_STACK);
  14. if (key < 0)
  15. return 0;
  16. u64 zero = 0, *val;
  17. val = calls.lookup_or_try_init(&key, &zero);
  18. if (val) {
  19. (*val) += size;
  20. }
  21. return 0;
  22. };
  23. EOT;
  24. $ebpf = new Ebpf($bpf_text);
  25. $ebpf->attach_uprobe("c", "malloc", "alloc_enter", ["pid" => $pid]);
  26. echo "Attaching to malloc in pid {$pid}, Ctrl+C to quit.\n";
  27. pcntl_signal(SIGINT, "signalHandler");
  28. pcntl_async_signals(true);
  29. # sleep until Ctrl-C
  30. while (true) {
  31. sleep(99999999);
  32. }
  33. function signalHandler($signo)
  34. {
  35. global $ebpf;
  36. global $pid;
  37. switch ($signo) {
  38. case SIGINT:
  39. $calls = $ebpf->get_table("calls");
  40. $stack_traces = $ebpf->get_table("stack_traces");
  41. $calls_vals = $calls->values();
  42. arsort($calls_vals);
  43. foreach ($calls_vals as $key => $value) {
  44. printf("%d bytes allocated at:\n", $value);
  45. if ($key > 0) {
  46. $a = $stack_traces->values($key, $pid);
  47. foreach ($a as $addr) {
  48. printf("\t%s\n", $addr);
  49. }
  50. printf(" %d\n\n", $value);
  51. }
  52. }
  53. exit(0);
  54. }
  55. }