From patchwork Tue Apr 15 07:50:24 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ye Liu X-Patchwork-Id: 14051638 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 473D2C369AB for ; Tue, 15 Apr 2025 07:51:10 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 9BCC72800C7; Tue, 15 Apr 2025 03:51:08 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 96AA8280073; Tue, 15 Apr 2025 03:51:08 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 8336C2800C7; Tue, 15 Apr 2025 03:51:08 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0015.hostedemail.com [216.40.44.15]) by kanga.kvack.org (Postfix) with ESMTP id 62F13280073 for ; Tue, 15 Apr 2025 03:51:08 -0400 (EDT) Received: from smtpin23.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay08.hostedemail.com (Postfix) with ESMTP id D4CB6140869 for ; Tue, 15 Apr 2025 07:51:08 +0000 (UTC) X-FDA: 83335507416.23.C9EFFD2 Received: from out-171.mta1.migadu.com (out-171.mta1.migadu.com [95.215.58.171]) by imf14.hostedemail.com (Postfix) with ESMTP id 36B67100002 for ; Tue, 15 Apr 2025 07:51:06 +0000 (UTC) Authentication-Results: imf14.hostedemail.com; dkim=pass header.d=linux.dev header.s=key1 header.b=VVW72aPb; dmarc=pass (policy=none) header.from=linux.dev; spf=pass (imf14.hostedemail.com: domain of ye.liu@linux.dev designates 95.215.58.171 as permitted sender) smtp.mailfrom=ye.liu@linux.dev ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1744703467; a=rsa-sha256; cv=none; b=AqPOCAClNXys9z8V3AlyFH/EVwOWdcdKo/6F+ZLYmwXn71zS9t0gOFCIpmFSr5joP5kCF+ QZjcUOWUbzjvEV4fXgd3n5U9w7P9B8KJUxmR/RToTelfl16bpczFW/vI0menPJMmZG9dpC iEE15qkpfeXo8L93nfh65R/ymBlzBmk= ARC-Authentication-Results: i=1; imf14.hostedemail.com; dkim=pass header.d=linux.dev header.s=key1 header.b=VVW72aPb; dmarc=pass (policy=none) header.from=linux.dev; spf=pass (imf14.hostedemail.com: domain of ye.liu@linux.dev designates 95.215.58.171 as permitted sender) smtp.mailfrom=ye.liu@linux.dev ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1744703467; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-transfer-encoding:content-transfer-encoding: in-reply-to:references:dkim-signature; bh=w7xWxJYFP6M/TEqfUiLVEiOQ7IdW+X8eIqI/gwRpLkM=; b=To6oGODACbwxysPN++zj7VoRsoLem/2uYA0e9qo6MugO43nmHX4BhhfS8usZaKofTXutI/ hKtdeJsSYeKYSPEiQsNvzpfND8nnqIRyvOvha0UlzW+HIaVpJSJ73mNsQkkGUYHqFG8fpG KKJR07gawZWWKncle54YMXsXD+aUSfU= X-Report-Abuse: Please report any abuse attempt to abuse@migadu.com and include these headers. DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.dev; s=key1; t=1744703465; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=w7xWxJYFP6M/TEqfUiLVEiOQ7IdW+X8eIqI/gwRpLkM=; b=VVW72aPbTA5CfCPTg6YTyuwMbCkhi0MPTaIJpFSfD/e5VFBXH8gixxFCKrqH7KikTn/Nbi ziz5Dbj5TKBjMJhReTN66se8zEtDRf27BtfbIfM3gjLxnw3Vllh6EBXzDIsbZYjsQYoTfA 3eFlHnTcnES5z1l2eJPJmHy/6VB8O4A= From: Ye Liu To: linux-kernel@vger.kernel.org, akpm@linux-foundation.org Cc: linux-toolchains@vger.kernel.org, linux-mm@kvack.org, Ye Liu Subject: [PATCH] tools/drgn: Add script to display page state for a given PID and VADDR Date: Tue, 15 Apr 2025 15:50:24 +0800 Message-Id: <20250415075024.248232-1-ye.liu@linux.dev> MIME-Version: 1.0 X-Migadu-Flow: FLOW_OUT X-Rspam-User: X-Rspamd-Queue-Id: 36B67100002 X-Rspamd-Server: rspam04 X-Stat-Signature: wq9wgweai1utm9u7jin8ptht8moqjngd X-HE-Tag: 1744703466-261752 X-HE-Meta: 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 l88VY1X2 52xxEYs7VzjvNB0qpEBVbkVH6SjiEloKsfZBTj4eC3UiZrcWup2OIfVu69TZpcdrlUVn4GkwWWRHF2Jb+20uGVvdZNAkfQFc4I2xXQ4brWTrYHn/DVA9Z43onwboDDDtAptv30VfBzRx4mqBQ4i+eOwKc2EuMNFIodSUfERyUIyG+WwdFRm5lVSbCTWA9Vmag0oms X-Bogosity: Ham, tests=bogofilter, spamicity=0.000053, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: From: Ye Liu Introduces a new drgn script, `show_page_info.py`, which allows users to analyze the state of a page given a process ID (PID) and a virtual address (VADDR). This can help kernel developers or debuggers easily inspect page-related information in a live kernel or vmcore. The script extracts information such as the page flags, mapping, and other metadata relevant to diagnosing memory issues. Currently, there is no specific maintainer entry for `tools/drgn/` in the MAINTAINERS file. Therefore, this patch is sent to the general kernel and tools mailing lists for review. Output example: sudo ./show_page_info.py 1 0x7f2c7de4c000 PID : 1 Comm : systemd mm : 0xffff888116b6d440 User Virtual Address : 0x7f2c7de4c000 Page Address : 0xffffea000b3a4000 raw: 0017ffffc000416c ffffea00045d1b08 ffffea000456d408 ffff888104521970 raw: 0000000000000000 ffff8881083fdb60 0000006900000018 ffff888107a41000 Page Flags : PG_referenced|PG_uptodate|PG_lru|PG_head|PG_active| PG_private|PG_reported Page Size : 16384 Page PFN : 0x2ce900 Page Physical : 0x2ce900000 Page Virtual : 0xffff8882ce900000 Page Refcount : 105 Page Mapcount : 24 Page Index : 0x0 Page Memcg Data : 0xffff888107a41000 Memcg Name : init.scope Memcg Path : /sys/fs/cgroup/memory/init.scope Page Mapping : 0xffff888104521970 Page Anon/File : File Page VMA : 0xffff888109e135e8 VMA Start : 0x7f2c7de4c000 VMA End : 0x7f2c7de58000 This page is part of a compound page. This page is the head page of a compound page. Head Page : 0xffffea000b3a4000 Compound Order : 2 Number of Pages : 4 Signed-off-by: Ye Liu --- tools/drgn/show_page_info.py | 120 +++++++++++++++++++++++++++++++++++ 1 file changed, 120 insertions(+) create mode 100644 tools/drgn/show_page_info.py diff --git a/tools/drgn/show_page_info.py b/tools/drgn/show_page_info.py new file mode 100644 index 000000000000..70d0cd97c7f0 --- /dev/null +++ b/tools/drgn/show_page_info.py @@ -0,0 +1,120 @@ +#!/usr/bin/env drgn +# SPDX-License-Identifier: GPL-2.0-only +# Copyright (C) 2025 Ye Liu + +import argparse +from drgn import Object +from drgn.helpers.linux import find_task, follow_page, page_size +from drgn.helpers.linux.mm import ( + decode_page_flags, page_to_pfn, page_to_phys, page_to_virt, vma_find, + PageSlab, PageCompound, PageHead, PageTail, compound_head, compound_order, compound_nr +) +from drgn.helpers.linux.cgroup import cgroup_name, cgroup_path + +DESC = """ +This is a drgn script to show the page state. +For more info on drgn, visit https://github.com/osandov/drgn. +""" + +MEMCG_DATA_OBJEXTS = 1 << 0 +MEMCG_DATA_KMEM = 1 << 1 +__NR_MEMCG_DATA_FLAGS = 1 << 2 + +def format_page_data(data): + """Format raw page data into a readable hex dump.""" + chunks = [data[i:i+8] for i in range(0, len(data), 8)] + hex_chunks = ["".join(f"{b:02x}" for b in chunk[::-1]) for chunk in chunks] + lines = [" ".join(hex_chunks[i:i+4]) for i in range(0, len(hex_chunks), 4)] + return "\n".join(f"raw: {line}" for line in lines) + +def get_memcg_info(page): + """Retrieve memory cgroup information for a page.""" + memcg_data = page.memcg_data.value_() + if memcg_data & MEMCG_DATA_OBJEXTS: + memcg_value = 0 + elif memcg_data & MEMCG_DATA_KMEM: + objcg = Object(prog, "struct obj_cgroup *", address=memcg_data & ~__NR_MEMCG_DATA_FLAGS) + memcg_value = objcg.memcg.value_() + else: + memcg_value = memcg_data & ~__NR_MEMCG_DATA_FLAGS + + memcg = Object(prog, "struct mem_cgroup *", address=memcg_value) + cgrp = memcg.css.cgroup + return cgroup_name(cgrp).decode(), f"/sys/fs/cgroup/memory{cgroup_path(cgrp).decode()}" + +def show_page_state(page, addr, mm, pid, task): + """Display detailed information about a page.""" + print(f'==============================================================') + print(f'PID : {pid} Comm : {task.comm.string_().decode()} mm : {hex(mm)}') + print(f'User Virtual Address : {hex(addr)}') + print(f'Page Address : {hex(page.value_())}') + print(f'--------------------------------------------------------------') + + print(format_page_data(prog.read(page.value_(), 64))) + print(f'--------------------------------------------------------------') + + print(f'Page Flags : {decode_page_flags(page)}') + print(f'Page Size : {page_size(page).value_()}') + print(f'Page PFN : {hex(page_to_pfn(page).value_())}') + print(f'Page Physical : {hex(page_to_phys(page).value_())}') + print(f'Page Virtual : {hex(page_to_virt(page).value_())}') + print(f'Page Refcount : {page._refcount.counter.value_()}') + print(f'Page Mapcount : {page._mapcount.counter.value_()}') + print(f'Page Index : {hex(page.index.value_())}') + print(f'Page Memcg Data : {hex(page.memcg_data.value_())}') + + memcg_name, memcg_path = get_memcg_info(page) + print(f'Memcg Name : {memcg_name}') + print(f'Memcg Path : {memcg_path}') + print(f'--------------------------------------------------------------') + + print(f'Page Mapping : {hex(page.mapping.value_())}') + print(f'Page Anon/File : {"Anon" if page.mapping.value_() & 0x1 else "File"}') + + vma = vma_find(mm, addr) + print(f'Page VMA : {hex(vma.value_())}') + print(f'VMA Start : {hex(vma.vm_start.value_())}') + print(f'VMA End : {hex(vma.vm_end.value_())}') + print(f'--------------------------------------------------------------') + + if PageSlab(page): + print("This page belongs to the slab allocator.") + + if PageCompound(page): + print("This page is part of a compound page.") + if PageHead(page): + print("This page is the head page of a compound page.") + if PageTail(page): + print("This page is the tail page of a compound page.") + print(f'Head Page : {hex(compound_head(page).value_())}') + print(f'Compound Order : {compound_order(page).value_()}') + print(f'Number of Pages : {compound_nr(page).value_()}') + else: + print("This page is not part of a compound page.") + print(f'==============================================================') + +def main(): + """Main function to parse arguments and display page state.""" + parser = argparse.ArgumentParser(description=DESC, formatter_class=argparse.RawTextHelpFormatter) + parser.add_argument('pid', metavar='PID', type=int, help='Target process ID (PID)') + parser.add_argument('vaddr', metavar='VADDR', type=str, help='Target virtual address in hexadecimal format (e.g., 0x7fff1234abcd)') + args = parser.parse_args() + + try: + vaddr = int(args.vaddr, 16) + except ValueError: + print(f"Error: Invalid virtual address format: {args.vaddr}") + return + + task = find_task(args.pid) + mm = task.mm + page = follow_page(mm, vaddr) + + if page: + show_page_state(page, vaddr, mm, args.pid, task) + else: + print(f"Address {hex(vaddr)} is not mapped.") + +if __name__ == "__main__": + main() +