From: William Cohen <wcohen@redhat.com>
To: linux-perf-users <linux-perf-users@vger.kernel.org>
Subject: Using perf with cgroups and containers
Date: Wed, 26 Nov 2014 11:59:04 -0500 [thread overview]
Message-ID: <547606D8.3040601@redhat.com> (raw)
Hi,
I have been looking at how perf supports cgroups and containers. The
"-G" option allows limiting the data collected to a particular cgroup.
Thus, one can use the option to collect some information about a
particular cgroup with something like:
$ sudo perf stat -a -e cycles -G machine.slice/machine-qemu\\x2drhel7\\x2dx86_64.scope -e instructions -G machine.slice/machine-qemu\\x2drhel7\\x2dx86_64.scope -- sleep 1
Performance counter stats for 'system wide':
9,668,237 cycles machine.slice/machine-qemu\x2drhel7\x2dx86_64.scope [82.28%]
4,685,886 instructions machine.slice/machine-qemu\x2drhel7\x2dx86_64.scope # 0.48 insns per cycle [82.28%]
1.001359839 seconds time elapsed
However, this approach seems to be awkward. It requires specifying
the cgroup for each event. It also requires the system-wide option
("-a") to get information for all the tasks in the cgroup and
superuser privileges. Thus, even if all the tasks are owned by the
user running the perf command, the command still needs superuser
privileges.
Another limitation is when within a container there doesn't seem to be
a way of doing the equivalent to a "perf record -a ..." to collect
related to that container. When running within a container going to
get something like the following:
# perf stat -a ls
Error:
You may not have permission to collect system-wide stats.
Consider tweaking /proc/sys/kernel/perf_event_paranoid:
-1 - Not paranoid at all
0 - Disallow raw tracepoint access for unpriv
1 - Disallow cpu events for unpriv
2 - Disallow kernel profiling for unpriv
There is a middle ground between monitoring a process/set of processes
and monitoring the entire machine that perf could do a better job of.
Have three broad categories to scope the data collection: pid, cgroup,
and container.
For pid perf can be monitoring itself or a set of processes. perf has
checks to make sure that the monitoring process has permission to
monitor the other processes.
For cgroup monitoring perf implementation only works for systemwide
monitoring "-a". Why should someone need to specify "-a" when they
specify the cgroup to monitor? It seems like this should operater
much more like the selection of processes to monitor.
For containers one might want to either monitor a container from
outside for system health or from the inside while doing development.
Currently perf can monitor from outside but isn't able to monitor from
inside.
Can something be done to improve the usability of perf for cgroups and
containers?
-Will
next reply other threads:[~2014-11-26 16:59 UTC|newest]
Thread overview: 4+ messages / expand[flat|nested] mbox.gz Atom feed top
2014-11-26 16:59 William Cohen [this message]
2014-11-26 20:52 ` Using perf with cgroups and containers Andi Kleen
2014-11-26 21:29 ` William Cohen
2014-11-28 18:00 ` Andi Kleen
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=547606D8.3040601@redhat.com \
--to=wcohen@redhat.com \
--cc=linux-perf-users@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).