Analysis systems, analysis method and program

ABSTRACT

Analysis system, analysis method and program. The system includes: trace means for acquiring a command issued by software executed in an information processing system and a physical address of a memory used by the command as trace data, and recording the trace data to storage means; event detecting means for detecting an event caused to occur by the software and acquiring event information; conversion means for converting the event information to a memory access pattern configured with a plurality of commands for accessing the memory and a plurality of physical addresses; and memory accessing means for accessing the memory using the converted memory access pattern, causing the trace means to acquire trace data and record the trace data to the storage means.

BACKGROUND

The present invention relates to a system and a method for analyzing thestate of use of a memory by software executed in an informationprocessing system, and a program for causing a computer to implement themethod.

There is known an apparatus that, in order to evaluate, analyze andoptimize software such as an OS and applications, acquires a log at thetime of the software accessing a memory (DRAM) (a memory tracer) asdescribed in Japanese patent applications JP2014-115954A andJP2013-072211. A similar apparatus called a hardware memory tracing tool(HMTT) is also known as described in “HaLock: hardware assisted lockcontention detection in multithreaded applications.”

The above memory tracer acquires, as access logs, only commands from thesoftware and physical addresses of the memory, and does not record dataexisting at the physical addresses. This is because the acquisition ofthe data requires a memory capacity enough to store the data, which isproblematic in view of speed and quantity.

In order to check the behavior of the software in detail by the memorytracer, it is necessary to trace information about when and whichphysical address the software uses and compare the traced informationwith an access log acquired by the memory tracer. This is because it isnot known only from the access log which software accesses the physicaladdress. For the purpose of tracing the information, for example, thereis known a method for dynamically monitoring and tracing the operationof an OS being executed, by software called SystemTap.

SUMMARY

In the case of tracing an event caused to occur by software by the abovemethod, there is a problem that occurs in tracing of such an event thatthe frequency of occurrence of a page fault is high, and the behavior ofthe software is influenced. Here, a page fault is interrupt processingthat occurs when a virtual address area that the software attempts toaccess does not exist on a TLB (Translation Look-aside Buffer) or whenthe virtual address area does not exist on a real memory but is saved inan HDD, an SSD or the like.

Further, when an event occurs that is to be traced and the event isstored in a file format, reading and writing of a large number of fileswill cause a problem to occur if the frequency of occurrence of theevent is high. Specifically, in benchmark analysis for evaluating theoperating speed of hardware or software, overhead due to the tracingfunction like that of SystemTap is large, and, therefore, there is aproblem that behavior differs from a normal operation of a system thatis originally intended to be measured.

Further, although recording of an access log by the memory tracer hasnsec-order accuracy of a memory clock, recording of time by an OS hasonly microsec-order accuracy. Therefore, there is also a problem that itis not known at what time point of the access log a record of SystemTapis to be inserted, and it is difficult to compare the records.

Therefore, there has been demand for provision of a system, a method andthe like making it easy to compare a record by hardware such as a memorytracer with a record by software such as SystemTap without causingreading and writing of a great number of files to occur and withoutinfluencing the behavior of software.

In view of the above problem, the present invention provides a systemfor analyzing the state of use of a memory by software executed in aninformation processing system, the system including: trace means foracquiring a command issued by the software and a physical address of thememory used by the command as trace data, and recording the trace datato storage means; event detecting means for detecting an event caused tooccur by the software and acquiring event information; conversion meansfor converting the event information to a memory access patternconfigured with a plurality of commands for accessing the memory and aplurality of physical addresses; and memory accessing means foraccessing the memory using the converted memory access pattern, causingthe trace means to acquire trace data and record the trace data to thestorage means.

By means of the system and method of the present invention, it preventsto cause reading and writing of a great number of files to occur; italso prevents to influence the behavior of software; and it becomes easyto compare a record by hardware with a record by software.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

FIG. 1 is diagram showing a configuration example of an analysis systemof the present invention and an analysis target information processingsystem;

FIG. 2 is a diagram showing another configuration example of theinformation processing system;

FIG. 3 is a diagram showing an example of a format of data recorded by atracer;

FIG. 4 is a diagram showing an example of event information;

FIG. 5 is a diagram showing a relationship between an address space of amemory and an event;

FIG. 6 is a diagram illustrating a configuration of a memory accesspattern;

FIG. 7 is a functional block diagram of the analysis system;

FIG. 8 is a flowchart showing a flow of processing for detecting anevent and embedding event information performed by the analysis system;

FIG. 9 is a diagram showing an example of a data format in which theevent information is embedded in an access log recorded by the tracer;

FIG. 10 is a functional block diagram of the analysis system;

FIG. 11 is a diagram showing an example of a data format after analysisprocessing is performed and the event information and the like areassigned;

FIG. 12 is a flowchart showing a flow of the analysis processingperformed by the analysis system; and

FIG. 13 is a flowchart showing a flow of detailed processing forconverting a physical address to a virtual address in the analysisprocessing.

DETAILED DESCRIPTION

Although the present invention will be described below along a specificembodiment shown in drawings, the present invention is not limited tothe embodiment described below. FIG. 1 is a diagram showing aconfiguration example of an analysis system of the present invention andan analysis target information processing system. An informationprocessing system 10 includes a CPU 11, a ROM 12, a main storage devicesuch as a DRAM, and an auxiliary storage device 13 such as an SSD,similarly to a general PC and the like. Hereinafter, the main storagedevice will be called a memory 14. Additionally, the informationprocessing system 10 can be provided with hardware such as an externalstorage I/F, a communication I/F, an input/output I/F, a display deviceand an input device.

CPU 11 controls the whole information processing system 10. CPU 11executes software such as an OS 15 and an application 16 and performsprocessing for setting data and for reading/writing data. ROM 12 storesa boot program for starting the information processing system 10,firmware for controlling the hardware, and the like. Memory 14 providesa work area for the CPU 11. Auxiliary storage device 13 stores software,data and the like to be used by CPU 11 so that CPU 11 can use themimmediately.

The external storage I/F is assumed to be a CD-ROM drive, a DVD drive,an SD card/slot or the like, and it performs reading/writing of datafrom/to a recording medium such as a CD-ROM, a DVD, an SD card or thelike. The communication I/F connects to a network such as a LAN and theInternet and enables communication with an apparatus on the network. Thenetwork can be any of a wired network and a wireless network. Theinput/output I/F connects a display device such as a display, an inputdevice such as a keyboard and a mouse, a voice input device such as amicrophone, a voice output device such as a speaker and other devices toenable use of the devices.

The units in the information processing system 10, such as CPU 11, aremutually connected via a bus so that they can exchange data and the likewith one another. Memory 14 is assumed to be, for example, a memorymodule with a plurality of DRAM chips mounted on a printed circuitboard, and it is used by being inserted into a socket into which thememory module can be inserted.

CPU 11 executes the software such as OS 15 and application 16. In theexecution, OS 15 assigns memory areas to a part of functions of OS 15and application 16, and the pieces of software perform predeterminedprocessing as a process using the assigned memory areas. CPU 11 canexecute not only one process but a plurality of processes. At this time,each of the processes has an independent address space and uses avirtual memory larger than memory 14 using auxiliary storage device 13also.

The virtual address space of the virtual memory used by the process isdivided into pieces with a certain size, that is, a plurality of pages.Memory 14, which is a physical memory, is divided into fixed-length pageframes, each frame having the same size as a page. An arbitrary page canbe associated with an arbitrary page frame.

When executing the process, CPU 11 outputs a virtual address to be usedto access a virtual memory. A memory managing unit not shown convertsthe outputted virtual address to a physical address that can be used byCPU 11. At this time, the memory managing unit uses a conversion tablecalled a page table which is created in memory 14 and in which a pageand a page frame are associated with each other to convert the virtualaddress of a certain page to the physical address of a correspondingpage frame. Then, CPU 11 accesses relevant data or the like in memory 14using the converted physical address and a command issued by theprocess.

The content of a page on memory 14 that has not been used for some timeis saved into auxiliary storage device 13, and the content of a pagerequested by the process is copied to memory 14. When the processaccesses the saved page, an event called a page fault occurs. When anevent detecting section 21 accepts this event, OS 15 copies the contentof the saved page to memory 14, and the process accesses the page andexecutes processing for reading/writing of data and the like.

An analysis system 20 shown by a broken line is a system for analyzingthe state of use of the memory by software executed in the informationprocessing system 10 and is configured, including an event detectingsection 21, a tracer 22, a dedicated storage device 23, such as an SSDand an HDD, for storing a tracing result of tracer 22, and an analysisapparatus 24.

The event detecting section 21 can be implemented as one function of OS15. The event detecting section 21 detects an event caused to occur bythe process. As examples of the event, occurrence of an error,disconnection of a session, a page fault and the like can be given. Theevent will be described below as a page fault event. The event detectingsection 21 acquires event information about the detected event. Forexample, SystemTap described above can be used to detect the event. Theevent detecting section 21 secures an event recording page for recordingthe event.

Tracer 22 is special hardware obtained by adding a function of recordingmemory access to memory 14, and a module mounted on the same printcircuit board as memory 14 can be used. This module can be inserted andfitted in the socket instead of the memory module inserted in thesocket. Tracer 22 acquires a command issued by software and a physicaladdress of memory 14 used by the command as trace data and records thetrace data to storage device 23. At the time of recording, tracer 22records the trace data together with the time of acquiring the accesslog. Although tracer 22 is configured to be inserted into the socket foruse here, tracer 22 is not limited thereto but can be used by beingconnected via a cable or the like.

Analysis apparatus 24 acquires the trace data stored in storage device23. Analysis apparatus 24 is provided with storage device 25 for storingthe trace data, such as an SSD and an HDD. Further, analysis apparatus24 is provided with analysis tool 26, which is software for performingdata analysis, and event analyzer 27, and they can be executed by a CPUnot shown.

In information processing system 10, event detecting section 21 detectsan event caused to occur by a process and acquires event information.Then, the event information is converted to a memory access pattern,which is configured with a plurality of commands and a plurality ofphysical addresses in accordance with certain rules, and the convertedmemory access pattern is used to access memory 14. Thereby, tracer 22acquires and records the commands and the physical addresses as anaccess log. Therefore, event information can be recorded to storagedevice 23 as trace data recorded by tracer 22 without the necessity ofstoring the event information as a file each time.

Since tracer 22 continues recording trace data of normal access tomemory 14 even after recording event trace data, the event trace data isin a form of being embedded among a plurality of pieces of recordedtrace data.

Analysis apparatus 24 acquires the plurality of pieces of trace datarecorded by tracer 22 and stores the trace data into storage device 25to perform analysis. Analysis apparatus 24 can use the trace data storedin storage device 25 to perform analysis offline. Event analyzer 27detects the event trace data from among the plurality of pieces of tracedata stored in storage device 25 and extracts the event information.Then, event analyzer 27 assigns the event information to related tracedata and stores the trace data into storage device 25.

Analysis tool 26 analyzes when and which process uses the memory usingthe trace data to which the event information has been assigned, andcauses the display device to output an analysis result about use of thereal memory of the process.

Analysis-target information processing system 10 is not limited to thesystem configured with one CPU 11 and one memory 14 as show in FIG. 1but can be a NUMA (Non-Uniform Memory Access) machine as shown in FIG.2. The NUMA machine is a machine in which pairs (nodes) 17 of CPU 11 andmemory 14 are internally connected, and it is such an architecture thatthe cost of access to memories 14 shared by the plurality of CPUs 11depends on memory areas and CPUs 11 and is not uniform. Further,information processing system 10 can be a system in which a plurality ofinformation processing apparatuses such as PCs are connected via cablesor a network.

In the case of adopting the NUMA machine, tracer 22 is provided formemory 14 of each node 17. Memory 14 to be accessed by a process thathas caused an event to occur is accessed with the use of a memory accesspattern, and tracer 22 of node 17 having memory 14 is caused to acquireand record trace data. That is, an event is recorded to node 17corresponding to a physical address.

Although FIG. 2 illustrates the configuration in which each node 17 isprovided with one CPU 11 and one memory 14, the configuration is notlimited thereto. Each node 17 can be configured with a plurality of CPUs11 and a plurality of memories 14.

Here, the format of trace data recorded by tracer 22 is shown in FIG. 3.Pieces of trace data are arranged in order of time of being acquiredwith trace data acquired the earliest at the top and recorded inassociation with commands (Cmds) and physical addresses (PAs). Thecommands are ACT, RD, WT, PRE and the like. ACT (Activate) is a commandto take in a row address and a bank address in a waiting state. RD(Read) is a command to take in a column address and call data. WT(Write) is a command to take in a column address and write data. PRE(Pre Charge) is a command to terminate all operations and return to thewaiting state. A node number for identifying node 17 shown in FIG. 2 canbe included although it is not shown in FIG. 3.

Memory 14 is managed being divided in a plurality of parts, and eachdivided part is called a bank. Each bank is accessed by specifying abank address. Memory 14 has a plurality of storage areas (memory cells)configured by a plurality of rows and columns, and each memory cell isaccessed with the use of a row address for specifying a row and a columnaddress for specifying a column in addition to a bank address. Thecolumn address can be relatively freely moved and read out. As for therow address, however, it is necessary to terminate an operation once andinput the row address again.

The event information acquired by the event detecting section 21 will bedescribed with reference to FIG. 4. The event information includes aprocess identification information (PID) for identifying software thatexecutes processing using an assigned memory area, that is, a process, aphysical address (PA) of a page frame used by the process, and thevirtual address (VA) of a page. The PID is a number assigned to theprocess. In the case of a page fault event, the content of a saved pagecorresponding to the VA is returned to the real memory 14, and the PA ofa newly assigned page frame after the page table is updated is obtained.

A relationship between a memory address space and event assignment willbe described with reference to FIG. 5. The physical address space of CPU11 is a space from the most significant bit (MSB) up to the leastsignificant bit (LSB) including a DRAM bus width (8 bytes) and a cacheline (64 bytes). Each address space (DRAM address space) of memory 14 isa space configured with a row address, a bank address and a columnaddress. The address space of an event address used for an event is aparticular page, and it is a space with a page size (4 KB or 2 MB in thecase of an x86 CPU).

Since the address space used for an event uses a row address space usedfor a particular page, the row address space of the address space usedfor an event is smaller than each DRAM address space. Further, as for ausable column addresses space, the column address space is smaller thaneach DRAM address space by a cache line size. In the address space usedfor an event, the cache is disabled so that writing to the memory by CPU11 immediately appears on memory 14.

Commands to be outputted to memory 14 will be described with referenceto FIG. 6. Access to the address space used for an event is performed byan ACT command and an RD command. A row address and a bank address aregiven by the ACT command, and a column address is given by the RDcommand. When only a column address part of a PA is changed, the PA isreferred to as the ACT command indicated by “A” and the RD commandsindicated by a series of “Rs” as shown in FIG. 6. In FIG. 6, “P”indicates a PRE command.

From this, if an event which is to be acquired and recorded by tracer 22is converted to a fixed part configured with an ACT command, a rowaddress and a bank address and a variable part configured with an RDcommand and a column address, a memory access pattern configured with aplurality of commands and a plurality of physical addresses as shown inFIG. 6 can be obtained. By actually accessing memory 14 using this,tracer 22 acquires and records an access log about it. Therefore, it ispossible to embed a record of the event into trace data recorded bytracer 22.

As for memory access, processing by a series of commands for anotherbank is started after processing by a series of commands is ended by thePRE command, as shown in FIG. 6.

Functions which analysis system 20 is provided with will be describedwith reference to FIG. 7. Analysis system 20 is provided with eventdetecting section 21, a conversion section 28 and a memory accessingsection 29 as its function sections. Analysis system 20 starts eventdetecting section 21 that detects an event, such as SystemTap, toperform analysis. As advance preparation, an event recording page issecured in memory 14. Then, the cache for the page is disabled so thataccess is immediately outputted to memory 14.

Event detecting section 21 detects an event and acquires eventinformation. Event detecting section 21 outputs the acquired eventinformation to conversion section 28. Conversion section 28 separatesthe event information into a fixed-length part and a variable-lengthpart. The fixed-length part is assigned to the row address and bankaddress of the event recording page in memory 14. PID=0x48 can beassigned to the addresses. The variable-length part is assigned to theplurality of column addresses of the event recording page. Individualpieces of data of a PA and a VA, that is, pieces of data “3”, “4”, “5”,“6”, “4”, “A”, “C”, “5” and “8” are assigned to the addresses.Therefore, conversion section 28 expresses the event information withthe bank address, the row address and the plurality of column addresses,combines them to generate a plurality of addresses, and, thereby,performs conversion to a memory access pattern.

In this example, the PA and VA acquired as the event information arePA=0x04560000 and VA=0xAC580000, respectively. As for a low-orderaddress indicating the inside of a page frame, an address withoutinformation is omitted (“0” in this example), and only “456” and “AC58”are extracted. The extracted addresses are configured with three digitsand four digits, respectively. The first “3” indicates the number ofdigits, and the following “4”, “5” and “6” are obtained by separating“456” one by one. The following “4” indicates the number of digits, and“A”, “C”, “5” and “8” are obtained by separating “AC58” one by one.Conversion by encoding or by a table, and the like can be used to reducethe amount of data.

Conversion section 28 generates a plurality of addresses as thosedescribed on the CPU instruction level in FIG. 6, using the physicaladdress (0x05600000) of the secured event recording page and thefixed-length part and variable-length part described above, and givesthe plurality of addresses to commands to convert them to a memoryaccess pattern.

Specifically, “48” of the PID and the separated one piece of data “3”are combined with the physical address “0x05600000” to generate anaddress “0x05604830”. By repeating this, a series of addresses“0x05604840”, . . . , “0x05604880” is generated. These addresses aregiven to commands to be converted to a memory access pattern.

The commands and addresses of the converted memory access pattern aresequentially taken into CPU 11, and the addresses are accessed. Memory14 is accessed by a bank and a row being identified by a bank addressand a row address first and then a column being specified by a columnaddress. Since the addresses are such that the bank and row addressesare the same and only the column addresses are different, a series ofcolumns are sequentially specified and sequentially accessed. This iscontinuously performed until being ended by the PRE command.

When access is performed in this way, tracer 22 acquires and records thecommands and the physical addresses as an access log, and, thus, theevent is recorded as trace data. Since other pieces of trace data arerecorded afterwards also, the trace data of the event is embedded in thetrace data recorded by tracer 22 as a result.

This processing performed by analysis system 20 will be described withreference to a flowchart shown in FIG. 8. This processing is started atstep 800, and an event recording page is secured at step 810. The pagecan be any page, and two or more pages can be used. At step 820, thecache is disabled. This is done so that access to memory 14 is performednot to the cache but directly to memory 14.

At step 830, it is determined whether event detecting section 21 hasdetected an event. If event detecting section 21 has not detected anevent, this determination is repeated until an event is detected. If anevent is detected, the flow proceeds to step 840, where eventinformation is acquired. At step 850, the event information is convertedto a memory access pattern as described above. At step 860, theconverted memory access pattern is used to access memory 14, and tracer22 is caused to acquire and record trace data. Thereby, the trace dataof the event is embedded into the trace data recorded by tracer 22.

At step 870, it is determined whether or not to end detection of anevent. For example, if a user disables the function of detecting anevent, it can be determined, in response to the setting, that detectionof an event is to be ended. Further, if some error occurs, it can bealso determined that detection of an event is to be ended. If detectionof an event is not to be ended, the flow returns to step 830 to performdetection of an event. If detection of an event is to be ended, the flowproceeds to step 880 to end this processing.

FIG. 9 illustrates actually embedded event trace data. A series ofmemory accesses by a process starts with an ACT command and ends with aPRE command. Since event trace data includes the physical address andPID of an event recording page, the trace data can be detected on thebasis of the information. In FIG. 9, trace data having a physicaladdress “0x056048**” can be detected as event trace data.

After this event, PA=0x04560000 is used by a process with PID=0x48 asVA=0xAC580000.

After embedding event trace data, analysis system 20 can performanalysis at arbitrary time. The analysis can be performed at any time.Analysis system 20 is further provided with, as shown in FIG. 10,storage device 25, data detecting section 30, extraction section 31 andaddress converting section 32 in order to perform the analysis.

Analysis system 20 is provided with an acquisition section not shown,and acquires a plurality of pieces of trace data recorded by tracer 22at arbitrary time and stores the acquired plurality of pieces of tracedata into storage device 25. As for the trace data to be acquired, alltrace data can be acquired, or trace data from a certain time to thepresent time or trace data during a particular period can be acquired.

Data detecting section 30 detects event trace data by referring to abank address and a row address given by an ACT command and determinedwhether trace data is event trace data or other normal trace data. Datadetecting section 30 performs the determination by using physicaladdress information about an event recording page secured by eventdetecting section 21 and referring to the above addresses.

Extraction section 31 extracts event information from the detected eventtrace data. The event information is converted to a memory accesspattern in accordance with certain rules. Therefore, if this is assumedto be Encode, the event information can be extracted by performinganalysis in accordance with certain rules similarly to the case of arelationship between Encode and Decode.

Specifically, extraction section 31 refers to the bank address and therow address given by the ACT command and extracts PID (0x48). Byreferring to column addresses given by RD commands, extraction section31 extracts pieces of data “3”, “4”, “5”, “6”, “4”, “A”, “C”, “5” and“8” and analyzes that the physical address is configured withthree-digit “456” and the virtual address is configured with four-digit“AC58”. From this analysis result, PA=0x04560000 and VA=0xAC580000 areobtained.

Using the extracted event information, address converting section 32converts the physical address to a virtual address used by the processto access memory 14. Since the extracted event information is PID, thePA of a page frame and a VA of a page, address converting section 32converts physical addresses recorded after the event using the pageframe to virtual addresses using the relationship between page frame andpage described above.

Specifically, the physical addresses recorded after the event using thepage frame are “0x04560000”, “0x04560040” and “0x04560080”. BecausePA=0x04560000 and VA=AC580000 are given, “AC5800” of the above VA isused as bank addresses and row addresses in the virtual addresses, andthe column addresses are converted to those of the physical addresses toobtain “0xAC580000”, “0xAC580040” and “0xAC580080”.

Address converting section 32 allocates the extracted event informationand the virtual addresses obtained by conversion to one or more piecesof trace data stored in storage device 25. The one or more pieces oftrace data are one or more pieces of trace data recorded after the eventusing the page frame described above. FIG. 11 illustrates the recordafter the allocation. As event information, PID is assigned to eachpiece of trace data.

The flow of this analysis processing will be described with reference toa flowchart shown in FIG. 12. The analysis processing can be performedat arbitrary time. This processing is started at step 1200. At step1210, a plurality of pieces of trace data recorded by tracer 22 areacquired. At step 1220, the acquired plurality of pieces of trace dataare stored into storage device 25.

At step 1230, data detecting section 30 sequentially calls the pieces oftrace data stored in storage device 25 being arranged in time series,confirms whether they are event trace data or not to detect event tracedata. This confirmation is performed on the basis of address information(row addresses and bank addresses) given by an ACT command to memory 14.At step 1240, event information is extracted from the detected eventtrace data. At step 1250, the extracted event information is used toconvert physical addresses to virtual addresses. At step 1260, theconverted virtual addresses and the event information are assigned totrace data.

At step 1270, it is determined whether or not to end the analysisprocessing. For example, if the user requests the analysis processing tobe ended, it can be determined that the analysis processing is to beended in response to the request. Further, if some error occurs, it canbe determined that the analysis processing is to be ended. If theanalysis processing is not to be ended, the flow returns to step 1210.If the analysis processing is to be ended, the flow proceeds to step1280 to end the analysis processing.

Detailed processing of the steps 1230 to 1260 will be described withreference to a flowchart shown in FIG. 13. This processing is started atstep 1300, and a page table is initialized at step 1310. In theinitialization, PAs and VAs set in the page table are cleared, forexample, to be the value 0. At step 1320, the pieces of trace datastored in time series are sequentially read. At step 1330, in order todetect event trace data, it is determined whether the read trace data isevent trace data or not.

If the trace data is event trace data, the flow proceeds to step 1340,where the log is analyzed, and event information is extracted to updatethe page table. Then, the flow proceeds to step 1390. On the other hand,if the read trace data is not event trace data but ordinary trace data,the content of the page table is not changed, and the flow proceeds tostep 1350, where the page table is used as it is to identify virtualaddresses.

At step 1360, it is determined whether the virtual addresses have beenidentified or not. If the virtual addresses could be identified, theflow proceeds to step 1370, where the identified virtual addresses areadded, and the trace data is updated. That is, the virtual addresses areassigned to the trace data to add the information to the trace data. Onthe other hand, if the virtual addresses cannot be identified, the flowproceeds to step 1380, where the trace data is updated by addinginformation to that effect. Then, the flow proceeds to step 1390, whereit is determined whether there is still trace data to be read. If thereis trace data to be read, the flow returns to step 1320. If there isnot, the flow proceeds to step 1400 to end this processing.

Since it is possible to temporally synchronously embed an event intotrace data recorded by tracer 22 by SystemTap or the like as describedabove, it is possible to easily perform work for synchronization betweenrecording by hardware and recording by software with a high accuracy.Since it is not necessary to stop any other processing to perform thiswork, online processing is possible. Further, since an arbitrary eventcan be associated with trace data, distinction from record of aparticular part in a process becomes possible.

If trace data of an event with a high frequency of occurrence, such as apage fault, is stored into a file each time, overhead occurs, andbehavior of software is influenced. However, it is not necessary tostore the trace data in a file, and, therefore, the influence can bereduced.

The analysis system and analysis method of the present invention havebeen described in detail with reference to the drawings. However, otherembodiments are possible, and addition, modification, deletion and thelike are possible within a range that one skilled in the art can thinkof. Any aspect is included in the scope of the present invention as faras the operation and advantageous effects of the present invention areobtained. Therefore, it is also possible to provide a program forcausing a computer to implement the analysis method and a recordingmedium in which the program is recorded.

What is claimed is:
 1. A computer program product comprising anon-transitory computer readable storage medium having a computerreadable program stored thereon, wherein the computer readable program,when executed, causes a computer to perform a method for analyzing thestate of use of a memory by software executed in an informationprocessing system, wherein event detecting means detects an event causedto occur by the software and acquires event information, the methodcomprising: converting the acquired event information to a memory accesspattern configured with a plurality of commands for accessing the memoryand a plurality of physical addresses; and accessing the memory usingthe converted memory access pattern, causing the trace means to acquiretrace data and record the trace data to storage means.
 2. The programproduct according to claim 1, further causing the computer to executethe steps of: acquiring a plurality of pieces of trace data recorded inthe storage means; detecting trace data of the event from among theacquired plurality of pieces of trace data; and extracting the eventinformation from the detected trace data.
 3. The program productaccording to claim 2, wherein: the event is a page fault event; and theprogram product further causes the computer to convert, using the eventinformation, the physical addresses included in at least one piece oftrace data to virtual addresses to be used by the software to access thememory.
 4. The program product according to claim 3, wherein thecomputer readable instructions further comprises the step of associatingthe physical addresses with the virtual addresses obtained by convertingthe physical addresses to generate a conversion table.
 5. The programproduct according to claim 1, wherein: the memory is managed beingdivided in a plurality of banks and is accessed with the use of bankaddresses for specifying the banks, row addresses for specifying aplurality of rows, and column addresses for specifying a plurality ofcolumns; and at the conversion step, the event information is convertedto the memory access pattern by expressing the event information withthe bank address, the row address and a plurality of the columnaddresses, and combining the bank address, the row address and each ofthe plurality of column addresses to generate a plurality of addresses.6. The program product according to claim 5, wherein: the eventinformation includes process identification information for identifying,as a process, software that performs processing using the memory, andpage frame information to be used by the software to access the memory;and at the conversion step, the process identification information isexpressed with the bank address and the row address, and the page frameinformation is expressed with the plurality of the column addresses. 7.The program product according to claim 1, wherein the informationprocessing system is configured with a plurality of nodes, each nodebeing provided with the trace means; and at the recording step, a memoryaccessed by the software having caused the event to occur is accessed,using the converted memory access pattern, the trace means of a nodehaving the memory is caused to acquire trace data, and the trace data iscaused to be recorded to the storage means.