alloc-track 0.4.0

Track memory allocations by backtrace or originating thread
Documentation

# alloc-track

This project allows per-thread and per-backtrace realtime memory profiling.

## Use Cases

* Diagnosing memory fragmentation (in the form of volatile allocations)
* Diagnosing memory leaks
* Profiling memory consumption of individual components

## Usage

1. Add the following dependency to your project:
```alloc-track = "0.2.3"```

2. Set a global allocator wrapped by `alloc_track::AllocTrack`

    Default rust allocator:
    ```

    use alloc_track::{AllocTrack, BacktraceMode};
    use std::alloc::System;

    #[global_allocator]
    static GLOBAL_ALLOC: AllocTrack<System> = AllocTrack::new(System, BacktraceMode::Short);
    ```

    Jemallocator allocator:
    ```

    use alloc_track::{AllocTrack, BacktraceMode};
    use jemallocator::Jemalloc;

    #[global_allocator]
    static GLOBAL_ALLOC: AllocTrack<Jemalloc> = AllocTrack::new(Jemalloc, BacktraceMode::Short);
    ```

3. Call `alloc_track::thread_report()` or `alloc_track::backtrace_report()` to generate a report. Note that `backtrace_report` requires the `backtrace` feature and the `BacktraceMode::Short` or `BacktraceMode::Full` flag to be passed to `AllocTrack::new`.

## Performance

In `BacktraceMode::None` or without the `backtrace` feature enabled, the thread memory profiling is reasonably performant. It is not something you would want to run in a production environment though, so feature-gating is a good idea.

When backtrace logging is enabled, the performance will degrade substantially depending on the number of allocations and stack depth. Symbol resolution is delaying, but a lot of allocations means a lot of backtraces. `backtrace_report` takes a single argument, which is a filter for individual backtrace records. Filtering out uninteresting backtraces is both easier to read, and substantially faster to generate a report as symbol resolution can be skipped. See `examples/example.rs` for an example.

## Real World Example

At LeakSignal, we had extreme memory segmentation in a high-bandwidth/high-concurrency gRPC service. We suspected a known hyper issue with high concurrency, but needed to confirm the cause and fix the issue ASAP. Existing tooling (bpftrace, valgrind) wasn't able to give us a concrete cause. I had created a prototype of this project back in 2019 or so, and it's time had come to shine. In a staging environment, I added an HTTP endpoint to generate a thread and backtrace report. I was able to identify a location where a large multi-allocation object was being cloned and dropped very often. A quick fix there solved our memory segmentation issue.