selecting points of interest in traces using patterns of
play

Selecting points of interest in traces using patterns of events - PowerPoint PPT Presentation

Selecting points of interest in traces using patterns of events Franois Trahay , Elisabeth Brunet, Mohamed Mosli Bouksiaa, Jianwei Liao Context Hardware is more and more complex NUMA, hierarchical caches, GPU, ... Software is more


  1. Selecting points of interest in traces using patterns of events François Trahay , Elisabeth Brunet, Mohamed Mosli Bouksiaa, Jianwei Liao

  2. Context  Hardware is more and more complex • NUMA, hierarchical caches, GPU, ...  Software is more and more complex • Hybrid MPI+OpenMP, MPI+CUDA, …  Achieving good performance is hard  Understanding the performance of an application is difficult → Need for performance analysis tools 2

  3. Performance analysis Tracing tools  Tracing applications (#82) 5292 Enter: function 14, process 7, source 0 (#83) 5387 Leave: function 1, process 7, source 0 (#84) 5540 Enter: function 14, process 3, source 0 • Run the application once (#85) 5631 Leave: function 1, process 3, source 0 (#86) 5767 Enter: function 14, process 5, source 0 • Capture interesting events (eg. MPI functions) (#87) 5801 Leave: function 1, process 5, source 0 (#88) 5995 Counter: process 8, counter 1, value 14829 • Generate an execution trace (#89) 6062 Counter: process 8, counter 1, value 14573 (#90) 6747 Enter: function 14, process 9, source 0 - Visualize & understand the behavior of the (#91) 6764 Counter: process 6, counter 1, value 14829 (#92) 6796 Leave: function 1, process 9, source 0 application (#93) 6806 Counter: process 6, counter 1, value 14573 - Find problematic parts of the execution  Examples • VampirTrace • ScalaTrace • Intel Trace Analyzer and Collector • EZTrace • … 3

  4. Visualizing large trace files  Visualizing a large trace is difficult • Millions of events  How to detect the interesting part of the trace ? NPB CG class A 16 MPI Processes – 426 000 events 4

  5. Visualizing large trace files  Visualizing a large trace is difficult • Millions of events  How to detect the interesting part of the trace ? NPB CG class A 16 MPI Processes – 426 000 events 5

  6. Visualizing large trace files repeating patterns  A trace is usually structured • Loops • Functions  Lots of similar information NPB CG class A 16 MPI Processes – 426 000 events 6

  7. Proposal: pointing what users should examinate  Detect similarities in a trace • Application phases that repeat 100 x { MPI_SEND (src=0 dest=1 len=16 tag=0) MPI_RECV (src=1 dest=0 len=16 tag=0) } MPI_Barrier 10000 x { MPI_SEND (src=0 dest=1 len=16 tag=0) MPI_RECV (src=1 dest=0 len=16 tag=0) } MPI_Barrier  Select « points of interests » of the trace • Parts that users should examine first • Where useful information is 7

  8. Detecting similarities 8

  9. Representation of a trace  A trace can be represented as an event list  Goal: detect patterns in this list • Can be viewed as a factorization 9

  10. Factorization algorithm First step: find small patterns  Find a couple of events (e1, e2) that appears several times → 2-event patterns  Browse the event list and search for duplicated sequences 10

  11. Factorization algorithm First step: find small patterns  Find a couple of events (e1, e2) that appears several times → 2-event patterns  Browse the event list and search for duplicated sequences 11

  12. Factorization algorithm Second step: find loops in patterns  A loop is a sequence of events that repeats • Each iteration has been detected as a pattern  Browse the patterns lists and search for consecutive sequences 12

  13. Factorization algorithm Second step: find loops in patterns  A loop is a sequence of events that repeats • Each iteration has been detected as a pattern  Browse the patterns lists and search for consecutive sequences 13

  14. Factorization algorithm Second step: find loops in patterns  A loop is a sequence of events that repeats • Each iteration has been detected as a pattern  Browse the patterns lists and search for consecutive sequences 14

  15. Factorization algorithm Second step: find loops in patterns  A loop is a sequence of events that repeats • Each iteration has been detected as a pattern  Browse the patterns lists and search for consecutive sequences 15

  16. Factorization algorithm Third step: try to expand patterns  Is this 2-event pattern a 3-event pattern ? 16

  17. Factorization algorithm Third step: try to expand patterns  Is this 2-event pattern a 3-event pattern ?  Case 1 : pattern #1 is always followed by event C 17

  18. Factorization algorithm Third step: try to expand patterns  Is this 2-event pattern a 3-event pattern ?  Case 1 : pattern #1 is always followed by event C → pattern #1 is a 3-event pattern 18

  19. Factorization algorithm third step: try to expand patterns  Is this 2-event pattern a 3-event pattern ?  Case 2: pattern #1 is not always followed by event C, but it sometimes is → create pattern #2 that integrates Pattern #1 19

  20. Factorization algorithm third step: try to expand patterns  Is this 2-event pattern a 3-event pattern ?  Case 2: pattern #1 is not always followed by event C, but it sometimes is → create pattern #2 that integrates Pattern #1 20

  21. Factorization algorithm third step: try to expand patterns  Is this 2-event pattern a 3-event pattern ?  Case 3: pattern #1 is followed by event C only once → do nothing 21

  22. Factorization algorithm Limitations  Only valid for 1 thread/process • Based on temporal order → the algorithm needs to run for each thread → can be done in parallel  Complexity : O(n 2 ) • Worst case complexity (when there is no pattern) • In real life : it depends on the size of patterns 22

  23. Evaluation  Implemented in EZTrace • Post mortem analysis • Parallelized with OpenMP Kernel Pattern # of events # of patterns  Stark cluster detection (ms) • 4 nodes CG 178 284 000 160 • Quad-core Xeon MG 186 118 000 2 728 SP 596 557 000 174  Results BT 951 400 000 112 LU 4 564 4 568 000 210 • Detects patterns NPB Class A, Procs=16 • Detects the applications iterations • Cheap compared to data mining techniques 23

  24. Selecting points of interest 24

  25. Searching for duplicated information  Select representative occurrences • Instead of examining 1000 occurrences • Select 1 occurrence per class #327 #549 #871 25

  26. Selecting representative occurrences  Classify occurrences according to their duration  Search for 'peaks' in the distribution 26

  27. Filtering traces  Select one occurrence per peak • Filter out 'similar' occurrences 27

  28. Experimental results NPB class A, 16 procs Kernel # events #events after filtering EP 3 090 2 873 FT 10 256 6 704 IS 18 552 15 948 MG 118 688 41 031 CG 284 754 11 724 BT 399 944 24 338 SP 557 318 68 287 LU 4 568 002 42 881 28

  29. Experimental results NPB class A, 16 procs Kernel # events #events after filtering EP 3 090 2 873 FT 10 256 6 704 IS 18 552 15 948 MG 118 688 41 031 CG 284 754 11 724 BT 399 944 24 338 SP 557 318 68 287 LU 4 568 002 42 881 29

  30. Conclusion 30

  31. Conclusion  Manually detecting the interesting parts of a trace is difficult  Proposal: automate the detection of problems • Detect repeating patterns of events • Compare similar patterns whose duration differ significantly • Filter out redundant information  Future work • Analyze patterns • Integrate to the stable version of EZTrace 31

  32. Question ? François Trahay http://eztrace.gforge.inria.fr/ 32

  33. Backtracking irregularities 33

  34. Backtracking irregularities 34

  35. Backtracking irregularities 35

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend