[ltt-dev] LTTng on ARM - no details in lttv

suren eda suren.eda at gmail.com
Tue Oct 6 11:59:02 EDT 2009


Hello all,
            I am trying to get LTTng working for ARM linux. I have applied
all the ARM specific and non-architecture specific patches to the kernel and
installed LTTV on a X86 host and lttcontrol package on the ARM system. The
problems I am facing:
 - In the control flow viewer, I see processes but all the processes are in
white color (I was expecting to see different colors depending on operation
performed). According to the manual it might be due to precomputations going
on but even after a long wait, the situation did not change.
- The Resource viewer is empty - do not see any processes or histograms

Versions:
Kernel - 2.6.29
LTTV   - 0.12.17
LTTng  - 0.122
lttcontrol - 0.71

I was able to configure LTTng in the kernel configuration:

*--- Linux Trace Toolkit Next Generation (LTTng)*
*LTTng Buffer Concurrency Management Algorithm (Linux Trace Toolkit
High-speed Lockless Data Relay)  ---> *
*<*>   Linux Trace Toolkit Serializer *
*<*>   Linux Trace Toolkit Custom Serializer *
*[*]   Debug check for random access in ltt relay buffers*
*<*>   Linux Trace Toolkit Trace Controller *
*<*>   Linux Trace Toolkit Tracer    *
*-*-   Align Linux Trace Toolkit Traces*
*[*]   Add event size field to LTT events for tracer debugging*
*<*>   Support logging events from userspace  *
*[*]   Support trace extraction from crash dump *
*[*]   Linux Trace Toolkit Kprobes Support *
*<*>   Linux Trace Toolkit State Dump *
*[ ]   Linux Trace Toolkit Ascii Output (work in progress)*

This is the output that I get when I run ltt-armall:

*# ltt-armall*
*Connecting all markers*
*Connecting /mnt/debugfs/ltt/markers/fd_state/file_descriptor*
*Connecting /mnt/debugfs/ltt/markers/global_state/statedump_end*
*Connecting /mnt/debugfs/ltt/markers/input/input_event*
*Connecting /mnt/debugfs/ltt/markers/irq_state/interrupt*
*Connecting /mnt/debugfs/ltt/markers/kernel/kprobe*
*Connecting /mnt/debugfs/ltt/markers/kprobe_state/kprobe_table*
*Connecting /mnt/debugfs/ltt/markers/module_state/list_module*
*Connecting /mnt/debugfs/ltt/markers/netif_state/network_ip_interface*
*Connecting /mnt/debugfs/ltt/markers/netif_state/network_ipv4_interface*
*Connecting /mnt/debugfs/ltt/markers/syscall_state/sys_call_table*
*Connecting /mnt/debugfs/ltt/markers/task_state/process_state*
*Connecting /mnt/debugfs/ltt/markers/userspace/event*
*Connecting /mnt/debugfs/ltt/markers/vm_state/vm_map*


Text dump output:
*
*
*Trace set contains 1 traces*
*
*
*metadata.core_marker_id: 91379.660001220 (/mnt/test/test_trace/metadata_0),
0, 0, , , 0, 0x0, MODE_UNKNOWN { channel = "vm_state", name = "vm_map",
event_id = 0, int = 4, long = 4, pointer = 4, size_t = 4, alignment = 4 }*
*metadata.core_marker_format: 91379.660002441
(/mnt/test/test_trace/metadata_0), 0, 0, , , 0, 0x0, MODE_UNKNOWN { channel
= "vm_state", name = "vm_map", format = "pid %d start %lu end %lu flags %lu
pgoff %lu inode %lu" }*
*metadata.core_marker_id: 91379.660003662 (/mnt/test/test_trace/metadata_0),
0, 0, , , 0, 0x0, MODE_UNKNOWN { channel = "fd_state", name =
"file_descriptor", event_id = 0, int = 4, long = 4, pointer = 4, size_t = 4,
alignment = 4 }*
*.....*
*task_state.process_state: 91379.660037841
(/mnt/test/test_trace/task_state_0), 0, 0, , , 0, 0x0, MODE_UNKNOWN { pid =
1, parent_pid = 0, name = "init", type = 0, mode = 5, submode = 0, status =
5, tgid = 1 }*
*task_state.process_state: 91379.660039062
(/mnt/test/test_trace/task_state_0), 0, 0, , , 0, 0x0, MODE_UNKNOWN { pid =
2, parent_pid = 0, name = "kthreadd", type = 1, mode = 5, submode = 0,
status = 5, tgid = 2 }*
*.....*
*fd_state.file_descriptor: 91379.660252685
(/mnt/test/test_trace/fd_state_0), 0, 0, swapper, , 0, 0x0, MODE_UNKNOWN {
filename = "/dev/initctl", pid = 1, fd = 10 }*
*fd_state.file_descriptor: 91379.660253906
(/mnt/test/test_trace/fd_state_0), 0, 0, swapper, , 0, 0x0, MODE_UNKNOWN {
filename = "/dev/null", pid = 787, fd = 0 }*
*......*
*vm_state.vm_map: 91379.730080566 (/mnt/test/test_trace/vm_state_0), 0, 0,
swapper, , 0, 0x0, MODE_UNKNOWN { pid = 32218, start = 32768, end = 45056,
flags = 134223989, pgoff = 0, inode = 620358 }*
*vm_state.vm_map: 91379.730081787 (/mnt/test/test_trace/vm_state_0), 0, 0,
swapper, , 0, 0x0, MODE_UNKNOWN { pid = 32218, start = 77824, end = 81920,
flags = 135272563, pgoff = 12288, inode = 620358 }*
*vm_state.vm_map: 91379.730083007 (/mnt/test/test_trace/vm_state_0), 0, 0,
swapper, , 0, 0x0, MODE_UNKNOWN { pid = 32218, start = 81920, end = 221184,
flags = 1048691, pgoff = 81920, inode = 0 }*
*vm_state.vm_map: 91379.730084228 (/mnt/test/test_trace/vm_state_0), 0, 0,
swapper, , 0, 0x0, MODE_UNKNOWN { pid = 32218, start = 715829248, end =
715948032, flags = 134219893, pgoff = 0, inode = 391808 }*
*irq_state.interrupt: 91379.730166015 (/mnt/test/test_trace/irq_state_0), 0,
0, swapper, , 0, 0x0, MODE_UNKNOWN { name = "msm", action = "smd_dev",
irq_id = 0 }*
*irq_state.interrupt: 91379.730167236 (/mnt/test/test_trace/irq_state_0), 0,
0, swapper, , 0, 0x0, MODE_UNKNOWN { name = "msm", action = "smsm_dev",
irq_id = 5 }*
*irq_state.interrupt: 91379.730168456 (/mnt/test/test_trace/irq_state_0), 0,
0, swapper, , 0, 0x0, MODE_UNKNOWN { name = "msm", action = "gp_timer",
irq_id = 7 }*
*......*
*netif_state.network_ipv4_interface: 91379.730196533
(/mnt/test/test_trace/netif_state_0), 0, 0, swapper, , 0, 0x0, MODE_UNKNOWN
{ name = "lo", address = 16777343, up = 0 }*
*netif_state.network_ip_interface: 91379.730197753
(/mnt/test/test_trace/netif_state_0), 0, 0, swapper, , 0, 0x0, MODE_UNKNOWN
{ name = "dummy0", address = 0, up = 0 }*
*netif_state.network_ipv4_interface: 91379.730198974
(/mnt/test/test_trace/netif_state_0), 0, 0, swapper, , 0, 0x0, MODE_UNKNOWN
{ name = "eth0", address = 1606870026, up = 0 }*
*netif_state.network_ip_interface: 91379.730200195
(/mnt/test/test_trace/netif_state_0), 0, 0, swapper, , 0, 0x0, MODE_UNKNOWN
{ name = "rmnet0", address = 0, up = 0 }*
*netif_state.network_ip_interface: 91379.730201415
(/mnt/test/test_trace/netif_state_0), 0, 0, swapper, , 0, 0x0, MODE_UNKNOWN
{ name = "rmnet1", address = 0, up = 0 }*
*netif_state.network_ip_interface: 91379.730202636
(/mnt/test/test_trace/netif_state_0), 0, 0, swapper, , 0, 0x0, MODE_UNKNOWN
{ name = "rmnet2", address = 0, up = 0 }*
*global_state.statedump_end: 91379.740001220
(/mnt/test/test_trace/global_state_0), 0, 0, swapper, , 0, 0x0, SYSCALL*
*End trace set*


I am concerned about the MODE_UNKNOWN in the text dump. Am I missing
something? Has anyone else seen this?

Help appreciated.

Thanks

Suren Eda
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.casi.polymtl.ca/pipermail/lttng-dev/attachments/20091006/2a9098cb/attachment-0003.htm>


More information about the lttng-dev mailing list