[ltt-dev] LTTng on ARM - no details in lttv

Mathieu Desnoyers compudj at krystal.dyndns.org
Tue Oct 6 12:38:32 EDT 2009


* suren eda (suren.eda at gmail.com) wrote:
> Hello all,
>             I am trying to get LTTng working for ARM linux. I have applied
> all the ARM specific and non-architecture specific patches to the kernel and
> installed LTTV on a X86 host and lttcontrol package on the ARM system. The
> problems I am facing:
>  - In the control flow viewer, I see processes but all the processes are in
> white color (I was expecting to see different colors depending on operation
> performed). According to the manual it might be due to precomputations going
> on but even after a long wait, the situation did not change.
> - The Resource viewer is empty - do not see any processes or histograms
> 
> Versions:
> Kernel - 2.6.29
> LTTV   - 0.12.17
> LTTng  - 0.122
> lttcontrol - 0.71
> 
> I was able to configure LTTng in the kernel configuration:
> 
> *--- Linux Trace Toolkit Next Generation (LTTng)*
> *LTTng Buffer Concurrency Management Algorithm (Linux Trace Toolkit
> High-speed Lockless Data Relay)  ---> *
> *<*>   Linux Trace Toolkit Serializer *
> *<*>   Linux Trace Toolkit Custom Serializer *
> *[*]   Debug check for random access in ltt relay buffers*
> *<*>   Linux Trace Toolkit Trace Controller *
> *<*>   Linux Trace Toolkit Tracer    *
> *-*-   Align Linux Trace Toolkit Traces*
> *[*]   Add event size field to LTT events for tracer debugging*
> *<*>   Support logging events from userspace  *
> *[*]   Support trace extraction from crash dump *
> *[*]   Linux Trace Toolkit Kprobes Support *
> *<*>   Linux Trace Toolkit State Dump *
> *[ ]   Linux Trace Toolkit Ascii Output (work in progress)*
> 
> This is the output that I get when I run ltt-armall:
> 
> *# ltt-armall*
> *Connecting all markers*
> *Connecting /mnt/debugfs/ltt/markers/fd_state/file_descriptor*
> *Connecting /mnt/debugfs/ltt/markers/global_state/statedump_end*
> *Connecting /mnt/debugfs/ltt/markers/input/input_event*
> *Connecting /mnt/debugfs/ltt/markers/irq_state/interrupt*
> *Connecting /mnt/debugfs/ltt/markers/kernel/kprobe*
> *Connecting /mnt/debugfs/ltt/markers/kprobe_state/kprobe_table*
> *Connecting /mnt/debugfs/ltt/markers/module_state/list_module*
> *Connecting /mnt/debugfs/ltt/markers/netif_state/network_ip_interface*
> *Connecting /mnt/debugfs/ltt/markers/netif_state/network_ipv4_interface*
> *Connecting /mnt/debugfs/ltt/markers/syscall_state/sys_call_table*
> *Connecting /mnt/debugfs/ltt/markers/task_state/process_state*
> *Connecting /mnt/debugfs/ltt/markers/userspace/event*
> *Connecting /mnt/debugfs/ltt/markers/vm_state/vm_map*
> 
> 
> Text dump output:
> *
> *
> *Trace set contains 1 traces*
> *
> *
> *metadata.core_marker_id: 91379.660001220 (/mnt/test/test_trace/metadata_0),
> 0, 0, , , 0, 0x0, MODE_UNKNOWN { channel = "vm_state", name = "vm_map",
> event_id = 0, int = 4, long = 4, pointer = 4, size_t = 4, alignment = 4 }*
> *metadata.core_marker_format: 91379.660002441
> (/mnt/test/test_trace/metadata_0), 0, 0, , , 0, 0x0, MODE_UNKNOWN { channel
> = "vm_state", name = "vm_map", format = "pid %d start %lu end %lu flags %lu
> pgoff %lu inode %lu" }*
> *metadata.core_marker_id: 91379.660003662 (/mnt/test/test_trace/metadata_0),
> 0, 0, , , 0, 0x0, MODE_UNKNOWN { channel = "fd_state", name =
> "file_descriptor", event_id = 0, int = 4, long = 4, pointer = 4, size_t = 4,
> alignment = 4 }*
> *.....*
> *task_state.process_state: 91379.660037841
> (/mnt/test/test_trace/task_state_0), 0, 0, , , 0, 0x0, MODE_UNKNOWN { pid =
> 1, parent_pid = 0, name = "init", type = 0, mode = 5, submode = 0, status =
> 5, tgid = 1 }*
> *task_state.process_state: 91379.660039062
> (/mnt/test/test_trace/task_state_0), 0, 0, , , 0, 0x0, MODE_UNKNOWN { pid =
> 2, parent_pid = 0, name = "kthreadd", type = 1, mode = 5, submode = 0,
> status = 5, tgid = 2 }*
> *.....*
> *fd_state.file_descriptor: 91379.660252685
> (/mnt/test/test_trace/fd_state_0), 0, 0, swapper, , 0, 0x0, MODE_UNKNOWN {
> filename = "/dev/initctl", pid = 1, fd = 10 }*
> *fd_state.file_descriptor: 91379.660253906
> (/mnt/test/test_trace/fd_state_0), 0, 0, swapper, , 0, 0x0, MODE_UNKNOWN {
> filename = "/dev/null", pid = 787, fd = 0 }*
> *......*
> *vm_state.vm_map: 91379.730080566 (/mnt/test/test_trace/vm_state_0), 0, 0,
> swapper, , 0, 0x0, MODE_UNKNOWN { pid = 32218, start = 32768, end = 45056,
> flags = 134223989, pgoff = 0, inode = 620358 }*
> *vm_state.vm_map: 91379.730081787 (/mnt/test/test_trace/vm_state_0), 0, 0,
> swapper, , 0, 0x0, MODE_UNKNOWN { pid = 32218, start = 77824, end = 81920,
> flags = 135272563, pgoff = 12288, inode = 620358 }*
> *vm_state.vm_map: 91379.730083007 (/mnt/test/test_trace/vm_state_0), 0, 0,
> swapper, , 0, 0x0, MODE_UNKNOWN { pid = 32218, start = 81920, end = 221184,
> flags = 1048691, pgoff = 81920, inode = 0 }*
> *vm_state.vm_map: 91379.730084228 (/mnt/test/test_trace/vm_state_0), 0, 0,
> swapper, , 0, 0x0, MODE_UNKNOWN { pid = 32218, start = 715829248, end =
> 715948032, flags = 134219893, pgoff = 0, inode = 391808 }*
> *irq_state.interrupt: 91379.730166015 (/mnt/test/test_trace/irq_state_0), 0,
> 0, swapper, , 0, 0x0, MODE_UNKNOWN { name = "msm", action = "smd_dev",
> irq_id = 0 }*
> *irq_state.interrupt: 91379.730167236 (/mnt/test/test_trace/irq_state_0), 0,
> 0, swapper, , 0, 0x0, MODE_UNKNOWN { name = "msm", action = "smsm_dev",
> irq_id = 5 }*
> *irq_state.interrupt: 91379.730168456 (/mnt/test/test_trace/irq_state_0), 0,
> 0, swapper, , 0, 0x0, MODE_UNKNOWN { name = "msm", action = "gp_timer",
> irq_id = 7 }*
> *......*
> *netif_state.network_ipv4_interface: 91379.730196533
> (/mnt/test/test_trace/netif_state_0), 0, 0, swapper, , 0, 0x0, MODE_UNKNOWN
> { name = "lo", address = 16777343, up = 0 }*
> *netif_state.network_ip_interface: 91379.730197753
> (/mnt/test/test_trace/netif_state_0), 0, 0, swapper, , 0, 0x0, MODE_UNKNOWN
> { name = "dummy0", address = 0, up = 0 }*
> *netif_state.network_ipv4_interface: 91379.730198974
> (/mnt/test/test_trace/netif_state_0), 0, 0, swapper, , 0, 0x0, MODE_UNKNOWN
> { name = "eth0", address = 1606870026, up = 0 }*
> *netif_state.network_ip_interface: 91379.730200195
> (/mnt/test/test_trace/netif_state_0), 0, 0, swapper, , 0, 0x0, MODE_UNKNOWN
> { name = "rmnet0", address = 0, up = 0 }*
> *netif_state.network_ip_interface: 91379.730201415
> (/mnt/test/test_trace/netif_state_0), 0, 0, swapper, , 0, 0x0, MODE_UNKNOWN
> { name = "rmnet1", address = 0, up = 0 }*
> *netif_state.network_ip_interface: 91379.730202636
> (/mnt/test/test_trace/netif_state_0), 0, 0, swapper, , 0, 0x0, MODE_UNKNOWN
> { name = "rmnet2", address = 0, up = 0 }*
> *global_state.statedump_end: 91379.740001220
> (/mnt/test/test_trace/global_state_0), 0, 0, swapper, , 0, 0x0, SYSCALL*
> *End trace set*
> 
> 
> I am concerned about the MODE_UNKNOWN in the text dump. Am I missing
> something? Has anyone else seen this?
> 
> Help appreciated.
> 

Before the statedump_end event appears, it's completely normal to have
MODE_UNKNOWN state.

Mathieu

> Thanks
> 
> Suren Eda

> _______________________________________________
> ltt-dev mailing list
> ltt-dev at lists.casi.polymtl.ca
> http://lists.casi.polymtl.ca/cgi-bin/mailman/listinfo/ltt-dev


-- 
Mathieu Desnoyers
OpenPGP key fingerprint: 8CD5 52C3 8E3C 4140 715F  BA06 3F25 A8FE 3BAE 9A68




More information about the lttng-dev mailing list