[ltt-dev] LTTng on ARM - no details in lttv
Mathieu Desnoyers
compudj at krystal.dyndns.org
Tue Oct 6 12:38:32 EDT 2009
* suren eda (suren.eda at gmail.com) wrote:
> Hello all,
> I am trying to get LTTng working for ARM linux. I have applied
> all the ARM specific and non-architecture specific patches to the kernel and
> installed LTTV on a X86 host and lttcontrol package on the ARM system. The
> problems I am facing:
> - In the control flow viewer, I see processes but all the processes are in
> white color (I was expecting to see different colors depending on operation
> performed). According to the manual it might be due to precomputations going
> on but even after a long wait, the situation did not change.
> - The Resource viewer is empty - do not see any processes or histograms
>
> Versions:
> Kernel - 2.6.29
> LTTV - 0.12.17
> LTTng - 0.122
> lttcontrol - 0.71
>
> I was able to configure LTTng in the kernel configuration:
>
> *--- Linux Trace Toolkit Next Generation (LTTng)*
> *LTTng Buffer Concurrency Management Algorithm (Linux Trace Toolkit
> High-speed Lockless Data Relay) ---> *
> *<*> Linux Trace Toolkit Serializer *
> *<*> Linux Trace Toolkit Custom Serializer *
> *[*] Debug check for random access in ltt relay buffers*
> *<*> Linux Trace Toolkit Trace Controller *
> *<*> Linux Trace Toolkit Tracer *
> *-*- Align Linux Trace Toolkit Traces*
> *[*] Add event size field to LTT events for tracer debugging*
> *<*> Support logging events from userspace *
> *[*] Support trace extraction from crash dump *
> *[*] Linux Trace Toolkit Kprobes Support *
> *<*> Linux Trace Toolkit State Dump *
> *[ ] Linux Trace Toolkit Ascii Output (work in progress)*
>
> This is the output that I get when I run ltt-armall:
>
> *# ltt-armall*
> *Connecting all markers*
> *Connecting /mnt/debugfs/ltt/markers/fd_state/file_descriptor*
> *Connecting /mnt/debugfs/ltt/markers/global_state/statedump_end*
> *Connecting /mnt/debugfs/ltt/markers/input/input_event*
> *Connecting /mnt/debugfs/ltt/markers/irq_state/interrupt*
> *Connecting /mnt/debugfs/ltt/markers/kernel/kprobe*
> *Connecting /mnt/debugfs/ltt/markers/kprobe_state/kprobe_table*
> *Connecting /mnt/debugfs/ltt/markers/module_state/list_module*
> *Connecting /mnt/debugfs/ltt/markers/netif_state/network_ip_interface*
> *Connecting /mnt/debugfs/ltt/markers/netif_state/network_ipv4_interface*
> *Connecting /mnt/debugfs/ltt/markers/syscall_state/sys_call_table*
> *Connecting /mnt/debugfs/ltt/markers/task_state/process_state*
> *Connecting /mnt/debugfs/ltt/markers/userspace/event*
> *Connecting /mnt/debugfs/ltt/markers/vm_state/vm_map*
>
>
> Text dump output:
> *
> *
> *Trace set contains 1 traces*
> *
> *
> *metadata.core_marker_id: 91379.660001220 (/mnt/test/test_trace/metadata_0),
> 0, 0, , , 0, 0x0, MODE_UNKNOWN { channel = "vm_state", name = "vm_map",
> event_id = 0, int = 4, long = 4, pointer = 4, size_t = 4, alignment = 4 }*
> *metadata.core_marker_format: 91379.660002441
> (/mnt/test/test_trace/metadata_0), 0, 0, , , 0, 0x0, MODE_UNKNOWN { channel
> = "vm_state", name = "vm_map", format = "pid %d start %lu end %lu flags %lu
> pgoff %lu inode %lu" }*
> *metadata.core_marker_id: 91379.660003662 (/mnt/test/test_trace/metadata_0),
> 0, 0, , , 0, 0x0, MODE_UNKNOWN { channel = "fd_state", name =
> "file_descriptor", event_id = 0, int = 4, long = 4, pointer = 4, size_t = 4,
> alignment = 4 }*
> *.....*
> *task_state.process_state: 91379.660037841
> (/mnt/test/test_trace/task_state_0), 0, 0, , , 0, 0x0, MODE_UNKNOWN { pid =
> 1, parent_pid = 0, name = "init", type = 0, mode = 5, submode = 0, status =
> 5, tgid = 1 }*
> *task_state.process_state: 91379.660039062
> (/mnt/test/test_trace/task_state_0), 0, 0, , , 0, 0x0, MODE_UNKNOWN { pid =
> 2, parent_pid = 0, name = "kthreadd", type = 1, mode = 5, submode = 0,
> status = 5, tgid = 2 }*
> *.....*
> *fd_state.file_descriptor: 91379.660252685
> (/mnt/test/test_trace/fd_state_0), 0, 0, swapper, , 0, 0x0, MODE_UNKNOWN {
> filename = "/dev/initctl", pid = 1, fd = 10 }*
> *fd_state.file_descriptor: 91379.660253906
> (/mnt/test/test_trace/fd_state_0), 0, 0, swapper, , 0, 0x0, MODE_UNKNOWN {
> filename = "/dev/null", pid = 787, fd = 0 }*
> *......*
> *vm_state.vm_map: 91379.730080566 (/mnt/test/test_trace/vm_state_0), 0, 0,
> swapper, , 0, 0x0, MODE_UNKNOWN { pid = 32218, start = 32768, end = 45056,
> flags = 134223989, pgoff = 0, inode = 620358 }*
> *vm_state.vm_map: 91379.730081787 (/mnt/test/test_trace/vm_state_0), 0, 0,
> swapper, , 0, 0x0, MODE_UNKNOWN { pid = 32218, start = 77824, end = 81920,
> flags = 135272563, pgoff = 12288, inode = 620358 }*
> *vm_state.vm_map: 91379.730083007 (/mnt/test/test_trace/vm_state_0), 0, 0,
> swapper, , 0, 0x0, MODE_UNKNOWN { pid = 32218, start = 81920, end = 221184,
> flags = 1048691, pgoff = 81920, inode = 0 }*
> *vm_state.vm_map: 91379.730084228 (/mnt/test/test_trace/vm_state_0), 0, 0,
> swapper, , 0, 0x0, MODE_UNKNOWN { pid = 32218, start = 715829248, end =
> 715948032, flags = 134219893, pgoff = 0, inode = 391808 }*
> *irq_state.interrupt: 91379.730166015 (/mnt/test/test_trace/irq_state_0), 0,
> 0, swapper, , 0, 0x0, MODE_UNKNOWN { name = "msm", action = "smd_dev",
> irq_id = 0 }*
> *irq_state.interrupt: 91379.730167236 (/mnt/test/test_trace/irq_state_0), 0,
> 0, swapper, , 0, 0x0, MODE_UNKNOWN { name = "msm", action = "smsm_dev",
> irq_id = 5 }*
> *irq_state.interrupt: 91379.730168456 (/mnt/test/test_trace/irq_state_0), 0,
> 0, swapper, , 0, 0x0, MODE_UNKNOWN { name = "msm", action = "gp_timer",
> irq_id = 7 }*
> *......*
> *netif_state.network_ipv4_interface: 91379.730196533
> (/mnt/test/test_trace/netif_state_0), 0, 0, swapper, , 0, 0x0, MODE_UNKNOWN
> { name = "lo", address = 16777343, up = 0 }*
> *netif_state.network_ip_interface: 91379.730197753
> (/mnt/test/test_trace/netif_state_0), 0, 0, swapper, , 0, 0x0, MODE_UNKNOWN
> { name = "dummy0", address = 0, up = 0 }*
> *netif_state.network_ipv4_interface: 91379.730198974
> (/mnt/test/test_trace/netif_state_0), 0, 0, swapper, , 0, 0x0, MODE_UNKNOWN
> { name = "eth0", address = 1606870026, up = 0 }*
> *netif_state.network_ip_interface: 91379.730200195
> (/mnt/test/test_trace/netif_state_0), 0, 0, swapper, , 0, 0x0, MODE_UNKNOWN
> { name = "rmnet0", address = 0, up = 0 }*
> *netif_state.network_ip_interface: 91379.730201415
> (/mnt/test/test_trace/netif_state_0), 0, 0, swapper, , 0, 0x0, MODE_UNKNOWN
> { name = "rmnet1", address = 0, up = 0 }*
> *netif_state.network_ip_interface: 91379.730202636
> (/mnt/test/test_trace/netif_state_0), 0, 0, swapper, , 0, 0x0, MODE_UNKNOWN
> { name = "rmnet2", address = 0, up = 0 }*
> *global_state.statedump_end: 91379.740001220
> (/mnt/test/test_trace/global_state_0), 0, 0, swapper, , 0, 0x0, SYSCALL*
> *End trace set*
>
>
> I am concerned about the MODE_UNKNOWN in the text dump. Am I missing
> something? Has anyone else seen this?
>
> Help appreciated.
>
Before the statedump_end event appears, it's completely normal to have
MODE_UNKNOWN state.
Mathieu
> Thanks
>
> Suren Eda
> _______________________________________________
> ltt-dev mailing list
> ltt-dev at lists.casi.polymtl.ca
> http://lists.casi.polymtl.ca/cgi-bin/mailman/listinfo/ltt-dev
--
Mathieu Desnoyers
OpenPGP key fingerprint: 8CD5 52C3 8E3C 4140 715F BA06 3F25 A8FE 3BAE 9A68
More information about the lttng-dev
mailing list