Taking a full-system trace #272
Unanswered
toddlipcon
asked this question in
Q&A
Replies: 1 comment
-
First of all, I'm sorry magic-trace didn't do the right thing. We tried to ship something that works, and it tends to only mostly work if you stick to the golden I haven't done any whole system-tracing with Intel PT. Perhaps unsurprisingly, I've mostly used it to trace single processes that monopolize a single isolated core. Some shots in the dark:
|
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
I noticed that when I trace an individual process or set of threads, there's a significant overhead added to context switching in the kernel as the context switch code needs to enable/disable intel_pt hooks. I'm trying to understand performance of a context-switch-heavy program, so this overhead is somewhat problematic.
I managed to collect a whole-system trace using something like:
which I can then decode with 'magic-trace decode'. But, it seems that if I try to also capture kernel events (with /uk instead of /u), things go south (I get weird call stacks where it looks like my functions never return).
Has anyone successfully done a whole-system trace (or a particular CPU trace, like I tried above)?
Beta Was this translation helpful? Give feedback.
All reactions