Taking a full-system trace #272
Unanswered
toddlipcon
asked this question in
Q&A
Replies: 1 comment
-
First of all, I'm sorry magic-trace didn't do the right thing. We tried to ship something that works, and it tends to only mostly work if you stick to the golden I haven't done any whole system-tracing with Intel PT. Perhaps unsurprisingly, I've mostly used it to trace single processes that monopolize a single isolated core. Some shots in the dark:
|
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
I noticed that when I trace an individual process or set of threads, there's a significant overhead added to context switching in the kernel as the context switch code needs to enable/disable intel_pt hooks. I'm trying to understand performance of a context-switch-heavy program, so this overhead is somewhat problematic.
I managed to collect a whole-system trace using something like:
which I can then decode with 'magic-trace decode'. But, it seems that if I try to also capture kernel events (with /uk instead of /u), things go south (I get weird call stacks where it looks like my functions never return).
Has anyone successfully done a whole-system trace (or a particular CPU trace, like I tried above)?
Beta Was this translation helpful? Give feedback.
All reactions