taking-a-snapshot: x-ref channel modes
[lttng-docs.git] / contents / getting-started / viewing-and-analyzing.md
CommitLineData
5e0cbfb0
PP
1---
2id: viewing-and-analyzing-your-traces
3---
4
5This section describes how to visualize the data gathered after tracing
6the Linux kernel or a user space application.
7
8Many ways exist to read your LTTng traces:
9
10 * **`babeltrace`** is a command line utility which converts trace formats;
11 it supports the format used by LTTng,
12 <abbr title="Common Trace Format">CTF</abbr>, as well as a basic
13 text output which may be `grep`ed. The `babeltrace` command is
14 part of the
15 <a href="http://www.efficios.com/babeltrace" class="ext">Babeltrace</a> project.
16 * Babeltrace also includes a **Python binding** so that you may
17 easily open and read an LTTng trace with your own script, benefiting
18 from the power of Python.
da5e8984 19 * **<a href="http://projects.eclipse.org/projects/tools.tracecompass" class="ext">Trace Compass</a>**
b8734c94
PP
20 is an Eclipse plugin used to visualize and analyze various types of
21 traces, including LTTng's. It also comes as a standalone application
22 and can be downloaded from
ef722ea0 23 <a href="http://projects.eclipse.org/projects/tools.tracecompass/downloads" class="ext">here</a>.
5e0cbfb0
PP
24
25LTTng trace files are usually recorded in the `~/lttng-traces` directory.
26Let's now view the trace and perform a basic analysis using
27`babeltrace`.
28
29The simplest way to list all the recorded events of a trace is to pass its
30path to `babeltrace` with no options:
31
32<pre class="term">
33babeltrace ~/lttng-traces/my-session
34</pre>
35
36`babeltrace` will find all traces within the given path recursively and
37output all their events, merging them intelligently.
38
39Listing all the system calls of a Linux kernel trace with their arguments is
40easy with `babeltrace` and `grep`:
41
42<pre class="term">
43babeltrace ~/lttng-traces/my-kernel-session | grep sys_
44</pre>
45
46Counting events is also straightforward:
47
48<pre class="term">
b80ba306 49babeltrace ~/lttng-traces/my-kernel-session | grep sys_read | wc --lines
5e0cbfb0
PP
50</pre>
51
52The text output of `babeltrace` is useful for isolating events by simple
53matching using `grep` and similar utilities. However, more elaborate filters
54such as keeping only events with a field value falling within a specific range
55are not trivial to write using a shell. Moreover, reductions and even the
56most basic computations involving multiple events are virtually impossible
57to implement.
58
59Fortunately, Babeltrace ships with a Python 3 binding which makes it
60really easy to read the events of an LTTng trace sequentially and compute
61the desired information.
62
63Here's a simple example using the Babeltrace Python binding. The following
64script accepts an LTTng Linux kernel trace path as its first argument and
65outputs the short names of the top 5 running processes on CPU 0 during the
66whole trace:
67
68~~~ python
69import sys
70from collections import Counter
71import babeltrace
72
73
74def top5proc():
75 if len(sys.argv) != 2:
76 msg = 'Usage: python {} TRACEPATH'.format(sys.argv[0])
77 raise ValueError(msg)
78
79 # a trace collection holds one to many traces
80 col = babeltrace.TraceCollection()
81
82 # add the trace provided by the user
83 # (LTTng traces always have the 'ctf' format)
84 if col.add_trace(sys.argv[1], 'ctf') is None:
85 raise RuntimeError('Cannot add trace')
86
87 # this counter dict will hold execution times:
88 #
89 # task command name -> total execution time (ns)
90 exec_times = Counter()
91
92 # this holds the last `sched_switch` timestamp
93 last_ts = None
94
95 # iterate events
96 for event in col.events:
97 # keep only `sched_switch` events
98 if event.name != 'sched_switch':
99 continue
100
101 # keep only events which happened on CPU 0
102 if event['cpu_id'] != 0:
103 continue
104
105 # event timestamp
106 cur_ts = event.timestamp
107
108 if last_ts is None:
109 # we start here
110 last_ts = cur_ts
111
112 # previous task command (short) name
113 prev_comm = event['prev_comm']
114
115 # initialize entry in our dict if not yet done
116 if prev_comm not in exec_times:
117 exec_times[prev_comm] = 0
118
119 # compute previous command execution time
120 diff = cur_ts - last_ts
121
122 # update execution time of this command
123 exec_times[prev_comm] += diff
124
125 # update last timestamp
126 last_ts = cur_ts
127
128 # display top 10
a345f8e0 129 for name, ns in exec_times.most_common(5):
5e0cbfb0
PP
130 s = ns / 1000000000
131 print('{:20}{} s'.format(name, s))
132
133
134if __name__ == '__main__':
135 top5proc()
136~~~
137
138Save this script as `top5proc.py` and run it with Python 3, providing the
139path to an LTTng Linux kernel trace as the first argument:
140
141<pre class="term">
142python3 top5proc.py ~/lttng-sessions/my-session-.../kernel
143</pre>
144
145Make sure the path you provide is the directory containing actual trace
146files (`channel0_0`, `metadata`, etc.): the `babeltrace` utility recurses
147directories, but the Python binding does not.
148
149Here's an example of output:
150
151~~~ text
152swapper/0 48.607245889 s
153chromium 7.192738188 s
154pavucontrol 0.709894415 s
155Compositor 0.660867933 s
156Xorg.bin 0.616753786 s
157~~~
158
159Note that `swapper/0` is the "idle" process of CPU 0 on Linux; since we
160weren't using the CPU that much when tracing, its first position in the list
161makes sense.
This page took 0.028758 seconds and 4 git commands to generate.