NOTES: -------------- 2011-07-21 : User-space tracer is not released. Tracing in user-space at this point is not possible with lttng-tools. QUICKSTART -------------- This is a quick start guide for the complete LTTng tool chain. This is divided in three sections respectively kernel tracing, user-space tracing and reading a trace. See the README file for installation procedure or use the various Linux distribution packages. In order to trace the kernel, you'll need the lttng-modules >= 2.0 compiled and installed. See http://lttng.org/lttng2.0 for more instructions for that part. For user-space tracing, you'll need an instrumented application, please see http://lttng.org/ust. lttng-tools provide a session daemon (ltt-sessiond) that acts as a tracing registry. To trace any instrumented applications or the kernel, a registered tracing session is needed beforehand. To interact with the session daemon and a tracing session, you should use the lttng command line UI (lttng). Here is a list of some powerful features the LTTng 2.0 kernel tracer offers: * Kprobes support * Function Tracer support * Context information support (add context data to an event) * Perf counter support * Tracepoint support The next sections explain how to do tracing :) Kernel Tracing -------------- You can start the session daemon by invoking the command "ltt-sessiond", or let the lttng command line tool do it for you. The session daemon loads the LTTng tracer modules for you if those modules can be found on your system. If they are not found, the kernel tracing feature will be unavailable. List available kernel events: # lttng list -k 1) Create a tracing session. A .lttngrc will be created in $HOME containing the session name (here 'mysession') you are working on. # lttng create mysession If you have multiple sessions, you can change the current session by using # lttng set-session myothersession 2) Enable event(s). Here for example, we want only 'sched_switch' and 'sys_enter' events for the kernel (-k/--kernel). # lttng enable-event sched_switch,sys_enter -k or enable ALL events (-a/--all): # lttng enable-event -a -k 3) Enable kprobes and/or the function tracer with lttng This is a new feature made possible by the new LTTng 2.0 kernel tracer. You can enable a dynamic probe and data will be output in the trace along side with your tracing data. # lttng enable-event aname -k --probe symbol+0xffff7260695 or # lttng enable-event aname -k --probe 0xffff7260695 Either an
or a