Skip Navigation Links | |
Exit Print View | |
Oracle Solaris 11.1 Dynamic Tracing Guide Oracle Solaris 11.1 Information Library |
cpucaps-sleep and cpucaps-wakeup
args[4] - ipv4info_t Structure
args[5] - ipv6info_t Structure
Remote Port Login/Logout Event Probes
13. Statically Defined Tracing for User Applications
The cpc provider makes available probes associated with CPU performance counter events. A probe fires when a specified number of events of a given type in a chosen processor mode have occurred. When a probe fires we can sample aspects of system state and inferences can be made about system behavior. Accurate inferences are possible when high enough sampling rates and/or long sampling times are employed.
Probes made available by the cpc provider have the following format:
cpc:::<event name>-<mode>[-<attributes>]-<count>
The format of attributes is:
<attr1>_<val1>[-<attr2>_<val2>...]|<value>
The definitions and detail of the components of the probe name are listed in the following table.
Table 11-6 Probename Components
|
A sample usage of the cpc provider is as follows:
cpc:::BU_fill_req_missed_L2-all-umask_0x7-cmask_0x0-10000
In this example, the parameters are set to the following values:event name is set to BU_fill_req_missed_L2.mode is set to all.attributes are set to umask = 0x7 and cmask = 0x0.count is set to 10000.
The following introductory example fires a probe on a CPU for every 10000 user-mode Level 1 instruction cache misses on a SPARC platform. When the probe fires we record the name of the executable that was on processor at the time the probe fires (see Examples section for further examples):
#!/usr/sbin/dtrace -s #pragma D option quiet cpc:::IC_miss-user-10000 { @[execname] = count(); } END { trunc(@, 10); }
# ./user-l1miss.d ^C dirname 8 firefox 8 sed 11 intrd 12 run-mozilla.sh 13 java 64 sshd 135 gconfd-2 569 thunderbird-bin 1666 firefox-bin 2060
Note - When working with the cpc provider it is important to remember that the state available when a probe fires is valid for the performance counter event that caused the probe to fire and not for all events counted with that probe. In the above output we see that the firefox-bin application caused the cpc:::IC_miss-user-10000 probe to fire 2060 times. As this probe fires once for every 10000 level 1 instruction cache misses on a CPU, the firefox-bin application could have contributed anywhere from 2060 to 20600000 of these misses.
The arguments to cpc probes are listed in table below.
Table 11-7 Probe Arguments
|
As the descriptions imply, if arg0 is non-zero then arg1 is zero; if arg0 is zero then arg1 is non-zero.
CPU performance counters are a finite resource and the number of probes that can be enabled depends upon hardware capabilities. Processors that cannot determine which counter has overflowed when multiple counters are programmed (e.g. AMD, UltraSPARC) are only allowed to have a single enabling at any one time. On such platforms, consumers attempting to enable more than 1 probe will fail as will consumers attempting to enable a probe when a disparate enabling already exists. Processors that can detect which counter has overflowed (e.g. Niagara2, Intel P4) are allowed to have as many probes enabled as the hardware will allow. This will be, at most, the number of counters available on a processor. On such configurations, multiple probes can be enabled at any one time.
Probes are enabled by consumers on a first-come, first-served basis. When hardware resources are fully utilized subsequent enablings will fail until resources become available.
Like the profile provider, the cpc provider creates probes dynamically on an as-needed basis. Thus, the desired cpc probe might not appear in a listing of all probes (for example, by using dtrace -l -P cpc) but the probe will be created when it is explicitly enabled.
Specifying a small event overflow count for frequently occurring events (e.g. cycle count, instructions executed) would quickly render the system unusable as a processor would be continuously servicing performance counter overflow interrupts. To prevent this situation, the smallest overflow count that can be specified for any probe is set, by default, at 5000. This can be altered by adjusting the dcpc-min-overflow variable in the /kernel/drv/dcpc.conf configuration file and then unloading and reloading the dcpc driver.
Note - It is necessary to take care specifying high frequency events such as instructions executed or cycle count. For example, measuring busy cycles on a fully utilized 3GHz processor with a count of 50000 would generate approximately 65000 interrupts/sec. This rate of interrupt delivery could degrade system performance to some degree.
The provider has priority over per-LWP libcpc usage (i.e. cputrack) for access to counters. In the same manner as cpustat, enabling probes causes all existing per-LWP counter contexts to be invalidated. As long as enabled probes remain active, the counters will remain unavailable to cputrack-type consumers.
Only one of cpustat and DTrace may use the counter hardware at any one time. Ownership of the counters is given on a first-come, first-served basis.
Some simple examples of cpc provider usage follow.
The simple script displays instructions executed by applications on an AMD platform
cpc:::FR_retired_x86_instr_w_excp_intr-user-10000 { @[execname] = count(); } # ./user-insts.d dtrace: script './user-insts.d' matched 1 probe ^C [chop] init 138 dtrace 175 nis_cachemgr 179 automountd 183 intrd 235 run-mozilla.sh 306 thunderbird 316 Xorg 453 thunderbird-bin 2370 sshd 8114
The following example shows a kernel profiled by cycle usage on an AMD platform.
cpc:::BU_cpu_clk_unhalted-kernel-10000 { @[func(arg0)] = count(); } # ./kern-cycles.d dtrace: script './kern-cycles.d' matched 1 probe ^C [chop] genunix`vpm_sync_pages 478948 genunix`vpm_unmap_pages 496626 genunix`vpm_map_pages 640785 unix`mutex_delay_default 916703 unix`hat_kpm_page2va 988880 tmpfs`rdtmp 991252 unix`hat_page_setattr 1077717 unix`page_try_reclaim_lock 1213379 genunix`free_vpmap 1914810 genunix`get_vpmap 2417896 unix`page_lookup_create 3992197 unix`mutex_enter 5595647 unix`do_copy_fault_nta 27803554
In this example we are looking at user-mode L2 cache misses and the functions that generated them on an AMD platform. The predicate ensures that we only sample function names when the probe was fired by the 'brendan' executable.
cpc:::BU_fill_req_missed_L2-all-0x7-10000 /execname == "brendan"/ { @[ufunc(arg1)] = count(); } ./brendan-l2miss.d dtrace: script './brendan-l2miss.d' matched 1 probe CPU ID FUNCTION:NAME ^C brendan`func_gamma 930 brendan`func_beta 1578 brendan`func_alpha 2945
You can have the same result with the following probe name format.
cpc:::BU_fill_req_missed_L2-all-umask_0x7-10000 / execname == "brendan" / { @[ufunc(arg1)] = count(); }
Here we use the same example as about but we use the much simpler generic event PAPI_l2_dcm to indicate our interest in L2 data cache misses instead of the platform event.
cpc:::PAPI_l2_dcm-all-10000 /execname == "brendan"/ { @[ufunc(arg1)] = count(); } # ./breandan-generic-l2miss.d dtrace: script './brendan-generic-l2miss.d' matched 1 probe ^C brendan`func_gamma 1681 brendan`func_beta 2521 brendan`func_alpha 5068
The following example probes offcore event on an Intel platform:
cpc:::off_core_response_0-all-msr_offcore_0x3001-10000 { @[execname] = count(); } # ./off_core_event.d dtrace: script './off_core_event.d' matched 1 probe ^C fmd 3 fsflush 36 sched 175
Multiple attributes are allowed using '-' between attributes.
The following example sets two attributes to probe L2 miss event in an AMD platform.
cpc:::BU_fill_req_missed_L2-all-umask_0x7-cmask_0x0-10000 { @[execname] = count(); } # ./l2miss.d dtrace: script './l2miss.d' matched 1 probe automountd 1 dtrace 1 fmd 1 in.routed 1 netcfgd 1 nscd 1 sendmail 1 utmpd 1 kcfd 2 syslogd 2 uname 2 file 3 ls 3 sshd 4 zfs 9 bash 10 ksh93 10 ssh 22 fsflush 34 sched 68 beadm 146
The cpc provider uses DTrace's stability mechanism to describe its stabilities as shown in the following table. For more information about the stability mechanism, see Chapter 18, Stability.
|