summaryrefslogtreecommitdiffstats
path: root/llvm/docs/XRayExample.rst
diff options
context:
space:
mode:
authorDean Michael Berris <dberris@google.com>2018-08-28 17:36:30 +0000
committerDean Michael Berris <dberris@google.com>2018-08-28 17:36:30 +0000
commit41a214759aeba0ffa062497fa2e4d15fed9bcf51 (patch)
tree2658406257ddcd11400960adcbc94144c54812e0 /llvm/docs/XRayExample.rst
parent60ffc2e9a47d606c4a262abb9630290654b81775 (diff)
downloadbcm5719-llvm-41a214759aeba0ffa062497fa2e4d15fed9bcf51.tar.gz
bcm5719-llvm-41a214759aeba0ffa062497fa2e4d15fed9bcf51.zip
[XRay][docs] Chrome Trace Viewer Instructions
This patch adds an example on how to generate a Chrome Trace Viewer loadable trace from an XRay trace. llvm-svn: 340847
Diffstat (limited to 'llvm/docs/XRayExample.rst')
-rw-r--r--llvm/docs/XRayExample.rst18
1 files changed, 16 insertions, 2 deletions
diff --git a/llvm/docs/XRayExample.rst b/llvm/docs/XRayExample.rst
index e5d934c23bc..ca243244e27 100644
--- a/llvm/docs/XRayExample.rst
+++ b/llvm/docs/XRayExample.rst
@@ -257,6 +257,21 @@ svg file.
If you open the svg in a browser, mouse events allow exploring the call stacks.
+Chrome Trace Viewer Visualization
+---------------------------------
+
+We can also generate a trace which can be loaded by the Chrome Trace Viewer
+from the same generated trace:
+
+::
+
+ $ llvm-xray convert -symbolize -instr_map=./bin/llc \
+ -output_format=trace_event xray-log.llc.5rqxkU \
+ | gzip > llc-trace.txt.gz
+
+From a Chrome browser, navigating to ``chrome:///tracing`` allows us to load
+the ``sample-trace.txt.gz`` file to visualize the execution trace.
+
Further Exploration
-------------------
@@ -317,6 +332,7 @@ applications:
$ llvm-xray graph xray-log.sample.* -m sample -color-edges=sum -edge-label=sum \
| unflatten -f -l10 | dot -Tsvg -o sample.svg
+
Next Steps
----------
@@ -327,8 +343,6 @@ making things better.
- Implement a query/filtering library that allows for finding patterns in the
XRay traces.
- - A conversion from the XRay trace onto something that can be visualised
- better by other tools (like the Chrome trace viewer for example).
- Collecting function call stacks and how often they're encountered in the
XRay trace.
OpenPOWER on IntegriCloud