Path: blob/master/tools/perf/Documentation/perf-intel-pt.txt
26282 views
perf-intel-pt(1)1================23NAME4----5perf-intel-pt - Support for Intel Processor Trace within perf tools67SYNOPSIS8--------9[verse]10'perf record' -e intel_pt//1112DESCRIPTION13-----------1415Intel Processor Trace (Intel PT) is an extension of Intel Architecture that16collects information about software execution such as control flow, execution17modes and timings and formats it into highly compressed binary packets.18Technical details are documented in the Intel 64 and IA-32 Architectures19Software Developer Manuals, Chapter 36 Intel Processor Trace.2021Intel PT is first supported in Intel Core M and 5th generation Intel Core22processors that are based on the Intel micro-architecture code name Broadwell.2324Trace data is collected by 'perf record' and stored within the perf.data file.25See below for options to 'perf record'.2627Trace data must be 'decoded' which involves walking the object code and matching28the trace data packets. For example a TNT packet only tells whether a29conditional branch was taken or not taken, so to make use of that packet the30decoder must know precisely which instruction was being executed.3132Decoding is done on-the-fly. The decoder outputs samples in the same format as33samples output by perf hardware events, for example as though the "instructions"34or "branches" events had been recorded. Presently 3 tools support this:35'perf script', 'perf report' and 'perf inject'. See below for more information36on using those tools.3738The main distinguishing feature of Intel PT is that the decoder can determine39the exact flow of software execution. Intel PT can be used to understand why40and how did software get to a certain point, or behave a certain way. The41software does not have to be recompiled, so Intel PT works with debug or release42builds, however the executed images are needed - which makes use in JIT-compiled43environments, or with self-modified code, a challenge. Also symbols need to be44provided to make sense of addresses.4546A limitation of Intel PT is that it produces huge amounts of trace data47(hundreds of megabytes per second per core) which takes a long time to decode,48for example two or three orders of magnitude longer than it took to collect.49Another limitation is the performance impact of tracing, something that will50vary depending on the use-case and architecture.515253Quickstart54----------5556It is important to start small. That is because it is easy to capture vastly57more data than can possibly be processed.5859The simplest thing to do with Intel PT is userspace profiling of small programs.60Data is captured with 'perf record' e.g. to trace 'ls' userspace-only:6162perf record -e intel_pt//u ls6364And profiled with 'perf report' e.g.6566perf report6768To also trace kernel space presents a problem, namely kernel self-modifying69code. A fairly good kernel image is available in /proc/kcore but to get an70accurate image a copy of /proc/kcore needs to be made under the same conditions71as the data capture. 'perf record' can make a copy of /proc/kcore if the option72--kcore is used, but access to /proc/kcore is restricted e.g.7374sudo perf record -o pt_ls --kcore -e intel_pt// -- ls7576which will create a directory named 'pt_ls' and put the perf.data file (named77simply 'data') and copies of /proc/kcore, /proc/kallsyms and /proc/modules into78it. The other tools understand the directory format, so to use 'perf report'79becomes:8081sudo perf report -i pt_ls8283Because samples are synthesized after-the-fact, the sampling period can be84selected for reporting. e.g. sample every microsecond8586sudo perf report pt_ls --itrace=i1usge8788See the sections below for more information about the --itrace option.8990Beware the smaller the period, the more samples that are produced, and the91longer it takes to process them.9293Also note that the coarseness of Intel PT timing information will start to94distort the statistical value of the sampling as the sampling period becomes95smaller.9697To represent software control flow, "branches" samples are produced. By default98a branch sample is synthesized for every single branch. To get an idea what99data is available you can use the 'perf script' tool with all itrace sampling100options, which will list all the samples.101102perf record -e intel_pt//u ls103perf script --itrace=iybxwpe104105An interesting field that is not printed by default is 'flags' which can be106displayed as follows:107108perf script --itrace=iybxwpe -F+flags109110The flags are "bcrosyiABExghDt" which stand for branch, call, return, conditional,111system, asynchronous, interrupt, transaction abort, trace begin, trace end,112in transaction, VM-entry, VM-exit, interrupt disabled, and interrupt disable113toggle respectively.114115perf script also supports higher level ways to dump instruction traces:116117perf script --insn-trace=disasm118119or to use the xed disassembler, which requires installing the xed tool120(see XED below):121122perf script --insn-trace --xed123124Dumping all instructions in a long trace can be fairly slow. It is usually better125to start with higher level decoding, like126127perf script --call-trace128129or130131perf script --call-ret-trace132133and then select a time range of interest. The time range can then be examined134in detail with135136perf script --time starttime,stoptime --insn-trace=disasm137138While examining the trace it's also useful to filter on specific CPUs using139the -C option140141perf script --time starttime,stoptime --insn-trace=disasm -C 1142143Dump all instructions in time range on CPU 1.144145Another interesting field that is not printed by default is 'ipc' which can be146displayed as follows:147148perf script --itrace=be -F+ipc149150There are two ways that instructions-per-cycle (IPC) can be calculated depending151on the recording.152153If the 'cyc' config term (see <<_config_terms,config terms>> section below) was used, then IPC154and cycle events are calculated using the cycle count from CYC packets, otherwise155MTC packets are used - refer to the 'mtc' config term. When MTC is used, however,156the values are less accurate because the timing is less accurate.157158Because Intel PT does not update the cycle count on every branch or instruction,159the values will often be zero. When there are values, they will be the number160of instructions and number of cycles since the last update, and thus represent161the average IPC cycle count since the last IPC for that event type.162Note IPC for "branches" events is calculated separately from IPC for "instructions"163events.164165Even with the 'cyc' config term, it is possible to produce IPC information for166every change of timestamp, but at the expense of accuracy. That is selected by167specifying the itrace 'A' option. Due to the granularity of timestamps, the168actual number of cycles increases even though the cycles reported does not.169The number of instructions is known, but if IPC is reported, cycles can be too170low and so IPC is too high. Note that inaccuracy decreases as the period of171sampling increases i.e. if the number of cycles is too low by a small amount,172that becomes less significant if the number of cycles is large. It may also be173useful to use the 'A' option in conjunction with dlfilter-show-cycles.so to174provide higher granularity cycle information.175176Also note that the IPC instruction count may or may not include the current177instruction. If the cycle count is associated with an asynchronous branch178(e.g. page fault or interrupt), then the instruction count does not include the179current instruction, otherwise it does. That is consistent with whether or not180that instruction has retired when the cycle count is updated.181182Another note, in the case of "branches" events, non-taken branches are not183presently sampled, so IPC values for them do not appear e.g. a CYC packet with a184TNT packet that starts with a non-taken branch. To see every possible IPC185value, "instructions" events can be used e.g. --itrace=i0ns186187While it is possible to create scripts to analyze the data, an alternative188approach is available to export the data to a sqlite or postgresql database.189Refer to script export-to-sqlite.py or export-to-postgresql.py for more details,190and to script exported-sql-viewer.py for an example of using the database.191192There is also script intel-pt-events.py which provides an example of how to193unpack the raw data for power events and PTWRITE. The script also displays194branches, and supports 2 additional modes selected by option:195196- --insn-trace - instruction trace197- --src-trace - source trace198199The intel-pt-events.py script also has options:200201- --all-switch-events - display all switch events, not only the last consecutive.202- --interleave [<n>] - interleave sample output for the same timestamp so that203no more than n samples for a CPU are displayed in a row. 'n' defaults to 4.204Note this only affects the order of output, and only when the timestamp is the205same.206207As mentioned above, it is easy to capture too much data. One way to limit the208data captured is to use 'snapshot' mode which is explained further below.209Refer to 'new snapshot option' and 'Intel PT modes of operation' further below.210211Another problem that will be experienced is decoder errors. They can be caused212by inability to access the executed image, self-modified or JIT-ed code, or the213inability to match side-band information (such as context switches and mmaps)214which results in the decoder not knowing what code was executed.215216There is also the problem of perf not being able to copy the data fast enough,217resulting in data lost because the buffer was full. See 'Buffer handling' below218for more details.219220221perf record222-----------223224new event225~~~~~~~~~226227The Intel PT kernel driver creates a new PMU for Intel PT. PMU events are228selected by providing the PMU name followed by the "config" separated by slashes.229An enhancement has been made to allow default "config" e.g. the option230231-e intel_pt//232233will use a default config value. Currently that is the same as234235-e intel_pt/tsc,noretcomp=0/236237which is the same as238239-e intel_pt/tsc=1,noretcomp=0/240241Note there are other config terms - see section <<_config_terms,config terms>> further below.242243The config terms are listed in /sys/devices/intel_pt/format. They are bit244fields within the config member of the struct perf_event_attr which is245passed to the kernel by the perf_event_open system call. They correspond to bit246fields in the IA32_RTIT_CTL MSR. Here is a list of them and their definitions:247248$ grep -H . /sys/bus/event_source/devices/intel_pt/format/*249/sys/bus/event_source/devices/intel_pt/format/cyc:config:1250/sys/bus/event_source/devices/intel_pt/format/cyc_thresh:config:19-22251/sys/bus/event_source/devices/intel_pt/format/mtc:config:9252/sys/bus/event_source/devices/intel_pt/format/mtc_period:config:14-17253/sys/bus/event_source/devices/intel_pt/format/noretcomp:config:11254/sys/bus/event_source/devices/intel_pt/format/psb_period:config:24-27255/sys/bus/event_source/devices/intel_pt/format/tsc:config:10256257Note that the default config must be overridden for each term i.e.258259-e intel_pt/noretcomp=0/260261is the same as:262263-e intel_pt/tsc=1,noretcomp=0/264265So, to disable TSC packets use:266267-e intel_pt/tsc=0/268269It is also possible to specify the config value explicitly:270271-e intel_pt/config=0x400/272273Note that, as with all events, the event is suffixed with event modifiers:274275u userspace276k kernel277h hypervisor278G guest279H host280p precise ip281282'h', 'G' and 'H' are for virtualization which are not used by Intel PT.283'p' is also not relevant to Intel PT. So only options 'u' and 'k' are284meaningful for Intel PT.285286perf_event_attr is displayed if the -vv option is used e.g.287288------------------------------------------------------------289perf_event_attr:290type 6291size 112292config 0x400293{ sample_period, sample_freq } 1294sample_type IP|TID|TIME|CPU|IDENTIFIER295read_format ID296disabled 1297inherit 1298exclude_kernel 1299exclude_hv 1300enable_on_exec 1301sample_id_all 1302------------------------------------------------------------303sys_perf_event_open: pid 31104 cpu 0 group_fd -1 flags 0x8304sys_perf_event_open: pid 31104 cpu 1 group_fd -1 flags 0x8305sys_perf_event_open: pid 31104 cpu 2 group_fd -1 flags 0x8306sys_perf_event_open: pid 31104 cpu 3 group_fd -1 flags 0x8307------------------------------------------------------------308309310config terms311~~~~~~~~~~~~312313Config terms are parameters specified with the -e intel_pt// event option,314for example:315316-e intel_pt/cyc/317318which selects cycle accurate mode. Each config term can have a value which319defaults to 1, so the above is the same as:320321-e intel_pt/cyc=1/322323Some terms are set by default, so must be set to 0 to turn them off. For324example, to turn off branch tracing:325326-e intel_pt/branch=0/327328Multiple config terms are separated by commas, for example:329330-e intel_pt/cyc,mtc_period=9/331332There are also common config terms, see linkperf:perf-record[1] documentation.333334Intel PT config terms are described below.335336*tsc*::337Always supported. Produces TSC timestamp packets to provide338timing information. In some cases it is possible to decode339without timing information, for example a per-thread context340that does not overlap executable memory maps.341+342The default config selects tsc (i.e. tsc=1).343344*noretcomp*::345Always supported. Disables "return compression" so a TIP packet346is produced when a function returns. Causes more packets to be347produced but might make decoding more reliable.348+349The default config does not select noretcomp (i.e. noretcomp=0).350351*psb_period*::352Allows the frequency of PSB packets to be specified.353+354The PSB packet is a synchronization packet that provides a355starting point for decoding or recovery from errors.356+357Support for psb_period is indicated by:358+359/sys/bus/event_source/devices/intel_pt/caps/psb_cyc360+361which contains "1" if the feature is supported and "0"362otherwise.363+364Valid values are given by:365+366/sys/bus/event_source/devices/intel_pt/caps/psb_periods367+368which contains a hexadecimal value, the bits of which represent369valid values e.g. bit 2 set means value 2 is valid.370+371The psb_period value is converted to the approximate number of372trace bytes between PSB packets as:373+3742 ^ (value + 11)375+376e.g. value 3 means 16KiB bytes between PSBs377+378If an invalid value is entered, the error message379will give a list of valid values e.g.380+381$ perf record -e intel_pt/psb_period=15/u uname382Invalid psb_period for intel_pt. Valid values are: 0-5383+384If MTC packets are selected, the default config selects a value385of 3 (i.e. psb_period=3) or the nearest lower value that is386supported (0 is always supported). Otherwise the default is 0.387+388If decoding is expected to be reliable and the buffer is large389then a large PSB period can be used.390+391Because a TSC packet is produced with PSB, the PSB period can392also affect the granularity to timing information in the absence393of MTC or CYC.394395*mtc*::396Produces MTC timing packets.397+398MTC packets provide finer grain timestamp information than TSC399packets. MTC packets record time using the hardware crystal400clock (CTC) which is related to TSC packets using a TMA packet.401+402Support for this feature is indicated by:403+404/sys/bus/event_source/devices/intel_pt/caps/mtc405+406which contains "1" if the feature is supported and407"0" otherwise.408+409The frequency of MTC packets can also be specified - see410mtc_period below.411412*mtc_period*::413Specifies how frequently MTC packets are produced - see mtc414above for how to determine if MTC packets are supported.415+416Valid values are given by:417+418/sys/bus/event_source/devices/intel_pt/caps/mtc_periods419+420which contains a hexadecimal value, the bits of which represent421valid values e.g. bit 2 set means value 2 is valid.422+423The mtc_period value is converted to the MTC frequency as:424425CTC-frequency / (2 ^ value)426+427e.g. value 3 means one eighth of CTC-frequency428+429Where CTC is the hardware crystal clock, the frequency of which430can be related to TSC via values provided in cpuid leaf 0x15.431+432If an invalid value is entered, the error message433will give a list of valid values e.g.434+435$ perf record -e intel_pt/mtc_period=15/u uname436Invalid mtc_period for intel_pt. Valid values are: 0,3,6,9437+438The default value is 3 or the nearest lower value439that is supported (0 is always supported).440441*cyc*::442Produces CYC timing packets.443+444CYC packets provide even finer grain timestamp information than445MTC and TSC packets. A CYC packet contains the number of CPU446cycles since the last CYC packet. Unlike MTC and TSC packets,447CYC packets are only sent when another packet is also sent.448+449Support for this feature is indicated by:450+451/sys/bus/event_source/devices/intel_pt/caps/psb_cyc452+453which contains "1" if the feature is supported and454"0" otherwise.455+456The number of CYC packets produced can be reduced by specifying457a threshold - see cyc_thresh below.458459*cyc_thresh*::460Specifies how frequently CYC packets are produced - see cyc461above for how to determine if CYC packets are supported.462+463Valid cyc_thresh values are given by:464+465/sys/bus/event_source/devices/intel_pt/caps/cycle_thresholds466+467which contains a hexadecimal value, the bits of which represent468valid values e.g. bit 2 set means value 2 is valid.469+470The cyc_thresh value represents the minimum number of CPU cycles471that must have passed before a CYC packet can be sent. The472number of CPU cycles is:473+4742 ^ (value - 1)475+476e.g. value 4 means 8 CPU cycles must pass before a CYC packet477can be sent. Note a CYC packet is still only sent when another478packet is sent, not at, e.g. every 8 CPU cycles.479+480If an invalid value is entered, the error message481will give a list of valid values e.g.482+483$ perf record -e intel_pt/cyc,cyc_thresh=15/u uname484Invalid cyc_thresh for intel_pt. Valid values are: 0-12485+486CYC packets are not requested by default.487488*pt*::489Specifies pass-through which enables the 'branch' config term.490+491The default config selects 'pt' if it is available, so a user will492never need to specify this term.493494*branch*::495Enable branch tracing. Branch tracing is enabled by default so to496disable branch tracing use 'branch=0'.497+498The default config selects 'branch' if it is available.499500*ptw*::501Enable PTWRITE packets which are produced when a ptwrite instruction502is executed.503+504Support for this feature is indicated by:505+506/sys/bus/event_source/devices/intel_pt/caps/ptwrite507+508which contains "1" if the feature is supported and509"0" otherwise.510+511As an alternative, refer to "Emulated PTWRITE" further below.512513*fup_on_ptw*::514Enable a FUP packet to follow the PTWRITE packet. The FUP packet515provides the address of the ptwrite instruction. In the absence of516fup_on_ptw, the decoder will use the address of the previous branch517if branch tracing is enabled, otherwise the address will be zero.518Note that fup_on_ptw will work even when branch tracing is disabled.519520*pwr_evt*::521Enable power events. The power events provide information about522changes to the CPU C-state.523+524Support for this feature is indicated by:525+526/sys/bus/event_source/devices/intel_pt/caps/power_event_trace527+528which contains "1" if the feature is supported and529"0" otherwise.530531*event*::532Enable Event Trace. The events provide information about asynchronous533events.534+535Support for this feature is indicated by:536+537/sys/bus/event_source/devices/intel_pt/caps/event_trace538+539which contains "1" if the feature is supported and540"0" otherwise.541542*notnt*::543Disable TNT packets. Without TNT packets, it is not possible to walk544executable code to reconstruct control flow, however FUP, TIP, TIP.PGE545and TIP.PGD packets still indicate asynchronous control flow, and (if546return compression is disabled - see noretcomp) return statements.547The advantage of eliminating TNT packets is reducing the size of the548trace and corresponding tracing overhead.549+550Support for this feature is indicated by:551+552/sys/bus/event_source/devices/intel_pt/caps/tnt_disable553+554which contains "1" if the feature is supported and555"0" otherwise.556557*aux-action=start-paused*::558Start tracing paused, refer to the section <<_pause_or_resume_tracing,Pause or Resume Tracing>>559560561config terms on other events562~~~~~~~~~~~~~~~~~~~~~~~~~~~~563564Some Intel PT features work with other events, features such as AUX area sampling565and PEBS-via-PT. In those cases, the other events can have config terms below:566567*aux-sample-size*::568Used to set the AUX area sample size, refer to the section569<<_aux_area_sampling_option,AUX area sampling option>>570571*aux-output*::572Used to select PEBS-via-PT, refer to the573section <<_pebs_via_intel_pt,PEBS via Intel PT>>574575*aux-action*::576Used to pause or resume tracing, refer to the section577<<_pause_or_resume_tracing,Pause or Resume Tracing>>578579AUX area sampling option580~~~~~~~~~~~~~~~~~~~~~~~~581582To select Intel PT "sampling" the AUX area sampling option can be used:583584--aux-sample585586Optionally it can be followed by the sample size in bytes e.g.587588--aux-sample=8192589590In addition, the Intel PT event to sample must be defined e.g.591592-e intel_pt//u593594Samples on other events will be created containing Intel PT data e.g. the595following will create Intel PT samples on the branch-misses event, note the596events must be grouped using {}:597598perf record --aux-sample -e '{intel_pt//u,branch-misses:u}'599600An alternative to '--aux-sample' is to add the config term 'aux-sample-size' to601events. In this case, the grouping is implied e.g.602603perf record -e intel_pt//u -e branch-misses/aux-sample-size=8192/u604605is the same as:606607perf record -e '{intel_pt//u,branch-misses/aux-sample-size=8192/u}'608609but allows for also using an address filter e.g.:610611perf record -e intel_pt//u --filter 'filter * @/bin/ls' -e branch-misses/aux-sample-size=8192/u -- ls612613It is important to select a sample size that is big enough to contain at least614one PSB packet. If not a warning will be displayed:615616Intel PT sample size (%zu) may be too small for PSB period (%zu)617618The calculation used for that is: if sample_size <= psb_period + 256 display the619warning. When sampling is used, psb_period defaults to 0 (2KiB).620621The default sample size is 4KiB.622623The sample size is passed in aux_sample_size in struct perf_event_attr. The624sample size is limited by the maximum event size which is 64KiB. It is625difficult to know how big the event might be without the trace sample attached,626but the tool validates that the sample size is not greater than 60KiB.627628629new snapshot option630~~~~~~~~~~~~~~~~~~~631632The difference between full trace and snapshot from the kernel's perspective is633that in full trace we don't overwrite trace data that the user hasn't collected634yet (and indicated that by advancing aux_tail), whereas in snapshot mode we let635the trace run and overwrite older data in the buffer so that whenever something636interesting happens, we can stop it and grab a snapshot of what was going on637around that interesting moment.638639To select snapshot mode a new option has been added:640641-S642643Optionally it can be followed by the snapshot size e.g.644645-S0x100000646647The default snapshot size is the auxtrace mmap size. If neither auxtrace mmap size648nor snapshot size is specified, then the default is 4MiB for privileged users649(or if /proc/sys/kernel/perf_event_paranoid < 0), 128KiB for unprivileged users.650If an unprivileged user does not specify mmap pages, the mmap pages will be651reduced as described in the <<_new_auxtrace_mmap_size_option,new auxtrace mmap size option>>652section below.653654The snapshot size is displayed if the option -vv is used e.g.655656Intel PT snapshot size: %zu657658659new auxtrace mmap size option660~~~~~~~~~~~~~~~~~~~~~~~~~~~~~661662Intel PT buffer size is specified by an addition to the -m option e.g.663664-m,16665666selects a buffer size of 16 pages i.e. 64KiB.667668Note that the existing functionality of -m is unchanged. The auxtrace mmap size669is specified by the optional addition of a comma and the value.670671The default auxtrace mmap size for Intel PT is 4MiB/page_size for privileged users672(or if /proc/sys/kernel/perf_event_paranoid < 0), 128KiB for unprivileged users.673If an unprivileged user does not specify mmap pages, the mmap pages will be674reduced from the default 512KiB/page_size to 256KiB/page_size, otherwise the675user is likely to get an error as they exceed their mlock limit (Max locked676memory as shown in /proc/self/limits). Note that perf does not count the first677512KiB (actually /proc/sys/kernel/perf_event_mlock_kb minus 1 page) per cpu678against the mlock limit so an unprivileged user is allowed 512KiB per cpu plus679their mlock limit (which defaults to 64KiB but is not multiplied by the number680of cpus).681682In full-trace mode, powers of two are allowed for buffer size, with a minimum683size of 2 pages. In snapshot mode or sampling mode, it is the same but the684minimum size is 1 page.685686The mmap size and auxtrace mmap size are displayed if the -vv option is used e.g.687688mmap length 528384689auxtrace mmap length 4198400690691692Intel PT modes of operation693~~~~~~~~~~~~~~~~~~~~~~~~~~~694695Intel PT can be used in 3 modes:696full-trace mode697sample mode698snapshot mode699700Full-trace mode traces continuously e.g.701702perf record -e intel_pt//u uname703704Sample mode attaches a Intel PT sample to other events e.g.705706perf record --aux-sample -e intel_pt//u -e branch-misses:u707708Snapshot mode captures the available data when a signal is sent or "snapshot"709control command is issued. e.g. using a signal710711perf record -v -e intel_pt//u -S ./loopy 1000000000 &712[1] 11435713kill -USR2 11435714Recording AUX area tracing snapshot715716Note that the signal sent is SIGUSR2.717Note that "Recording AUX area tracing snapshot" is displayed because the -v718option is used.719720The advantage of using "snapshot" control command is that the access is721controlled by access to a FIFO e.g.722723$ mkfifo perf.control724$ mkfifo perf.ack725$ cat perf.ack &726[1] 15235727$ sudo ~/bin/perf record --control fifo:perf.control,perf.ack -S -e intel_pt//u -- sleep 60 &728[2] 15243729$ ps -e | grep perf73015244 pts/1 00:00:00 perf731$ kill -USR2 15244732bash: kill: (15244) - Operation not permitted733$ echo snapshot > perf.control734ack735736The 3 Intel PT modes of operation cannot be used together.737738739Buffer handling740~~~~~~~~~~~~~~~741742There may be buffer limitations (i.e. single ToPa entry) which means that actual743buffer sizes are limited to powers of 2 up to 4MiB (MAX_PAGE_ORDER). In order to744provide other sizes, and in particular an arbitrarily large size, multiple745buffers are logically concatenated. However an interrupt must be used to switch746between buffers. That has two potential problems:747a) the interrupt may not be handled in time so that the current buffer748becomes full and some trace data is lost.749b) the interrupts may slow the system and affect the performance750results.751752If trace data is lost, the driver sets 'truncated' in the PERF_RECORD_AUX event753which the tools report as an error.754755In full-trace mode, the driver waits for data to be copied out before allowing756the (logical) buffer to wrap-around. If data is not copied out quickly enough,757again 'truncated' is set in the PERF_RECORD_AUX event. If the driver has to758wait, the intel_pt event gets disabled. Because it is difficult to know when759that happens, perf tools always re-enable the intel_pt event after copying out760data.761762763Intel PT and build ids764~~~~~~~~~~~~~~~~~~~~~~765766By default "perf record" post-processes the event stream to find all build ids767for executables for all addresses sampled. Deliberately, Intel PT is not768decoded for that purpose (it would take too long). Instead the build ids for769all executables encountered (due to mmap, comm or task events) are included770in the perf.data file.771772To see buildids included in the perf.data file use the command:773774perf buildid-list775776If the perf.data file contains Intel PT data, that is the same as:777778perf buildid-list --with-hits779780781Snapshot mode and event disabling782~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~783784In order to make a snapshot, the intel_pt event is disabled using an IOCTL,785namely PERF_EVENT_IOC_DISABLE. However doing that can also disable the786collection of side-band information. In order to prevent that, a dummy787software event has been introduced that permits tracking events (like mmaps) to788continue to be recorded while intel_pt is disabled. That is important to ensure789there is complete side-band information to allow the decoding of subsequent790snapshots.791792A test has been created for that. To find the test:793794perf test list795...79623: Test using a dummy software event to keep tracking797798To run the test:799800perf test 2380123: Test using a dummy software event to keep tracking : Ok802803804perf record modes (nothing new here)805~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~806807perf record essentially operates in one of three modes:808per thread809per cpu810workload only811812"per thread" mode is selected by -t or by --per-thread (with -p or -u or just a813workload).814"per cpu" is selected by -C or -a.815"workload only" mode is selected by not using the other options but providing a816command to run (i.e. the workload).817818In per-thread mode an exact list of threads is traced. There is no inheritance.819Each thread has its own event buffer.820821In per-cpu mode all processes (or processes from the selected cgroup i.e. -G822option, or processes selected with -p or -u) are traced. Each cpu has its own823buffer. Inheritance is allowed.824825In workload-only mode, the workload is traced but with per-cpu buffers.826Inheritance is allowed. Note that you can now trace a workload in per-thread827mode by using the --per-thread option.828829830Privileged vs non-privileged users831~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~832833Unless /proc/sys/kernel/perf_event_paranoid is set to -1, unprivileged users834have memory limits imposed upon them. That affects what buffer sizes they can835have as outlined above.836837The v4.2 kernel introduced support for a context switch metadata event,838PERF_RECORD_SWITCH, which allows unprivileged users to see when their processes839are scheduled out and in, just not by whom, which is left for the840PERF_RECORD_SWITCH_CPU_WIDE, that is only accessible in system wide context,841which in turn requires CAP_PERFMON or CAP_SYS_ADMIN.842843Please see the 45ac1403f564 ("perf: Add PERF_RECORD_SWITCH to indicate context844switches") commit, that introduces these metadata events for further info.845846When working with kernels < v4.2, the following considerations must be taken,847as the sched:sched_switch tracepoints will be used to receive such information:848849Unless /proc/sys/kernel/perf_event_paranoid is set to -1, unprivileged users are850not permitted to use tracepoints which means there is insufficient side-band851information to decode Intel PT in per-cpu mode, and potentially workload-only852mode too if the workload creates new processes.853854Note also, that to use tracepoints, read-access to debugfs is required. So if855debugfs is not mounted or the user does not have read-access, it will again not856be possible to decode Intel PT in per-cpu mode.857858859sched_switch tracepoint860~~~~~~~~~~~~~~~~~~~~~~~861862The sched_switch tracepoint is used to provide side-band data for Intel PT863decoding in kernels where the PERF_RECORD_SWITCH metadata event isn't864available.865866The sched_switch events are automatically added. e.g. the second event shown867below:868869$ perf record -vv -e intel_pt//u uname870------------------------------------------------------------871perf_event_attr:872type 6873size 112874config 0x400875{ sample_period, sample_freq } 1876sample_type IP|TID|TIME|CPU|IDENTIFIER877read_format ID878disabled 1879inherit 1880exclude_kernel 1881exclude_hv 1882enable_on_exec 1883sample_id_all 1884------------------------------------------------------------885sys_perf_event_open: pid 31104 cpu 0 group_fd -1 flags 0x8886sys_perf_event_open: pid 31104 cpu 1 group_fd -1 flags 0x8887sys_perf_event_open: pid 31104 cpu 2 group_fd -1 flags 0x8888sys_perf_event_open: pid 31104 cpu 3 group_fd -1 flags 0x8889------------------------------------------------------------890perf_event_attr:891type 2892size 112893config 0x108894{ sample_period, sample_freq } 1895sample_type IP|TID|TIME|CPU|PERIOD|RAW|IDENTIFIER896read_format ID897inherit 1898sample_id_all 1899exclude_guest 1900------------------------------------------------------------901sys_perf_event_open: pid -1 cpu 0 group_fd -1 flags 0x8902sys_perf_event_open: pid -1 cpu 1 group_fd -1 flags 0x8903sys_perf_event_open: pid -1 cpu 2 group_fd -1 flags 0x8904sys_perf_event_open: pid -1 cpu 3 group_fd -1 flags 0x8905------------------------------------------------------------906perf_event_attr:907type 1908size 112909config 0x9910{ sample_period, sample_freq } 1911sample_type IP|TID|TIME|IDENTIFIER912read_format ID913disabled 1914inherit 1915exclude_kernel 1916exclude_hv 1917mmap 1918comm 1919enable_on_exec 1920task 1921sample_id_all 1922mmap2 1923comm_exec 1924------------------------------------------------------------925sys_perf_event_open: pid 31104 cpu 0 group_fd -1 flags 0x8926sys_perf_event_open: pid 31104 cpu 1 group_fd -1 flags 0x8927sys_perf_event_open: pid 31104 cpu 2 group_fd -1 flags 0x8928sys_perf_event_open: pid 31104 cpu 3 group_fd -1 flags 0x8929mmap size 528384B930AUX area mmap length 4194304931perf event ring buffer mmapped per cpu932Synthesizing auxtrace information933Linux934[ perf record: Woken up 1 times to write data ]935[ perf record: Captured and wrote 0.042 MB perf.data ]936937Note, the sched_switch event is only added if the user is permitted to use it938and only in per-cpu mode.939940Note also, the sched_switch event is only added if TSC packets are requested.941That is because, in the absence of timing information, the sched_switch events942cannot be matched against the Intel PT trace.943944945perf script946-----------947948By default, perf script will decode trace data found in the perf.data file.949This can be further controlled by new option --itrace.950951952New --itrace option953~~~~~~~~~~~~~~~~~~~954955Having no option is the same as956957--itrace958959which, in turn, is the same as960961--itrace=cepwxy962963The letters are:964965i synthesize "instructions" events966y synthesize "cycles" events967b synthesize "branches" events968x synthesize "transactions" events969w synthesize "ptwrite" events970p synthesize "power" events (incl. PSB events)971c synthesize branches events (calls only)972r synthesize branches events (returns only)973o synthesize PEBS-via-PT events974I synthesize Event Trace events975e synthesize tracing error events976d create a debug log977g synthesize a call chain (use with i or x)978G synthesize a call chain on existing event records979l synthesize last branch entries (use with i or x)980L synthesize last branch entries on existing event records981s skip initial number of events982q quicker (less detailed) decoding983A approximate IPC984Z prefer to ignore timestamps (so-called "timeless" decoding)985986"Instructions" events look like they were recorded by "perf record -e987instructions".988989"Cycles" events look like they were recorded by "perf record -e cycles"990(ie., the default). Note that even with CYC packets enabled and no sampling,991these are not fully accurate, since CYC packets are not emitted for each992instruction, only when some other event (like an indirect branch, or a993TNT packet representing multiple branches) happens causes a packet to994be emitted. Thus, it is more effective for attributing cycles to functions995(and possibly basic blocks) than to individual instructions, although it996is not even perfect for functions (although it becomes better if the noretcomp997option is active).998999"Branches" events look like they were recorded by "perf record -e branches". "c"1000and "r" can be combined to get calls and returns.10011002"Transactions" events correspond to the start or end of transactions. The1003'flags' field can be used in perf script to determine whether the event is a1004transaction start, commit or abort.10051006Note that "instructions", "cycles", "branches" and "transactions" events1007depend on code flow packets which can be disabled by using the config term1008"branch=0". Refer to the <<_config_terms,config terms>> section above.10091010"ptwrite" events record the payload of the ptwrite instruction and whether1011"fup_on_ptw" was used. "ptwrite" events depend on PTWRITE packets which are1012recorded only if the "ptw" config term was used. Refer to the <<_config_terms,config terms>>1013section above. perf script "synth" field displays "ptwrite" information like1014this: "ip: 0 payload: 0x123456789abcdef0" where "ip" is 1 if "fup_on_ptw" was1015used.10161017"Power" events correspond to power event packets and CBR (core-to-bus ratio)1018packets. While CBR packets are always recorded when tracing is enabled, power1019event packets are recorded only if the "pwr_evt" config term was used. Refer to1020the <<_config_terms,config terms>> section above. The power events record information about1021C-state changes, whereas CBR is indicative of CPU frequency. perf script1022"event,synth" fields display information like this:10231024cbr: cbr: 22 freq: 2189 MHz (200%)1025mwait: hints: 0x60 extensions: 0x11026pwre: hw: 0 cstate: 2 sub-cstate: 01027exstop: ip: 11028pwrx: deepest cstate: 2 last cstate: 2 wake reason: 0x410291030Where:10311032"cbr" includes the frequency and the percentage of maximum non-turbo1033"mwait" shows mwait hints and extensions1034"pwre" shows C-state transitions (to a C-state deeper than C0) and1035whether initiated by hardware1036"exstop" indicates execution stopped and whether the IP was recorded1037exactly,1038"pwrx" indicates return to C010391040For more details refer to the Intel 64 and IA-32 Architectures Software1041Developer Manuals.10421043PSB events show when a PSB+ occurred and also the byte-offset in the trace.1044Emitting a PSB+ can cause a CPU a slight delay. When doing timing analysis1045of code with Intel PT, it is useful to know if a timing bubble was caused1046by Intel PT or not.10471048Error events show where the decoder lost the trace. Error events1049are quite important. Users must know if what they are seeing is a complete1050picture or not. The "e" option may be followed by flags which affect what errors1051will or will not be reported. Each flag must be preceded by either '+' or '-'.1052The flags supported by Intel PT are:10531054-o Suppress overflow errors1055-l Suppress trace data lost errors10561057For example, for errors but not overflow or data lost errors:10581059--itrace=e-o-l10601061The "d" option will cause the creation of a file "intel_pt.log" containing all1062decoded packets and instructions. Note that this option slows down the decoder1063and that the resulting file may be very large. The "d" option may be followed1064by flags which affect what debug messages will or will not be logged. Each flag1065must be preceded by either '+' or '-'. The flags support by Intel PT are:10661067-a Suppress logging of perf events1068+a Log all perf events1069+e Output only on decoding errors (size configurable)1070+o Output to stdout instead of "intel_pt.log"10711072By default, logged perf events are filtered by any specified time ranges, but1073flag +a overrides that. The +e flag can be useful for analyzing errors. By1074default, the log size in that case is 16384 bytes, but can be altered by1075linkperf:perf-config[1] e.g. perf config itrace.debug-log-buffer-size=3000010761077In addition, the period of the "instructions" event can be specified. e.g.10781079--itrace=i10us10801081sets the period to 10us i.e. one instruction sample is synthesized for each 101082microseconds of trace. Alternatives to "us" are "ms" (milliseconds),1083"ns" (nanoseconds), "t" (TSC ticks) or "i" (instructions).10841085"ms", "us" and "ns" are converted to TSC ticks.10861087The timing information included with Intel PT does not give the time of every1088instruction. Consequently, for the purpose of sampling, the decoder estimates1089the time since the last timing packet based on 1 tick per instruction. The time1090on the sample is *not* adjusted and reflects the last known value of TSC.10911092For Intel PT, the default period is 100us.10931094Setting it to a zero period means "as often as possible".10951096In the case of Intel PT that is the same as a period of 1 and a unit of1097'instructions' (i.e. --itrace=i1i).10981099Also the call chain size (default 16, max. 1024) for instructions or1100transactions events can be specified. e.g.11011102--itrace=ig321103--itrace=xg3211041105Also the number of last branch entries (default 64, max. 1024) for instructions or1106transactions events can be specified. e.g.11071108--itrace=il101109--itrace=xl1011101111Note that last branch entries are cleared for each sample, so there is no overlap1112from one sample to the next.11131114The G and L options are designed in particular for sample mode, and work much1115like g and l but add call chain and branch stack to the other selected events1116instead of synthesized events. For example, to record branch-misses events for1117'ls' and then add a call chain derived from the Intel PT trace:11181119perf record --aux-sample -e '{intel_pt//u,branch-misses:u}' -- ls1120perf report --itrace=Ge11211122Although in fact G is a default for perf report, so that is the same as just:11231124perf report11251126One caveat with the G and L options is that they work poorly with "Large PEBS".1127Large PEBS means PEBS records will be accumulated by hardware and the written1128into the event buffer in one go. That reduces interrupts, but can give very1129late timestamps. Because the Intel PT trace is synchronized by timestamps,1130the PEBS events do not match the trace. Currently, Large PEBS is used only in1131certain circumstances:1132- hardware supports it1133- PEBS is used1134- event period is specified, instead of frequency1135- the sample type is limited to the following flags:1136PERF_SAMPLE_IP | PERF_SAMPLE_TID | PERF_SAMPLE_ADDR |1137PERF_SAMPLE_ID | PERF_SAMPLE_CPU | PERF_SAMPLE_STREAM_ID |1138PERF_SAMPLE_DATA_SRC | PERF_SAMPLE_IDENTIFIER |1139PERF_SAMPLE_TRANSACTION | PERF_SAMPLE_PHYS_ADDR |1140PERF_SAMPLE_REGS_INTR | PERF_SAMPLE_REGS_USER |1141PERF_SAMPLE_PERIOD (and sometimes) | PERF_SAMPLE_TIME1142Because Intel PT sample mode uses a different sample type to the list above,1143Large PEBS is not used with Intel PT sample mode. To avoid Large PEBS in other1144cases, avoid specifying the event period i.e. avoid the 'perf record' -c option,1145--count option, or 'period' config term.11461147To disable trace decoding entirely, use the option --no-itrace.11481149It is also possible to skip events generated (instructions, branches, transactions)1150at the beginning. This is useful to ignore initialization code.11511152--itrace=i0nss100000011531154skips the first million instructions.11551156The q option changes the way the trace is decoded. The decoding is much faster1157but much less detailed. Specifically, with the q option, the decoder does not1158decode TNT packets, and does not walk object code, but gets the ip from FUP and1159TIP packets. The q option can be used with the b and i options but the period1160is not used. The q option decodes more quickly, but is useful only if the1161control flow of interest is represented or indicated by FUP, TIP, TIP.PGE, or1162TIP.PGD packets (refer below). However the q option could be used to find time1163ranges that could then be decoded fully using the --time option.11641165What will *not* be decoded with the (single) q option:11661167- direct calls and jmps1168- conditional branches1169- non-branch instructions11701171What *will* be decoded with the (single) q option:11721173- asynchronous branches such as interrupts1174- indirect branches1175- function return target address *if* the noretcomp config term (refer1176<<_config_terms,config terms>> section) was used1177- start of (control-flow) tracing1178- end of (control-flow) tracing, if it is not out of context1179- power events, ptwrite, transaction start and abort1180- instruction pointer associated with PSB packets11811182Note the q option does not specify what events will be synthesized e.g. the p1183option must be used also to show power events.11841185Repeating the q option (double-q i.e. qq) results in even faster decoding and even1186less detail. The decoder decodes only extended PSB (PSB+) packets, getting the1187instruction pointer if there is a FUP packet within PSB+ (i.e. between PSB and1188PSBEND). Note PSB packets occur regularly in the trace based on the psb_period1189config term (refer <<_config_terms,config terms>> section). There will be a FUP packet if the1190PSB+ occurs while control flow is being traced.11911192What will *not* be decoded with the qq option:11931194- everything except instruction pointer associated with PSB packets11951196What *will* be decoded with the qq option:11971198- instruction pointer associated with PSB packets11991200The Z option is equivalent to having recorded a trace without TSC1201(i.e. config term tsc=0). It can be useful to avoid timestamp issues when1202decoding a trace of a virtual machine.120312041205dlfilter-show-cycles.so1206~~~~~~~~~~~~~~~~~~~~~~~12071208Cycles can be displayed using dlfilter-show-cycles.so in which case the itrace A1209option can be useful to provide higher granularity cycle information:12101211perf script --itrace=A --call-trace --dlfilter dlfilter-show-cycles.so12121213To see a list of dlfilters:12141215perf script -v --list-dlfilters12161217See also linkperf:perf-dlfilters[1]121812191220dump option1221~~~~~~~~~~~12221223perf script has an option (-D) to "dump" the events i.e. display the binary1224data.12251226When -D is used, Intel PT packets are displayed. The packet decoder does not1227pay attention to PSB packets, but just decodes the bytes - so the packets seen1228by the actual decoder may not be identical in places where the data is corrupt.1229One example of that would be when the buffer-switching interrupt has been too1230slow, and the buffer has been filled completely. In that case, the last packet1231in the buffer might be truncated and immediately followed by a PSB as the trace1232continues in the next buffer.12331234To disable the display of Intel PT packets, combine the -D option with1235--no-itrace.123612371238perf report1239-----------12401241By default, perf report will decode trace data found in the perf.data file.1242This can be further controlled by new option --itrace exactly the same as1243perf script, with the exception that the default is --itrace=igxe.124412451246perf inject1247-----------12481249perf inject also accepts the --itrace option in which case tracing data is1250removed and replaced with the synthesized events. e.g.12511252perf inject --itrace -i perf.data -o perf.data.new12531254Below is an example of using Intel PT with autofdo. It requires autofdo1255(https://github.com/google/autofdo) and gcc version 5. The bubble1256sort example is from the AutoFDO tutorial (https://gcc.gnu.org/wiki/AutoFDO/Tutorial)1257amended to take the number of elements as a parameter.12581259$ gcc-5 -O3 sort.c -o sort_optimized1260$ ./sort_optimized 300001261Bubble sorting array of 30000 elements12622254 ms12631264$ cat ~/.perfconfig1265[intel-pt]1266mispred-all = on12671268$ perf record -e intel_pt//u ./sort 30001269Bubble sorting array of 3000 elements127058 ms1271[ perf record: Woken up 2 times to write data ]1272[ perf record: Captured and wrote 3.939 MB perf.data ]1273$ perf inject -i perf.data -o inj --itrace=i100usle --strip1274$ ./create_gcov --binary=./sort --profile=inj --gcov=sort.gcov -gcov_version=11275$ gcc-5 -O3 -fauto-profile=sort.gcov sort.c -o sort_autofdo1276$ ./sort_autofdo 300001277Bubble sorting array of 30000 elements12782155 ms12791280Note there is currently no advantage to using Intel PT instead of LBR, but1281that may change in the future if greater use is made of the data.128212831284PEBS via Intel PT1285-----------------12861287Some hardware has the feature to redirect PEBS records to the Intel PT trace.1288Recording is selected by using the aux-output config term e.g.12891290perf record -c 10000 -e '{intel_pt/branch=0/,cycles/aux-output/ppp}' uname12911292Originally, software only supported redirecting at most one PEBS event because it1293was not able to differentiate one event from another. To overcome that, more recent1294kernels and perf tools add support for the PERF_RECORD_AUX_OUTPUT_HW_ID side-band event.1295To check for the presence of that event in a PEBS-via-PT trace:12961297perf script -D --no-itrace | grep PERF_RECORD_AUX_OUTPUT_HW_ID12981299To display PEBS events from the Intel PT trace, use the itrace 'o' option e.g.13001301perf script --itrace=oe13021303XED1304---13051306include::build-xed.txt[]130713081309Tracing Virtual Machines (kernel only)1310--------------------------------------13111312Currently, kernel tracing is supported with either "timeless" decoding1313(i.e. no TSC timestamps) or VM Time Correlation. VM Time Correlation is an extra step1314using 'perf inject' and requires unchanging VMX TSC Offset and no VMX TSC Scaling.13151316Other limitations and caveats13171318VMX controls may suppress packets needed for decoding resulting in decoding errors1319VMX controls may block the perf NMI to the host potentially resulting in lost trace data1320Guest kernel self-modifying code (e.g. jump labels or JIT-compiled eBPF) will result in decoding errors1321Guest thread information is unknown1322Guest VCPU is unknown but may be able to be inferred from the host thread1323Callchains are not supported13241325Example using "timeless" decoding13261327Start VM13281329$ sudo virsh start kubuntu20.041330Domain kubuntu20.04 started13311332Mount the guest file system. Note sshfs needs -o direct_io to enable reading of proc files. root access is needed to read /proc/kcore.13331334$ mkdir vm01335$ sshfs -o direct_io root@vm0:/ vm013361337Copy the guest /proc/kallsyms, /proc/modules and /proc/kcore13381339$ perf buildid-cache -v --kcore vm0/proc/kcore1340kcore added to build-id cache directory /home/user/.debug/[kernel.kcore]/9600f316a53a0f54278885e8d9710538ec5f6a08/20210218074943061341$ KALLSYMS=/home/user/.debug/[kernel.kcore]/9600f316a53a0f54278885e8d9710538ec5f6a08/2021021807494306/kallsyms13421343Find the VM process13441345$ ps -eLl | grep 'KVM\|PID'1346F S UID PID PPID LWP C PRI NI ADDR SZ WCHAN TTY TIME CMD13473 S 64055 1430 1 1440 1 80 0 - 1921718 - ? 00:02:47 CPU 0/KVM13483 S 64055 1430 1 1441 1 80 0 - 1921718 - ? 00:02:41 CPU 1/KVM13493 S 64055 1430 1 1442 1 80 0 - 1921718 - ? 00:02:38 CPU 2/KVM13503 S 64055 1430 1 1443 2 80 0 - 1921718 - ? 00:03:18 CPU 3/KVM13511352Start an open-ended perf record, tracing the VM process, do something on the VM, and then ctrl-C to stop.1353TSC is not supported and tsc=0 must be specified. That means mtc is useless, so add mtc=0.1354However, IPC can still be determined, hence cyc=1 can be added.1355Only kernel decoding is supported, so 'k' must be specified.1356Intel PT traces both the host and the guest so --guest and --host need to be specified.1357Without timestamps, --per-thread must be specified to distinguish threads.13581359$ sudo perf kvm --guest --host --guestkallsyms $KALLSYMS record --kcore -e intel_pt/tsc=0,mtc=0,cyc=1/k -p 1430 --per-thread1360^C1361[ perf record: Woken up 1 times to write data ]1362[ perf record: Captured and wrote 5.829 MB ]13631364perf script can be used to provide an instruction trace13651366$ perf script --guestkallsyms $KALLSYMS --insn-trace=disasm -F+ipc | grep -C10 vmresume | head -211367CPU 0/KVM 1440 ffffffff82133cdd __vmx_vcpu_run+0x3d ([kernel.kallsyms]) movq 0x48(%rax), %r91368CPU 0/KVM 1440 ffffffff82133ce1 __vmx_vcpu_run+0x41 ([kernel.kallsyms]) movq 0x50(%rax), %r101369CPU 0/KVM 1440 ffffffff82133ce5 __vmx_vcpu_run+0x45 ([kernel.kallsyms]) movq 0x58(%rax), %r111370CPU 0/KVM 1440 ffffffff82133ce9 __vmx_vcpu_run+0x49 ([kernel.kallsyms]) movq 0x60(%rax), %r121371CPU 0/KVM 1440 ffffffff82133ced __vmx_vcpu_run+0x4d ([kernel.kallsyms]) movq 0x68(%rax), %r131372CPU 0/KVM 1440 ffffffff82133cf1 __vmx_vcpu_run+0x51 ([kernel.kallsyms]) movq 0x70(%rax), %r141373CPU 0/KVM 1440 ffffffff82133cf5 __vmx_vcpu_run+0x55 ([kernel.kallsyms]) movq 0x78(%rax), %r151374CPU 0/KVM 1440 ffffffff82133cf9 __vmx_vcpu_run+0x59 ([kernel.kallsyms]) movq (%rax), %rax1375CPU 0/KVM 1440 ffffffff82133cfc __vmx_vcpu_run+0x5c ([kernel.kallsyms]) callq 0xffffffff82133c401376CPU 0/KVM 1440 ffffffff82133c40 vmx_vmenter+0x0 ([kernel.kallsyms]) jz 0xffffffff82133c461377CPU 0/KVM 1440 ffffffff82133c42 vmx_vmenter+0x2 ([kernel.kallsyms]) vmresume IPC: 0.11 (50/445)1378:1440 1440 ffffffffbb678b06 native_write_msr+0x6 ([guest.kernel.kallsyms]) nopl %eax, (%rax,%rax,1)1379:1440 1440 ffffffffbb678b0b native_write_msr+0xb ([guest.kernel.kallsyms]) retq IPC: 0.04 (2/41)1380:1440 1440 ffffffffbb666646 lapic_next_deadline+0x26 ([guest.kernel.kallsyms]) data16 nop1381:1440 1440 ffffffffbb666648 lapic_next_deadline+0x28 ([guest.kernel.kallsyms]) xor %eax, %eax1382:1440 1440 ffffffffbb66664a lapic_next_deadline+0x2a ([guest.kernel.kallsyms]) popq %rbp1383:1440 1440 ffffffffbb66664b lapic_next_deadline+0x2b ([guest.kernel.kallsyms]) retq IPC: 0.16 (4/25)1384:1440 1440 ffffffffbb74607f clockevents_program_event+0x8f ([guest.kernel.kallsyms]) test %eax, %eax1385:1440 1440 ffffffffbb746081 clockevents_program_event+0x91 ([guest.kernel.kallsyms]) jz 0xffffffffbb74603c IPC: 0.06 (2/30)1386:1440 1440 ffffffffbb74603c clockevents_program_event+0x4c ([guest.kernel.kallsyms]) popq %rbx1387:1440 1440 ffffffffbb74603d clockevents_program_event+0x4d ([guest.kernel.kallsyms]) popq %r1213881389Example using VM Time Correlation13901391Start VM13921393$ sudo virsh start kubuntu20.041394Domain kubuntu20.04 started13951396Mount the guest file system. Note sshfs needs -o direct_io to enable reading of proc files. root access is needed to read /proc/kcore.13971398$ mkdir -p vm01399$ sshfs -o direct_io root@vm0:/ vm014001401Copy the guest /proc/kallsyms, /proc/modules and /proc/kcore14021403$ perf buildid-cache -v --kcore vm0/proc/kcore1404same kcore found in /home/user/.debug/[kernel.kcore]/cc9c55a98c5e4ec0aeda69302554aabed5cd6491/20210213124507771405$ KALLSYMS=/home/user/.debug/\[kernel.kcore\]/cc9c55a98c5e4ec0aeda69302554aabed5cd6491/2021021312450777/kallsyms14061407Find the VM process14081409$ ps -eLl | grep 'KVM\|PID'1410F S UID PID PPID LWP C PRI NI ADDR SZ WCHAN TTY TIME CMD14113 S 64055 16998 1 17005 13 80 0 - 1818189 - ? 00:00:16 CPU 0/KVM14123 S 64055 16998 1 17006 4 80 0 - 1818189 - ? 00:00:05 CPU 1/KVM14133 S 64055 16998 1 17007 3 80 0 - 1818189 - ? 00:00:04 CPU 2/KVM14143 S 64055 16998 1 17008 4 80 0 - 1818189 - ? 00:00:05 CPU 3/KVM14151416Start an open-ended perf record, tracing the VM process, do something on the VM, and then ctrl-C to stop.1417IPC can be determined, hence cyc=1 can be added.1418Only kernel decoding is supported, so 'k' must be specified.1419Intel PT traces both the host and the guest so --guest and --host need to be specified.14201421$ sudo perf kvm --guest --host --guestkallsyms $KALLSYMS record --kcore -e intel_pt/cyc=1/k -p 169981422^C[ perf record: Woken up 1 times to write data ]1423[ perf record: Captured and wrote 9.041 MB perf.data.kvm ]14241425Now 'perf inject' can be used to determine the VMX TCS Offset. Note, Intel PT TSC packets are1426only 7-bytes, so the TSC Offset might differ from the actual value in the 8th byte. That will1427have no effect i.e. the resulting timestamps will be correct anyway.14281429$ perf inject -i perf.data.kvm --vm-time-correlation=dry-run1430ERROR: Unknown TSC Offset for VMCS 0x1bff6a1431VMCS: 0x1bff6a TSC Offset 0xffffe42722c64c411432ERROR: Unknown TSC Offset for VMCS 0x1cbc081433VMCS: 0x1cbc08 TSC Offset 0xffffe42722c64c411434ERROR: Unknown TSC Offset for VMCS 0x1c3ce81435VMCS: 0x1c3ce8 TSC Offset 0xffffe42722c64c411436ERROR: Unknown TSC Offset for VMCS 0x1cbce91437VMCS: 0x1cbce9 TSC Offset 0xffffe42722c64c4114381439Each virtual CPU has a different Virtual Machine Control Structure (VMCS)1440shown above with the calculated TSC Offset. For an unchanging TSC Offset1441they should all be the same for the same virtual machine.14421443Now that the TSC Offset is known, it can be provided to 'perf inject'14441445$ perf inject -i perf.data.kvm --vm-time-correlation="dry-run 0xffffe42722c64c41"14461447Note the options for 'perf inject' --vm-time-correlation are:14481449[ dry-run ] [ <TSC Offset> [ : <VMCS> [ , <VMCS> ]... ] ]...14501451So it is possible to specify different TSC Offsets for different VMCS.1452The option "dry-run" will cause the file to be processed but without updating it.1453Note it is also possible to get a intel_pt.log file by adding option --itrace=d14541455There were no errors so, do it for real14561457$ perf inject -i perf.data.kvm --vm-time-correlation=0xffffe42722c64c41 --force14581459'perf script' can be used to see if there are any decoder errors14601461$ perf script -i perf.data.kvm --guestkallsyms $KALLSYMS --itrace=e-o14621463There were none.14641465'perf script' can be used to provide an instruction trace showing timestamps14661467$ perf script -i perf.data.kvm --guestkallsyms $KALLSYMS --insn-trace=disasm -F+ipc | grep -C10 vmresume | head -211468CPU 1/KVM 17006 [001] 11500.262865593: ffffffff82133cdd __vmx_vcpu_run+0x3d ([kernel.kallsyms]) movq 0x48(%rax), %r91469CPU 1/KVM 17006 [001] 11500.262865593: ffffffff82133ce1 __vmx_vcpu_run+0x41 ([kernel.kallsyms]) movq 0x50(%rax), %r101470CPU 1/KVM 17006 [001] 11500.262865593: ffffffff82133ce5 __vmx_vcpu_run+0x45 ([kernel.kallsyms]) movq 0x58(%rax), %r111471CPU 1/KVM 17006 [001] 11500.262865593: ffffffff82133ce9 __vmx_vcpu_run+0x49 ([kernel.kallsyms]) movq 0x60(%rax), %r121472CPU 1/KVM 17006 [001] 11500.262865593: ffffffff82133ced __vmx_vcpu_run+0x4d ([kernel.kallsyms]) movq 0x68(%rax), %r131473CPU 1/KVM 17006 [001] 11500.262865593: ffffffff82133cf1 __vmx_vcpu_run+0x51 ([kernel.kallsyms]) movq 0x70(%rax), %r141474CPU 1/KVM 17006 [001] 11500.262865593: ffffffff82133cf5 __vmx_vcpu_run+0x55 ([kernel.kallsyms]) movq 0x78(%rax), %r151475CPU 1/KVM 17006 [001] 11500.262865593: ffffffff82133cf9 __vmx_vcpu_run+0x59 ([kernel.kallsyms]) movq (%rax), %rax1476CPU 1/KVM 17006 [001] 11500.262865593: ffffffff82133cfc __vmx_vcpu_run+0x5c ([kernel.kallsyms]) callq 0xffffffff82133c401477CPU 1/KVM 17006 [001] 11500.262865593: ffffffff82133c40 vmx_vmenter+0x0 ([kernel.kallsyms]) jz 0xffffffff82133c461478CPU 1/KVM 17006 [001] 11500.262866075: ffffffff82133c42 vmx_vmenter+0x2 ([kernel.kallsyms]) vmresume IPC: 0.05 (40/769)1479:17006 17006 [001] 11500.262869216: ffffffff82200cb0 asm_sysvec_apic_timer_interrupt+0x0 ([guest.kernel.kallsyms]) clac1480:17006 17006 [001] 11500.262869216: ffffffff82200cb3 asm_sysvec_apic_timer_interrupt+0x3 ([guest.kernel.kallsyms]) pushq $0xffffffffffffffff1481:17006 17006 [001] 11500.262869216: ffffffff82200cb5 asm_sysvec_apic_timer_interrupt+0x5 ([guest.kernel.kallsyms]) callq 0xffffffff822011601482:17006 17006 [001] 11500.262869216: ffffffff82201160 error_entry+0x0 ([guest.kernel.kallsyms]) cld1483:17006 17006 [001] 11500.262869216: ffffffff82201161 error_entry+0x1 ([guest.kernel.kallsyms]) pushq %rsi1484:17006 17006 [001] 11500.262869216: ffffffff82201162 error_entry+0x2 ([guest.kernel.kallsyms]) movq 0x8(%rsp), %rsi1485:17006 17006 [001] 11500.262869216: ffffffff82201167 error_entry+0x7 ([guest.kernel.kallsyms]) movq %rdi, 0x8(%rsp)1486:17006 17006 [001] 11500.262869216: ffffffff8220116c error_entry+0xc ([guest.kernel.kallsyms]) pushq %rdx1487:17006 17006 [001] 11500.262869216: ffffffff8220116d error_entry+0xd ([guest.kernel.kallsyms]) pushq %rcx1488:17006 17006 [001] 11500.262869216: ffffffff8220116e error_entry+0xe ([guest.kernel.kallsyms]) pushq %rax148914901491Tracing Virtual Machines (including user space)1492-----------------------------------------------14931494It is possible to use perf record to record sideband events within a virtual machine, so that an Intel PT trace on the host can be decoded.1495Sideband events from the guest perf.data file can be injected into the host perf.data file using perf inject.14961497Here is an example of the steps needed:14981499On the guest machine:15001501Check that no-kvmclock kernel command line option was used to boot:15021503Note, this is essential to enable time correlation between host and guest machines.15041505$ cat /proc/cmdline1506BOOT_IMAGE=/boot/vmlinuz-5.10.0-16-amd64 root=UUID=cb49c910-e573-47e0-bce7-79e293df8e1d ro no-kvmclock15071508There is no BPF support at present so, if possible, disable JIT compiling:15091510$ echo 0 | sudo tee /proc/sys/net/core/bpf_jit_enable1511015121513Start perf record to collect sideband events:15141515$ sudo perf record -o guest-sideband-testing-guest-perf.data --sample-identifier --buildid-all --switch-events --kcore -a -e dummy15161517On the host machine:15181519Start perf record to collect Intel PT trace:15201521Note, the host trace will get very big, very fast, so the steps from starting to stopping the host trace really need to be done so that they happen in the shortest time possible.15221523$ sudo perf record -o guest-sideband-testing-host-perf.data -m,64M --kcore -a -e intel_pt/cyc/15241525On the guest machine:15261527Run a small test case, just 'uname' in this example:15281529$ uname1530Linux15311532On the host machine:15331534Stop the Intel PT trace:15351536^C1537[ perf record: Woken up 1 times to write data ]1538[ perf record: Captured and wrote 76.122 MB guest-sideband-testing-host-perf.data ]15391540On the guest machine:15411542Stop the Intel PT trace:15431544^C1545[ perf record: Woken up 1 times to write data ]1546[ perf record: Captured and wrote 1.247 MB guest-sideband-testing-guest-perf.data ]15471548And then copy guest-sideband-testing-guest-perf.data to the host (not shown here).15491550On the host machine:15511552With the 2 perf.data recordings, and with their ownership changed to the user.15531554Identify the TSC Offset:15551556$ perf inject -i guest-sideband-testing-host-perf.data --vm-time-correlation=dry-run1557VMCS: 0x103fc6 TSC Offset 0xfffffa6ae070cb201558VMCS: 0x103ff2 TSC Offset 0xfffffa6ae070cb201559VMCS: 0x10fdaa TSC Offset 0xfffffa6ae070cb201560VMCS: 0x24d57c TSC Offset 0xfffffa6ae070cb2015611562Correct Intel PT TSC timestamps for the guest machine:15631564$ perf inject -i guest-sideband-testing-host-perf.data --vm-time-correlation=0xfffffa6ae070cb20 --force15651566Identify the guest machine PID:15671568$ perf script -i guest-sideband-testing-host-perf.data --no-itrace --show-task-events | grep KVM1569CPU 0/KVM 0 [000] 0.000000: PERF_RECORD_COMM: CPU 0/KVM:13376/133811570CPU 1/KVM 0 [000] 0.000000: PERF_RECORD_COMM: CPU 1/KVM:13376/133821571CPU 2/KVM 0 [000] 0.000000: PERF_RECORD_COMM: CPU 2/KVM:13376/133831572CPU 3/KVM 0 [000] 0.000000: PERF_RECORD_COMM: CPU 3/KVM:13376/1338415731574Note, the QEMU option -name debug-threads=on is needed so that thread names1575can be used to determine which thread is running which VCPU as above. libvirt seems to use this by default.15761577Create a guestmount, assuming the guest machine is 'vm_to_test':15781579$ mkdir -p ~/guestmount/133761580$ sshfs -o direct_io vm_to_test:/ ~/guestmount/1337615811582Inject the guest perf.data file into the host perf.data file:15831584Note, due to the guestmount option, guest object files and debug files will be copied into the build ID cache from the guest machine, with the notable exception of VDSO.1585If needed, VDSO can be copied manually in a fashion similar to that used by the perf-archive script.15861587$ perf inject -i guest-sideband-testing-host-perf.data -o inj --guestmount ~/guestmount --guest-data=guest-sideband-testing-guest-perf.data,13376,0xfffffa6ae070cb2015881589Show an excerpt from the result. In this case the CPU and time range have been to chosen to show interaction between guest and host when 'uname' is starting to run on the guest machine:15901591Notes:15921593- the CPU displayed, [002] in this case, is always the host CPU1594- events happening in the virtual machine start with VM:13376 VCPU:003, which shows the hypervisor PID 13376 and the VCPU number1595- only calls and errors are displayed i.e. --itrace=ce1596- branches entering and exiting the virtual machine are split, and show as 2 branches to/from "0 [unknown] ([unknown])"15971598$ perf script -i inj --itrace=ce -F+machine_pid,+vcpu,+addr,+pid,+tid,-period --ns --time 7919.408803365,7919.408804631 -C 21599CPU 3/KVM 13376/13384 [002] 7919.408803365: branches: ffffffffc0f8ebe0 vmx_vcpu_enter_exit+0xc0 ([kernel.kallsyms]) => ffffffffc0f8edc0 __vmx_vcpu_run+0x0 ([kernel.kallsyms])1600CPU 3/KVM 13376/13384 [002] 7919.408803365: branches: ffffffffc0f8edd5 __vmx_vcpu_run+0x15 ([kernel.kallsyms]) => ffffffffc0f8eca0 vmx_update_host_rsp+0x0 ([kernel.kallsyms])1601CPU 3/KVM 13376/13384 [002] 7919.408803365: branches: ffffffffc0f8ee1b __vmx_vcpu_run+0x5b ([kernel.kallsyms]) => ffffffffc0f8ed60 vmx_vmenter+0x0 ([kernel.kallsyms])1602CPU 3/KVM 13376/13384 [002] 7919.408803461: branches: ffffffffc0f8ed62 vmx_vmenter+0x2 ([kernel.kallsyms]) => 0 [unknown] ([unknown])1603VM:13376 VCPU:003 uname 3404/3404 [002] 7919.408803461: branches: 0 [unknown] ([unknown]) => 7f851c9b5a5c init_cacheinfo+0x3ac (/usr/lib/x86_64-linux-gnu/libc-2.31.so)1604VM:13376 VCPU:003 uname 3404/3404 [002] 7919.408803567: branches: 7f851c9b5a5a init_cacheinfo+0x3aa (/usr/lib/x86_64-linux-gnu/libc-2.31.so) => 0 [unknown] ([unknown])1605CPU 3/KVM 13376/13384 [002] 7919.408803567: branches: 0 [unknown] ([unknown]) => ffffffffc0f8ed80 vmx_vmexit+0x0 ([kernel.kallsyms])1606CPU 3/KVM 13376/13384 [002] 7919.408803596: branches: ffffffffc0f6619a vmx_vcpu_run+0x26a ([kernel.kallsyms]) => ffffffffb2255c60 x86_virt_spec_ctrl+0x0 ([kernel.kallsyms])1607CPU 3/KVM 13376/13384 [002] 7919.408803801: branches: ffffffffc0f66445 vmx_vcpu_run+0x515 ([kernel.kallsyms]) => ffffffffb2290b30 native_write_msr+0x0 ([kernel.kallsyms])1608CPU 3/KVM 13376/13384 [002] 7919.408803850: branches: ffffffffc0f661f8 vmx_vcpu_run+0x2c8 ([kernel.kallsyms]) => ffffffffc1092300 kvm_load_host_xsave_state+0x0 ([kernel.kallsyms])1609CPU 3/KVM 13376/13384 [002] 7919.408803850: branches: ffffffffc1092327 kvm_load_host_xsave_state+0x27 ([kernel.kallsyms]) => ffffffffc1092220 kvm_load_host_xsave_state.part.0+0x0 ([kernel.kallsyms])1610CPU 3/KVM 13376/13384 [002] 7919.408803862: branches: ffffffffc0f662cf vmx_vcpu_run+0x39f ([kernel.kallsyms]) => ffffffffc0f63f90 vmx_recover_nmi_blocking+0x0 ([kernel.kallsyms])1611CPU 3/KVM 13376/13384 [002] 7919.408803862: branches: ffffffffc0f662e9 vmx_vcpu_run+0x3b9 ([kernel.kallsyms]) => ffffffffc0f619a0 __vmx_complete_interrupts+0x0 ([kernel.kallsyms])1612CPU 3/KVM 13376/13384 [002] 7919.408803872: branches: ffffffffc109cfb2 vcpu_enter_guest+0x752 ([kernel.kallsyms]) => ffffffffc0f5f570 vmx_handle_exit_irqoff+0x0 ([kernel.kallsyms])1613CPU 3/KVM 13376/13384 [002] 7919.408803881: branches: ffffffffc109d028 vcpu_enter_guest+0x7c8 ([kernel.kallsyms]) => ffffffffb234f900 __srcu_read_lock+0x0 ([kernel.kallsyms])1614CPU 3/KVM 13376/13384 [002] 7919.408803897: branches: ffffffffc109d06f vcpu_enter_guest+0x80f ([kernel.kallsyms]) => ffffffffc0f72e30 vmx_handle_exit+0x0 ([kernel.kallsyms])1615CPU 3/KVM 13376/13384 [002] 7919.408803897: branches: ffffffffc0f72e3d vmx_handle_exit+0xd ([kernel.kallsyms]) => ffffffffc0f727c0 __vmx_handle_exit+0x0 ([kernel.kallsyms])1616CPU 3/KVM 13376/13384 [002] 7919.408803897: branches: ffffffffc0f72b15 __vmx_handle_exit+0x355 ([kernel.kallsyms]) => ffffffffc0f60ae0 vmx_flush_pml_buffer+0x0 ([kernel.kallsyms])1617CPU 3/KVM 13376/13384 [002] 7919.408803903: branches: ffffffffc0f72994 __vmx_handle_exit+0x1d4 ([kernel.kallsyms]) => ffffffffc10b7090 kvm_emulate_cpuid+0x0 ([kernel.kallsyms])1618CPU 3/KVM 13376/13384 [002] 7919.408803903: branches: ffffffffc10b70f1 kvm_emulate_cpuid+0x61 ([kernel.kallsyms]) => ffffffffc10b6e10 kvm_cpuid+0x0 ([kernel.kallsyms])1619CPU 3/KVM 13376/13384 [002] 7919.408803941: branches: ffffffffc10b7125 kvm_emulate_cpuid+0x95 ([kernel.kallsyms]) => ffffffffc1093110 kvm_skip_emulated_instruction+0x0 ([kernel.kallsyms])1620CPU 3/KVM 13376/13384 [002] 7919.408803941: branches: ffffffffc109311f kvm_skip_emulated_instruction+0xf ([kernel.kallsyms]) => ffffffffc0f5e180 vmx_get_rflags+0x0 ([kernel.kallsyms])1621CPU 3/KVM 13376/13384 [002] 7919.408803951: branches: ffffffffc109312a kvm_skip_emulated_instruction+0x1a ([kernel.kallsyms]) => ffffffffc0f5fd30 vmx_skip_emulated_instruction+0x0 ([kernel.kallsyms])1622CPU 3/KVM 13376/13384 [002] 7919.408803951: branches: ffffffffc0f5fd79 vmx_skip_emulated_instruction+0x49 ([kernel.kallsyms]) => ffffffffc0f5fb50 skip_emulated_instruction+0x0 ([kernel.kallsyms])1623CPU 3/KVM 13376/13384 [002] 7919.408803956: branches: ffffffffc0f5fc68 skip_emulated_instruction+0x118 ([kernel.kallsyms]) => ffffffffc0f6a940 vmx_cache_reg+0x0 ([kernel.kallsyms])1624CPU 3/KVM 13376/13384 [002] 7919.408803964: branches: ffffffffc0f5fc11 skip_emulated_instruction+0xc1 ([kernel.kallsyms]) => ffffffffc0f5f9e0 vmx_set_interrupt_shadow+0x0 ([kernel.kallsyms])1625CPU 3/KVM 13376/13384 [002] 7919.408803980: branches: ffffffffc109f8b1 vcpu_run+0x71 ([kernel.kallsyms]) => ffffffffc10ad2f0 kvm_cpu_has_pending_timer+0x0 ([kernel.kallsyms])1626CPU 3/KVM 13376/13384 [002] 7919.408803980: branches: ffffffffc10ad2fb kvm_cpu_has_pending_timer+0xb ([kernel.kallsyms]) => ffffffffc10b0490 apic_has_pending_timer+0x0 ([kernel.kallsyms])1627CPU 3/KVM 13376/13384 [002] 7919.408803991: branches: ffffffffc109f899 vcpu_run+0x59 ([kernel.kallsyms]) => ffffffffc109c860 vcpu_enter_guest+0x0 ([kernel.kallsyms])1628CPU 3/KVM 13376/13384 [002] 7919.408803993: branches: ffffffffc109cd4c vcpu_enter_guest+0x4ec ([kernel.kallsyms]) => ffffffffc0f69140 vmx_prepare_switch_to_guest+0x0 ([kernel.kallsyms])1629CPU 3/KVM 13376/13384 [002] 7919.408803996: branches: ffffffffc109cd7d vcpu_enter_guest+0x51d ([kernel.kallsyms]) => ffffffffb234f930 __srcu_read_unlock+0x0 ([kernel.kallsyms])1630CPU 3/KVM 13376/13384 [002] 7919.408803996: branches: ffffffffc109cd9c vcpu_enter_guest+0x53c ([kernel.kallsyms]) => ffffffffc0f609b0 vmx_sync_pir_to_irr+0x0 ([kernel.kallsyms])1631CPU 3/KVM 13376/13384 [002] 7919.408803996: branches: ffffffffc0f60a6d vmx_sync_pir_to_irr+0xbd ([kernel.kallsyms]) => ffffffffc10adc20 kvm_lapic_find_highest_irr+0x0 ([kernel.kallsyms])1632CPU 3/KVM 13376/13384 [002] 7919.408804010: branches: ffffffffc0f60abd vmx_sync_pir_to_irr+0x10d ([kernel.kallsyms]) => ffffffffc0f60820 vmx_set_rvi+0x0 ([kernel.kallsyms])1633CPU 3/KVM 13376/13384 [002] 7919.408804019: branches: ffffffffc109ceca vcpu_enter_guest+0x66a ([kernel.kallsyms]) => ffffffffb2249840 fpregs_assert_state_consistent+0x0 ([kernel.kallsyms])1634CPU 3/KVM 13376/13384 [002] 7919.408804021: branches: ffffffffc109cf10 vcpu_enter_guest+0x6b0 ([kernel.kallsyms]) => ffffffffc0f65f30 vmx_vcpu_run+0x0 ([kernel.kallsyms])1635CPU 3/KVM 13376/13384 [002] 7919.408804024: branches: ffffffffc0f6603b vmx_vcpu_run+0x10b ([kernel.kallsyms]) => ffffffffb229bed0 __get_current_cr3_fast+0x0 ([kernel.kallsyms])1636CPU 3/KVM 13376/13384 [002] 7919.408804024: branches: ffffffffc0f66055 vmx_vcpu_run+0x125 ([kernel.kallsyms]) => ffffffffb2253050 cr4_read_shadow+0x0 ([kernel.kallsyms])1637CPU 3/KVM 13376/13384 [002] 7919.408804030: branches: ffffffffc0f6608d vmx_vcpu_run+0x15d ([kernel.kallsyms]) => ffffffffc10921e0 kvm_load_guest_xsave_state+0x0 ([kernel.kallsyms])1638CPU 3/KVM 13376/13384 [002] 7919.408804030: branches: ffffffffc1092207 kvm_load_guest_xsave_state+0x27 ([kernel.kallsyms]) => ffffffffc1092110 kvm_load_guest_xsave_state.part.0+0x0 ([kernel.kallsyms])1639CPU 3/KVM 13376/13384 [002] 7919.408804032: branches: ffffffffc0f660c6 vmx_vcpu_run+0x196 ([kernel.kallsyms]) => ffffffffb22061a0 perf_guest_get_msrs+0x0 ([kernel.kallsyms])1640CPU 3/KVM 13376/13384 [002] 7919.408804032: branches: ffffffffb22061a9 perf_guest_get_msrs+0x9 ([kernel.kallsyms]) => ffffffffb220cda0 intel_guest_get_msrs+0x0 ([kernel.kallsyms])1641CPU 3/KVM 13376/13384 [002] 7919.408804039: branches: ffffffffc0f66109 vmx_vcpu_run+0x1d9 ([kernel.kallsyms]) => ffffffffc0f652c0 clear_atomic_switch_msr+0x0 ([kernel.kallsyms])1642CPU 3/KVM 13376/13384 [002] 7919.408804040: branches: ffffffffc0f66119 vmx_vcpu_run+0x1e9 ([kernel.kallsyms]) => ffffffffc0f73f60 intel_pmu_lbr_is_enabled+0x0 ([kernel.kallsyms])1643CPU 3/KVM 13376/13384 [002] 7919.408804042: branches: ffffffffc0f73f81 intel_pmu_lbr_is_enabled+0x21 ([kernel.kallsyms]) => ffffffffc10b68e0 kvm_find_cpuid_entry+0x0 ([kernel.kallsyms])1644CPU 3/KVM 13376/13384 [002] 7919.408804045: branches: ffffffffc0f66454 vmx_vcpu_run+0x524 ([kernel.kallsyms]) => ffffffffc0f61ff0 vmx_update_hv_timer+0x0 ([kernel.kallsyms])1645CPU 3/KVM 13376/13384 [002] 7919.408804057: branches: ffffffffc0f66142 vmx_vcpu_run+0x212 ([kernel.kallsyms]) => ffffffffc10af100 kvm_wait_lapic_expire+0x0 ([kernel.kallsyms])1646CPU 3/KVM 13376/13384 [002] 7919.408804057: branches: ffffffffc0f66156 vmx_vcpu_run+0x226 ([kernel.kallsyms]) => ffffffffb2255c60 x86_virt_spec_ctrl+0x0 ([kernel.kallsyms])1647CPU 3/KVM 13376/13384 [002] 7919.408804057: branches: ffffffffc0f66161 vmx_vcpu_run+0x231 ([kernel.kallsyms]) => ffffffffc0f8eb20 vmx_vcpu_enter_exit+0x0 ([kernel.kallsyms])1648CPU 3/KVM 13376/13384 [002] 7919.408804057: branches: ffffffffc0f8eb44 vmx_vcpu_enter_exit+0x24 ([kernel.kallsyms]) => ffffffffb2353e10 rcu_note_context_switch+0x0 ([kernel.kallsyms])1649CPU 3/KVM 13376/13384 [002] 7919.408804057: branches: ffffffffb2353e1c rcu_note_context_switch+0xc ([kernel.kallsyms]) => ffffffffb2353db0 rcu_qs+0x0 ([kernel.kallsyms])1650CPU 3/KVM 13376/13384 [002] 7919.408804066: branches: ffffffffc0f8ebe0 vmx_vcpu_enter_exit+0xc0 ([kernel.kallsyms]) => ffffffffc0f8edc0 __vmx_vcpu_run+0x0 ([kernel.kallsyms])1651CPU 3/KVM 13376/13384 [002] 7919.408804066: branches: ffffffffc0f8edd5 __vmx_vcpu_run+0x15 ([kernel.kallsyms]) => ffffffffc0f8eca0 vmx_update_host_rsp+0x0 ([kernel.kallsyms])1652CPU 3/KVM 13376/13384 [002] 7919.408804066: branches: ffffffffc0f8ee1b __vmx_vcpu_run+0x5b ([kernel.kallsyms]) => ffffffffc0f8ed60 vmx_vmenter+0x0 ([kernel.kallsyms])1653CPU 3/KVM 13376/13384 [002] 7919.408804162: branches: ffffffffc0f8ed62 vmx_vmenter+0x2 ([kernel.kallsyms]) => 0 [unknown] ([unknown])1654VM:13376 VCPU:003 uname 3404/3404 [002] 7919.408804162: branches: 0 [unknown] ([unknown]) => 7f851c9b5a5c init_cacheinfo+0x3ac (/usr/lib/x86_64-linux-gnu/libc-2.31.so)1655VM:13376 VCPU:003 uname 3404/3404 [002] 7919.408804273: branches: 7f851cb7c0e4 _dl_init+0x74 (/usr/lib/x86_64-linux-gnu/ld-2.31.so) => 7f851cb7bf50 call_init.part.0+0x0 (/usr/lib/x86_64-linux-gnu/ld-2.31.so)1656VM:13376 VCPU:003 uname 3404/3404 [002] 7919.408804526: branches: 55e0c00136f0 _start+0x0 (/usr/bin/uname) => ffffffff83200ac0 asm_exc_page_fault+0x0 ([kernel.kallsyms])1657VM:13376 VCPU:003 uname 3404/3404 [002] 7919.408804526: branches: ffffffff83200ac3 asm_exc_page_fault+0x3 ([kernel.kallsyms]) => ffffffff83201290 error_entry+0x0 ([kernel.kallsyms])1658VM:13376 VCPU:003 uname 3404/3404 [002] 7919.408804534: branches: ffffffff832012fa error_entry+0x6a ([kernel.kallsyms]) => ffffffff830b59a0 sync_regs+0x0 ([kernel.kallsyms])1659VM:13376 VCPU:003 uname 3404/3404 [002] 7919.408804631: branches: ffffffff83200ad9 asm_exc_page_fault+0x19 ([kernel.kallsyms]) => ffffffff830b8210 exc_page_fault+0x0 ([kernel.kallsyms])1660VM:13376 VCPU:003 uname 3404/3404 [002] 7919.408804631: branches: ffffffff830b82a4 exc_page_fault+0x94 ([kernel.kallsyms]) => ffffffff830b80e0 __kvm_handle_async_pf+0x0 ([kernel.kallsyms])1661VM:13376 VCPU:003 uname 3404/3404 [002] 7919.408804631: branches: ffffffff830b80ed __kvm_handle_async_pf+0xd ([kernel.kallsyms]) => ffffffff830b80c0 kvm_read_and_reset_apf_flags+0x0 ([kernel.kallsyms])166216631664Tracing Virtual Machines - Guest Code1665-------------------------------------16661667A common case for KVM test programs is that the test program acts as the1668hypervisor, creating, running and destroying the virtual machine, and1669providing the guest object code from its own object code. In this case,1670the VM is not running an OS, but only the functions loaded into it by the1671hypervisor test program, and conveniently, loaded at the same virtual1672addresses. To support that, option "--guest-code" has been added to perf script1673and perf kvm report.16741675Here is an example tracing a test program from the kernel's KVM selftests:16761677# perf record --kcore -e intel_pt/cyc/ -- tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test1678[ perf record: Woken up 1 times to write data ]1679[ perf record: Captured and wrote 0.280 MB perf.data ]1680# perf script --guest-code --itrace=bep --ns -F-period,+addr,+flags1681[SNIP]1682tsc_msrs_test 18436 [007] 10897.962087733: branches: call ffffffffc13b2ff5 __vmx_vcpu_run+0x15 (vmlinux) => ffffffffc13b2f50 vmx_update_host_rsp+0x0 (vmlinux)1683tsc_msrs_test 18436 [007] 10897.962087733: branches: return ffffffffc13b2f5d vmx_update_host_rsp+0xd (vmlinux) => ffffffffc13b2ffa __vmx_vcpu_run+0x1a (vmlinux)1684tsc_msrs_test 18436 [007] 10897.962087733: branches: call ffffffffc13b303b __vmx_vcpu_run+0x5b (vmlinux) => ffffffffc13b2f80 vmx_vmenter+0x0 (vmlinux)1685tsc_msrs_test 18436 [007] 10897.962087836: branches: vmentry ffffffffc13b2f82 vmx_vmenter+0x2 (vmlinux) => 0 [unknown] ([unknown])1686[guest/18436] 18436 [007] 10897.962087836: branches: vmentry 0 [unknown] ([unknown]) => 402c81 guest_code+0x131 (/home/user/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test)1687[guest/18436] 18436 [007] 10897.962087836: branches: call 402c81 guest_code+0x131 (/home/user/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test) => 40dba0 ucall+0x0 (/home/user/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test)1688[guest/18436] 18436 [007] 10897.962088248: branches: vmexit 40dba0 ucall+0x0 (/home/user/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test) => 0 [unknown] ([unknown])1689tsc_msrs_test 18436 [007] 10897.962088248: branches: vmexit 0 [unknown] ([unknown]) => ffffffffc13b2fa0 vmx_vmexit+0x0 (vmlinux)1690tsc_msrs_test 18436 [007] 10897.962088248: branches: jmp ffffffffc13b2fa0 vmx_vmexit+0x0 (vmlinux) => ffffffffc13b2fd2 vmx_vmexit+0x32 (vmlinux)1691tsc_msrs_test 18436 [007] 10897.962088256: branches: return ffffffffc13b2fd2 vmx_vmexit+0x32 (vmlinux) => ffffffffc13b3040 __vmx_vcpu_run+0x60 (vmlinux)1692tsc_msrs_test 18436 [007] 10897.962088270: branches: return ffffffffc13b30b6 __vmx_vcpu_run+0xd6 (vmlinux) => ffffffffc13b2f2e vmx_vcpu_enter_exit+0x4e (vmlinux)1693[SNIP]1694tsc_msrs_test 18436 [007] 10897.962089321: branches: call ffffffffc13b2ff5 __vmx_vcpu_run+0x15 (vmlinux) => ffffffffc13b2f50 vmx_update_host_rsp+0x0 (vmlinux)1695tsc_msrs_test 18436 [007] 10897.962089321: branches: return ffffffffc13b2f5d vmx_update_host_rsp+0xd (vmlinux) => ffffffffc13b2ffa __vmx_vcpu_run+0x1a (vmlinux)1696tsc_msrs_test 18436 [007] 10897.962089321: branches: call ffffffffc13b303b __vmx_vcpu_run+0x5b (vmlinux) => ffffffffc13b2f80 vmx_vmenter+0x0 (vmlinux)1697tsc_msrs_test 18436 [007] 10897.962089424: branches: vmentry ffffffffc13b2f82 vmx_vmenter+0x2 (vmlinux) => 0 [unknown] ([unknown])1698[guest/18436] 18436 [007] 10897.962089424: branches: vmentry 0 [unknown] ([unknown]) => 40dba0 ucall+0x0 (/home/user/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test)1699[guest/18436] 18436 [007] 10897.962089701: branches: jmp 40dc1b ucall+0x7b (/home/user/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test) => 40dc39 ucall+0x99 (/home/user/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test)1700[guest/18436] 18436 [007] 10897.962089701: branches: jcc 40dc3c ucall+0x9c (/home/user/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test) => 40dc20 ucall+0x80 (/home/user/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test)1701[guest/18436] 18436 [007] 10897.962089701: branches: jcc 40dc3c ucall+0x9c (/home/user/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test) => 40dc20 ucall+0x80 (/home/user/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test)1702[guest/18436] 18436 [007] 10897.962089701: branches: jcc 40dc37 ucall+0x97 (/home/user/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test) => 40dc50 ucall+0xb0 (/home/user/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test)1703[guest/18436] 18436 [007] 10897.962089878: branches: vmexit 40dc55 ucall+0xb5 (/home/user/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test) => 0 [unknown] ([unknown])1704tsc_msrs_test 18436 [007] 10897.962089878: branches: vmexit 0 [unknown] ([unknown]) => ffffffffc13b2fa0 vmx_vmexit+0x0 (vmlinux)1705tsc_msrs_test 18436 [007] 10897.962089878: branches: jmp ffffffffc13b2fa0 vmx_vmexit+0x0 (vmlinux) => ffffffffc13b2fd2 vmx_vmexit+0x32 (vmlinux)1706tsc_msrs_test 18436 [007] 10897.962089887: branches: return ffffffffc13b2fd2 vmx_vmexit+0x32 (vmlinux) => ffffffffc13b3040 __vmx_vcpu_run+0x60 (vmlinux)1707tsc_msrs_test 18436 [007] 10897.962089901: branches: return ffffffffc13b30b6 __vmx_vcpu_run+0xd6 (vmlinux) => ffffffffc13b2f2e vmx_vcpu_enter_exit+0x4e (vmlinux)1708[SNIP]17091710# perf kvm --guest-code --guest --host report -i perf.data --stdio | head -2017111712# To display the perf.data header info, please use --header/--header-only options.1713#1714#1715# Total Lost Samples: 01716#1717# Samples: 12 of event 'instructions'1718# Event count (approx.): 22745831719#1720# Children Self Command Shared Object Symbol1721# ........ ........ ............. .................... ...........................................1722#172354.70% 0.00% tsc_msrs_test [kernel.vmlinux] [k] entry_SYSCALL_64_after_hwframe1724|1725---entry_SYSCALL_64_after_hwframe1726do_syscall_641727|1728|--29.44%--syscall_exit_to_user_mode1729| exit_to_user_mode_prepare1730| task_work_run1731| __fput173217331734Event Trace1735-----------17361737Event Trace records information about asynchronous events, for example interrupts,1738faults, VM exits and entries. The information is recorded in CFE and EVD packets,1739and also the Interrupt Flag is recorded on the MODE.Exec packet. The CFE packet1740contains a type field to identify one of the following:174117421 INTR interrupt, fault, exception, NMI17432 IRET interrupt return17443 SMI system management interrupt17454 RSM resume from system management mode17465 SIPI startup interprocessor interrupt17476 INIT INIT signal17487 VMENTRY VM-Entry17498 VMEXIT VM-Entry17509 VMEXIT_INTR VM-Exit due to interrupt175110 SHUTDOWN Shutdown17521753For more details, refer to the Intel 64 and IA-32 Architectures Software1754Developer Manuals (version 076 or later).17551756The capability to do Event Trace is indicated by the1757/sys/bus/event_source/devices/intel_pt/caps/event_trace file.17581759Event trace is selected for recording using the "event" config term. e.g.17601761perf record -e intel_pt/event/u uname17621763Event trace events are output using the --itrace I option. e.g.17641765perf script --itrace=Ie17661767perf script displays events containing CFE type, vector and event data,1768in the form:17691770evt: hw int (t) cfe: INTR IP: 1 vector: 3 PFA: 0x887766554433221117711772The IP flag indicates if the event binds to an IP, which includes any case where1773flow control packet generation is enabled, as well as when CFE packet IP bit is1774set.17751776perf script displays events containing changes to the Interrupt Flag in the form:17771778iflag: t IFLAG: 1->0 via branch17791780where "via branch" indicates a branch (interrupt or return from interrupt) and1781"non branch" indicates an instruction such as CFI, STI or POPF).17821783In addition, the current state of the interrupt flag is indicated by the presence1784or absence of the "D" (interrupt disabled) perf script flag. If the interrupt1785flag is changed, then the "t" flag is also included i.e.17861787no flag, interrupts enabled IF=11788t interrupts become disabled IF=1 -> IF=01789D interrupts are disabled IF=01790Dt interrupts become enabled IF=0 -> IF=117911792The intel-pt-events.py script illustrates how to access Event Trace information1793using a Python script.179417951796TNT Disable1797-----------17981799TNT packets are disabled using the "notnt" config term. e.g.18001801perf record -e intel_pt/notnt/u uname18021803In that case the --itrace q option is forced because walking executable code1804to reconstruct the control flow is not possible.180518061807Emulated PTWRITE1808----------------18091810Later perf tools support a method to emulate the ptwrite instruction, which1811can be useful if hardware does not support the ptwrite instruction.18121813Instead of using the ptwrite instruction, a function is used which produces1814a trace that encodes the payload data into TNT packets. Here is an example1815of the function:18161817#include <stdint.h>18181819void perf_emulate_ptwrite(uint64_t x)1820__attribute__((externally_visible, noipa, no_instrument_function, naked));18211822#define PERF_EMULATE_PTWRITE_8_BITS \1823"1: shl %rax\n" \1824" jc 1f\n" \1825"1: shl %rax\n" \1826" jc 1f\n" \1827"1: shl %rax\n" \1828" jc 1f\n" \1829"1: shl %rax\n" \1830" jc 1f\n" \1831"1: shl %rax\n" \1832" jc 1f\n" \1833"1: shl %rax\n" \1834" jc 1f\n" \1835"1: shl %rax\n" \1836" jc 1f\n" \1837"1: shl %rax\n" \1838" jc 1f\n"18391840/* Undefined instruction */1841#define PERF_EMULATE_PTWRITE_UD2 ".byte 0x0f, 0x0b\n"18421843#define PERF_EMULATE_PTWRITE_MAGIC PERF_EMULATE_PTWRITE_UD2 ".ascii \"perf,ptwrite \"\n"18441845void perf_emulate_ptwrite(uint64_t x __attribute__ ((__unused__)))1846{1847/* Assumes SysV ABI : x passed in rdi */1848__asm__ volatile (1849"jmp 1f\n"1850PERF_EMULATE_PTWRITE_MAGIC1851"1: mov %rdi, %rax\n"1852PERF_EMULATE_PTWRITE_8_BITS1853PERF_EMULATE_PTWRITE_8_BITS1854PERF_EMULATE_PTWRITE_8_BITS1855PERF_EMULATE_PTWRITE_8_BITS1856PERF_EMULATE_PTWRITE_8_BITS1857PERF_EMULATE_PTWRITE_8_BITS1858PERF_EMULATE_PTWRITE_8_BITS1859PERF_EMULATE_PTWRITE_8_BITS1860"1: ret\n"1861);1862}18631864For example, a test program with the function above:18651866#include <stdio.h>1867#include <stdint.h>1868#include <stdlib.h>18691870#include "perf_emulate_ptwrite.h"18711872int main(int argc, char *argv[])1873{1874uint64_t x = 0;18751876if (argc > 1)1877x = strtoull(argv[1], NULL, 0);1878perf_emulate_ptwrite(x);1879return 0;1880}18811882Can be compiled and traced:18831884$ gcc -Wall -Wextra -O3 -g -o eg_ptw eg_ptw.c1885$ perf record -e intel_pt//u ./eg_ptw 0x1234567890abcdef1886[ perf record: Woken up 1 times to write data ]1887[ perf record: Captured and wrote 0.017 MB perf.data ]1888$ perf script --itrace=ew1889eg_ptw 19875 [007] 8061.235912: ptwrite: IP: 0 payload: 0x1234567890abcdef 55701249a196 perf_emulate_ptwrite+0x16 (/home/user/eg_ptw)1890$189118921893Pipe mode1894---------1895Pipe mode is a problem for Intel PT and possibly other auxtrace users.1896It's not recommended to use a pipe as data output with Intel PT because1897of the following reason.18981899Essentially the auxtrace buffers do not behave like the regular perf1900event buffers. That is because the head and tail are updated by1901software, but in the auxtrace case the data is written by hardware.1902So the head and tail do not get updated as data is written.19031904In the Intel PT case, the head and tail are updated only when the trace1905is disabled by software, for example:1906- full-trace, system wide : when buffer passes watermark1907- full-trace, not system-wide : when buffer passes watermark or1908context switches1909- snapshot mode : as above but also when a snapshot is made1910- sample mode : as above but also when a sample is made19111912That means finished-round ordering doesn't work. An auxtrace buffer1913can turn up that has data that extends back in time, possibly to the1914very beginning of tracing.19151916For a perf.data file, that problem is solved by going through the trace1917and queuing up the auxtrace buffers in advance.19181919For pipe mode, the order of events and timestamps can presumably1920be messed up.192119221923Pause or Resume Tracing1924-----------------------19251926With newer Kernels, it is possible to use other selected events to pause1927or resume Intel PT tracing. This is configured by using the "aux-action"1928config term:19291930"aux-action=pause" is used with events that are to pause Intel PT tracing.19311932"aux-action=resume" is used with events that are to resume Intel PT tracing.19331934"aux-action=start-paused" is used with the Intel PT event to start in a1935paused state.19361937For example, to trace only the uname system call (sys_newuname) when running the1938command line utility uname:19391940$ perf record --kcore -e intel_pt/aux-action=start-paused/k,syscalls:sys_enter_newuname/aux-action=resume/,syscalls:sys_exit_newuname/aux-action=pause/ uname1941Linux1942[ perf record: Woken up 1 times to write data ]1943[ perf record: Captured and wrote 0.043 MB perf.data ]1944$ perf script --call-trace1945uname 30805 [000] 24001.058782799: name: 0x7ffc9c1865b01946uname 30805 [000] 24001.058784424: psb offs: 01947uname 30805 [000] 24001.058784424: cbr: 39 freq: 3904 MHz (139%)1948uname 30805 [000] 24001.058784629: ([kernel.kallsyms]) debug_smp_processor_id1949uname 30805 [000] 24001.058784629: ([kernel.kallsyms]) __x64_sys_newuname1950uname 30805 [000] 24001.058784629: ([kernel.kallsyms]) down_read1951uname 30805 [000] 24001.058784629: ([kernel.kallsyms]) __cond_resched1952uname 30805 [000] 24001.058784629: ([kernel.kallsyms]) preempt_count_add1953uname 30805 [000] 24001.058784629: ([kernel.kallsyms]) in_lock_functions1954uname 30805 [000] 24001.058784629: ([kernel.kallsyms]) preempt_count_sub1955uname 30805 [000] 24001.058784629: ([kernel.kallsyms]) up_read1956uname 30805 [000] 24001.058784629: ([kernel.kallsyms]) preempt_count_add1957uname 30805 [000] 24001.058784838: ([kernel.kallsyms]) in_lock_functions1958uname 30805 [000] 24001.058784838: ([kernel.kallsyms]) preempt_count_sub1959uname 30805 [000] 24001.058784838: ([kernel.kallsyms]) _copy_to_user1960uname 30805 [000] 24001.058784838: ([kernel.kallsyms]) syscall_exit_to_user_mode1961uname 30805 [000] 24001.058784838: ([kernel.kallsyms]) syscall_exit_work1962uname 30805 [000] 24001.058784838: ([kernel.kallsyms]) perf_syscall_exit1963uname 30805 [000] 24001.058784838: ([kernel.kallsyms]) debug_smp_processor_id1964uname 30805 [000] 24001.058785046: ([kernel.kallsyms]) perf_trace_buf_alloc1965uname 30805 [000] 24001.058785046: ([kernel.kallsyms]) perf_swevent_get_recursion_context1966uname 30805 [000] 24001.058785046: ([kernel.kallsyms]) debug_smp_processor_id1967uname 30805 [000] 24001.058785046: ([kernel.kallsyms]) debug_smp_processor_id1968uname 30805 [000] 24001.058785046: ([kernel.kallsyms]) perf_tp_event1969uname 30805 [000] 24001.058785046: ([kernel.kallsyms]) perf_trace_buf_update1970uname 30805 [000] 24001.058785046: ([kernel.kallsyms]) tracing_gen_ctx_irq_test1971uname 30805 [000] 24001.058785046: ([kernel.kallsyms]) perf_swevent_event1972uname 30805 [000] 24001.058785046: ([kernel.kallsyms]) __perf_event_account_interrupt1973uname 30805 [000] 24001.058785046: ([kernel.kallsyms]) __this_cpu_preempt_check1974uname 30805 [000] 24001.058785046: ([kernel.kallsyms]) perf_event_output_forward1975uname 30805 [000] 24001.058785046: ([kernel.kallsyms]) perf_event_aux_pause1976uname 30805 [000] 24001.058785046: ([kernel.kallsyms]) ring_buffer_get1977uname 30805 [000] 24001.058785046: ([kernel.kallsyms]) __rcu_read_lock1978uname 30805 [000] 24001.058785046: ([kernel.kallsyms]) __rcu_read_unlock1979uname 30805 [000] 24001.058785254: ([kernel.kallsyms]) pt_event_stop1980uname 30805 [000] 24001.058785254: ([kernel.kallsyms]) debug_smp_processor_id1981uname 30805 [000] 24001.058785254: ([kernel.kallsyms]) debug_smp_processor_id1982uname 30805 [000] 24001.058785254: ([kernel.kallsyms]) native_write_msr1983uname 30805 [000] 24001.058785463: ([kernel.kallsyms]) native_write_msr1984uname 30805 [000] 24001.058785639: 0x019851986The example above uses tracepoints, but any kind of sampled event can be used.19871988For example:19891990Tracing between arch_cpu_idle_enter() and arch_cpu_idle_exit() using breakpoint events:19911992$ sudo cat /proc/kallsyms | sort | grep ' arch_cpu_idle_enter\| arch_cpu_idle_exit'1993ffffffffb605bf60 T arch_cpu_idle_enter1994ffffffffb614d8a0 W arch_cpu_idle_exit1995$ sudo perf record --kcore -a -e intel_pt/aux-action=start-paused/k -e mem:0xffffffffb605bf60:x/aux-action=resume/ -e mem:0xffffffffb614d8a0:x/aux-action=pause/ -- sleep 11996[ perf record: Woken up 1 times to write data ]1997[ perf record: Captured and wrote 1.387 MB perf.data ]19981999Tracing __alloc_pages() using kprobes:20002001$ sudo perf probe --add '__alloc_pages order'2002Added new event: probe:__alloc_pages (on __alloc_pages with order)2003$ sudo perf probe --add __alloc_pages%return2004Added new event: probe:__alloc_pages__return (on __alloc_pages%return)2005$ sudo perf record --kcore -aR -e intel_pt/aux-action=start-paused/k -e probe:__alloc_pages/aux-action=resume/ -e probe:__alloc_pages__return/aux-action=pause/ -- sleep 12006[ perf record: Woken up 1 times to write data ]2007[ perf record: Captured and wrote 1.490 MB perf.data ]20082009Tracing starting at main() using a uprobe event:20102011$ sudo perf probe -x /usr/bin/uname main2012Added new event: probe_uname:main (on main in /usr/bin/uname)2013$ sudo perf record -e intel_pt/-aux-action=start-paused/u -e probe_uname:main/aux-action=resume/ -- uname2014Linux2015[ perf record: Woken up 1 times to write data ]2016[ perf record: Captured and wrote 0.031 MB perf.data ]20172018Tracing occasionally using cycles events with different periods:20192020$ perf record --kcore -a -m,64M -e intel_pt/aux-action=start-paused/k -e cycles/aux-action=pause,period=1000000/Pk -e cycles/aux-action=resume,period=10500000/Pk -- firefox2021[ perf record: Woken up 19 times to write data ]2022[ perf record: Captured and wrote 16.561 MB perf.data ]202320242025EXAMPLE2026-------20272028Examples can be found on perf wiki page "Perf tools support for IntelĀ® Processor Trace":20292030https://perf.wiki.kernel.org/index.php/Perf_tools_support_for_Intel%C2%AE_Processor_Trace203120322033SEE ALSO2034--------20352036linkperf:perf-record[1], linkperf:perf-script[1], linkperf:perf-report[1],2037linkperf:perf-inject[1]203820392040