1 Tracing with Intel Processor Trace
2 ==================================
4 Intel PT is a technology available in modern Intel CPUs that allows efficient
5 tracing of all the instructions executed by a process.
6 LLDB can collect traces and dump them using its symbolication stack.
8 https://easyperf.net/blog/2019/08/23/Intel-Processor-Trace.
13 Confirm that your CPU supports Intel PT
14 (see https://www.intel.com/content/www/us/en/support/articles/000056730/processors.html)
15 and that your operating system is Linux.
17 Check for the existence of this particular file on your Linux system
21 $ cat /sys/bus/event_source/devices/intel_pt/type
23 The output should be a number. Otherwise, try upgrading your kernel.
29 Clone and build the low level Intel PT
30 decoder library `LibIPT library <https://github.com/intel/libipt>`_.
33 $ git clone git@github.com:intel/libipt.git
35 $ cmake -S libipt -B libipt-build
39 This will generate a few files in the ``<libipt-build>/lib``
40 and ``<libipt-build>/libipt/include`` directories.
42 Configure and build LLDB with Intel PT support
47 -DLLDB_BUILD_INTEL_PT=ON \
48 -DLIBIPT_INCLUDE_PATH="<libipt-build>/libipt/include" \
49 -DLIBIPT_LIBRARY_PATH="<libipt-build>/lib" \
50 ... other common configuration parameters
54 $ cd <lldb-build> && ninja lldb lldb-server # if using Ninja
60 When you are debugging a process, you can turn on intel-pt tracing,
61 which will “record” all the instructions that the process will execute.
62 After turning it on, you can continue debugging, and at any breakpoint,
63 you can inspect the instruction list.
72 > process trace start # start tracing on all threads, including future ones
73 # keep debugging until you hit a breakpoint
75 > thread trace dump instructions
76 # this should output something like
78 thread #2: tid = 2861133, total instructions = 5305673
79 libc.so.6`__GI___libc_read + 45 at read.c:25:1
80 [4962255] 0x00007fffeb64c63d subq $0x10, %rsp
81 [4962256] 0x00007fffeb64c641 movq %rdi, -0x18(%rbp)
82 libc.so.6`__GI___libc_read + 53 [inlined] __libc_read at read.c:26:10
83 [4962257] 0x00007fffeb64c645 callq 0x7fffeb66b640 ; __libc_enable_asynccancel
84 libc.so.6`__libc_enable_asynccancel
85 [4962258] 0x00007fffeb66b640 movl %fs:0x308, %eax
86 libc.so.6`__libc_enable_asynccancel + 8
87 [4962259] 0x00007fffeb66b648 movl %eax, %r11d
89 # you can keep pressing ENTER to see more and more instructions
91 The number between brackets is the instruction index,
92 and by default the current thread will be picked.
94 Configuring the trace size
95 --------------------------
97 The CPU stores the instruction list in a compressed format in a ring buffer,
98 which keeps the latest information.
99 By default, LLDB uses a buffer of 4KB per thread,
100 but you can change it by running.
101 The size must be a power of 2 and at least 4KB.
105 thread trace start all -s <size_in_bytes>
107 For reference, a 1MB trace buffer can easily store around 5M instructions.
109 Printing more instructions
110 --------------------------
112 If you want to dump more instructions at a time, you can run
116 thread trace dump instructions -c <count>
118 Printing the instructions of another thread
119 -------------------------------------------
121 By default the current thread will be picked when dumping instructions,
126 thread trace dump instructions <#thread index>
128 thread trace dump instructions 8
130 to select another thread.
135 What if you are debugging + tracing a process that crashes?
140 thread trace dump instructions
142 To inspect how it crashed! There's nothing special that you need to do.
147 * thread #1, name = 'a.out', stop reason = signal SIGFPE: integer divide by zero
148 frame #0: 0x00000000004009f1 a.out`main at main.cpp:8:14
151 -> 8 cout << 12 / x << endl;
154 (lldb) thread trace dump instructions -c 5
155 thread #1: tid = 604302, total instructions = 8388
156 libstdc++.so.6`std::istream::operator>>(int&) + 181
157 [8383] 0x00007ffff7b41665 popq %rbp
158 [8384] 0x00007ffff7b41666 retq
159 a.out`main + 66 at main.cpp:8:14
160 [8385] 0x00000000004009e8 movl -0x4(%rbp), %ecx
161 [8386] 0x00000000004009eb movl $0xc, %eax
162 [8387] 0x00000000004009f0 cltd
165 At this moment, we are not including the failed instruction in the trace,
166 but in the future we might do it for readability.
169 Offline Trace Analysis
170 ----------------------
172 It's also possible to record a trace using a custom Intel PT collector
173 and decode + symbolicate the trace using LLDB.
174 For that, the command trace load is useful.
175 In order to use trace load, you need to first create a JSON file with
176 the definition of the trace session.
184 "vendor": "GenuineIntel",
192 "triple": "x86_64-*-linux",
196 "iptTrace": "trace.file" # raw thread-specific trace from the AUX buffer
199 "modules": [ # this are all the shared libraries + the main executable
201 "file": "a.out", # optional if it's the same as systemPath
202 "systemPath": "a.out",
203 "loadAddress": 4194304,
207 "systemPath": "/usr/lib/libfoo.so",
208 "loadAddress": "0x00007ffff7bd9000",
211 "systemPath": "libbar.so",
212 "loadAddress": "0x00007ffff79d7000",
219 You can see the full schema by typing
223 trace schema intel-pt
225 The JSON file mainly contains all the shared libraries that
226 were part of the traced process, along with their memory load address.
227 If the analysis is done on the same computer where the traces were obtained,
228 it's enough to use the “systemPath” field.
229 If the analysis is done on a different machines, these files need to be
230 copied over and the “file” field should point to the
231 location of the file relative to the JSON file.
232 Once you have the JSON file and the module files in place, you can simple run
237 > trace load /path/to/json
238 > thread trace dump instructions <optional thread index>
240 Then it's like in the live session case
245 - Original RFC document_ for this feature.
246 - Some details about how Meta is using Intel Processor Trace can be found in this blog_ post.
248 .. _document: https://docs.google.com/document/d/1cOVTGp1sL_HBXjP9eB7qjVtDNr5xnuZvUUtv43G5eVI
249 .. _blog: https://engineering.fb.com/2021/04/27/developer-tools/reverse-debugging/