Skip to content

Latest commit

 

History

History
927 lines (742 loc) · 35 KB

uftrace-record.md

File metadata and controls

927 lines (742 loc) · 35 KB

% UFTRACE-RECORD(1) Uftrace User Manuals % Namhyung Kim [email protected] % Sep, 2018

NAME

uftrace-record - Run a command and record its trace data

SYNOPSIS

uftrace record [options] COMMAND [command-options]

DESCRIPTION

This command runs COMMAND and gathers function trace data from it, and saves it into files under the uftrace data directory - without displaying anything.

This data can then be inspected later on, using uftrace replay or uftrace report.

RECORD OPTIONS

-A SPEC, --argument=SPEC : Record function arguments. This option can be used more than once. Implies --srcline. See ARGUMENTS.

-R SPEC, --retval=SPEC : Record function return values. This option can be used more than once. Implies --srcline. See ARGUMENTS.

-P FUNC, --patch=FUNC : Patch FUNC dynamically. This option can be used more than once. See DYNAMIC TRACING.

-U FUNC, --unpatch=FUNC : Do not apply dynamic patching for FUNC. This option can be used more than once. See DYNAMIC TRACING.

-E EVENT, --event=EVENT : Enable event tracing. The event should be available on the system.

-S SCRIPT_PATH, --script=SCRIPT_PATH : Run a given script to do additional work at the entry and exit of function during target program execution. The type of script is detected by the postfix such as '.py' for python. See SCRIPT EXECUTION.

-W, --watch=POINT : Add watch point to display POINT if the value is changed. See WATCH POINT.

-a, --auto-args : Automatically record arguments and return values of known functions. These are usually functions in standard (C language or system) libraries but if debug info is available it includes functions in the user program. Implies --srcline.

-l, --nest-libcall : Trace function calls between libraries. By default, uftrace only record library call from the main executable. Implies --force.

-k, --kernel : Trace kernel functions as well as user functions. By default, the tracing depth is 1 (Only kernel entry/exit functions will be traced). Use the -K/--kernel-depth option to override this.

-K DEPTH, --kernel-depth=DEPTH : Set kernel max function depth separately. Implies --kernel.

--clock=CLOCK : Set clock source for timestamp recording. CLOCK can be one of 'mono', 'mono_raw', or 'boot'. Default is 'mono'.

--host=HOST : Send trace data to given host via the network, not writing to files. The uftrace recv command should be run on the destination host to receive the data.

--port=PORT : When sending data to the network (with --host), use the given port instead of the default (8090).

--signal=TRG : Set trigger on selected signals rather than functions. But there are restrictions so only a few of trigger actions are support for signals. The available actions are: trace_on, trace_off, finish. This option can be used more than once. See TRIGGERS.

--nop : Do not record any functions. This is a no-op and only meaningful for performance comparisons.

--force : Allow running uftrace even if some problems occur. When uftrace record finds no mcount symbol (which is generated by compiler) in the executable, it quits with an error message since uftrace can not trace the program. However, it is possible that the user is only interested in functions within a dynamically-linked library, in which case this option can be used to cause uftrace to run the program regardless. Also, the -A/--argument and -R/--retval options work only for binaries built with -pg, so uftrace will normally exit when it tries to run binaries built without that option. This option ignores the warning and goes on tracing without the argument and/or return value.

--time : Print running time of children in time(1)-style.

-e, --estimate-return : Record only ENTRY data for each function. This option is useful when the target program deals with stack in some way. Normally uftrace modifies task's execution stack frame to hook return from the function. However sometimes it makes troubles and it's hard to handle all the cases properly. This option tells uftrace not to hook return address in order to prevent those problems. The return time is estimated as a half of execution time of two consecutive functions.

COMMON OPTIONS

-F FUNC, --filter=FUNC : Set filter to trace selected functions and their children functions. This option can be used more than once. See FILTERS.

-N FUNC, --notrace=FUNC : Set filter not to trace selected functions and their children functions. This option can be used more than once. See FILTERS.

-C FUNC, --caller-filter=FUNC : Set filter to trace callers of selected functions only. This option can be used more than once. See FILTERS.

-T TRG, --trigger=TRG : Set trigger on selected functions. This option can be used more than once. See TRIGGERS.

-D DEPTH, --depth=DEPTH : Set global trace limit in nesting level. See FILTERS.

-t TIME, --time-filter=TIME : Do not show functions which run under the time threshold. If some functions explicitly have the 'trace' trigger applied, those are always traced regardless of execution time. See FILTERS.

-Z SIZE, --size-filter=SIZE : Do not show functions smaller than SIZE bytes. See FILTERS.

-L LOCATION, --loc-filter=LOCATION : Set filter to trace selected source locations. This option can be used more than once. Implies --srcline. See FILTERS.

--no-libcall : Do not record library function invocations. Library calls are normally traced by hooking calls to the resolver function of dynamic linker in the PLT. One can disable it with this option.

--no-event : Disable event recording which is used by default. Note that explicit event tracing by --event option is not affected by this. Implies --no-sched.

--no-sched : Disable schedule event recording which is used by default.

--match=TYPE : Use pattern match using TYPE. Possible types are regex and glob. Default is regex.

--disable : DEPRECATED. Use --trace=off instead.

--trace=STATE : Set uftrace tracing STATE. Possible states are on and off. Default is on. This is only meaningful when used with a trace_on trigger or with the agent.

--with-syms=DIR : Read symbol data from the .sym files in DIR directory instead of the binary. This can be useful to deal with stripped binaries. The file name of the main binary should be the same when saved and used.

RECORD CONFIG OPTIONS

--libmcount-path=PATH : Load libmcount libraries from this path. This is mostly for testing purposes.

-b SIZE, --buffer=SIZE : Size of internal buffer in which trace data will be saved. Default size is 128k.

--kernel-buffer=SIZE : Set kernel tracing buffer size. The default value (in the kernel) is 1408k.

--no-pltbind : Do not bind dynamic symbol address. This option uses the LD_BIND_NOT environment variable to trace library function calls which might be missing due to concurrent (first) accesses. It is not meaningful to use this option with the --no-libcall option.

--max-stack=DEPTH : Set the max function stack depth for tracing. Default is 1024.

--num-thread=NUM : Use NUM threads to record trace data. Default is 1/4 of online CPUs (but when full kernel tracing is enabled, it will use the full number of CPUs).

--libmcount-single : Use single thread version of libmcount for faster recording. This is ignored if the target program links with the pthread library.

--rt-prio=PRIO : Boost priority of recording threads to real-time (FIFO) with priority of PRIO. This is particularly useful for high-volume data such as full kernel tracing.

--keep-pid : Retain same pid for traced program. For some daemon processes, it is important to have same pid when forked. Running under uftrace normally changes pid as it calls fork() again internally.

--no-randomize-addr : Disable ASLR (Address Space Layout Randomization). It makes the target process fix its address space layout.

-g, --agent : Spawn an agent thread in the target. At runtime, the agent receives external commands and can change supported tracing options. See AGENT section in the uftrace-live(1).

--srcline : Enable recording source line in the debug info.

FILTERS

The uftrace tool supports filtering out uninteresting functions. Filtering is highly recommended since it helps users focus on the interesting functions and reduces the data size. When uftrace is called it receives two types of function filter; an opt-in filter with -F/--filter and an opt-out filter with -N/--notrace.

These filters can be applied either at record time or replay time. They can be added and removed at runtime from the client. See uftrace-live(1) for details about agent operations.

The first type of filter is opt-in. By default, it doesn't trace anything. But when one of the specified functions is executed, tracing is started. When the function returns, tracing is stopped again.

For example, consider a simple program which calls a(), b() and c() in turn.

$ cat abc.c
void c(void) {
    /* do nothing */
}

void b(void) {
    c();
}

void a(void) {
    b();
}

int main(void) {
    a();
    return 0;
}

$ gcc -pg -o abc abc.c

Normally uftrace will trace all the functions from main() to c().

$ uftrace record ./abc
$ uftrace replay
# DURATION    TID     FUNCTION
 138.494 us [ 1234] | __cxa_atexit();
            [ 1234] | main() {
            [ 1234] |   a() {
            [ 1234] |     b() {
   3.880 us [ 1234] |       c();
   5.475 us [ 1234] |     } /* b */
   6.448 us [ 1234] |   } /* a */
   8.631 us [ 1234] | } /* main */

But when the -F b filter option is used, it will not trace main() or a() but only b() and c().

$ uftrace record -F b ./abc
$ uftrace replay
# DURATION    TID     FUNCTION
            [ 1234] | b() {
   3.880 us [ 1234] |   c();
   5.475 us [ 1234] | } /* b */

The second type of filter is opt-out. By default, everything is traced, but when one of the specified functions is executed, tracing stops. When the excluded function returns, tracing is started again.

In the above example, you can omit the function b() and all calls it makes with the -N option.

$ uftrace record -N b ./abc
$ uftrace replay
# DURATION    TID     FUNCTION
 138.494 us [ 1234] | __cxa_atexit();
            [ 1234] | main() {
   6.448 us [ 1234] |   a();
   8.631 us [ 1234] | } /* main */

If users only care about specific functions and want to know how they are called, one can use the caller filter. It makes the function as leaf and records the parent functions to the function.

$ uftrace record -C b ./abc
$ uftrace replay
# DURATION    TID     FUNCTION
            [ 1234] | main() {
            [ 1234] |   a() {
   5.475 us [ 1234] |     b();
   6.448 us [ 1234] |   } /* a */
   8.631 us [ 1234] | } /* main */

In the above example, functions not in the calling path were not shown. Also the function 'c' - which is a child of the function 'b' - is also hidden.

Caller filters can be added and removed from the client at runtime, using the @clear suffix for the -C / --caller-filter option.

In addition, you can limit the nesting level of functions with the -D option.

$ uftrace record -D 3 ./abc
$ uftrace replay
# DURATION    TID     FUNCTION
 138.494 us [ 1234] | __cxa_atexit();
            [ 1234] | main() {
            [ 1234] |   a() {
   5.475 us [ 1234] |     b();
   6.448 us [ 1234] |   } /* a */
   8.631 us [ 1234] | } /* main */

In the above example, uftrace only records functions up to a depth of 3, so leaf function c() was omitted. Note that the -D option works with -F.

Sometimes it's useful to see long-running functions only. This is good because there are usually many tiny functions that are not interesting. The -t/--time-filter option implements the time-based filter that only records functions which run longer than the given threshold. In the above example, the user might want to see functions running more than 5 micro-seconds like below:

$ uftrace record -t 5us ./abc
$ uftrace replay
# DURATION    TID     FUNCTION
 138.494 us [ 1234] | __cxa_atexit();
            [ 1234] | main() {
            [ 1234] |   a() {
   5.475 us [ 1234] |     b();
   6.448 us [ 1234] |   } /* a */
   8.631 us [ 1234] | } /* main */

The -t/--time-filter option works for user-level functions only. It does not work for recording kernel functions, but they can be hidden in replay, report, dump and graph commands with -t/--time-filter option.

In addition, you can set filter to record selected source locations with -L option.

$ uftrace record -L s-libmain.c t-lib
$ uftrace replay --srcline
# DURATION     TID     FUNCTION [SOURCE]
            [  5043] | main() { /* /home/uftrace/tests/s-libmain.c:16 */
   6.998 us [  5043] |   foo(); /* /home/uftrace/tests/s-libmain.c:11 */
   9.393 us [  5043] | } /* main */

You can set filter with the @hide suffix not to record selected source locations.

$ uftrace record -L s-libmain.c@hide t-lib
$ uftrace replay --srcline
# DURATION     TID     FUNCTION [SOURCE]
            [ 14688] | lib_a() { /* /home/uftrace/tests/s-lib.c:10 */
            [ 14688] |   lib_b() { /* /home/uftrace/tests/s-lib.c:15 */
   1.505 us [ 14688] |     lib_c(); /* /home/uftrace/tests/s-lib.c:20 */
   2.816 us [ 14688] |   } /* lib_b */
   3.181 us [ 14688] | } /* lib_a */

The -Z/--size-filter option is to filter functions that has small sizes. It reads ELF symbols size and compare it with the given value. The PLT functions may have no symbol size in the ELF format, in that case the PLT entry size will be used as the size of the function.

$ uftrace record -Z 100  t-arg
$ uftrace replay
# DURATION     TID     FUNCTION
            [162500] | main() {
  12.486 us [162500] |   foo();
   0.505 us [162500] |   many();
            [162500] |   pass() {
   0.283 us [162500] |     check();
   1.449 us [162500] |   } /* pass */
  18.478 us [162500] | } /* main */

You can also set triggers on filtered functions. See TRIGGERS section below for details.

When kernel function tracing is enabled, you can also set the filters on kernel functions by marking the symbol with the @kernel modifier. The following example will show all user functions and the (kernel) page fault handler.

$ sudo uftrace -k -F '.*page_fault@kernel' ./abc
# DURATION    TID     FUNCTION
           [14721] | main() {
  7.713 us [14721] |   __do_page_fault();
  6.600 us [14721] |   __do_page_fault();
  6.544 us [14721] |   __do_page_fault();
           [14721] |   a() {
           [14721] |     b() {
           [14721] |       c() {
  0.860 us [14721] |         getpid();
  2.346 us [14721] |       } /* c */
  2.956 us [14721] |     } /* b */
  3.340 us [14721] |   } /* a */
 79.086 us [14721] | } /* main */

TRIGGERS

The uftrace tool supports triggering actions on selected function calls (with or without filters) and/or signals. Currently supported triggers are listed below. The BNF for trigger specification is as follows:

<trigger>    :=  <symbol> "@" <actions>
<actions>    :=  <action>  | <action> "," <actions>
<action>     :=  "depth="<num> | "trace" | "trace_on" | "trace_off" |
                 "time="<time_spec> | "size="<num> | "read="<read_spec> |
                 "finish" | "filter" | "notrace" | "recover"
                 "filter" | "notrace" | "recover"
<time_unit>  :=  "ns" | "nsec" | "us" | "usec" | "ms" | "msec" | "s" | "sec" | "m" | "min"
<read_spec>  :=  "proc/statm" | "page-fault" | "pmu-cycle" | "pmu-cache" | "pmu-branch"

The depth trigger is to change filter depth during execution of the function. It can be used to apply different filter depths for different functions.

The following example shows how triggers work. The global filter maximum depth is 5, but when function b() is called, it is changed to 1, so functions below b() will not be shown.

$ uftrace record -D 5 -T 'b@depth=1' ./abc
$ uftrace replay
# DURATION    TID     FUNCTION
 138.494 us [ 1234] | __cxa_atexit();
            [ 1234] | main() {
            [ 1234] |   a() {
   5.475 us [ 1234] |     b();
   6.448 us [ 1234] |   } /* a */
   8.631 us [ 1234] | } /* main */

The backtrace trigger is only meaningful in the replay command.

The trace_on and trace_off actions (the _ can be omitted as traceon and traceoff) control whether uftrace records the specified functions or not.

The 'recover' trigger is for some corner cases in which the process accesses the callstack directly. For now it's not necessary to call it as uftrace does the job automatically.

The 'time' trigger is to change time filter setting during execution of the function. It can be used to apply different time filter for different functions.

The read trigger is to read some information at runtime. The result will be recorded as (builtin) events at the beginning and the end of a given function. As of now, following events are supported:

  • "proc/statm": process memory stat from /proc filesystem
  • "page-fault": number of page faults using getrusage(2)
  • "pmu-cycle": cpu cycles and instructions using Linux perf-event syscall
  • "pmu-cache": (cpu) cache-references and misses using Linux perf-event syscall
  • "pmu-branch": branch instructions and misses using Linux perf-event syscall

The results are printed as events (comments) like below.

$ uftrace record -T a@read=proc/statm ./abc
$ uftrace replay
# DURATION    TID     FUNCTION
            [ 1234] | main() {
            [ 1234] |   a() {
            [ 1234] |     /* read:proc/statm (size=6808KB, rss=776KB, shared=712KB) */
            [ 1234] |     b() {
            [ 1234] |       c() {
   1.448 us [ 1234] |         getpid();
  10.270 us [ 1234] |       } /* c */
  11.250 us [ 1234] |     } /* b */
            [ 1234] |     /* diff:proc/statm (size=+4KB, rss=+0KB, shared=+0KB) */
  18.380 us [ 1234] |   } /* a */
  19.537 us [ 1234] | } /* main */

The 'finish' trigger is to end recording. The process still can run and this can be useful to trace unterminated processes like daemon.

The 'filter' and 'notrace' triggers have same effect as -F/--filter and -N/--notrace options respectively.

Triggers only work for user-level functions for now.

The trigger can be used for signals as well. This is done by signal trigger with --signal option. The syntax is similar to function trigger but only "trace_on", "trace_off" and "finish" trigger actions are supported.

$ uftrace record --signal 'SIGUSR1@finish' ./some-daemon

ARGUMENTS

The uftrace tool supports recording function arguments and/or return values using the -A/--argument and -R/--retval options respectively. The syntax is very similar to that of triggers:

<argument>    :=  <symbol> [ "@" <specs> ]
<specs>       :=  <spec> | <spec> "," <spec>
<spec>        :=  ( <int_spec> | <float_spec> | <ret_spec> )
<int_spec>    :=  "arg" N [ "/" <format> [ <size> ] ] [ "%" ( <reg> | <stack> ) ]
<float_spec>  :=  "fparg" N [ "/" ( <size> | "80" ) ] [ "%" ( <reg> | <stack> ) ]
<ret_spec>    :=  "retval" [ "/" <format> [ <size> ] ]
<format>      :=  "d" | "i" | "u" | "x" | "o" | "s" | "c" | "f" | "S" | "p"
<size>        :=  "8" | "16" | "32" | "64"
<reg>         :=  <arch-specific register name>  # "rdi", "xmm0", "r0", ...
<stack>       :=  "stack" [ "+" ] <offset>

The -A/--argument option takes a symbol name pattern and its optional specs. The spec is started by argN where N is an index of the arguments. The index starts from 1 and corresponds to the argument passing order of the calling convention on the system. Note that the indexes of arguments are separately counted for integer (or pointer) and floating-point type, and they can interfere depending on the calling convention. The argN is for integer arguments and fpargN is for floating-point arguments.

Users can optionally specify a format and size for the arguments and/or return values. The "d" format or without format field, uftrace treats them as 'long int' type for integers and 'double' for floating-point numbers. The "i" format makes it signed integer type and "u" format is for unsigned type. Both are printed as decimal while "x" format makes it printed as hexadecimal, and "o" format makes it printed as octal. The "s" format is for null-terminated string type and "c" format is for character type. The "f" format is for floating-point type and is meaningful only for return value (generally). Note that fpargN doesn't take the format field since it's always floating-point. The "S" format is for std::string, but it only supports libstdc++ library as of yet. Finally, the "p" format is for function pointer. Once the target address is recorded, it will be displayed as function name.

Please beware when using string type arguments since it can crash the program if the (pointer) value is invalid. Actually uftrace tries to keep track of valid ranges of process address space but it might miss some corner cases.

It is also possible to specify a certain register name or stack offset for arguments (but not for return value). The following register names can be used for argument:

  • x86: rdi, rsi, rdx, rcx, r8, r9 (for integer), xmm[0-7] (for floating-point)
  • arm: r[0-3] (for integer), s[0-15] or d[0-7] (for floating-point)

Examples are below:

$ uftrace record -A main@arg1/x -R main@retval/i32 ./abc
$ uftrace replay
# DURATION    TID     FUNCTION
 138.494 us [ 1234] | __cxa_atexit();
            [ 1234] | main(0x1) {
            [ 1234] |   a() {
            [ 1234] |     b() {
   3.880 us [ 1234] |       c();
   5.475 us [ 1234] |     } /* b */
   6.448 us [ 1234] |   } /* a */
   8.631 us [ 1234] | } = 0; /* main */

$ uftrace record -A puts@arg1/s -R puts@retval ./hello
Hello world

$ uftrace replay
# DURATION    TID     FUNCTION
   1.457 us [21534] | __monstartup();
   0.997 us [21534] | __cxa_atexit();
            [21534] | main() {
   7.226 us [21534] |   puts("Hello world") = 12;
   8.708 us [21534] | } /* main */

Note that these arguments and return value are recorded only if the executable was built with the -pg option. Executables built with -finstrument-functions will ignore it except for library calls. Recording of arguments and return values only works with user-level functions for now.

If the target program is built with debug info like DWARF, uftrace can identify number of arguments and their types automatically (when built with libdw). Also arguments and return value of some well-known library functions are provided even if the debug info is not available. In these cases user don't need to specify spec of the arguments and return value manually - just a function name (or pattern) is enough. In fact, manual argspec will suppress the automatic argspec.

For example, the above example can be written like below:

$ uftrace record -A . -R main ./hello
Hello world

$ uftrace replay -F main
# DURATION     TID     FUNCTION
            [ 18948] | main(1, 0x7ffeeb7590b8) {
   7.183 us [ 18948] |   puts("Hello world");
   9.832 us [ 18948] | } = 0; /* main */

Note that argument pattern (".") matches to any character so it recorded all (supported) functions. It shows two arguments for "main" and a single string argument for "puts". If you simply want to see all arguments and return values of every functions (if supported), use -a/--auto-args option.

DYNAMIC TRACING

FULL DYNAMIC TRACING

The uftrace tool supports dynamic function tracing which can be enabled at runtime (load-time, to be precise) on x86_64 and AArch64. Before recording functions, normally you need to build the target program with -pg (or -finstrument-functions), then it has some performance impact because all functions call mcount().

With dynamic tracing, you can trace specific functions only given by the -P/--patch option and can also disable specific functions given by the -U/--unpatch option. With capstone disassembly engine you even don't need to (re)compile the target with the option above. Now uftrace can analyze the instructions and (if possible) it can copy them to a different place and rewrite it to call mcount() function so that it can be traced by uftrace. After that the control is passed to the copied instructions and then returned back to the remaining instructions.

The following example shows an error message when normally running uftrace. Because the binary doesn't call any instrumentation code (i.e. 'mcount').

$ gcc -o abc tests/s-abc.c
$ uftrace abc
uftrace: /home/namhyung/project/uftrace/cmd-record.c:1305:check_binary
  ERROR: Can't find 'mcount' symbol in the 'abc'.
         It seems not to be compiled with -pg or -finstrument-functions flag
         which generates traceable code.  Please check your binary file.

But when the -P a patch option is used, and then only it can dynamically trace a().

$ uftrace record --no-libcall -P a abc
$ uftrace replay
# DURATION    TID     FUNCTION
   0.923 us [19379] | a();

In addition, you can enable all functions using '.' (for glob, '*') that matches to any character in a regex pattern with P option.

$ uftrace record --no-libcall -P . abc
$ uftrace replay
# DURATION    TID     FUNCTION
            [19387] | main() {
            [19387] |   a() {
            [19387] |     b() {
   0.940 us [19387] |       c();
   2.030 us [19387] |     } /* b */
   2.451 us [19387] |   } /* a */
   3.289 us [19387] | } /* main */

Note that -U option has the opposite effect of -P option so users can the both to fine-control. The option comes later will override the formers. For example if you want to trace all functions but 'a' in the above:

$ uftrace record --no-libcall -P . -U a  abc
$ uftrace replay
# DURATION    TID     FUNCTION
            [19390] | main() {
            [19390] |   b() {
   0.983 us [19390] |     c();
   2.012 us [19390] |   } /* b */
   3.373 us [19390] | } /* main */

The order of the options is important, if you change it like -U a -P . then it will trace all the functions since -P . will be effective for all.

GCC FENTRY

If the capstone is not available, you need to add some more compiler (gcc) options when building the target program. The gcc 5.1 or more recent versions provide -mfentry and -mnop-mcount options which add instrumentation code (i.e. calling mcount() function) at the very beginning of a function and convert the instruction to a NOP. Then it has almost zero performance overhead when running in a normal condition. The uftrace can selectively convert it back to call mcount() using -P option.

$ gcc -pg -mfentry -mnop-mcount -o abc-fentry tests/s-abc.c
$ uftrace record -P . --no-libcall abc-fentry
$ uftrace replay
# DURATION     TID     FUNCTION
            [ 18973] | main() {
            [ 18973] |   a() {
            [ 18973] |     b() {
   0.852 us [ 18973] |       c();
   2.378 us [ 18973] |     } /* b */
   2.909 us [ 18973] |   } /* a */
   3.756 us [ 18973] | } /* main */

CLANG XRAY

Clang/LLVM 4.0 provides a dynamic instrumentation technique called X-ray. It's similar to a combination of gcc -mfentry -mnop-mcount and -finstrument-functions. The uftrace also supports dynamic tracing on the executables built with the X-ray.

For example, you can build the target program by clang with the below option and equally use -P option for dynamic tracing like below:

$ clang -fxray-instrument -fxray-instruction-threshold=1 -o abc-xray  tests/s-abc.c
$ uftrace record -P main abc-xray
$ uftrace replay
# DURATION    TID     FUNCTION
            [11093] | main() {
   1.659 us [11093] |   getpid();
   5.963 us [11093] | } /* main */

$ uftrace record -P . abc-xray
$ uftrace replay
# DURATION    TID     FUNCTION
            [11098] | main() {
            [11098] |   a() {
            [11098] |     b() {
            [11098] |       c() {
   0.753 us [11098] |         getpid();
   1.430 us [11098] |       } /* c */
   1.915 us [11098] |     } /* b */
   2.405 us [11098] |   } /* a */
   3.005 us [11098] | } /* main */

PATCHABLE FUNCTION ENTRY

Recent compilers in both gcc and clang support another useful option -fpatchable-function-entry=N[,M] that generates M NOPs before the function entry and N-M NOPs after the function entry. We can simply use the case when M is 0 so -fpatchable-function-entry=N is enough. The number of NOPs required for dynamic tracing depends on the architecture but x86_64 requires 5 NOPs and AArch64 requires 2 NOPs to dynamically patch a call instruction for uftrace recording.

For example in x86_64, you can build the target program and trace as follows.

$ gcc -fpatchable-function-entry=5 -o abc-fpatchable tests/s-abc.c
$ uftrace record -P . abc-fpatchable
$ uftrace replay
# DURATION     TID     FUNCTION
            [  6818] | main() {
            [  6818] |   a() {
            [  6818] |     b() {
            [  6818] |       c() {
   0.926 us [  6818] |         getpid();
   4.158 us [  6818] |       } /* c */
   4.590 us [  6818] |     } /* b */
   4.957 us [  6818] |   } /* a */
   5.593 us [  6818] | } /* main */

This feature can also be used by explicitly adding compiler attribute to some specific functions with __attribute__ ((patchable_function_entry (N,M))). For example, the 'tests/s-abc.c' program can be modified as follows.

static int c(void)
{
        return 100000;
}

__attribute__((patchable_function_entry(5)))
static int b(void)
{
        return c() + 1;
}

static int a(void)
{
        return b() - 1;
}

__attribute__((patchable_function_entry(5)))
int main(void)
{
        int ret = 0;

        ret += a();
        return ret ? 0 : 1;
}

The attribute is added to function 'main' and 'b' only and this program can normally be compiled without any additional compiler options, but the compiler detects the attributes and adds 5 NOPs at the entry of 'main' and 'b'.

$ gcc -o abc tests/s-patchable-abc.c
$ uftrace record -P . abc
$ uftrace replay
# DURATION     TID     FUNCTION
            [ 20803] | main() {
   0.342 us [ 20803] |   b();
   1.608 us [ 20803] | } /* main */

With this way, uftrace can selectively trace only the functions user wants by explicitly adding the attribute. This approach can collect trace records in a much less intrusive way compared to tracing the entire functions enabled by compiler flags.

-fpatchable-function-entry=N[,M] option and its attribute are supported since gcc-8.1 and clang-10. This dynamic tracing feature can be used in both x86_64 and AArch64 as of now.

SCRIPT EXECUTION

The uftrace tool supports script execution for each function entry and exit. The supported script types are Python 2.7, Python 3 and Lua 5.1 as of now.

The user can write four functions. 'uftrace_entry' and 'uftrace_exit' are executed whenever each function is executed at the entry and exit. However 'uftrace_begin' and 'uftrace_end' are only executed once when the target program begins and ends.

$ cat scripts/simple.py
def uftrace_begin(ctx):
    print("program begins...")

def uftrace_entry(ctx):
    func = ctx["name"]
    print("entry : " + func + "()")

def uftrace_exit(ctx):
    func = ctx["name"]
    print("exit  : " + func + "()")

def uftrace_end():
    print("program is finished")

The above script can be executed in record time as follows:

$ uftrace record -S scripts/simple.py -F main tests/t-abc
program begins...
entry : main()
entry : a()
entry : b()
entry : c()
entry : getpid()
exit  : getpid()
exit  : c()
exit  : b()
exit  : a()
exit  : main()
program is finished

The 'ctx' variable is a dictionary type that contains the below information.

/* context information passed to uftrace_entry(ctx) and uftrace_exit(ctx) */
script_context = {
    int       tid;
    int       depth;
    long      timestamp;
    long      duration;    # exit only
    long      address;
    string    name;
    list      args;        # entry only (if available)
    value     retval;      # exit  only (if available)
};

/* context information passed to uftrace_begin(ctx) */
script_context = {
    bool      record;      # True if it runs at record time, otherwise False
    string    version;     # uftrace version info
    list      cmds;        # execution commands
};

Each field in 'script_context' can be read inside the script. Please see uftrace-script(1) for details about scripting.

WATCH POINT

The uftrace watch point is to display certain value only if it's changed. It's conceptually same as other debuggers but only works at function entry and exit so it might miss some updates.

As of now, following watch points are supported:

  • "cpu" : cpu number current task is running on
  • "var": read value of a global variable given after ":".

Like read triggers, the result is displayed as event (comment):

$ uftrace -W cpu tests/t-abc
# DURATION     TID     FUNCTION
            [ 19060] | main() {
            [ 19060] |   /* watch:cpu (cpu=8) */
            [ 19060] |   a() {
            [ 19060] |     b() {
            [ 19060] |       c() {
   2.365 us [ 19060] |         getpid();
   8.002 us [ 19060] |       } /* c */
   8.690 us [ 19060] |     } /* b */
   9.350 us [ 19060] |   } /* a */
  12.479 us [ 19060] | } /* main */

This is how to use 'var' watchpoints:

 $ uftrace -W var:mydata a.out
 # DURATION     TID     FUNCTION
             [239842] | __monstartup() {
             [239842] |   /* watch:var (mydata=7) */
    3.534 us [239842] | } /* __monstartup */
    0.191 us [239842] | __cxa_atexit();
             [239842] | main() {
             [239842] |   foo() {
             [239842] |     /* watch:var (mydata=42) */
    0.381 us [239842] |     bar();
    1.069 us [239842] |   } /* foo */
    2.698 us [239842] | } /* main */

SEE ALSO

uftrace(1), uftrace-replay(1), uftrace-report(1), uftrace-recv(1), uftrace-graph(1), uftrace-script(1), uftrace-tui(1)