Intel® VTune™ Profiler

User Guide

ID 766319
Date 3/22/2024

A newer version of this document is available. Customers should click here to go to the newest version.

Document Table of Contents


Analyze a KVM guest OS running on your system.

GUI Equivalent

Analyze KVM guest OS option in the WHAT pane


-analyze-kvm-guest | -no-analyze-kvm-guest



Actions Modified



Analyze a KVM guest OS running on your system. For successful analysis, make sure to do the following:

  1. Copy these files from the guest OS to your local file system:

    • /proc/kallsyms

    • /proc/modules

    • any guest OS’s modules of interest (vmlinux, any *.ko files, and so on)

  2. Specify a Linux target system for analysis using the target-system option.

  3. Configure your VTune Profiler analysis target by using thekvm-guest-kallsyms, kvm-guest-modules, and search-dir options to specify paths to the files copied in step 1 for accurate module resolution.

  4. Configure your collect-with by using theknob ftrace-config=<events> option to specify Linux FTrace* events tracking IRQ injection process.


Enable a custom hardware event-based sampling collection for the KVM guest OS and collect irq, softirq, workq, and kvm FTrace events:

vtune --target-system=ssh: user1@ -collect-with runsa -knob event-config=CPU_CLK_UNHALTED.REF_TSC:sa=3500000,CPU_CLK_UNHALTED.THREAD:sa=3500000,INST_RETIRED.ANY:sa=3500000 –knob enable-stack-collection=true -knob ftrace-config=irq,softirq,workq,kvm -analyze-kvm-guest -kvm-guest-kallsyms=/home/vtune/[guest]/kvm.kallsyms -kvm-guest-modules=/home/vtune/[guest]/kvm.modules --search-dir sym:p=/home/vtune/ --target-pid 9791