1 // SPDX-License-Identifier: GPL-2.0
2 // Copyright (c) 2019 Facebook
3 #include <linux/sched.h>
4 #include <linux/ptrace.h>
9 #include <bpf/bpf_helpers.h>
11 #include "bpf_compiler.h"
13 #define FUNCTION_NAME_LEN 64
14 #define FILE_NAME_LEN 128
15 #define TASK_COMM_LEN 16
18 int PyThreadState_frame;
19 int PyThreadState_thread;
20 int PyFrameObject_back;
21 int PyFrameObject_code;
22 int PyFrameObject_lineno;
23 int PyCodeObject_filename;
24 int PyCodeObject_name;
30 uintptr_t current_state_addr;
31 uintptr_t tls_key_addr;
41 char name[FUNCTION_NAME_LEN];
42 char file[FILE_NAME_LEN];
48 char comm[TASK_COMM_LEN];
49 int32_t kernel_stack_id;
50 int32_t user_stack_id;
55 int32_t stack[STACK_MAX_LEN];
66 void* f_back; // PyFrameObject.f_back, previous frame
67 void* f_code; // PyFrameObject.f_code, pointer to PyCodeObject
68 void* co_filename; // PyCodeObject.co_filename
69 void* co_name; // PyCodeObject.co_name
77 static void *get_thread_state(void *tls_base, PidData *pidData)
82 bpf_probe_read_user(&key, sizeof(key), (void*)(long)pidData->tls_key_addr);
83 bpf_probe_read_user(&thread_state, sizeof(thread_state),
84 tls_base + 0x310 + key * 0x10 + 0x08);
88 static __always_inline bool get_frame_data(void *frame_ptr, PidData *pidData,
89 FrameData *frame, Symbol *symbol)
91 // read data from PyFrameObject
92 bpf_probe_read_user(&frame->f_back,
93 sizeof(frame->f_back),
94 frame_ptr + pidData->offsets.PyFrameObject_back);
95 bpf_probe_read_user(&frame->f_code,
96 sizeof(frame->f_code),
97 frame_ptr + pidData->offsets.PyFrameObject_code);
99 // read data from PyCodeObject
102 bpf_probe_read_user(&frame->co_filename,
103 sizeof(frame->co_filename),
104 frame->f_code + pidData->offsets.PyCodeObject_filename);
105 bpf_probe_read_user(&frame->co_name,
106 sizeof(frame->co_name),
107 frame->f_code + pidData->offsets.PyCodeObject_name);
108 // read actual names into symbol
109 if (frame->co_filename)
110 bpf_probe_read_user_str(&symbol->file,
111 sizeof(symbol->file),
113 pidData->offsets.String_data);
115 bpf_probe_read_user_str(&symbol->name,
116 sizeof(symbol->name),
118 pidData->offsets.String_data);
123 __uint(type, BPF_MAP_TYPE_HASH);
124 __uint(max_entries, 1);
126 __type(value, PidData);
127 } pidmap SEC(".maps");
130 __uint(type, BPF_MAP_TYPE_HASH);
131 __uint(max_entries, 1);
133 __type(value, Event);
134 } eventmap SEC(".maps");
137 __uint(type, BPF_MAP_TYPE_HASH);
138 __uint(max_entries, 1);
141 } symbolmap SEC(".maps");
144 __uint(type, BPF_MAP_TYPE_ARRAY);
145 __uint(max_entries, 1);
147 __type(value, Stats);
148 } statsmap SEC(".maps");
151 __uint(type, BPF_MAP_TYPE_PERF_EVENT_ARRAY);
152 __uint(max_entries, 32);
153 __uint(key_size, sizeof(int));
154 __uint(value_size, sizeof(int));
155 } perfmap SEC(".maps");
158 __uint(type, BPF_MAP_TYPE_STACK_TRACE);
159 __uint(max_entries, 1000);
160 __uint(key_size, sizeof(int));
161 __uint(value_size, sizeof(long long) * 127);
162 } stackmap SEC(".maps");
165 struct process_frame_ctx {
167 int32_t *symbol_counter;
176 static int process_frame_callback(__u32 i, struct process_frame_ctx *ctx)
179 void *frame_ptr = ctx->frame_ptr;
180 PidData *pidData = ctx->pidData;
181 FrameData *frame = ctx->frame;
182 int32_t *symbol_counter = ctx->symbol_counter;
183 int cur_cpu = ctx->cur_cpu;
184 Event *event = ctx->event;
185 Symbol *sym = ctx->sym;
187 if (frame_ptr && get_frame_data(frame_ptr, pidData, frame, sym)) {
188 int32_t new_symbol_id = *symbol_counter * 64 + cur_cpu;
189 int32_t *symbol_id = bpf_map_lookup_elem(&symbolmap, sym);
192 bpf_map_update_elem(&symbolmap, sym, &zero, 0);
193 symbol_id = bpf_map_lookup_elem(&symbolmap, sym);
199 if (*symbol_id == new_symbol_id)
203 if (i >= STACK_MAX_LEN)
206 event->stack[i] = *symbol_id;
208 event->stack_len = i + 1;
209 frame_ptr = frame->f_back;
213 #endif /* USE_BPF_LOOP */
217 #elif defined(SUBPROGS)
220 static __always_inline
222 int __on_event(struct bpf_raw_tracepoint_args *ctx)
224 uint64_t pid_tgid = bpf_get_current_pid_tgid();
225 pid_t pid = (pid_t)(pid_tgid >> 32);
226 PidData* pidData = bpf_map_lookup_elem(&pidmap, &pid);
231 Event* event = bpf_map_lookup_elem(&eventmap, &zero);
237 event->tid = (pid_t)pid_tgid;
238 bpf_get_current_comm(&event->comm, sizeof(event->comm));
240 event->user_stack_id = bpf_get_stackid(ctx, &stackmap, BPF_F_USER_STACK);
241 event->kernel_stack_id = bpf_get_stackid(ctx, &stackmap, 0);
243 void* thread_state_current = (void*)0;
244 bpf_probe_read_user(&thread_state_current,
245 sizeof(thread_state_current),
246 (void*)(long)pidData->current_state_addr);
248 struct task_struct* task = (struct task_struct*)bpf_get_current_task();
249 void* tls_base = (void*)task;
251 void* thread_state = pidData->use_tls ? get_thread_state(tls_base, pidData)
252 : thread_state_current;
253 event->thread_current = thread_state == thread_state_current;
255 if (pidData->use_tls) {
256 uint64_t pthread_created;
257 uint64_t pthread_self;
258 bpf_probe_read_user(&pthread_self, sizeof(pthread_self),
261 bpf_probe_read_user(&pthread_created,
262 sizeof(pthread_created),
264 pidData->offsets.PyThreadState_thread);
265 event->pthread_match = pthread_created == pthread_self;
267 event->pthread_match = 1;
270 if (event->pthread_match || !pidData->use_tls) {
274 int cur_cpu = bpf_get_smp_processor_id();
276 bpf_probe_read_user(&frame_ptr,
279 pidData->offsets.PyThreadState_frame);
281 int32_t* symbol_counter = bpf_map_lookup_elem(&symbolmap, &sym);
282 if (symbol_counter == NULL)
285 struct process_frame_ctx ctx = {
287 .symbol_counter = symbol_counter,
288 .frame_ptr = frame_ptr,
295 bpf_loop(STACK_MAX_LEN, process_frame_callback, &ctx, 0);
299 #if defined(USE_ITER)
300 /* no for loop, no unrolling */
301 #elif defined(NO_UNROLL)
302 __pragma_loop_no_unroll
303 #elif defined(UNROLL_COUNT)
304 __pragma_loop_unroll_count(UNROLL_COUNT)
306 __pragma_loop_unroll_full
307 #endif /* NO_UNROLL */
308 /* Unwind python stack */
311 bpf_for(i, 0, STACK_MAX_LEN) {
312 #else /* !USE_ITER */
313 for (int i = 0; i < STACK_MAX_LEN; ++i) {
315 if (frame_ptr && get_frame_data(frame_ptr, pidData, &frame, &sym)) {
316 int32_t new_symbol_id = *symbol_counter * 64 + cur_cpu;
317 int32_t *symbol_id = bpf_map_lookup_elem(&symbolmap, &sym);
319 bpf_map_update_elem(&symbolmap, &sym, &zero, 0);
320 symbol_id = bpf_map_lookup_elem(&symbolmap, &sym);
324 if (*symbol_id == new_symbol_id)
326 event->stack[i] = *symbol_id;
327 event->stack_len = i + 1;
328 frame_ptr = frame.f_back;
331 #endif /* USE_BPF_LOOP */
332 event->stack_complete = frame_ptr == NULL;
334 event->stack_complete = 1;
337 Stats* stats = bpf_map_lookup_elem(&statsmap, &zero);
342 bpf_perf_event_output(ctx, &perfmap, 0, event, offsetof(Event, metadata));
346 SEC("raw_tracepoint/kfree_skb")
347 int on_event(struct bpf_raw_tracepoint_args* ctx)
350 ret |= __on_event(ctx);
351 ret |= __on_event(ctx);
352 ret |= __on_event(ctx);
353 ret |= __on_event(ctx);
354 ret |= __on_event(ctx);
358 char _license[] SEC("license") = "GPL";