perf_event_open(2)

SECCIƓN: 2 - Llamadas al sistema

perf_event_open(2) System Calls Manual perf_event_open(2)

NAME

perf_event_open - set up performance monitoring

LIBRARY

Standard C library (libc, -lc)

SYNOPSIS

#include <linux/perf_event.h> /* Definition of PERF_* constants */

#include <linux/hw_breakpoint.h> /* Definition of HW_* constants */

#include <sys/syscall.h> /* Definition of SYS_* constants */

#include <unistd.h>

int syscall(SYS_perf_event_open, struct perf_event_attr *attr,

pid_t pid, int cpu, int group_fd, unsigned long flags);

Note: glibc provides no wrapper for perf_event_open(), necessitating

the use of syscall(2).

DESCRIPTION

Given a list of parameters, perf_event_open() returns a file descrip‐

tor, for use in subsequent system calls (read(2), mmap(2), prctl(2),

fcntl(2), etc.).

A call to perf_event_open() creates a file descriptor that allows mea‐

suring performance information. Each file descriptor corresponds to

one event that is measured; these can be grouped together to measure

multiple events simultaneously.

Events can be enabled and disabled in two ways: via ioctl(2) and via

prctl(2). When an event is disabled it does not count or generate

overflows but does continue to exist and maintain its count value.

Events come in two flavors: counting and sampled. A counting event is

one that is used for counting the aggregate number of events that oc‐

cur. In general, counting event results are gathered with a read(2)

call. A sampling event periodically writes measurements to a buffer

that can then be accessed via mmap(2).

Arguments

The pid and cpu arguments allow specifying which process and CPU to

monitor:

pid == 0 and cpu == -1

This measures the calling process/thread on any CPU.

pid == 0 and cpu >= 0

This measures the calling process/thread only when running on

the specified CPU.

pid > 0 and cpu == -1

This measures the specified process/thread on any CPU.

pid > 0 and cpu >= 0

This measures the specified process/thread only when running on

the specified CPU.

pid == -1 and cpu >= 0

This measures all processes/threads on the specified CPU. This

requires CAP_PERFMON (since Linux 5.8) or CAP_SYS_ADMIN capabil‐

ity or a /proc/sys/kernel/perf_event_paranoid value of less than

1.

pid == -1 and cpu == -1

This setting is invalid and will return an error.

When pid is greater than zero, permission to perform this system call

is governed by CAP_PERFMON (since Linux 5.9) and a ptrace access mode

PTRACE_MODE_READ_REALCREDS check on older Linux versions; see

ptrace(2).

The group_fd argument allows event groups to be created. An event

group has one event which is the group leader. The leader is created

first, with group_fd = -1. The rest of the group members are created

with subsequent perf_event_open() calls with group_fd being set to the

file descriptor of the group leader. (A single event on its own is

created with group_fd = -1 and is considered to be a group with only 1

member.) An event group is scheduled onto the CPU as a unit: it will

be put onto the CPU only if all of the events in the group can be put

onto the CPU. This means that the values of the member events can be

meaningfully compared—added, divided (to get ratios), and so on—with

each other, since they have counted events for the same set of executed

instructions.

The flags argument is formed by ORing together zero or more of the fol‐

lowing values:

PERF_FLAG_FD_CLOEXEC (since Linux 3.14)

This flag enables the close-on-exec flag for the created event

file descriptor, so that the file descriptor is automatically

closed on execve(2). Setting the close-on-exec flags at cre‐

ation time, rather than later with fcntl(2), avoids potential

race conditions where the calling thread invokes

perf_event_open() and fcntl(2) at the same time as another

thread calls fork(2) then execve(2).

PERF_FLAG_FD_NO_GROUP

This flag tells the event to ignore the group_fd parameter ex‐

cept for the purpose of setting up output redirection using the

PERF_FLAG_FD_OUTPUT flag.

PERF_FLAG_FD_OUTPUT (broken since Linux 2.6.35)

This flag re-routes the event's sampled output to instead be in‐

cluded in the mmap buffer of the event specified by group_fd.

PERF_FLAG_PID_CGROUP (since Linux 2.6.39)

This flag activates per-container system-wide monitoring. A

container is an abstraction that isolates a set of resources for

finer-grained control (CPUs, memory, etc.). In this mode, the

event is measured only if the thread running on the monitored

CPU belongs to the designated container (cgroup). The cgroup is

identified by passing a file descriptor opened on its directory

in the cgroupfs filesystem. For instance, if the cgroup to mon‐

itor is called test, then a file descriptor opened on

/dev/cgroup/test (assuming cgroupfs is mounted on /dev/cgroup)

must be passed as the pid parameter. cgroup monitoring is

available only for system-wide events and may therefore require

extra permissions.

The perf_event_attr structure provides detailed configuration informa‐

tion for the event being created.

struct perf_event_attr {

__u32 type; /* Type of event */

__u32 size; /* Size of attribute structure */

__u64 config; /* Type-specific configuration */

union {

__u64 sample_period; /* Period of sampling */

__u64 sample_freq; /* Frequency of sampling */

};

__u64 sample_type; /* Specifies values included in sample */

__u64 read_format; /* Specifies values returned in read */

__u64 disabled : 1, /* off by default */

inherit : 1, /* children inherit it */

pinned : 1, /* must always be on PMU */

exclusive : 1, /* only group on PMU */

exclude_user : 1, /* don't count user */

exclude_kernel : 1, /* don't count kernel */

exclude_hv : 1, /* don't count hypervisor */

exclude_idle : 1, /* don't count when idle */

mmap : 1, /* include mmap data */

comm : 1, /* include comm data */

freq : 1, /* use freq, not period */

inherit_stat : 1, /* per task counts */

enable_on_exec : 1, /* next exec enables */

task : 1, /* trace fork/exit */

watermark : 1, /* wakeup_watermark */

precise_ip : 2, /* skid constraint */

mmap_data : 1, /* non-exec mmap data */

sample_id_all : 1, /* sample_type all events */

exclude_host : 1, /* don't count in host */

exclude_guest : 1, /* don't count in guest */

exclude_callchain_kernel : 1,

/* exclude kernel callchains */

exclude_callchain_user : 1,

/* exclude user callchains */

mmap2 : 1, /* include mmap with inode data */

comm_exec : 1, /* flag comm events that are

due to exec */

use_clockid : 1, /* use clockid for time fields */

context_switch : 1, /* context switch data */

write_backward : 1, /* Write ring buffer from end

to beginning */

namespaces : 1, /* include namespaces data */

ksymbol : 1, /* include ksymbol events */

bpf_event : 1, /* include bpf events */

aux_output : 1, /* generate AUX records

instead of events */

cgroup : 1, /* include cgroup events */

text_poke : 1, /* include text poke events */

build_id : 1, /* use build id in mmap2 events */

inherit_thread : 1, /* children only inherit */

/* if cloned with CLONE_THREAD */

remove_on_exec : 1, /* event is removed from task

on exec */

sigtrap : 1, /* send synchronous SIGTRAP

on event */

__reserved_1 : 26;

union {

__u32 wakeup_events; /* wakeup every n events */

__u32 wakeup_watermark; /* bytes before wakeup */

};

__u32 bp_type; /* breakpoint type */

union {

__u64 bp_addr; /* breakpoint address */

__u64 kprobe_func; /* for perf_kprobe */

__u64 uprobe_path; /* for perf_uprobe */

__u64 config1; /* extension of config */

};

union {

__u64 bp_len; /* breakpoint length */

__u64 kprobe_addr; /* with kprobe_func == NULL */

__u64 probe_offset; /* for perf_[k,u]probe */

__u64 config2; /* extension of config1 */

};

__u64 branch_sample_type; /* enum perf_branch_sample_type */

__u64 sample_regs_user; /* user regs to dump on samples */

__u32 sample_stack_user; /* size of stack to dump on

samples */

__s32 clockid; /* clock to use for time fields */

__u64 sample_regs_intr; /* regs to dump on samples */

__u32 aux_watermark; /* aux bytes before wakeup */

__u16 sample_max_stack; /* max frames in callchain */

__u16 __reserved_2; /* align to u64 */

__u32 aux_sample_size; /* max aux sample size */

__u32 __reserved_3; /* align to u64 */

__u64 sig_data; /* user data for sigtrap */

};

The fields of the perf_event_attr structure are described in more de‐

tail below:

type This field specifies the overall event type. It has one of the

following values:

PERF_TYPE_HARDWARE

This indicates one of the "generalized" hardware events

provided by the kernel. See the config field definition

for more details.

PERF_TYPE_SOFTWARE

This indicates one of the software-defined events pro‐

vided by the kernel (even if no hardware support is

available).

PERF_TYPE_TRACEPOINT

This indicates a tracepoint provided by the kernel trace‐

point infrastructure.

PERF_TYPE_HW_CACHE

This indicates a hardware cache event. This has a spe‐

cial encoding, described in the config field definition.

PERF_TYPE_RAW

This indicates a "raw" implementation-specific event in

the config field.

PERF_TYPE_BREAKPOINT (since Linux 2.6.33)

This indicates a hardware breakpoint as provided by the

CPU. Breakpoints can be read/write accesses to an ad‐

dress as well as execution of an instruction address.

dynamic PMU

Since Linux 2.6.38, perf_event_open() can support multi‐

ple PMUs. To enable this, a value exported by the kernel

can be used in the type field to indicate which PMU to

use. The value to use can be found in the sysfs filesys‐

tem: there is a subdirectory per PMU instance under

/sys/bus/event_source/devices. In each subdirectory

there is a type file whose content is an integer that can

be used in the type field. For instance,

/sys/bus/event_source/devices/cpu/type contains the value

for the core CPU PMU, which is usually 4.

kprobe and uprobe (since Linux 4.17)

These two dynamic PMUs create a kprobe/uprobe and attach

it to the file descriptor generated by perf_event_open.

The kprobe/uprobe will be destroyed on the destruction of

the file descriptor. See fields kprobe_func, up‐

robe_path, kprobe_addr, and probe_offset for more de‐

tails.

size The size of the perf_event_attr structure for forward/backward

compatibility. Set this using sizeof(struct perf_event_attr) to

allow the kernel to see the struct size at the time of compila‐

tion.

The related define PERF_ATTR_SIZE_VER0 is set to 64; this was

the size of the first published struct. PERF_ATTR_SIZE_VER1 is

72, corresponding to the addition of breakpoints in Linux

2.6.33. PERF_ATTR_SIZE_VER2 is 80 corresponding to the addition

of branch sampling in Linux 3.4. PERF_ATTR_SIZE_VER3 is 96 cor‐

responding to the addition of sample_regs_user and sam‐

ple_stack_user in Linux 3.7. PERF_ATTR_SIZE_VER4 is 104 corre‐

sponding to the addition of sample_regs_intr in Linux 3.19.

PERF_ATTR_SIZE_VER5 is 112 corresponding to the addition of

aux_watermark in Linux 4.1.

config This specifies which event you want, in conjunction with the

type field. The config1 and config2 fields are also taken into

account in cases where 64 bits is not enough to fully specify

the event. The encoding of these fields are event dependent.

There are various ways to set the config field that are depen‐

dent on the value of the previously described type field. What

follows are various possible settings for config separated out

by type.

If type is PERF_TYPE_HARDWARE, we are measuring one of the gen‐

eralized hardware CPU events. Not all of these are available on

all platforms. Set config to one of the following:

PERF_COUNT_HW_CPU_CYCLES

Total cycles. Be wary of what happens during CPU

frequency scaling.

PERF_COUNT_HW_INSTRUCTIONS

Retired instructions. Be careful, these can be af‐

fected by various issues, most notably hardware in‐

terrupt counts.

PERF_COUNT_HW_CACHE_REFERENCES

Cache accesses. Usually this indicates Last Level

Cache accesses but this may vary depending on your

CPU. This may include prefetches and coherency mes‐

sages; again this depends on the design of your CPU.

PERF_COUNT_HW_CACHE_MISSES

Cache misses. Usually this indicates Last Level

Cache misses; this is intended to be used in con‐

junction with the PERF_COUNT_HW_CACHE_REFERENCES

event to calculate cache miss rates.

PERF_COUNT_HW_BRANCH_INSTRUCTIONS

Retired branch instructions. Prior to Linux 2.6.35,

this used the wrong event on AMD processors.

PERF_COUNT_HW_BRANCH_MISSES

Mispredicted branch instructions.

PERF_COUNT_HW_BUS_CYCLES

Bus cycles, which can be different from total cy‐

cles.

PERF_COUNT_HW_STALLED_CYCLES_FRONTEND (since Linux 3.0)

Stalled cycles during issue.

PERF_COUNT_HW_STALLED_CYCLES_BACKEND (since Linux 3.0)

Stalled cycles during retirement.

PERF_COUNT_HW_REF_CPU_CYCLES (since Linux 3.3)

Total cycles; not affected by CPU frequency scaling.

If type is PERF_TYPE_SOFTWARE, we are measuring software events

provided by the kernel. Set config to one of the following:

PERF_COUNT_SW_CPU_CLOCK

This reports the CPU clock, a high-resolution per-

CPU timer.

PERF_COUNT_SW_TASK_CLOCK

This reports a clock count specific to the task that

is running.

PERF_COUNT_SW_PAGE_FAULTS

This reports the number of page faults.

PERF_COUNT_SW_CONTEXT_SWITCHES

This counts context switches. Until Linux 2.6.34,

these were all reported as user-space events, after

that they are reported as happening in the kernel.

PERF_COUNT_SW_CPU_MIGRATIONS

This reports the number of times the process has mi‐

grated to a new CPU.

PERF_COUNT_SW_PAGE_FAULTS_MIN

This counts the number of minor page faults. These

did not require disk I/O to handle.

PERF_COUNT_SW_PAGE_FAULTS_MAJ

This counts the number of major page faults. These

required disk I/O to handle.

PERF_COUNT_SW_ALIGNMENT_FAULTS (since Linux 2.6.33)

This counts the number of alignment faults. These

happen when unaligned memory accesses happen; the

kernel can handle these but it reduces performance.

This happens only on some architectures (never on

x86).

PERF_COUNT_SW_EMULATION_FAULTS (since Linux 2.6.33)

This counts the number of emulation faults. The

kernel sometimes traps on unimplemented instructions

and emulates them for user space. This can nega‐

tively impact performance.

PERF_COUNT_SW_DUMMY (since Linux 3.12)

This is a placeholder event that counts nothing.

Informational sample record types such as mmap or

comm must be associated with an active event. This

dummy event allows gathering such records without

requiring a counting event.

PERF_COUNT_SW_BPF_OUTPUT (since Linux 4.4)

This is used to generate raw sample data from BPF.

BPF programs can write to this event using

bpf_perf_event_output helper.

PERF_COUNT_SW_CGROUP_SWITCHES (since Linux 5.13)

This counts context switches to a task in a differ‐

ent cgroup. In other words, if the next task is in

the same cgroup, it won't count the switch.

If type is PERF_TYPE_TRACEPOINT, then we are measuring kernel

tracepoints. The value to use in config can be obtained from

under debugfs tracing/events/*/*/id if ftrace is enabled in the

kernel.

If type is PERF_TYPE_HW_CACHE, then we are measuring a hardware

CPU cache event. To calculate the appropriate config value, use

the following equation:

config = (perf_hw_cache_id) |

(perf_hw_cache_op_id << 8) |

(perf_hw_cache_op_result_id << 16);

where perf_hw_cache_id is one of:

PERF_COUNT_HW_CACHE_L1D

for measuring Level 1 Data Cache

PERF_COUNT_HW_CACHE_L1I

for measuring Level 1 Instruction Cache

PERF_COUNT_HW_CACHE_LL

for measuring Last-Level Cache

PERF_COUNT_HW_CACHE_DTLB

for measuring the Data TLB

PERF_COUNT_HW_CACHE_ITLB

for measuring the Instruction TLB

PERF_COUNT_HW_CACHE_BPU

for measuring the branch prediction unit

PERF_COUNT_HW_CACHE_NODE (since Linux 3.1)

for measuring local memory accesses

and perf_hw_cache_op_id is one of:

PERF_COUNT_HW_CACHE_OP_READ

for read accesses

PERF_COUNT_HW_CACHE_OP_WRITE

for write accesses

PERF_COUNT_HW_CACHE_OP_PREFETCH

for prefetch accesses

and perf_hw_cache_op_result_id is one of:

PERF_COUNT_HW_CACHE_RESULT_ACCESS

to measure accesses

PERF_COUNT_HW_CACHE_RESULT_MISS

to measure misses

If type is PERF_TYPE_RAW, then a custom "raw" config value is

needed. Most CPUs support events that are not covered by the

"generalized" events. These are implementation defined; see

your CPU manual (for example the Intel Volume 3B documentation

or the AMD BIOS and Kernel Developer Guide). The libpfm4 li‐

brary can be used to translate from the name in the architec‐

tural manuals to the raw hex value perf_event_open() expects in

this field.

If type is PERF_TYPE_BREAKPOINT, then leave config set to zero.

Its parameters are set in other places.

If type is kprobe or uprobe, set retprobe (bit 0 of config, see

/sys/bus/event_source/devices/[k,u]probe/format/retprobe) for

kretprobe/uretprobe. See fields kprobe_func, uprobe_path,

kprobe_addr, and probe_offset for more details.

kprobe_func, uprobe_path, kprobe_addr, and probe_offset

These fields describe the kprobe/uprobe for dynamic PMUs kprobe

and uprobe. For kprobe: use kprobe_func and probe_offset, or

use kprobe_addr and leave kprobe_func as NULL. For uprobe: use

uprobe_path and probe_offset.

sample_period, sample_freq

A "sampling" event is one that generates an overflow notifica‐

tion every N events, where N is given by sample_period. A sam‐

pling event has sample_period > 0. When an overflow occurs, re‐

quested data is recorded in the mmap buffer. The sample_type

field controls what data is recorded on each overflow.

sample_freq can be used if you wish to use frequency rather than

period. In this case, you set the freq flag. The kernel will

adjust the sampling period to try and achieve the desired rate.

The rate of adjustment is a timer tick.

sample_type

The various bits in this field specify which values to include

in the sample. They will be recorded in a ring-buffer, which is

available to user space using mmap(2). The order in which the

values are saved in the sample are documented in the MMAP Layout

subsection below; it is not the enum perf_event_sample_format

order.

PERF_SAMPLE_IP

Records instruction pointer.

PERF_SAMPLE_TID

Records the process and thread IDs.

PERF_SAMPLE_TIME

Records a timestamp.

PERF_SAMPLE_ADDR

Records an address, if applicable.

PERF_SAMPLE_READ

Record counter values for all events in a group, not just

the group leader.

PERF_SAMPLE_CALLCHAIN

Records the callchain (stack backtrace).

PERF_SAMPLE_ID

Records a unique ID for the opened event's group leader.

PERF_SAMPLE_CPU

Records CPU number.

PERF_SAMPLE_PERIOD

Records the current sampling period.

PERF_SAMPLE_STREAM_ID

Records a unique ID for the opened event. Unlike

PERF_SAMPLE_ID the actual ID is returned, not the group

leader. This ID is the same as the one returned by

PERF_FORMAT_ID.

PERF_SAMPLE_RAW

Records additional data, if applicable. Usually returned

by tracepoint events.

PERF_SAMPLE_BRANCH_STACK (since Linux 3.4)

This provides a record of recent branches, as provided by

CPU branch sampling hardware (such as Intel Last Branch

Record). Not all hardware supports this feature.

See the branch_sample_type field for how to filter which

branches are reported.

PERF_SAMPLE_REGS_USER (since Linux 3.7)

Records the current user-level CPU register state (the

values in the process before the kernel was called).

PERF_SAMPLE_STACK_USER (since Linux 3.7)

Records the user level stack, allowing stack unwinding.

PERF_SAMPLE_WEIGHT (since Linux 3.10)

Records a hardware provided weight value that expresses

how costly the sampled event was. This allows the hard‐

ware to highlight expensive events in a profile.

PERF_SAMPLE_DATA_SRC (since Linux 3.10)

Records the data source: where in the memory hierarchy

the data associated with the sampled instruction came

from. This is available only if the underlying hardware

supports this feature.

PERF_SAMPLE_IDENTIFIER (since Linux 3.12)

Places the SAMPLE_ID value in a fixed position in the

record, either at the beginning (for sample events) or at

the end (if a non-sample event).

This was necessary because a sample stream may have

records from various different event sources with differ‐

ent sample_type settings. Parsing the event stream prop‐

erly was not possible because the format of the record

was needed to find SAMPLE_ID, but the format could not be

found without knowing what event the sample belonged to

(causing a circular dependency).

The PERF_SAMPLE_IDENTIFIER setting makes the event stream

always parsable by putting SAMPLE_ID in a fixed location,

even though it means having duplicate SAMPLE_ID values in

records.

PERF_SAMPLE_TRANSACTION (since Linux 3.13)

Records reasons for transactional memory abort events

(for example, from Intel TSX transactional memory sup‐

port).

The precise_ip setting must be greater than 0 and a

transactional memory abort event must be measured or no

values will be recorded. Also note that some perf_event

measurements, such as sampled cycle counting, may cause

extraneous aborts (by causing an interrupt during a

transaction).

PERF_SAMPLE_REGS_INTR (since Linux 3.19)

Records a subset of the current CPU register state as

specified by sample_regs_intr. Unlike PERF_SAM‐

PLE_REGS_USER the register values will return kernel reg‐

ister state if the overflow happened while kernel code is

running. If the CPU supports hardware sampling of regis‐

ter state (i.e., PEBS on Intel x86) and precise_ip is set

higher than zero then the register values returned are

those captured by hardware at the time of the sampled in‐

struction's retirement.

PERF_SAMPLE_PHYS_ADDR (since Linux 4.13)

Records physical address of data like in PERF_SAM‐

PLE_ADDR.

PERF_SAMPLE_CGROUP (since Linux 5.7)

Records (perf_event) cgroup ID of the process. This cor‐

responds to the id field in the PERF_RECORD_CGROUP event.

PERF_SAMPLE_DATA_PAGE_SIZE (since Linux 5.11)

Records page size of data like in PERF_SAMPLE_ADDR.

PERF_SAMPLE_CODE_PAGE_SIZE (since Linux 5.11)

Records page size of ip like in PERF_SAMPLE_IP.

PERF_SAMPLE_WEIGHT_STRUCT (since Linux 5.12)

Records hardware provided weight values like in PERF_SAM‐

PLE_WEIGHT, but it can represent multiple values in a

struct. This shares the same space as PERF_SAM‐

PLE_WEIGHT, so users can apply either of those, not both.

It has the following format and the meaning of each field

is dependent on the hardware implementation.

union perf_sample_weight {

u64 full; /* PERF_SAMPLE_WEIGHT */

struct { /* PERF_SAMPLE_WEIGHT_STRUCT */

u32 var1_dw;

u16 var2_w;

u16 var3_w;

};

};

read_format

This field specifies the format of the data returned by read(2)

on a perf_event_open() file descriptor.

PERF_FORMAT_TOTAL_TIME_ENABLED

Adds the 64-bit time_enabled field. This can be used to

calculate estimated totals if the PMU is overcommitted

and multiplexing is happening.

PERF_FORMAT_TOTAL_TIME_RUNNING

Adds the 64-bit time_running field. This can be used to

calculate estimated totals if the PMU is overcommitted

and multiplexing is happening.

PERF_FORMAT_ID

Adds a 64-bit unique value that corresponds to the event

group.

PERF_FORMAT_GROUP

Allows all counter values in an event group to be read

with one read.

PERF_FORMAT_LOST (since Linux 6.0)

Adds a 64-bit value that is the number of lost samples

for this event. This would be only meaningful when sam‐

ple_period or sample_freq is set.

disabled

The disabled bit specifies whether the counter starts out dis‐

abled or enabled. If disabled, the event can later be enabled

by ioctl(2), prctl(2), or enable_on_exec.

When creating an event group, typically the group leader is ini‐

tialized with disabled set to 1 and any child events are ini‐

tialized with disabled set to 0. Despite disabled being 0, the

child events will not start until the group leader is enabled.

inherit

The inherit bit specifies that this counter should count events

of child tasks as well as the task specified. This applies only

to new children, not to any existing children at the time the

counter is created (nor to any new children of existing chil‐

dren).

Inherit does not work for some combinations of read_format val‐

ues, such as PERF_FORMAT_GROUP.

pinned The pinned bit specifies that the counter should always be on

the CPU if at all possible. It applies only to hardware coun‐

ters and only to group leaders. If a pinned counter cannot be

put onto the CPU (e.g., because there are not enough hardware

counters or because of a conflict with some other event), then

the counter goes into an 'error' state, where reads return end-

of-file (i.e., read(2) returns 0) until the counter is subse‐

quently enabled or disabled.

exclusive

The exclusive bit specifies that when this counter's group is on

the CPU, it should be the only group using the CPU's counters.

In the future this may allow monitoring programs to support PMU

features that need to run alone so that they do not disrupt

other hardware counters.

Note that many unexpected situations may prevent events with the

exclusive bit set from ever running. This includes any users

running a system-wide measurement as well as any kernel use of

the performance counters (including the commonly enabled NMI

Watchdog Timer interface).

exclude_user

If this bit is set, the count excludes events that happen in

user space.

exclude_kernel

If this bit is set, the count excludes events that happen in

kernel space.

exclude_hv

If this bit is set, the count excludes events that happen in the

hypervisor. This is mainly for PMUs that have built-in support

for handling this (such as POWER). Extra support is needed for

handling hypervisor measurements on most machines.

exclude_idle

If set, don't count when the CPU is running the idle task.

While you can currently enable this for any event type, it is

ignored for all but software events.

mmap The mmap bit enables generation of PERF_RECORD_MMAP samples for

every mmap(2) call that has PROT_EXEC set. This allows tools to

notice new executable code being mapped into a program (dynamic

shared libraries for example) so that addresses can be mapped

back to the original code.

comm The comm bit enables tracking of process command name as modi‐

fied by the execve(2) and prctl(PR_SET_NAME) system calls as

well as writing to /proc/self/comm. If the comm_exec flag is

also successfully set (possible since Linux 3.16), then the misc

flag PERF_RECORD_MISC_COMM_EXEC can be used to differentiate the

execve(2) case from the others.

freq If this bit is set, then sample_frequency not sample_period is

used when setting up the sampling interval.

inherit_stat

This bit enables saving of event counts on context switch for

inherited tasks. This is meaningful only if the inherit field

is set.

enable_on_exec

If this bit is set, a counter is automatically enabled after a

call to execve(2).

task If this bit is set, then fork/exit notifications are included in

the ring buffer.

watermark

If set, have an overflow notification happen when we cross the

wakeup_watermark boundary. Otherwise, overflow notifications

happen after wakeup_events samples.

precise_ip (since Linux 2.6.35)

This controls the amount of skid. Skid is how many instructions

execute between an event of interest happening and the kernel

being able to stop and record the event. Smaller skid is better

and allows more accurate reporting of which events correspond to

which instructions, but hardware is often limited with how small

this can be.

The possible values of this field are the following:

0 SAMPLE_IP can have arbitrary skid.

1 SAMPLE_IP must have constant skid.

2 SAMPLE_IP requested to have 0 skid.

3 SAMPLE_IP must have 0 skid. See also the description of

PERF_RECORD_MISC_EXACT_IP.

mmap_data (since Linux 2.6.36)

This is the counterpart of the mmap field. This enables genera‐

tion of PERF_RECORD_MMAP samples for mmap(2) calls that do not

have PROT_EXEC set (for example data and SysV shared memory).

sample_id_all (since Linux 2.6.38)

If set, then TID, TIME, ID, STREAM_ID, and CPU can additionally

be included in non-PERF_RECORD_SAMPLEs if the corresponding sam‐

ple_type is selected.

If PERF_SAMPLE_IDENTIFIER is specified, then an additional ID

value is included as the last value to ease parsing the record

stream. This may lead to the id value appearing twice.

The layout is described by this pseudo-structure:

struct sample_id {

{ u32 pid, tid; } /* if PERF_SAMPLE_TID set */

{ u64 time; } /* if PERF_SAMPLE_TIME set */

{ u64 id; } /* if PERF_SAMPLE_ID set */

{ u64 stream_id;} /* if PERF_SAMPLE_STREAM_ID set */

{ u32 cpu, res; } /* if PERF_SAMPLE_CPU set */

{ u64 id; } /* if PERF_SAMPLE_IDENTIFIER set */

};

exclude_host (since Linux 3.2)

When conducting measurements that include processes running VM

instances (i.e., have executed a KVM_RUN ioctl(2)), only measure

events happening inside a guest instance. This is only meaning‐

ful outside the guests; this setting does not change counts

gathered inside of a guest. Currently, this functionality is

x86 only.

exclude_guest (since Linux 3.2)

When conducting measurements that include processes running VM

instances (i.e., have executed a KVM_RUN ioctl(2)), do not mea‐

sure events happening inside guest instances. This is only

meaningful outside the guests; this setting does not change

counts gathered inside of a guest. Currently, this functional‐

ity is x86 only.

exclude_callchain_kernel (since Linux 3.7)

Do not include kernel callchains.

exclude_callchain_user (since Linux 3.7)

Do not include user callchains.

mmap2 (since Linux 3.16)

Generate an extended executable mmap record that contains enough

additional information to uniquely identify shared mappings.

The mmap flag must also be set for this to work.

comm_exec (since Linux 3.16)

This is purely a feature-detection flag, it does not change ker‐

nel behavior. If this flag can successfully be set, then, when

comm is enabled, the PERF_RECORD_MISC_COMM_EXEC flag will be set

in the misc field of a comm record header if the rename event

being reported was caused by a call to execve(2). This allows

tools to distinguish between the various types of process renam‐

ing.

use_clockid (since Linux 4.1)

This allows selecting which internal Linux clock to use when

generating timestamps via the clockid field. This can make it

easier to correlate perf sample times with timestamps generated

by other tools.

context_switch (since Linux 4.3)

This enables the generation of PERF_RECORD_SWITCH records when a

context switch occurs. It also enables the generation of

PERF_RECORD_SWITCH_CPU_WIDE records when sampling in CPU-wide

mode. This functionality is in addition to existing tracepoint

and software events for measuring context switches. The advan‐

tage of this method is that it will give full information even

with strict perf_event_paranoid settings.

write_backward (since Linux 4.6)

This causes the ring buffer to be written from the end to the

beginning. This is to support reading from overwritable ring

buffer.

namespaces (since Linux 4.11)

This enables the generation of PERF_RECORD_NAMESPACES records

when a task enters a new namespace. Each namespace has a combi‐

nation of device and inode numbers.

ksymbol (since Linux 5.0)

This enables the generation of PERF_RECORD_KSYMBOL records when

new kernel symbols are registered or unregistered. This is ana‐

lyzing dynamic kernel functions like eBPF.

bpf_event (since Linux 5.0)

This enables the generation of PERF_RECORD_BPF_EVENT records

when an eBPF program is loaded or unloaded.

aux_output (since Linux 5.4)

This allows normal (non-AUX) events to generate data for AUX

events if the hardware supports it.

cgroup (since Linux 5.7)

This enables the generation of PERF_RECORD_CGROUP records when a

new cgroup is created (and activated).

text_poke (since Linux 5.8)

This enables the generation of PERF_RECORD_TEXT_POKE records

when there's a change to the kernel text (i.e., self-modifying

code).

build_id (since Linux 5.12)

This changes the contents in the PERF_RECORD_MMAP2 to have a

build-id instead of device and inode numbers.

inherit_thread (since Linux 5.13)

This disables the inheritance of the event to a child process.

Only new threads in the same process (which is cloned with

CLONE_THREAD) will inherit the event.

remove_on_exec (since Linux 5.13)

This closes the event when it starts a new process image by ex‐

ecve(2).

sigtrap (since Linux 5.13)

This enables synchronous signal delivery of SIGTRAP on event

overflow.

wakeup_events, wakeup_watermark

This union sets how many samples (wakeup_events) or bytes

(wakeup_watermark) happen before an overflow notification hap‐

pens. Which one is used is selected by the watermark bit flag.

wakeup_events counts only PERF_RECORD_SAMPLE record types. To

receive overflow notification for all PERF_RECORD types choose

watermark and set wakeup_watermark to 1.

Prior to Linux 3.0, setting wakeup_events to 0 resulted in no

overflow notifications; more recent kernels treat 0 the same as

1.

bp_type (since Linux 2.6.33)

This chooses the breakpoint type. It is one of:

HW_BREAKPOINT_EMPTY

No breakpoint.

HW_BREAKPOINT_R

Count when we read the memory location.

HW_BREAKPOINT_W

Count when we write the memory location.

HW_BREAKPOINT_RW

Count when we read or write the memory location.

HW_BREAKPOINT_X

Count when we execute code at the memory location.

The values can be combined via a bitwise or, but the combination

of HW_BREAKPOINT_R or HW_BREAKPOINT_W with HW_BREAKPOINT_X is

not allowed.

bp_addr (since Linux 2.6.33)

This is the address of the breakpoint. For execution break‐

points, this is the memory address of the instruction of inter‐

est; for read and write breakpoints, it is the memory address of

the memory location of interest.

config1 (since Linux 2.6.39)

config1 is used for setting events that need an extra register

or otherwise do not fit in the regular config field. Raw OFF‐

CORE_EVENTS on Nehalem/Westmere/SandyBridge use this field on

Linux 3.3 and later kernels.

bp_len (since Linux 2.6.33)

bp_len is the length of the breakpoint being measured if type is

PERF_TYPE_BREAKPOINT. Options are HW_BREAKPOINT_LEN_1,

HW_BREAKPOINT_LEN_2, HW_BREAKPOINT_LEN_4, and HW_BREAK‐

POINT_LEN_8. For an execution breakpoint, set this to

sizeof(long).

config2 (since Linux 2.6.39)

config2 is a further extension of the config1 field.

branch_sample_type (since Linux 3.4)

If PERF_SAMPLE_BRANCH_STACK is enabled, then this specifies what

branches to include in the branch record.

The first part of the value is the privilege level, which is a

combination of one of the values listed below. If the user does

not set privilege level explicitly, the kernel will use the

event's privilege level. Event and branch privilege levels do

not have to match.

PERF_SAMPLE_BRANCH_USER

Branch target is in user space.

PERF_SAMPLE_BRANCH_KERNEL

Branch target is in kernel space.

PERF_SAMPLE_BRANCH_HV

Branch target is in hypervisor.

PERF_SAMPLE_BRANCH_PLM_ALL

A convenience value that is the three preceding values

ORed together.

In addition to the privilege value, at least one or more of the

following bits must be set.

PERF_SAMPLE_BRANCH_ANY

Any branch type.

PERF_SAMPLE_BRANCH_ANY_CALL

Any call branch (includes direct calls, indirect calls,

and far jumps).

PERF_SAMPLE_BRANCH_IND_CALL

Indirect calls.

PERF_SAMPLE_BRANCH_CALL (since Linux 4.4)

Direct calls.

PERF_SAMPLE_BRANCH_ANY_RETURN

Any return branch.

PERF_SAMPLE_BRANCH_IND_JUMP (since Linux 4.2)

Indirect jumps.

PERF_SAMPLE_BRANCH_COND (since Linux 3.16)

Conditional branches.

PERF_SAMPLE_BRANCH_ABORT_TX (since Linux 3.11)

Transactional memory aborts.

PERF_SAMPLE_BRANCH_IN_TX (since Linux 3.11)

Branch in transactional memory transaction.

PERF_SAMPLE_BRANCH_NO_TX (since Linux 3.11)

Branch not in transactional memory transaction.

PERF_SAMPLE_BRANCH_CALL_STACK (since Linux 4.1) Branch is

part of a hardware-generated call stack. This requires

hardware support, currently only found on Intel x86

Haswell or newer.

sample_regs_user (since Linux 3.7)

This bit mask defines the set of user CPU registers to dump on

samples. The layout of the register mask is architecture-spe‐

cific and is described in the kernel header file arch/ARCH/in‐

clude/uapi/asm/perf_regs.h.

sample_stack_user (since Linux 3.7)

This defines the size of the user stack to dump if PERF_SAM‐

PLE_STACK_USER is specified.

clockid (since Linux 4.1)

If use_clockid is set, then this field selects which internal

Linux timer to use for timestamps. The available timers are de‐

fined in linux/time.h, with CLOCK_MONOTONIC, CLOCK_MONO‐

TONIC_RAW, CLOCK_REALTIME, CLOCK_BOOTTIME, and CLOCK_TAI cur‐

rently supported.

aux_watermark (since Linux 4.1)

This specifies how much data is required to trigger a

PERF_RECORD_AUX sample.

sample_max_stack (since Linux 4.8)

When sample_type includes PERF_SAMPLE_CALLCHAIN, this field

specifies how many stack frames to report when generating the

callchain.

aux_sample_size (since Linux 5.5)

When PERF_SAMPLE_AUX flag is set, specify the desired size of

AUX data. Note that it can get smaller data than the specified

size.

sig_data (since Linux 5.13)

This data will be copied to user's signal handler (through

si_perf in the siginfo_t) to disambiguate which event triggered

the signal.

Reading results

Once a perf_event_open() file descriptor has been opened, the values of

the events can be read from the file descriptor. The values that are

there are specified by the read_format field in the attr structure at

open time.

If you attempt to read into a buffer that is not big enough to hold the

data, the error ENOSPC results.

Here is the layout of the data returned by a read:

• If PERF_FORMAT_GROUP was specified to allow reading all events in a

group at once:

struct read_format {

u64 nr; /* The number of events */

u64 time_enabled; /* if PERF_FORMAT_TOTAL_TIME_ENABLED */

u64 time_running; /* if PERF_FORMAT_TOTAL_TIME_RUNNING */

struct {

u64 value; /* The value of the event */

u64 id; /* if PERF_FORMAT_ID */

u64 lost; /* if PERF_FORMAT_LOST */

} values[nr];

};

• If PERF_FORMAT_GROUP was not specified:

struct read_format {

u64 value; /* The value of the event */

u64 time_enabled; /* if PERF_FORMAT_TOTAL_TIME_ENABLED */

u64 time_running; /* if PERF_FORMAT_TOTAL_TIME_RUNNING */

u64 id; /* if PERF_FORMAT_ID */

u64 lost; /* if PERF_FORMAT_LOST */

};

The values read are as follows:

nr The number of events in this file descriptor. Available only if

PERF_FORMAT_GROUP was specified.

time_enabled, time_running

Total time the event was enabled and running. Normally these

values are the same. Multiplexing happens if the number of

events is more than the number of available PMU counter slots.

In that case the events run only part of the time and the

time_enabled and time running values can be used to scale an es‐

timated value for the count.

value An unsigned 64-bit value containing the counter result.

id A globally unique value for this particular event; only present

if PERF_FORMAT_ID was specified in read_format.

lost The number of lost samples of this event; only present if

PERF_FORMAT_LOST was specified in read_format.

MMAP layout

When using perf_event_open() in sampled mode, asynchronous events (like

counter overflow or PROT_EXEC mmap tracking) are logged into a ring-

buffer. This ring-buffer is created and accessed through mmap(2).

The mmap size should be 1+2^n pages, where the first page is a metadata

page (struct perf_event_mmap_page) that contains various bits of infor‐

mation such as where the ring-buffer head is.

Before Linux 2.6.39, there is a bug that means you must allocate an

mmap ring buffer when sampling even if you do not plan to access it.

The structure of the first metadata mmap page is as follows:

struct perf_event_mmap_page {

__u32 version; /* version number of this structure */

__u32 compat_version; /* lowest version this is compat with */

__u32 lock; /* seqlock for synchronization */

__u32 index; /* hardware counter identifier */

__s64 offset; /* add to hardware counter value */

__u64 time_enabled; /* time event active */

__u64 time_running; /* time event on CPU */

union {

__u64 capabilities;

struct {

__u64 cap_usr_time / cap_usr_rdpmc / cap_bit0 : 1,

cap_bit0_is_deprecated : 1,

cap_user_rdpmc : 1,

cap_user_time : 1,

cap_user_time_zero : 1,

};

};

__u16 pmc_width;

__u16 time_shift;

__u32 time_mult;

__u64 time_offset;

__u64 __reserved[120]; /* Pad to 1 k */

__u64 data_head; /* head in the data section */

__u64 data_tail; /* user-space written tail */

__u64 data_offset; /* where the buffer starts */

__u64 data_size; /* data buffer size */

__u64 aux_head;

__u64 aux_tail;

__u64 aux_offset;

__u64 aux_size;

}

The following list describes the fields in the perf_event_mmap_page

structure in more detail:

version

Version number of this structure.

compat_version

The lowest version this is compatible with.

lock A seqlock for synchronization.

index A unique hardware counter identifier.

offset When using rdpmc for reads this offset value must be added to

the one returned by rdpmc to get the current total event count.

time_enabled

Time the event was active.

time_running

Time the event was running.

cap_usr_time / cap_usr_rdpmc / cap_bit0 (since Linux 3.4)

There was a bug in the definition of cap_usr_time and

cap_usr_rdpmc from Linux 3.4 until Linux 3.11. Both bits were

defined to point to the same location, so it was impossible to

know if cap_usr_time or cap_usr_rdpmc were actually set.

Starting with Linux 3.12, these are renamed to cap_bit0 and you

should use the cap_user_time and cap_user_rdpmc fields instead.

cap_bit0_is_deprecated (since Linux 3.12)

If set, this bit indicates that the kernel supports the properly

separated cap_user_time and cap_user_rdpmc bits.

If not-set, it indicates an older kernel where cap_usr_time and

cap_usr_rdpmc map to the same bit and thus both features should

be used with caution.

cap_user_rdpmc (since Linux 3.12)

If the hardware supports user-space read of performance counters

without syscall (this is the "rdpmc" instruction on x86), then

the following code can be used to do a read:

u32 seq, time_mult, time_shift, idx, width;

u64 count, enabled, running;

u64 cyc, time_offset;

do {

seq = pc->lock;

barrier();

enabled = pc->time_enabled;

running = pc->time_running;

if (pc->cap_usr_time && enabled != running) {

cyc = rdtsc();

time_offset = pc->time_offset;

time_mult = pc->time_mult;

time_shift = pc->time_shift;

}

idx = pc->index;

count = pc->offset;

if (pc->cap_usr_rdpmc && idx) {

width = pc->pmc_width;

count += rdpmc(idx - 1);

}

barrier();

} while (pc->lock != seq);

cap_user_time (since Linux 3.12)

This bit indicates the hardware has a constant, nonstop time‐

stamp counter (TSC on x86).

cap_user_time_zero (since Linux 3.12)

Indicates the presence of time_zero which allows mapping time‐

stamp values to the hardware clock.

pmc_width

If cap_usr_rdpmc, this field provides the bit-width of the value

read using the rdpmc or equivalent instruction. This can be

used to sign extend the result like:

pmc <<= 64 - pmc_width;

pmc >>= 64 - pmc_width; // signed shift right

count += pmc;

time_shift, time_mult, time_offset

If cap_usr_time, these fields can be used to compute the time

delta since time_enabled (in nanoseconds) using rdtsc or simi‐

lar.

u64 quot, rem;

u64 delta;

quot = cyc >> time_shift;

rem = cyc & (((u64)1 << time_shift) - 1);

delta = time_offset + quot * time_mult +

((rem * time_mult) >> time_shift);

Where time_offset, time_mult, time_shift, and cyc are read in

the seqcount loop described above. This delta can then be added

to enabled and possible running (if idx), improving the scaling:

enabled += delta;

if (idx)

running += delta;

quot = count / running;

rem = count % running;

count = quot * enabled + (rem * enabled) / running;

time_zero (since Linux 3.12)

If cap_usr_time_zero is set, then the hardware clock (the TSC

timestamp counter on x86) can be calculated from the time_zero,

time_mult, and time_shift values:

time = timestamp - time_zero;

quot = time / time_mult;

rem = time % time_mult;

cyc = (quot << time_shift) + (rem << time_shift) / time_mult;

And vice versa:

quot = cyc >> time_shift;

rem = cyc & (((u64)1 << time_shift) - 1);

timestamp = time_zero + quot * time_mult +

((rem * time_mult) >> time_shift);

data_head

This points to the head of the data section. The value continu‐

ously increases, it does not wrap. The value needs to be manu‐

ally wrapped by the size of the mmap buffer before accessing the

samples.

On SMP-capable platforms, after reading the data_head value,

user space should issue an rmb().

data_tail

When the mapping is PROT_WRITE, the data_tail value should be

written by user space to reflect the last read data. In this

case, the kernel will not overwrite unread data.

data_offset (since Linux 4.1)

Contains the offset of the location in the mmap buffer where

perf sample data begins.

data_size (since Linux 4.1)

Contains the size of the perf sample region within the mmap buf‐

fer.

aux_head, aux_tail, aux_offset, aux_size (since Linux 4.1)

The AUX region allows mmap(2)-ing a separate sample buffer for

high-bandwidth data streams (separate from the main perf sample

buffer). An example of a high-bandwidth stream is instruction

tracing support, as is found in newer Intel processors.

To set up an AUX area, first aux_offset needs to be set with an

offset greater than data_offset+data_size and aux_size needs to

be set to the desired buffer size. The desired offset and size

must be page aligned, and the size must be a power of two.

These values are then passed to mmap in order to map the AUX

buffer. Pages in the AUX buffer are included as part of the

RLIMIT_MEMLOCK resource limit (see setrlimit(2)), and also as

part of the perf_event_mlock_kb allowance.

By default, the AUX buffer will be truncated if it will not fit

in the available space in the ring buffer. If the AUX buffer is

mapped as a read only buffer, then it will operate in ring buf‐

fer mode where old data will be overwritten by new. In over‐

write mode, it might not be possible to infer where the new data

began, and it is the consumer's job to disable measurement while

reading to avoid possible data races.

The aux_head and aux_tail ring buffer pointers have the same be‐

havior and ordering rules as the previous described data_head

and data_tail.

The following 2^n ring-buffer pages have the layout described below.

If perf_event_attr.sample_id_all is set, then all event types will have

the sample_type selected fields related to where/when (identity) an

event took place (TID, TIME, ID, CPU, STREAM_ID) described in

PERF_RECORD_SAMPLE below, it will be stashed just after the

perf_event_header and the fields already present for the existing

fields, that is, at the end of the payload. This allows a newer

perf.data file to be supported by older perf tools, with the new op‐

tional fields being ignored.

The mmap values start with a header:

struct perf_event_header {

__u32 type;

__u16 misc;

__u16 size;

};

Below, we describe the perf_event_header fields in more detail. For

ease of reading, the fields with shorter descriptions are presented

first.

size This indicates the size of the record.

misc The misc field contains additional information about the sample.

The CPU mode can be determined from this value by masking with

PERF_RECORD_MISC_CPUMODE_MASK and looking for one of the follow‐

ing (note these are not bit masks, only one can be set at a

time):

PERF_RECORD_MISC_CPUMODE_UNKNOWN

Unknown CPU mode.

PERF_RECORD_MISC_KERNEL

Sample happened in the kernel.

PERF_RECORD_MISC_USER

Sample happened in user code.

PERF_RECORD_MISC_HYPERVISOR

Sample happened in the hypervisor.

PERF_RECORD_MISC_GUEST_KERNEL (since Linux 2.6.35)

Sample happened in the guest kernel.

PERF_RECORD_MISC_GUEST_USER (since Linux 2.6.35)

Sample happened in guest user code.

Since the following three statuses are generated by different

record types, they alias to the same bit:

PERF_RECORD_MISC_MMAP_DATA (since Linux 3.10)

This is set when the mapping is not executable; otherwise

the mapping is executable.

PERF_RECORD_MISC_COMM_EXEC (since Linux 3.16)

This is set for a PERF_RECORD_COMM record on kernels more

recent than Linux 3.16 if a process name change was

caused by an execve(2) system call.

PERF_RECORD_MISC_SWITCH_OUT (since Linux 4.3)

When a PERF_RECORD_SWITCH or PERF_RECORD_SWITCH_CPU_WIDE

record is generated, this bit indicates that the context

switch is away from the current process (instead of into

the current process).

In addition, the following bits can be set:

PERF_RECORD_MISC_EXACT_IP

This indicates that the content of PERF_SAMPLE_IP points

to the actual instruction that triggered the event. See

also perf_event_attr.precise_ip.

PERF_RECORD_MISC_SWITCH_OUT_PREEMPT (since Linux 4.17)

When a PERF_RECORD_SWITCH or PERF_RECORD_SWITCH_CPU_WIDE

record is generated, this indicates the context switch

was a preemption.

PERF_RECORD_MISC_MMAP_BUILD_ID (since Linux 5.12)

This indicates that the content of PERF_SAMPLE_MMAP2 con‐

tains build-ID data instead of device major and minor

numbers as well as the inode number.

PERF_RECORD_MISC_EXT_RESERVED (since Linux 2.6.35)

This indicates there is extended data available (cur‐

rently not used).

PERF_RECORD_MISC_PROC_MAP_PARSE_TIMEOUT

This bit is not set by the kernel. It is reserved for

the user-space perf utility to indicate that

/proc/i[pid]/maps parsing was taking too long and was

stopped, and thus the mmap records may be truncated.

type The type value is one of the below. The values in the corre‐

sponding record (that follows the header) depend on the type se‐

lected as shown.

PERF_RECORD_MMAP

The MMAP events record the PROT_EXEC mappings so that we can

correlate user-space IPs to code. They have the following

structure:

struct {

struct perf_event_header header;

u32 pid, tid;

u64 addr;

u64 len;

u64 pgoff;

char filename[];

};

pid is the process ID.

tid is the thread ID.

addr is the address of the allocated memory. len is the

length of the allocated memory. pgoff is the page

offset of the allocated memory. filename is a string

describing the backing of the allocated memory.

PERF_RECORD_LOST

This record indicates when events are lost.

struct {

struct perf_event_header header;

u64 id;

u64 lost;

struct sample_id sample_id;

};

id is the unique event ID for the samples that were

lost.

lost is the number of events that were lost.

PERF_RECORD_COMM

This record indicates a change in the process name.

struct {

struct perf_event_header header;

u32 pid;

u32 tid;

char comm[];

struct sample_id sample_id;

};

pid is the process ID.

tid is the thread ID.

comm is a string containing the new name of the process.

PERF_RECORD_EXIT

This record indicates a process exit event.

struct {

struct perf_event_header header;

u32 pid, ppid;

u32 tid, ptid;

u64 time;

struct sample_id sample_id;

};

PERF_RECORD_THROTTLE, PERF_RECORD_UNTHROTTLE

This record indicates a throttle/unthrottle event.

struct {

struct perf_event_header header;

u64 time;

u64 id;

u64 stream_id;

struct sample_id sample_id;

};

PERF_RECORD_FORK

This record indicates a fork event.

struct {

struct perf_event_header header;

u32 pid, ppid;

u32 tid, ptid;

u64 time;

struct sample_id sample_id;

};

PERF_RECORD_READ

This record indicates a read event.

struct {

struct perf_event_header header;

u32 pid, tid;

struct read_format values;

struct sample_id sample_id;

};

PERF_RECORD_SAMPLE

This record indicates a sample.

struct {

struct perf_event_header header;

u64 sample_id; /* if PERF_SAMPLE_IDENTIFIER */

u64 ip; /* if PERF_SAMPLE_IP */

u32 pid, tid; /* if PERF_SAMPLE_TID */

u64 time; /* if PERF_SAMPLE_TIME */

u64 addr; /* if PERF_SAMPLE_ADDR */

u64 id; /* if PERF_SAMPLE_ID */

u64 stream_id; /* if PERF_SAMPLE_STREAM_ID */

u32 cpu, res; /* if PERF_SAMPLE_CPU */

u64 period; /* if PERF_SAMPLE_PERIOD */

struct read_format v;

/* if PERF_SAMPLE_READ */

u64 nr; /* if PERF_SAMPLE_CALLCHAIN */

u64 ips[nr]; /* if PERF_SAMPLE_CALLCHAIN */

u32 size; /* if PERF_SAMPLE_RAW */

char data[size]; /* if PERF_SAMPLE_RAW */

u64 bnr; /* if PERF_SAMPLE_BRANCH_STACK */

struct perf_branch_entry lbr[bnr];

/* if PERF_SAMPLE_BRANCH_STACK */

u64 abi; /* if PERF_SAMPLE_REGS_USER */

u64 regs[weight(mask)];

/* if PERF_SAMPLE_REGS_USER */

u64 size; /* if PERF_SAMPLE_STACK_USER */

char data[size]; /* if PERF_SAMPLE_STACK_USER */

u64 dyn_size; /* if PERF_SAMPLE_STACK_USER &&

size != 0 */

union perf_sample_weight weight;

/* if PERF_SAMPLE_WEIGHT */

/* || PERF_SAMPLE_WEIGHT_STRUCT */

u64 data_src; /* if PERF_SAMPLE_DATA_SRC */

u64 transaction; /* if PERF_SAMPLE_TRANSACTION */

u64 abi; /* if PERF_SAMPLE_REGS_INTR */

u64 regs[weight(mask)];

/* if PERF_SAMPLE_REGS_INTR */

u64 phys_addr; /* if PERF_SAMPLE_PHYS_ADDR */

u64 cgroup; /* if PERF_SAMPLE_CGROUP */

u64 data_page_size;

/* if PERF_SAMPLE_DATA_PAGE_SIZE */

u64 code_page_size;

/* if PERF_SAMPLE_CODE_PAGE_SIZE */

u64 size; /* if PERF_SAMPLE_AUX */

char data[size]; /* if PERF_SAMPLE_AUX */

};

sample_id

If PERF_SAMPLE_IDENTIFIER is enabled, a 64-bit unique ID

is included. This is a duplication of the PERF_SAM‐

PLE_ID id value, but included at the beginning of the

sample so parsers can easily obtain the value.

ip If PERF_SAMPLE_IP is enabled, then a 64-bit instruction

pointer value is included.

pid, tid

If PERF_SAMPLE_TID is enabled, then a 32-bit process ID

and 32-bit thread ID are included.

time

If PERF_SAMPLE_TIME is enabled, then a 64-bit timestamp

is included. This is obtained via local_clock() which

is a hardware timestamp if available and the jiffies

value if not.

addr

If PERF_SAMPLE_ADDR is enabled, then a 64-bit address is

included. This is usually the address of a tracepoint,

breakpoint, or software event; otherwise the value is 0.

id If PERF_SAMPLE_ID is enabled, a 64-bit unique ID is in‐

cluded. If the event is a member of an event group, the

group leader ID is returned. This ID is the same as the

one returned by PERF_FORMAT_ID.

stream_id

If PERF_SAMPLE_STREAM_ID is enabled, a 64-bit unique ID

is included. Unlike PERF_SAMPLE_ID the actual ID is re‐

turned, not the group leader. This ID is the same as

the one returned by PERF_FORMAT_ID.

cpu, res

If PERF_SAMPLE_CPU is enabled, this is a 32-bit value

indicating which CPU was being used, in addition to a

reserved (unused) 32-bit value.

period

If PERF_SAMPLE_PERIOD is enabled, a 64-bit value indi‐

cating the current sampling period is written.

v If PERF_SAMPLE_READ is enabled, a structure of type

read_format is included which has values for all events

in the event group. The values included depend on the

read_format value used at perf_event_open() time.

nr, ips[nr]

If PERF_SAMPLE_CALLCHAIN is enabled, then a 64-bit num‐

ber is included which indicates how many following

64-bit instruction pointers will follow. This is the

current callchain.

size, data[size]

If PERF_SAMPLE_RAW is enabled, then a 32-bit value indi‐

cating size is included followed by an array of 8-bit

values of length size. The values are padded with 0 to

have 64-bit alignment.

This RAW record data is opaque with respect to the ABI.

The ABI doesn't make any promises with respect to the

stability of its content, it may vary depending on

event, hardware, and kernel version.

bnr, lbr[bnr]

If PERF_SAMPLE_BRANCH_STACK is enabled, then a 64-bit

value indicating the number of records is included, fol‐

lowed by bnr perf_branch_entry structures which each in‐

clude the fields:

from This indicates the source instruction (may not be

a branch).

to The branch target.

mispred

The branch target was mispredicted.

predicted

The branch target was predicted.

in_tx (since Linux 3.11)

The branch was in a transactional memory transac‐

tion.

abort (since Linux 3.11)

The branch was in an aborted transactional memory

transaction.

cycles (since Linux 4.3)

This reports the number of cycles elapsed since

the previous branch stack update.

The entries are from most to least recent, so the first

entry has the most recent branch.

Support for mispred, predicted, and cycles is optional;

if not supported, those values will be 0.

The type of branches recorded is specified by the

branch_sample_type field.

abi, regs[weight(mask)]

If PERF_SAMPLE_REGS_USER is enabled, then the user CPU

registers are recorded.

The abi field is one of PERF_SAMPLE_REGS_ABI_NONE,

PERF_SAMPLE_REGS_ABI_32, or PERF_SAMPLE_REGS_ABI_64.

The regs field is an array of the CPU registers that

were specified by the sample_regs_user attr field. The

number of values is the number of bits set in the sam‐

ple_regs_user bit mask.

size, data[size], dyn_size

If PERF_SAMPLE_STACK_USER is enabled, then the user

stack is recorded. This can be used to generate stack

backtraces. size is the size requested by the user in

sample_stack_user or else the maximum record size. data

is the stack data (a raw dump of the memory pointed to

by the stack pointer at the time of sampling). dyn_size

is the amount of data actually dumped (can be less than

size). Note that dyn_size is omitted if size is 0.

weight

If PERF_SAMPLE_WEIGHT or PERF_SAMPLE_WEIGHT_STRUCT is

enabled, then a 64-bit value provided by the hardware is

recorded that indicates how costly the event was. This

allows expensive events to stand out more clearly in

profiles.

data_src

If PERF_SAMPLE_DATA_SRC is enabled, then a 64-bit value

is recorded that is made up of the following fields:

mem_op

Type of opcode, a bitwise combination of:

PERF_MEM_OP_NA Not available

PERF_MEM_OP_LOAD Load instruction

PERF_MEM_OP_STORE Store instruction

PERF_MEM_OP_PFETCH Prefetch

PERF_MEM_OP_EXEC Executable code

mem_lvl

Memory hierarchy level hit or miss, a bitwise combi‐

nation of the following, shifted left by

PERF_MEM_LVL_SHIFT:

PERF_MEM_LVL_NA Not available

PERF_MEM_LVL_HIT Hit

PERF_MEM_LVL_MISS Miss

PERF_MEM_LVL_L1 Level 1 cache

PERF_MEM_LVL_LFB Line fill buffer

PERF_MEM_LVL_L2 Level 2 cache

PERF_MEM_LVL_L3 Level 3 cache

PERF_MEM_LVL_LOC_RAM Local DRAM

PERF_MEM_LVL_REM_RAM1 Remote DRAM 1 hop

PERF_MEM_LVL_REM_RAM2 Remote DRAM 2 hops

PERF_MEM_LVL_REM_CCE1 Remote cache 1 hop

PERF_MEM_LVL_REM_CCE2 Remote cache 2 hops

PERF_MEM_LVL_IO I/O memory

PERF_MEM_LVL_UNC Uncached memory

mem_snoop

Snoop mode, a bitwise combination of the following,

shifted left by PERF_MEM_SNOOP_SHIFT:

PERF_MEM_SNOOP_NA Not available

PERF_MEM_SNOOP_NONE No snoop

PERF_MEM_SNOOP_HIT Snoop hit

PERF_MEM_SNOOP_MISS Snoop miss

PERF_MEM_SNOOP_HITM Snoop hit modified

mem_lock

Lock instruction, a bitwise combination of the fol‐

lowing, shifted left by PERF_MEM_LOCK_SHIFT:

PERF_MEM_LOCK_NA Not available

PERF_MEM_LOCK_LOCKED Locked transaction

mem_dtlb

TLB access hit or miss, a bitwise combination of the

following, shifted left by PERF_MEM_TLB_SHIFT:

PERF_MEM_TLB_NA Not available

PERF_MEM_TLB_HIT Hit

PERF_MEM_TLB_MISS Miss

PERF_MEM_TLB_L1 Level 1 TLB

PERF_MEM_TLB_L2 Level 2 TLB

PERF_MEM_TLB_WK Hardware walker

PERF_MEM_TLB_OS OS fault handler

transaction

If the PERF_SAMPLE_TRANSACTION flag is set, then a

64-bit field is recorded describing the sources of any

transactional memory aborts.

The field is a bitwise combination of the following val‐

ues:

PERF_TXN_ELISION

Abort from an elision type transaction (Intel-

CPU-specific).

PERF_TXN_TRANSACTION

Abort from a generic transaction.

PERF_TXN_SYNC

Synchronous abort (related to the reported in‐

struction).

PERF_TXN_ASYNC

Asynchronous abort (not related to the reported

instruction).

PERF_TXN_RETRY

Retryable abort (retrying the transaction may

have succeeded).

PERF_TXN_CONFLICT

Abort due to memory conflicts with other threads.

PERF_TXN_CAPACITY_WRITE

Abort due to write capacity overflow.

PERF_TXN_CAPACITY_READ

Abort due to read capacity overflow.

In addition, a user-specified abort code can be obtained

from the high 32 bits of the field by shifting right by

PERF_TXN_ABORT_SHIFT and masking with the value

PERF_TXN_ABORT_MASK.

abi, regs[weight(mask)]

If PERF_SAMPLE_REGS_INTR is enabled, then the user CPU

registers are recorded.

The abi field is one of PERF_SAMPLE_REGS_ABI_NONE,

PERF_SAMPLE_REGS_ABI_32, or PERF_SAMPLE_REGS_ABI_64.

The regs field is an array of the CPU registers that

were specified by the sample_regs_intr attr field. The

number of values is the number of bits set in the sam‐

ple_regs_intr bit mask.

phys_addr

If the PERF_SAMPLE_PHYS_ADDR flag is set, then the

64-bit physical address is recorded.

cgroup

If the PERF_SAMPLE_CGROUP flag is set, then the 64-bit

cgroup ID (for the perf_event subsystem) is recorded.

To get the pathname of the cgroup, the ID should match

to one in a PERF_RECORD_CGROUP.

data_page_size

If the PERF_SAMPLE_DATA_PAGE_SIZE flag is set, then the

64-bit page size value of the data address is recorded.

code_page_size

If the PERF_SAMPLE_CODE_PAGE_SIZE flag is set, then the

64-bit page size value of the ip address is recorded.

size

data[size]

If PERF_SAMPLE_AUX is enabled, a snapshot of the aux

buffer is recorded.

PERF_RECORD_MMAP2

This record includes extended information on mmap(2) calls

returning executable mappings. The format is similar to

that of the PERF_RECORD_MMAP record, but includes extra val‐

ues that allow uniquely identifying shared mappings. De‐

pending on the PERF_RECORD_MISC_MMAP_BUILD_ID bit in the

header, the extra values have different layout and meanings.

struct {

struct perf_event_header header;

u32 pid;

u32 tid;

u64 addr;

u64 len;

u64 pgoff;

union {

struct {

u32 maj;

u32 min;

u64 ino;

u64 ino_generation;

};

struct { /* if PERF_RECORD_MISC_MMAP_BUILD_ID */

u8 build_id_size;

u8 __reserved_1;

u16 __reserved_2;

u8 build_id[20];

};

};

u32 prot;

u32 flags;

char filename[];

struct sample_id sample_id;

};

pid is the process ID.

tid is the thread ID.

addr is the address of the allocated memory.

len is the length of the allocated memory.

pgoff is the page offset of the allocated memory.

maj is the major ID of the underlying device.

min is the minor ID of the underlying device.

ino is the inode number.

ino_generation

is the inode generation.

build_id_size

is the actual size of build_id field (up to 20).

build_id

is a raw data to identify a binary.

prot is the protection information.

flags is the flags information.

filename

is a string describing the backing of the allocated

memory.

PERF_RECORD_AUX (since Linux 4.1)

This record reports that new data is available in the sepa‐

rate AUX buffer region.

struct {

struct perf_event_header header;

u64 aux_offset;

u64 aux_size;

u64 flags;

struct sample_id sample_id;

};

aux_offset

offset in the AUX mmap region where the new data be‐

gins.

aux_size

size of the data made available.

flags describes the AUX update.

PERF_AUX_FLAG_TRUNCATED

if set, then the data returned was truncated

to fit the available buffer size.

PERF_AUX_FLAG_OVERWRITE

if set, then the data returned has overwritten

previous data.

PERF_RECORD_ITRACE_START (since Linux 4.1)

This record indicates which process has initiated an in‐

struction trace event, allowing tools to properly correlate

the instruction addresses in the AUX buffer with the proper

executable.

struct {

struct perf_event_header header;

u32 pid;

u32 tid;

};

pid process ID of the thread starting an instruction

trace.

tid thread ID of the thread starting an instruction

trace.

PERF_RECORD_LOST_SAMPLES (since Linux 4.2)

When using hardware sampling (such as Intel PEBS) this

record indicates some number of samples that may have been

lost.

struct {

struct perf_event_header header;

u64 lost;

struct sample_id sample_id;

};

lost the number of potentially lost samples.

PERF_RECORD_SWITCH (since Linux 4.3)

This record indicates a context switch has happened. The

PERF_RECORD_MISC_SWITCH_OUT bit in the misc field indicates

whether it was a context switch into or away from the cur‐

rent process.

struct {

struct perf_event_header header;

struct sample_id sample_id;

};

PERF_RECORD_SWITCH_CPU_WIDE (since Linux 4.3)

As with PERF_RECORD_SWITCH this record indicates a context

switch has happened, but it only occurs when sampling in

CPU-wide mode and provides additional information on the

process being switched to/from. The

PERF_RECORD_MISC_SWITCH_OUT bit in the misc field indicates

whether it was a context switch into or away from the cur‐

rent process.

struct {

struct perf_event_header header;

u32 next_prev_pid;

u32 next_prev_tid;

struct sample_id sample_id;

};

next_prev_pid

The process ID of the previous (if switching in) or

next (if switching out) process on the CPU.

next_prev_tid

The thread ID of the previous (if switching in) or

next (if switching out) thread on the CPU.

PERF_RECORD_NAMESPACES (since Linux 4.11)

This record includes various namespace information of a

process.

struct {

struct perf_event_header header;

u32 pid;

u32 tid;

u64 nr_namespaces;

struct { u64 dev, inode } [nr_namespaces];

struct sample_id sample_id;

};

pid is the process ID

tid is the thread ID

nr_namespace

is the number of namespaces in this record

Each namespace has dev and inode fields and is recorded in

the fixed position like below:

NET_NS_INDEX=0

Network namespace

UTS_NS_INDEX=1

UTS namespace

IPC_NS_INDEX=2

IPC namespace

PID_NS_INDEX=3

PID namespace

USER_NS_INDEX=4

User namespace

MNT_NS_INDEX=5

Mount namespace

CGROUP_NS_INDEX=6

Cgroup namespace

PERF_RECORD_KSYMBOL (since Linux 5.0)

This record indicates kernel symbol register/unregister

events.

struct {

struct perf_event_header header;

u64 addr;

u32 len;

u16 ksym_type;

u16 flags;

char name[];

struct sample_id sample_id;

};

addr is the address of the kernel symbol.

len is the length of the kernel symbol.

ksym_type

is the type of the kernel symbol. Currently the fol‐

lowing types are available:

PERF_RECORD_KSYMBOL_TYPE_BPF

The kernel symbol is a BPF function.

flags If the PERF_RECORD_KSYMBOL_FLAGS_UNREGISTER is set,

then this event is for unregistering the kernel sym‐

bol.

PERF_RECORD_BPF_EVENT (since Linux 5.0)

This record indicates BPF program is loaded or unloaded.

struct {

struct perf_event_header header;

u16 type;

u16 flags;

u32 id;

u8 tag[BPF_TAG_SIZE];

struct sample_id sample_id;

};

type is one of the following values:

PERF_BPF_EVENT_PROG_LOAD

A BPF program is loaded

PERF_BPF_EVENT_PROG_UNLOAD

A BPF program is unloaded

id is the ID of the BPF program.

tag is the tag of the BPF program. Currently,

BPF_TAG_SIZE is defined as 8.

PERF_RECORD_CGROUP (since Linux 5.7)

This record indicates a new cgroup is created and activated.

struct {

struct perf_event_header header;

u64 id;

char path[];

struct sample_id sample_id;

};

id is the cgroup identifier. This can be also retrieved

by name_to_handle_at(2) on the cgroup path (as a file

handle).

path is the path of the cgroup from the root.

PERF_RECORD_TEXT_POKE (since Linux 5.8)

This record indicates a change in the kernel text. This in‐

cludes addition and removal of the text and the correspond‐

ing length is zero in this case.

struct {

struct perf_event_header header;

u64 addr;

u16 old_len;

u16 new_len;

u8 bytes[];

struct sample_id sample_id;

};

addr is the address of the change

old_len

is the old length

new_len

is the new length

bytes contains old bytes immediately followed by new bytes.

Overflow handling

Events can be set to notify when a threshold is crossed, indicating an

overflow. Overflow conditions can be captured by monitoring the event

file descriptor with poll(2), select(2), or epoll(7). Alternatively,

the overflow events can be captured via sa signal handler, by enabling

I/O signaling on the file descriptor; see the discussion of the F_SE‐

TOWN and F_SETSIG operations in fcntl(2).

Overflows are generated only by sampling events (sample_period must

have a nonzero value).

There are two ways to generate overflow notifications.

The first is to set a wakeup_events or wakeup_watermark value that will

trigger if a certain number of samples or bytes have been written to

the mmap ring buffer. In this case, POLL_IN is indicated.

The other way is by use of the PERF_EVENT_IOC_REFRESH ioctl. This

ioctl adds to a counter that decrements each time the event overflows.

When nonzero, POLL_IN is indicated, but once the counter reaches 0

POLL_HUP is indicated and the underlying event is disabled.

Refreshing an event group leader refreshes all siblings and refreshing

with a parameter of 0 currently enables infinite refreshes; these be‐

haviors are unsupported and should not be relied on.

Starting with Linux 3.18, POLL_HUP is indicated if the event being mon‐

itored is attached to a different process and that process exits.

rdpmc instruction

Starting with Linux 3.4 on x86, you can use the rdpmc instruction to

get low-latency reads without having to enter the kernel. Note that

using rdpmc is not necessarily faster than other methods for reading

event values.

Support for this can be detected with the cap_usr_rdpmc field in the

mmap page; documentation on how to calculate event values can be found

in that section.

Originally, when rdpmc support was enabled, any process (not just ones

with an active perf event) could use the rdpmc instruction to access

the counters. Starting with Linux 4.0, rdpmc support is only allowed

if an event is currently enabled in a process's context. To restore

the old behavior, write the value 2 to /sys/devices/cpu/rdpmc.

perf_event ioctl calls

Various ioctls act on perf_event_open() file descriptors:

PERF_EVENT_IOC_ENABLE

This enables the individual event or event group specified by

the file descriptor argument.

If the PERF_IOC_FLAG_GROUP bit is set in the ioctl argument,

then all events in a group are enabled, even if the event speci‐

fied is not the group leader (but see BUGS).

PERF_EVENT_IOC_DISABLE

This disables the individual counter or event group specified by

the file descriptor argument.

Enabling or disabling the leader of a group enables or disables

the entire group; that is, while the group leader is disabled,

none of the counters in the group will count. Enabling or dis‐

abling a member of a group other than the leader affects only

that counter; disabling a non-leader stops that counter from

counting but doesn't affect any other counter.

If the PERF_IOC_FLAG_GROUP bit is set in the ioctl argument,

then all events in a group are disabled, even if the event spec‐

ified is not the group leader (but see BUGS).

PERF_EVENT_IOC_REFRESH

Non-inherited overflow counters can use this to enable a counter

for a number of overflows specified by the argument, after which

it is disabled. Subsequent calls of this ioctl add the argument

value to the current count. An overflow notification with

POLL_IN set will happen on each overflow until the count reaches

0; when that happens a notification with POLL_HUP set is sent

and the event is disabled. Using an argument of 0 is considered

undefined behavior.

PERF_EVENT_IOC_RESET

Reset the event count specified by the file descriptor argument

to zero. This resets only the counts; there is no way to reset

the multiplexing time_enabled or time_running values.

If the PERF_IOC_FLAG_GROUP bit is set in the ioctl argument,

then all events in a group are reset, even if the event speci‐

fied is not the group leader (but see BUGS).

PERF_EVENT_IOC_PERIOD

This updates the overflow period for the event.

Since Linux 3.7 (on ARM) and Linux 3.14 (all other architec‐

tures), the new period takes effect immediately. On older ker‐

nels, the new period did not take effect until after the next

overflow.

The argument is a pointer to a 64-bit value containing the de‐

sired new period.

Prior to Linux 2.6.36, this ioctl always failed due to a bug in

the kernel.

PERF_EVENT_IOC_SET_OUTPUT

This tells the kernel to report event notifications to the spec‐

ified file descriptor rather than the default one. The file de‐

scriptors must all be on the same CPU.

The argument specifies the desired file descriptor, or -1 if

output should be ignored.

PERF_EVENT_IOC_SET_FILTER (since Linux 2.6.33)

This adds an ftrace filter to this event.

The argument is a pointer to the desired ftrace filter.

PERF_EVENT_IOC_ID (since Linux 3.12)

This returns the event ID value for the given event file de‐

scriptor.

The argument is a pointer to a 64-bit unsigned integer to hold

the result.

PERF_EVENT_IOC_SET_BPF (since Linux 4.1)

This allows attaching a Berkeley Packet Filter (BPF) program to

an existing kprobe tracepoint event. You need CAP_PERFMON

(since Linux 5.8) or CAP_SYS_ADMIN privileges to use this ioctl.

The argument is a BPF program file descriptor that was created

by a previous bpf(2) system call.

PERF_EVENT_IOC_PAUSE_OUTPUT (since Linux 4.7)

This allows pausing and resuming the event's ring-buffer. A

paused ring-buffer does not prevent generation of samples, but

simply discards them. The discarded samples are considered

lost, and cause a PERF_RECORD_LOST sample to be generated when

possible. An overflow signal may still be triggered by the dis‐

carded sample even though the ring-buffer remains empty.

The argument is an unsigned 32-bit integer. A nonzero value

pauses the ring-buffer, while a zero value resumes the ring-buf‐

fer.

PERF_EVENT_MODIFY_ATTRIBUTES (since Linux 4.17)

This allows modifying an existing event without the overhead of

closing and reopening a new event. Currently this is supported

only for breakpoint events.

The argument is a pointer to a perf_event_attr structure con‐

taining the updated event settings.

PERF_EVENT_IOC_QUERY_BPF (since Linux 4.16)

This allows querying which Berkeley Packet Filter (BPF) programs

are attached to an existing kprobe tracepoint. You can only at‐

tach one BPF program per event, but you can have multiple events

attached to a tracepoint. Querying this value on one tracepoint

event returns the ID of all BPF programs in all events attached

to the tracepoint. You need CAP_PERFMON (since Linux 5.8) or

CAP_SYS_ADMIN privileges to use this ioctl.

The argument is a pointer to a structure

struct perf_event_query_bpf {

__u32 ids_len;

__u32 prog_cnt;

__u32 ids[0];

};

The ids_len field indicates the number of ids that can fit in

the provided ids array. The prog_cnt value is filled in by the

kernel with the number of attached BPF programs. The ids array

is filled with the ID of each attached BPF program. If there

are more programs than will fit in the array, then the kernel

will return ENOSPC and ids_len will indicate the number of pro‐

gram IDs that were successfully copied.

Using prctl(2)

A process can enable or disable all currently open event groups using

the prctl(2) PR_TASK_PERF_EVENTS_ENABLE and PR_TASK_PERF_EVENTS_DISABLE

operations. This applies only to events created locally by the calling

process. This does not apply to events created by other processes at‐

tached to the calling process or inherited events from a parent

process. Only group leaders are enabled and disabled, not any other

members of the groups.

perf_event related configuration files

Files in /proc/sys/kernel/

/proc/sys/kernel/perf_event_paranoid

The perf_event_paranoid file can be set to restrict access

to the performance counters.

2 allow only user-space measurements (default since

Linux 4.6).

1 allow both kernel and user measurements (default be‐

fore Linux 4.6).

0 allow access to CPU-specific data but not raw trace‐

point samples.

no restrictions.

The existence of the perf_event_paranoid file is the offi‐

cial method for determining if a kernel supports

perf_event_open().

/proc/sys/kernel/perf_event_max_sample_rate

This sets the maximum sample rate. Setting this too high

can allow users to sample at a rate that impacts overall ma‐

chine performance and potentially lock up the machine. The

default value is 100000 (samples per second).

/proc/sys/kernel/perf_event_max_stack

This file sets the maximum depth of stack frame entries re‐

ported when generating a call trace.

/proc/sys/kernel/perf_event_mlock_kb

Maximum number of pages an unprivileged user can mlock(2).

The default is 516 (kB).

Files in /sys/bus/event_source/devices/

Since Linux 2.6.34, the kernel supports having multiple PMUs avail‐

able for monitoring. Information on how to program these PMUs can

be found under /sys/bus/event_source/devices/. Each subdirectory

corresponds to a different PMU.

/sys/bus/event_source/devices/*/type (since Linux 2.6.38)

This contains an integer that can be used in the type field

of perf_event_attr to indicate that you wish to use this

PMU.

/sys/bus/event_source/devices/cpu/rdpmc (since Linux 3.4)

If this file is 1, then direct user-space access to the per‐

formance counter registers is allowed via the rdpmc instruc‐

tion. This can be disabled by echoing 0 to the file.

As of Linux 4.0 the behavior has changed, so that 1 now

means only allow access to processes with active perf

events, with 2 indicating the old allow-anyone-access behav‐

ior.

/sys/bus/event_source/devices/*/format/ (since Linux 3.4)

This subdirectory contains information on the architecture-

specific subfields available for programming the various

config fields in the perf_event_attr struct.

The content of each file is the name of the config field,

followed by a colon, followed by a series of integer bit

ranges separated by commas. For example, the file event may

contain the value config1:1,6-10,44 which indicates that

event is an attribute that occupies bits 1,6–10, and 44 of

perf_event_attr::config1.

/sys/bus/event_source/devices/*/events/ (since Linux 3.4)

This subdirectory contains files with predefined events.

The contents are strings describing the event settings ex‐

pressed in terms of the fields found in the previously men‐

tioned ./format/ directory. These are not necessarily com‐

plete lists of all events supported by a PMU, but usually a

subset of events deemed useful or interesting.

The content of each file is a list of attribute names sepa‐

rated by commas. Each entry has an optional value (either

hex or decimal). If no value is specified, then it is as‐

sumed to be a single-bit field with a value of 1. An exam‐

ple entry may look like this: event=0x2,inv,ldlat=3.

/sys/bus/event_source/devices/*/uevent

This file is the standard kernel device interface for in‐

jecting hotplug events.

/sys/bus/event_source/devices/*/cpumask (since Linux 3.7)

The cpumask file contains a comma-separated list of integers

that indicate a representative CPU number for each socket

(package) on the motherboard. This is needed when setting

up uncore or northbridge events, as those PMUs present

socket-wide events.

RETURN VALUE

On success, perf_event_open() returns the new file descriptor. On er‐

ror, -1 is returned and errno is set to indicate the error.

ERRORS

The errors returned by perf_event_open() can be inconsistent, and may

vary across processor architectures and performance monitoring units.

E2BIG Returned if the perf_event_attr size value is too small (smaller

than PERF_ATTR_SIZE_VER0), too big (larger than the page size),

or larger than the kernel supports and the extra bytes are not

zero. When E2BIG is returned, the perf_event_attr size field is

overwritten by the kernel to be the size of the structure it was

expecting.

EACCES Returned when the requested event requires CAP_PERFMON (since

Linux 5.8) or CAP_SYS_ADMIN permissions (or a more permissive

perf_event paranoid setting). Some common cases where an un‐

privileged process may encounter this error: attaching to a

process owned by a different user; monitoring all processes on a

given CPU (i.e., specifying the pid argument as -1); and not

setting exclude_kernel when the paranoid setting requires it.

EBADF Returned if the group_fd file descriptor is not valid, or, if

PERF_FLAG_PID_CGROUP is set, the cgroup file descriptor in pid

is not valid.

EBUSY (since Linux 4.1)

Returned if another event already has exclusive access to the

PMU.

EFAULT Returned if the attr pointer points at an invalid memory ad‐

dress.

EINTR Returned when trying to mix perf and ftrace handling for a up‐

robe.

EINVAL Returned if the specified event is invalid. There are many pos‐

sible reasons for this. A not-exhaustive list: sample_freq is

higher than the maximum setting; the cpu to monitor does not ex‐

ist; read_format is out of range; sample_type is out of range;

the flags value is out of range; exclusive or pinned set and the

event is not a group leader; the event config values are out of

range or set reserved bits; the generic event selected is not

supported; or there is not enough room to add the selected

event.

EMFILE Each opened event uses one file descriptor. If a large number

of events are opened, the per-process limit on the number of

open file descriptors will be reached, and no more events can be

created.

ENODEV Returned when the event involves a feature not supported by the

current CPU.

ENOENT Returned if the type setting is not valid. This error is also

returned for some unsupported generic events.

ENOSPC Prior to Linux 3.3, if there was not enough room for the event,

ENOSPC was returned. In Linux 3.3, this was changed to EINVAL.

ENOSPC is still returned if you try to add more breakpoint

events than supported by the hardware.

ENOSYS Returned if PERF_SAMPLE_STACK_USER is set in sample_type and it

is not supported by hardware.

EOPNOTSUPP

Returned if an event requiring a specific hardware feature is

requested but there is no hardware support. This includes re‐

questing low-skid events if not supported, branch tracing if it

is not available, sampling if no PMU interrupt is available, and

branch stacks for software events.

EOVERFLOW (since Linux 4.8)

Returned if PERF_SAMPLE_CALLCHAIN is requested and sam‐

ple_max_stack is larger than the maximum specified in

/proc/sys/kernel/perf_event_max_stack.

EPERM Returned on many (but not all) architectures when an unsupported

exclude_hv, exclude_idle, exclude_user, or exclude_kernel set‐

ting is specified.

It can also happen, as with EACCES, when the requested event re‐

quires CAP_PERFMON (since Linux 5.8) or CAP_SYS_ADMIN permis‐

sions (or a more permissive perf_event paranoid setting). This

includes setting a breakpoint on a kernel address, and (since

Linux 3.13) setting a kernel function-trace tracepoint.

ESRCH Returned if attempting to attach to a process that does not ex‐

ist.

VERSION

perf_event_open() was introduced in Linux 2.6.31 but was called

perf_counter_open(). It was renamed in Linux 2.6.32.

STANDARDS

This perf_event_open() system call Linux-specific and should not be

used in programs intended to be portable.

NOTES

The official way of knowing if perf_event_open() support is enabled is

checking for the existence of the file /proc/sys/ker‐

nel/perf_event_paranoid.

CAP_PERFMON capability (since Linux 5.8) provides secure approach to

performance monitoring and observability operations in a system accord‐

ing to the principal of least privilege (POSIX IEEE 1003.1e). Access‐

ing system performance monitoring and observability operations using

CAP_PERFMON rather than the much more powerful CAP_SYS_ADMIN excludes

chances to misuse credentials and makes operations more secure.

CAP_SYS_ADMIN usage for secure system performance monitoring and ob‐

servability is discouraged in favor of the CAP_PERFMON capability.

BUGS

The F_SETOWN_EX option to fcntl(2) is needed to properly get overflow

signals in threads. This was introduced in Linux 2.6.32.

Prior to Linux 2.6.33 (at least for x86), the kernel did not check if

events could be scheduled together until read time. The same happens

on all known kernels if the NMI watchdog is enabled. This means to see

if a given set of events works you have to perf_event_open(), start,

then read before you know for sure you can get valid measurements.

Prior to Linux 2.6.34, event constraints were not enforced by the ker‐

nel. In that case, some events would silently return "0" if the kernel

scheduled them in an improper counter slot.

Prior to Linux 2.6.34, there was a bug when multiplexing where the

wrong results could be returned.

Kernels from Linux 2.6.35 to Linux 2.6.39 can quickly crash the kernel

if "inherit" is enabled and many threads are started.

Prior to Linux 2.6.35, PERF_FORMAT_GROUP did not work with attached

processes.

There is a bug in the kernel code between Linux 2.6.36 and Linux 3.0

that ignores the "watermark" field and acts as if a wakeup_event was

chosen if the union has a nonzero value in it.

From Linux 2.6.31 to Linux 3.4, the PERF_IOC_FLAG_GROUP ioctl argument

was broken and would repeatedly operate on the event specified rather

than iterating across all sibling events in a group.

From Linux 3.4 to Linux 3.11, the mmap cap_usr_rdpmc and cap_usr_time

bits mapped to the same location. Code should migrate to the new

cap_user_rdpmc and cap_user_time fields instead.

Always double-check your results! Various generalized events have had

wrong values. For example, retired branches measured the wrong thing

on AMD machines until Linux 2.6.35.

EXAMPLES

The following is a short example that measures the total instruction

count of a call to printf(3).

#include <linux/perf_event.h>

#include <stdio.h>

#include <stdlib.h>

#include <string.h>

#include <sys/ioctl.h>

#include <sys/syscall.h>

#include <unistd.h>

static long

perf_event_open(struct perf_event_attr *hw_event, pid_t pid,

int cpu, int group_fd, unsigned long flags)

{

int ret;

ret = syscall(SYS_perf_event_open, hw_event, pid, cpu,

group_fd, flags);

return ret;

}

int

main(void)

{

int fd;

long long count;

struct perf_event_attr pe;

memset(&pe, 0, sizeof(pe));

pe.type = PERF_TYPE_HARDWARE;

pe.size = sizeof(pe);

pe.config = PERF_COUNT_HW_INSTRUCTIONS;

pe.disabled = 1;

pe.exclude_kernel = 1;

pe.exclude_hv = 1;

fd = perf_event_open(&pe, 0, -1, -1, 0);

if (fd == -1) {

fprintf(stderr, "Error opening leader %llx\n", pe.config);

exit(EXIT_FAILURE);

}

ioctl(fd, PERF_EVENT_IOC_RESET, 0);

ioctl(fd, PERF_EVENT_IOC_ENABLE, 0);

printf("Measuring instruction count for this printf\n");

ioctl(fd, PERF_EVENT_IOC_DISABLE, 0);

read(fd, &count, sizeof(count));

printf("Used %lld instructions\n", count);

close(fd);

}

SEE ALSO

perf(1), fcntl(2), mmap(2), open(2), prctl(2), read(2)

Documentation/admin-guide/perf-security.rst in the kernel source tree

Linux man-pages 6.03 2023-02-10 perf_event_open(2)

***

ƍndice de la Sección 2

ƍndice General