[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <8d282e87-c1c8-f7a0-631b-8d569c2154a6@arm.com>
Date: Mon, 11 Jul 2022 10:25:20 +0100
From: James Clark <james.clark@....com>
To: Vince Weaver <vincent.weaver@...ne.edu>,
Andrew Kilroy <andrew.kilroy@....com>
Cc: linux-kernel@...r.kernel.org, linux-perf-users@...r.kernel.org,
acme@...nel.org, Peter Zijlstra <peterz@...radead.org>,
Ingo Molnar <mingo@...hat.com>,
Mark Rutland <mark.rutland@....com>,
Alexander Shishkin <alexander.shishkin@...ux.intel.com>,
Jiri Olsa <jolsa@...nel.org>,
Namhyung Kim <namhyung@...nel.org>,
Martin KaFai Lau <kafai@...com>,
Song Liu <songliubraving@...com>, Yonghong Song <yhs@...com>,
John Fastabend <john.fastabend@...il.com>,
KP Singh <kpsingh@...nel.org>, Tom Rix <trix@...hat.com>,
linux-arm-kernel@...ts.infradead.org, netdev@...r.kernel.org,
bpf@...r.kernel.org, llvm@...ts.linux.dev
Subject: Re: [PATCH 2/8] perf evsel: Do not request ptrauth sample field if
not supported
On 06/07/2022 17:01, Vince Weaver wrote:
> On Mon, 4 Jul 2022, Andrew Kilroy wrote:
>
>> A subsequent patch alters perf to perf_event_open with the
>> PERF_SAMPLE_ARCH_1 bit on.
>>
>> This patch deals with the case where the kernel does not know about the
>> PERF_SAMPLE_ARCH_1 bit, and does not know to send the pointer
>> authentication masks. In this case the perf_event_open system call
>> returns -EINVAL (-22) and perf exits with an error.
>>
>> This patch causes userspace process to re-attempt the perf_event_open
>> system call but without asking for the PERF_SAMPLE_ARCH_1 sample
>> field, allowing the perf_event_open system call to succeed.
>
> So in this case you are leaking ARM64-specific info into the generic
> perf_event_open() call? Is there any way the kernel could implement this
> without userspace having to deal with the issue?
Hi Vince,
The alternative to this change is just to call it "PERF_SAMPLE_POINTER_AUTH_MASK"
and then it's not Arm specific, it's just that only Arm implements it for now.
This is definitely an option.
But if no platform ever implements something similar then that bit is wasted.
The intention of adding "PERF_SAMPLE_ARCH_1" was to prevent wasting that bit.
But as you say, maybe making it arch specific isn't the right way either.
I wouldn't say the perf_event_open call is currently generic though, lots of
it already requires knowledge of the current platform, and searching for 'x86'
in the docs for it gives 10 matches.
>
> There are a few recent ARM64 perf_event related patches that are pushing
> ARM specific interfaces into the generic code, with the apparent
> assumption that it will just be implemented in the userspace perf tool.
> However there are a number of outside-the-kernel codebases that also use
> perf_event_open() and it seems a bit onerous if all of them have to start
> adding a lot of extra ARM64-specific code, especially because as far as I
Because pointer auth is a hardware feature, other tools have no choice but
to implement this if they do Dwarf based stack unwinding. There is no way
around that. The pointers are stored mangled and they don't make sense
without masking them. GDB has already implemented support for it. If they
don't do Dwarf based stack unwinding then they can carry on as they are
and everything will still work.
> can tell there haven't been any documentation patches included for the
> Makefile.
We plan to update the docs for the syscall, but it's in another repo, and
we'll wait for this change to be finalised first. I'm not sure what you
mean about the Makefile?
Thanks
James
>
> The other recent change that's annoying for userspace is the addition of
> the ARM-specific /proc/sys/kernel/perf_user_access that duplicates
> functionality found in /sys/devices/cpu/rdpmc
>
> Vince Weaver
> vincent.weaver@...ne.edu
Powered by blists - more mailing lists