[PATCH v2 0/1] Perf stack unwinding with pointer authentication

James Clark james.clark at arm.com
Thu Oct 20 03:19:19 PDT 2022


Hi,

I've taken up this change from Andrew and made some improvements. It
also didn't apply cleanly anymore so I thought I would resend.

I know there were some discussions with Vince Weaver about having
something arch specific in perf_event_open, so it would be good to get
some more feedback on that. I'm happy to change it so that it's just
called PERF_SAMPLE_PTRAUTH, but given how arch specific the output is,
I'm not sure if that is best.

Thanks
James

Changes since V1:

  * Use weak symbols instead of #ifdefs which simplified things
  * Remove the new files as everything fits well into existing ones
  * Never allow opening the event if CONFIG_ARM64_PTR_AUTH isn't set
  * Include only the kernel side change in this set, the perf tool
    changes are here [1] which I will also rebase and resubmit
  * Rebase onto tip/perf/core (82aad7ff7ac)

[1]: https://lore.kernel.org/lkml/20220704145333.22557-1-andrew.kilroy@arm.com/T/#t

Andrew Kilroy (1):
  perf arm64: Send pointer auth masks to ring buffer

 arch/arm64/include/asm/perf_event.h | 32 +++++++++++++++++++++++++++++
 arch/arm64/kernel/perf_event.c      | 32 +++++++++++++++++++++++++++++
 include/linux/perf_event.h          | 12 +++++++++++
 include/uapi/linux/perf_event.h     |  4 +++-
 kernel/events/core.c                | 31 ++++++++++++++++++++++++++++
 5 files changed, 110 insertions(+), 1 deletion(-)

-- 
2.28.0




More information about the linux-arm-kernel mailing list