[PATCH v2 1/1] perf arm64: Send pointer auth masks to ring buffer
James Clark
james.clark at linaro.org
Tue Mar 3 02:38:23 PST 2026
On 02/03/2026 4:33 pm, Jakub Brnak wrote:
> On Mon, Oct 31, 2022 at 01:48:56PM +0000, James Clark wrote:
>>
>>
>> On 27/10/2022 18:20, Peter Zijlstra wrote:
>>> On Tue, Oct 25, 2022 at 04:28:12PM +0100, James Clark wrote:
>>>
>>>>> Why do we want the same mask repeated over and over with each sample;
>>>>> should this not be part of the address space (side-band) data?
>>>>
>>>> You are probably right that it could be done that way. The reason that
>>>> we did it this way was to be consistent with ptrace feature [1] where it
>>>> is delivered to userspace on a per-process basis. And there is also a
>>>> prctl for the enabled key types [2] which can be changed dynamically.
>>>> Particularly for the last reason is why it was done per sample.
>>>>
>>>> Having said that, the enabled keys field is not used by perf, only the
>>>> mask is used, so I can drop the per sample data until enabled keys is
>>>> needed, which may be never.
>>>>
>>>> I'm going to assume that perf shouldn't use ptrace because of
>>>> permissions and conflicts with debuggers, so I could put the mask
>>>> somewhere like PERF_RECORD_FORK instead of per sample.
>>>
>>> Yeah, or create an new RECORD type which you can also send around at
>>> prctl() time.
>>>
>>> The only thing that's needed on top of that is exposing the mask
>>> somewhere in /proc for existing tasks; which is what perf also uses to
>>> syntesize RECORD_MMAP events on startup etc..
>>>
>>
>> Hmm ok, in that case I can just add the /proc interface for now because
>> the mask won't change and we can add the new record type at the point
>> it's needed in the future.
>>
>> Thanks for the feedback.
>
> Hi all,
>
> Does anyone know how this issue was eventually resolved?
> Specifically, is the mask for the pointer authentication bits
> currently exposed and stored somewhere in perf.data so it can be
> used when running perf report?
>
> Thanks,
> Jakub
>
>
Hi Jakub,
No we never finished this, you're actually the first person to mention
it. Can you give a bit more detail about your use case? Maybe we can dig
out the old branches and work on it again.
For a summary of the current status, frame pointer unwinds in the kernel
are working with pointer auth because the kernel strips them.
We patched libunwind for support on commit f67ef2867bc5 ("Unwind with
pointer authentication on arm64"). And libdw on commit 0af6c7289c22
(libdwfl, aarch64: Demangle return addresses using a PAC mask). These
two were to support dwarf unwinding, but the kernel changes to expose
the mask and Perf changes to pass it to the unwinders were never finished.
Thanks
James
More information about the linux-arm-kernel
mailing list