[PATCH v2 0/1] Perf stack unwinding with pointer authentication
From: James Clark
Date: Thu Oct 20 2022 - 06:22:20 EST
Hi,
I've taken up this change from Andrew and made some improvements. It
also didn't apply cleanly anymore so I thought I would resend.
I know there were some discussions with Vince Weaver about having
something arch specific in perf_event_open, so it would be good to get
some more feedback on that. I'm happy to change it so that it's just
called PERF_SAMPLE_PTRAUTH, but given how arch specific the output is,
I'm not sure if that is best.
Thanks
James
Changes since V1:
* Use weak symbols instead of #ifdefs which simplified things
* Remove the new files as everything fits well into existing ones
* Never allow opening the event if CONFIG_ARM64_PTR_AUTH isn't set
* Include only the kernel side change in this set, the perf tool
changes are here [1] which I will also rebase and resubmit
* Rebase onto tip/perf/core (82aad7ff7ac)
[1]: https://lore.kernel.org/lkml/20220704145333.22557-1-andrew.kilroy@xxxxxxx/T/#t
Andrew Kilroy (1):
perf arm64: Send pointer auth masks to ring buffer
arch/arm64/include/asm/perf_event.h | 32 +++++++++++++++++++++++++++++
arch/arm64/kernel/perf_event.c | 32 +++++++++++++++++++++++++++++
include/linux/perf_event.h | 12 +++++++++++
include/uapi/linux/perf_event.h | 4 +++-
kernel/events/core.c | 31 ++++++++++++++++++++++++++++
5 files changed, 110 insertions(+), 1 deletion(-)
--
2.28.0