[PATCH v4 2/9] perf/core: open access for CAP_SYS_PERFMON privileged process
arnaldo.melo at gmail.com
arnaldo.melo at gmail.com
Sat Jan 11 11:35:12 AEDT 2020
<keescook at chromium.org>,Jann Horn <jannh at google.com>,Thomas Gleixner <tglx at linutronix.de>,Tvrtko Ursulin <tvrtko.ursulin at linux.intel.com>,Lionel Landwerlin <lionel.g.landwerlin at intel.com>,linux-kernel <linux-kernel at vger.kernel.org>,"linux-security-module at vger.kernel.org" <linux-security-module at vger.kernel.org>,"selinux at vger.kernel.org" <selinux at vger.kernel.org>,"intel-gfx at lists.freedesktop.org" <intel-gfx at lists.freedesktop.org>,"bpf at vger.kernel.org" <bpf at vger.kernel.org>,"linux-parisc at vger.kernel.org" <linux-parisc at vger.kernel.org>,"linuxppc-dev at lists.ozlabs.org" <linuxppc-dev at lists.ozlabs.org>,"linux-perf-users at vger.kernel.org" <linux-perf-users at vger.kernel.org>,"linux-arm-kernel at lists.infradead.org" <linux-arm-kernel at lists.infradead.org>,"oprofile-list at lists.sf.net" <oprofile-list at lists.sf.net>
From: Arnaldo Carvalho de Melo <acme at kernel.org>
Message-ID: <A7F0BF73-9189-44BA-9264-C88F2F51CBF3 at kernel.org>
On January 10, 2020 9:23:27 PM GMT-03:00, Song Liu <songliubraving at fb.com> wrote:
>
>
>> On Jan 10, 2020, at 3:47 PM, Masami Hiramatsu <mhiramat at kernel.org>
>wrote:
>>
>> On Fri, 10 Jan 2020 13:45:31 -0300
>> Arnaldo Carvalho de Melo <acme at kernel.org> wrote:
>>
>>> Em Sat, Jan 11, 2020 at 12:52:13AM +0900, Masami Hiramatsu escreveu:
>>>> On Fri, 10 Jan 2020 15:02:34 +0100 Peter Zijlstra
><peterz at infradead.org> wrote:
>>>>> Again, this only allows attaching to previously created kprobes,
>it does
>>>>> not allow creating kprobes, right?
>>>
>>>>> That is; I don't think CAP_SYS_PERFMON should be allowed to create
>>>>> kprobes.
>>>
>>>>> As might be clear; I don't actually know what the user-ABI is for
>>>>> creating kprobes.
>>>
>>>> There are 2 ABIs nowadays, ftrace and ebpf. perf-probe uses ftrace
>interface to
>>>> define new kprobe events, and those events are treated as
>completely same as
>>>> tracepoint events. On the other hand, ebpf tries to define new
>probe event
>>>> via perf_event interface. Above one is that interface. IOW, it
>creates new kprobe.
>>>
>>> Masami, any plans to make 'perf probe' use the perf_event_open()
>>> interface for creating kprobes/uprobes?
>>
>> Would you mean perf probe to switch to perf_event_open()?
>> No, perf probe is for setting up the ftrace probe events. I think we
>can add an
>> option to use perf_event_open(). But current kprobe creation from
>perf_event_open()
>> is separated from ftrace by design.
>
>I guess we can extend event parser to understand kprobe directly.
>Instead of
>
> perf probe kernel_func
> perf stat/record -e probe:kernel_func ...
>
>We can just do
>
> perf stat/record -e kprobe:kernel_func ...
You took the words from my mouth, exactly, that is a perfect use case, an alternative to the 'perf probe' one of making a disabled event that then gets activated via record/stat/trace, in many cases it's better, removes the explicit probe setup case.
Regards,
- Arnaldo
>
>Thanks,
>Song
More information about the Linuxppc-dev
mailing list