Received: by 2002:ab2:7b86:0:b0:1f7:5705:b850 with SMTP id q6csp1405563lqh; Mon, 6 May 2024 06:59:06 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCWyWb8o8YWTnylPCR9MMdpn8j7CJAZEK/K3SJoaZexmfbpAdhbuiuXSAVuvvHM+CtC1LEetl9+T5U+t1yHbboDaYUqg1VLoLeiwIAClSA== X-Google-Smtp-Source: AGHT+IFSh1855WpBKTlwBJacRVIbyvVsDRJ8/T6WIjGKeymRV6wsKtNkAtCf4hGSkxR3Lat9dy1U X-Received: by 2002:a50:d519:0:b0:570:5b71:4859 with SMTP id u25-20020a50d519000000b005705b714859mr5776005edi.41.1715003945881; Mon, 06 May 2024 06:59:05 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1715003945; cv=pass; d=google.com; s=arc-20160816; b=UZGGyBTVe8qwGUFsTz7kDs7An/T1MCDsVn9VY3+isdHCn8WpdZuhUY2DaCn799zVIQ AjobTsSfKzmWr5Ft1HSL8GO+GD4RCxO1eNj3DcL6urqqy0F9qOJ+r6+IVnAIQCb9ciDF iCVbQxb00dNPPtMoYZtJm9qwjJEswTh68UvWPvVJarZrsELF4DX58WwlETnVIumPGfPX O23SiR5WOu9+31tGRXP8b1btKKaaEuNkopE9az8mibyEAPfYhc1UiW6Y/WCiajimvcgw K1tX9xxrCShZU6K/ZqAJRvImW6WQYtLT6iUfwvXYDDWhx4GxrCF8DvGCd8Mq77yXk8F7 jGHA== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-transfer-encoding:content-disposition :mime-version:list-unsubscribe:list-subscribe:list-id:precedence :references:message-id:subject:cc:to:from:date:dkim-signature; bh=S4PMgYcqIz8Ar5wB75CyEMa2K5CNSfpJae0K/3/viZk=; fh=PlIPd6YSlEwVKQ0XO4N+R6mzCqb17bX4DNm+qYgIjtU=; b=a4Z6MsKAIJpxBHD9/y+Wtqkzb7+Ky6NIpHSheiNE9f1pbpFMUPgKR6ljm1FSL5LYkv 4aUu2fko+1mPPz6VOtMpdzs/AkCaJQ64Y2QzxLTbxZ6LEmAddaSEgX39Iz5NFIhxezFN s6DSWCzAJ6UnxYh5rLPwmrrdIY803NZyWizYBGDY0rGc3nBnJ8tb4ou1Ucx04yjxtJ2T IEniL+EoNBIw8EywdPxI58Nppyw6KpsQjBi35DQG4vmQepQHUqeFw5Cvd2JwvL9LT0xm nwEJsEeZ5CDrValMZTdE+FQvol30srT3Gn2fgZENbYqHkfe12N6+j9bxv0eRFpGVgIlf 4wwg==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=e3GtH8bp; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-169933-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-169933-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [2604:1380:4601:e00::3]) by mx.google.com with ESMTPS id h15-20020a056402280f00b005729ec3f02esi4914151ede.301.2024.05.06.06.59.05 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 06 May 2024 06:59:05 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-169933-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) client-ip=2604:1380:4601:e00::3; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=e3GtH8bp; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-169933-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-169933-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 7141C1F22CBE for ; Mon, 6 May 2024 13:59:05 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 17A3581AAB; Mon, 6 May 2024 13:58:52 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="e3GtH8bp" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 96BCE7FBC6; Mon, 6 May 2024 13:58:50 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1715003930; cv=none; b=mcgedauqAyeY8fzS8JsPTcq80KAa07oFTyEdSCNLqKkVw9zAtA0ATJBSHvJMSjAGKSdK+fuK68HQ/Bi9rUWZaYsrir9pYUqJYmEy9ZQY5ZIPLVZjr23bsmV7/pL3ZESdRYuTr2DkDVhYv9g+eBXUy2fotPAD2A+fW5KGxgHju7U= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1715003930; c=relaxed/simple; bh=IVqDKFkhumztfAGI13+AbiKN+ZomqU+p5X3ccF6t988=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=pfh762UHKKtE8oivlJRQkP5eLPNrFzRt+gotJb1mBkQ/8j+EpjuqaHn9oiPDDkmLC4TndhnYW2qtM1fiPEMzZZBaajPiqW8Cy2m5lefY8gHplY6XqrplFbyjz0heogxT3oJ5pQ1K4MmYt6AMU3S4Q2OwjiBYIr+oLaqviPpWoZ4= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=e3GtH8bp; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id 74146C116B1; Mon, 6 May 2024 13:58:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1715003930; bh=IVqDKFkhumztfAGI13+AbiKN+ZomqU+p5X3ccF6t988=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=e3GtH8bpQacvsG/MulZkKiYjUwP62cpavRPHDEoErmr7W0VTKSwOgqZsbEXWez8V9 MLw/V3EvOZdK/qBhK/u7tJIEv0aysVGHyxe2JwYuLVGtuQPePxYtEHdKB7usvRdm74 ybSEWQvleKjaiKkZbTjLCffnjo4FWALQVscGqSzQp3IpZqFyVJB2G9hzfINNrYEqwp fyBUe2HKamOExOkqE3VG+2gs2/SPtW4S1yctyYM2vIxJSyjK8doBMrXSG1sERR8jXg z0OQKrVry9qDig9wM0z5W7qpaRVVXBAlyXKLdguwj4dIA0E+G7EGZSrwAusxap8GSB 4/PbAJlyQUIew== Date: Mon, 6 May 2024 10:58:46 -0300 From: Arnaldo Carvalho de Melo To: Andrii Nakryiko Cc: Jiri Olsa , Ian Rogers , Greg KH , Andrii Nakryiko , linux-fsdevel@vger.kernel.org, brauner@kernel.org, viro@zeniv.linux.org.uk, akpm@linux-foundation.org, linux-kernel@vger.kernel.org, bpf@vger.kernel.org, linux-mm@kvack.org, Daniel =?iso-8859-1?Q?M=FCller?= , "linux-perf-use." Subject: Re: [PATCH 2/5] fs/procfs: implement efficient VMA querying API for /proc//maps Message-ID: References: <20240504003006.3303334-1-andrii@kernel.org> <20240504003006.3303334-3-andrii@kernel.org> <2024050439-janitor-scoff-be04@gregkh> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: On Sat, May 04, 2024 at 02:50:31PM -0700, Andrii Nakryiko wrote: > On Sat, May 4, 2024 at 8:28 AM Greg KH wrote: > > On Fri, May 03, 2024 at 05:30:03PM -0700, Andrii Nakryiko wrote: > > > Note also, that fetching VMA name (e.g., backing file path, or special > > > hard-coded or user-provided names) is optional just like build ID. If > > > user sets vma_name_size to zero, kernel code won't attempt to retrieve > > > it, saving resources. > > > Signed-off-by: Andrii Nakryiko > > Where is the userspace code that uses this new api you have created? > So I added a faithful comparison of existing /proc//maps vs new > ioctl() API to solve a common problem (as described above) in patch > #5. The plan is to put it in mentioned blazesym library at the very > least. > > I'm sure perf would benefit from this as well (cc'ed Arnaldo and > linux-perf-user), as they need to do stack symbolization as well. At some point, when BPF iterators became a thing we thought about, IIRC Jiri did some experimentation, but I lost track, of using BPF to synthesize PERF_RECORD_MMAP2 records for pre-existing maps, the layout as in uapi/linux/perf_event.h: /* * The MMAP2 records are an augmented version of MMAP, they add * maj, min, ino numbers to be used to uniquely identify each mapping * * struct { * struct perf_event_header header; * * u32 pid, tid; * u64 addr; * u64 len; * u64 pgoff; * union { * struct { * u32 maj; * u32 min; * u64 ino; * u64 ino_generation; * }; * struct { * u8 build_id_size; * u8 __reserved_1; * u16 __reserved_2; * u8 build_id[20]; * }; * }; * u32 prot, flags; * char filename[]; * struct sample_id sample_id; * }; */ PERF_RECORD_MMAP2 = 10, * PERF_RECORD_MISC_MMAP_BUILD_ID - PERF_RECORD_MMAP2 event As perf.data files can be used for many purposes we want them all, so we setup a meta data perf file descriptor to go on receiving the new mmaps while we read /proc//maps, to reduce the chance of missing maps, do it in parallel, etc: ⬢[acme@toolbox perf-tools-next]$ perf record -h 'event synthesis' Usage: perf record [] [] or: perf record [] -- [] --num-thread-synthesize number of threads to run for event synthesis --synth Fine-tune event synthesis: default=all ⬢[acme@toolbox perf-tools-next]$ For this specific initial synthesis of everything the plan, as mentioned about Jiri's experiments, was to use a BPF iterator to just feed the perf ring buffer with those events, that way userspace would just receive the usual records it gets when a new mmap is put in place, the BPF iterator would just feed the preexisting mmaps, as instructed via the perf_event_attr for the perf_event_open syscall. For people not wanting BPF, i.e. disabling it altogether in perf or disabling just BPF skels, then we would fallback to the current method, or to the one being discussed here when it becomes available. One thing to have in mind is for this iterator not to generate duplicate records for non-pre-existing mmaps, i.e. we would need some generation number that would be bumped when asking for such pre-existing maps PERF_RECORD_MMAP2 dumps. > It will be up to other similar projects to adopt this, but we'll > definitely get this into blazesym as it is actually a problem for the At some point looking at plugging blazesym somehow with perf may be something to consider, indeed. - Arnaldo > abovementioned Oculus use case. We already had to make a tradeoff (see > [2], this wasn't done just because we could, but it was requested by > Oculus customers) to cache the contents of /proc//maps and run > the risk of missing some shared libraries that can be loaded later. It > would be great to not have to do this tradeoff, which this new API > would enable. > > [2] https://github.com/libbpf/blazesym/commit/6b521314126b3ae6f2add43e93234b59fed48ccf > > > > > > --- > > > fs/proc/task_mmu.c | 165 ++++++++++++++++++++++++++++++++++++++++ > > > include/uapi/linux/fs.h | 32 ++++++++ > > > 2 files changed, 197 insertions(+) > > > > > > diff --git a/fs/proc/task_mmu.c b/fs/proc/task_mmu.c > > > index 8e503a1635b7..cb7b1ff1a144 100644 > > > --- a/fs/proc/task_mmu.c > > > +++ b/fs/proc/task_mmu.c > > > @@ -22,6 +22,7 @@ > > > #include > > > #include > > > #include > > > +#include > > > > > > #include > > > #include > > > @@ -375,11 +376,175 @@ static int pid_maps_open(struct inode *inode, struct file *file) > > > return do_maps_open(inode, file, &proc_pid_maps_op); > > > } > > > > > > +static int do_procmap_query(struct proc_maps_private *priv, void __user *uarg) > > > +{ > > > + struct procfs_procmap_query karg; > > > + struct vma_iterator iter; > > > + struct vm_area_struct *vma; > > > + struct mm_struct *mm; > > > + const char *name = NULL; > > > + char build_id_buf[BUILD_ID_SIZE_MAX], *name_buf = NULL; > > > + __u64 usize; > > > + int err; > > > + > > > + if (copy_from_user(&usize, (void __user *)uarg, sizeof(usize))) > > > + return -EFAULT; > > > + if (usize > PAGE_SIZE) > > > > Nice, where did you document that? And how is that portable given that > > PAGE_SIZE can be different on different systems? > > I'm happy to document everything, can you please help by pointing > where this documentation has to live? > > This is mostly fool-proofing, though, because the user has to pass > sizeof(struct procfs_procmap_query), which I don't see ever getting > close to even 4KB (not even saying about 64KB). This is just to > prevent copy_struct_from_user() below to do too much zero-checking. > > > > > and why aren't you checking the actual structure size instead? You can > > easily run off the end here without knowing it. > > See copy_struct_from_user(), it does more checks. This is a helper > designed specifically to deal with use cases like this where kernel > struct size can change and user space might be newer or older. > copy_struct_from_user() has a nice documentation describing all these > nuances. > > > > > > + return -E2BIG; > > > + if (usize < offsetofend(struct procfs_procmap_query, query_addr)) > > > + return -EINVAL; > > > > Ok, so you have two checks? How can the first one ever fail? > > Hmm.. If usize = 8, copy_from_user() won't fail, usize > PAGE_SIZE > won't fail, but this one will fail. > > The point of this check is that user has to specify at least first > three fields of procfs_procmap_query (size, query_flags, and > query_addr), because without those the query is meaningless. > > > > > > > + err = copy_struct_from_user(&karg, sizeof(karg), uarg, usize); > > and this helper does more checks validating that the user either has a > shorter struct (and then zero-fills the rest of kernel-side struct) or > has longer (and then the longer part has to be zero filled). Do check > copy_struct_from_user() documentation, it's great. > > > > + if (err) > > > + return err; > > > + > > > + if (karg.query_flags & ~PROCFS_PROCMAP_EXACT_OR_NEXT_VMA) > > > + return -EINVAL; > > > + if (!!karg.vma_name_size != !!karg.vma_name_addr) > > > + return -EINVAL; > > > + if (!!karg.build_id_size != !!karg.build_id_addr) > > > + return -EINVAL; > > > > So you want values to be set, right? > > Either both should be set, or neither. It's ok for both size/addr > fields to be zero, in which case it indicates that the user doesn't > want this part of information (which is usually a bit more expensive > to get and might not be necessary for all the cases). > > > > > > + > > > + mm = priv->mm; > > > + if (!mm || !mmget_not_zero(mm)) > > > + return -ESRCH; > > > > What is this error for? Where is this documentned? > > I copied it from existing /proc//maps checks. I presume it's > guarding the case when mm might be already put. So if the process is > gone, but we have /proc//maps file open? > > > > > > + if (mmap_read_lock_killable(mm)) { > > > + mmput(mm); > > > + return -EINTR; > > > + } > > > + > > > + vma_iter_init(&iter, mm, karg.query_addr); > > > + vma = vma_next(&iter); > > > + if (!vma) { > > > + err = -ENOENT; > > > + goto out; > > > + } > > > + /* user wants covering VMA, not the closest next one */ > > > + if (!(karg.query_flags & PROCFS_PROCMAP_EXACT_OR_NEXT_VMA) && > > > + vma->vm_start > karg.query_addr) { > > > + err = -ENOENT; > > > + goto out; > > > + } > > > + > > > + karg.vma_start = vma->vm_start; > > > + karg.vma_end = vma->vm_end; > > > + > > > + if (vma->vm_file) { > > > + const struct inode *inode = file_user_inode(vma->vm_file); > > > + > > > + karg.vma_offset = ((__u64)vma->vm_pgoff) << PAGE_SHIFT; > > > + karg.dev_major = MAJOR(inode->i_sb->s_dev); > > > + karg.dev_minor = MINOR(inode->i_sb->s_dev); > > > > So the major/minor is that of the file superblock? Why? > > Because inode number is unique only within given super block (and even > then it's more complicated, e.g., btrfs subvolumes add more headaches, > I believe). inode + dev maj/min is sometimes used for cache/reuse of > per-binary information (e.g., pre-processed DWARF information, which > is *very* expensive, so anything that allows to avoid doing this is > helpful). > > > > > > + karg.inode = inode->i_ino; > > > > What is userspace going to do with this? > > > > See above. > > > > + } else { > > > + karg.vma_offset = 0; > > > + karg.dev_major = 0; > > > + karg.dev_minor = 0; > > > + karg.inode = 0; > > > > Why not set everything to 0 up above at the beginning so you never miss > > anything, and you don't miss any holes accidentally in the future. > > > > Stylistic preference, I find this more explicit, but I don't care much > one way or another. > > > > + } > > > + > > > + karg.vma_flags = 0; > > > + if (vma->vm_flags & VM_READ) > > > + karg.vma_flags |= PROCFS_PROCMAP_VMA_READABLE; > > > + if (vma->vm_flags & VM_WRITE) > > > + karg.vma_flags |= PROCFS_PROCMAP_VMA_WRITABLE; > > > + if (vma->vm_flags & VM_EXEC) > > > + karg.vma_flags |= PROCFS_PROCMAP_VMA_EXECUTABLE; > > > + if (vma->vm_flags & VM_MAYSHARE) > > > + karg.vma_flags |= PROCFS_PROCMAP_VMA_SHARED; > > > + > > [...] > > > > diff --git a/include/uapi/linux/fs.h b/include/uapi/linux/fs.h > > > index 45e4e64fd664..fe8924a8d916 100644 > > > --- a/include/uapi/linux/fs.h > > > +++ b/include/uapi/linux/fs.h > > > @@ -393,4 +393,36 @@ struct pm_scan_arg { > > > __u64 return_mask; > > > }; > > > > > > +/* /proc//maps ioctl */ > > > +#define PROCFS_IOCTL_MAGIC 0x9f > > > > Don't you need to document this in the proper place? > > I probably do, but I'm asking for help in knowing where. procfs is not > a typical area of kernel I'm working with, so any pointers are highly > appreciated. > > > > > > +#define PROCFS_PROCMAP_QUERY _IOWR(PROCFS_IOCTL_MAGIC, 1, struct procfs_procmap_query) > > > + > > > +enum procmap_query_flags { > > > + PROCFS_PROCMAP_EXACT_OR_NEXT_VMA = 0x01, > > > +}; > > > + > > > +enum procmap_vma_flags { > > > + PROCFS_PROCMAP_VMA_READABLE = 0x01, > > > + PROCFS_PROCMAP_VMA_WRITABLE = 0x02, > > > + PROCFS_PROCMAP_VMA_EXECUTABLE = 0x04, > > > + PROCFS_PROCMAP_VMA_SHARED = 0x08, > > > > Are these bits? If so, please use the bit macro for it to make it > > obvious. > > > > Yes, they are. When I tried BIT(1), it didn't compile. I chose not to > add any extra #includes to this UAPI header, but I can figure out the > necessary dependency and do BIT(), I just didn't feel like BIT() adds > much here, tbh. > > > > +}; > > > + > > > +struct procfs_procmap_query { > > > + __u64 size; > > > + __u64 query_flags; /* in */ > > > > Does this map to the procmap_vma_flags enum? if so, please say so. > > no, procmap_query_flags, and yes, I will > > > > > > + __u64 query_addr; /* in */ > > > + __u64 vma_start; /* out */ > > > + __u64 vma_end; /* out */ > > > + __u64 vma_flags; /* out */ > > > + __u64 vma_offset; /* out */ > > > + __u64 inode; /* out */ > > > > What is the inode for, you have an inode for the file already, why give > > it another one? > > This is inode of vma's backing file, same as /proc//maps' file > column. What inode of file do I already have here? You mean of > /proc//maps itself? It's useless for the intended purposes. > > > > > > + __u32 dev_major; /* out */ > > > + __u32 dev_minor; /* out */ > > > > What is major/minor for? > > This is the same information as emitted by /proc//maps, > identifies superblock of vma's backing file. As I mentioned above, it > can be used for caching per-file (i.e., per-ELF binary) information > (for example). > > > > > > + __u32 vma_name_size; /* in/out */ > > > + __u32 build_id_size; /* in/out */ > > > + __u64 vma_name_addr; /* in */ > > > + __u64 build_id_addr; /* in */ > > > > Why not document this all using kerneldoc above the structure? > > Yes, sorry, I slacked a bit on adding this upfront. I knew we'll be > figuring out the best place and approach, and so wanted to avoid > documentation churn. > > Would something like what we have for pm_scan_arg and pagemap APIs > work? I see it added a few simple descriptions for pm_scan_arg struct, > and there is Documentation/admin-guide/mm/pagemap.rst. Should I add > Documentation/admin-guide/mm/procmap.rst (admin-guide part feels off, > though)? Anyways, I'm hoping for pointers where all this should be > documented. Thank you! > > > > > anyway, I don't like ioctls, but there is a place for them, you just > > have to actually justify the use for them and not say "not efficient > > enough" as that normally isn't an issue overall. > > I've written a demo tool in patch #5 which performs real-world task: > mapping addresses to their VMAs (specifically calculating file offset, > finding vma_start + vma_end range to further access files from > /proc//map_files/-). I did the implementation > faithfully, doing it in the most optimal way for both APIs. I showed > that for "typical" (it's hard to specify what typical is, of course, > too many variables) scenario (it was data collected on a real server > running real service, 30 seconds of process-specific stack traces were > captured, if I remember correctly). I showed that doing exactly the > same amount of work is ~35x times slower with /proc//maps. > > Take another process, another set of addresses, another anything, and > the numbers will be different, but I think it gives the right idea. > > But I think we are overpivoting on text vs binary distinction here. > It's the more targeted querying of VMAs that's beneficial here. This > allows applications to not cache anything and just re-query when doing > periodic or continuous profiling (where addresses are coming in not as > one batch, as a sequence of batches extended in time). > > /proc//maps, for all its usefulness, just can't provide this sort > of ability, as it wasn't designed to do that and is targeting > different use cases. > > And then, a new ability to request reliable (it's not 100% reliable > today, I'm going to address that as a follow up) build ID is *crucial* > for some scenarios. The mentioned Oculus use case, the need to fully > access underlying ELF binary just to get build ID is frowned upon. And > for a good reason. Profiler only needs build ID, which is no secret > and not sensitive information. This new (and binary, yes) API allows > to add this into an API without breaking any backwards compatibility. > > > > > thanks, > > > > greg k-h