lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 11 Sep 2015 17:22:22 -0300 From: Arnaldo Carvalho de Melo <arnaldo.melo@...il.com> To: Raphaël Beamonte <raphael.beamonte@...il.com> Cc: Jiri Olsa <jolsa@...hat.com>, Namhyung Kim <namhyung@...nel.org>, Jiri Olsa <jolsa@...nel.org>, lkml <linux-kernel@...r.kernel.org>, David Ahern <dsahern@...il.com>, Ingo Molnar <mingo@...nel.org>, Peter Zijlstra <a.p.zijlstra@...llo.nl>, Matt Fleming <matt@...eblueprint.co.uk> Subject: Re: [PATCH 5/5] perf tools: Enhance parsing events tracepoint error output Em Fri, Sep 11, 2015 at 03:56:44PM -0400, Raphaël Beamonte escreveu: > Another possibility would be to have another perf command, sort of a > "perf remountfs", to run with sudo and that would make itself both > checks and remount accordingly the two fs. This part maybe more interesting, so I'll focus on it, yeah, having a: 'perf fixperms' command (have a better name? :) ) may make sense, would need context tho, i.e. something like: perf fixperms trace Or: perf fixperms top But then, perhaps in that case: $ trace ls Error: No permissions to read /sys/kernel/debug/tracing/events/raw_syscalls/sys_(enter|exit) Hint: Try 'sudo mount -o remount,mode=755 /sys/kernel/debug' We could just add some more text saying that please check as well that the other parts of the path we're trying to access are available once the suggestion is followed. - Arnaldo -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists