[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <172501332409.1008166.7238309612916378266.b4-ty@kernel.org>
Date: Fri, 30 Aug 2024 17:12:11 +0100
From: Will Deacon <will@...nel.org>
To: linux-arm-kernel@...ts.infradead.org,
James Clark <james.clark@...aro.org>
Cc: catalin.marinas@....com,
kernel-team@...roid.com,
Will Deacon <will@...nel.org>,
peterz@...radead.org,
Al Grant <al.grant@....com>,
Mark Rutland <mark.rutland@....com>,
Ingo Molnar <mingo@...hat.com>,
Arnaldo Carvalho de Melo <acme@...nel.org>,
Namhyung Kim <namhyung@...nel.org>,
Alexander Shishkin <alexander.shishkin@...ux.intel.com>,
Jiri Olsa <jolsa@...nel.org>,
Ian Rogers <irogers@...gle.com>,
Adrian Hunter <adrian.hunter@...el.com>,
"Liang, Kan" <kan.liang@...ux.intel.com>,
linux-kernel@...r.kernel.org,
linux-perf-users@...r.kernel.org
Subject: Re: [PATCH v3] drivers/perf: arm_spe: Use perf_allow_kernel() for permissions
On Tue, 27 Aug 2024 15:51:12 +0100, James Clark wrote:
> Use perf_allow_kernel() for 'pa_enable' (physical addresses),
> 'pct_enable' (physical timestamps) and context IDs. This means that
> perf_event_paranoid is now taken into account and LSM hooks can be used,
> which is more consistent with other perf_event_open calls. For example
> PERF_SAMPLE_PHYS_ADDR uses perf_allow_kernel() rather than just
> perfmon_capable().
>
> [...]
Applied to arm64 (for-next/perf), thanks!
[1/1] drivers/perf: arm_spe: Use perf_allow_kernel() for permissions
https://git.kernel.org/arm64/c/5e9629d0ae97
Cheers,
--
Will
https://fixes.arm64.dev
https://next.arm64.dev
https://will.arm64.dev
Powered by blists - more mailing lists