lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <172501332409.1008166.7238309612916378266.b4-ty@kernel.org>
Date: Fri, 30 Aug 2024 17:12:11 +0100
From: Will Deacon <will@...nel.org>
To: linux-arm-kernel@...ts.infradead.org,
	James Clark <james.clark@...aro.org>
Cc: catalin.marinas@....com,
	kernel-team@...roid.com,
	Will Deacon <will@...nel.org>,
	peterz@...radead.org,
	Al Grant <al.grant@....com>,
	Mark Rutland <mark.rutland@....com>,
	Ingo Molnar <mingo@...hat.com>,
	Arnaldo Carvalho de Melo <acme@...nel.org>,
	Namhyung Kim <namhyung@...nel.org>,
	Alexander Shishkin <alexander.shishkin@...ux.intel.com>,
	Jiri Olsa <jolsa@...nel.org>,
	Ian Rogers <irogers@...gle.com>,
	Adrian Hunter <adrian.hunter@...el.com>,
	"Liang, Kan" <kan.liang@...ux.intel.com>,
	linux-kernel@...r.kernel.org,
	linux-perf-users@...r.kernel.org
Subject: Re: [PATCH v3] drivers/perf: arm_spe: Use perf_allow_kernel() for permissions

On Tue, 27 Aug 2024 15:51:12 +0100, James Clark wrote:
> Use perf_allow_kernel() for 'pa_enable' (physical addresses),
> 'pct_enable' (physical timestamps) and context IDs. This means that
> perf_event_paranoid is now taken into account and LSM hooks can be used,
> which is more consistent with other perf_event_open calls. For example
> PERF_SAMPLE_PHYS_ADDR uses perf_allow_kernel() rather than just
> perfmon_capable().
> 
> [...]

Applied to arm64 (for-next/perf), thanks!

[1/1] drivers/perf: arm_spe: Use perf_allow_kernel() for permissions
      https://git.kernel.org/arm64/c/5e9629d0ae97

Cheers,
-- 
Will

https://fixes.arm64.dev
https://next.arm64.dev
https://will.arm64.dev

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ