lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <3cbcf862-0608-4174-a286-dc73a9b9fc7c@amd.com>
Date: Thu, 24 Oct 2024 11:35:01 +0530
From: Ravi Bangoria <ravi.bangoria@....com>
To: Peter Zijlstra <peterz@...radead.org>, Ingo Molnar <mingo@...nel.org>
Cc: Kan Liang <kan.liang@...ux.intel.com>, Mark Rutland
 <mark.rutland@....com>,
 Alexander Shishkin <alexander.shishkin@...ux.intel.com>,
 Arnaldo Carvalho de Melo <acme@...nel.org>,
 LKML <linux-kernel@...r.kernel.org>, Stephane Eranian <eranian@...gle.com>,
 Sandipan Das <sandipan.das@....com>, Namhyung Kim <namhyung@...nel.org>,
 Ravi Bangoria <ravi.bangoria@....com>
Subject: Re: [PATCH v4 0/5] perf: Relax privilege restriction on AMD IBS

> This is RFC v3 to allow AMD IBS to regular users on the default settings
> where kernel-level profiling is disabled (perf_event_paranoid=2).
> Currently AMD IBS doesn't allow any kind of exclusion in the event
> attribute.  But users needs to set attr.exclude_kernel to open an event
> on such an environment.

FWIW, IBS code had few issues with sample period computation which can
lead to SW programing unsupported values to IBS MSRs. Since this series
expose IBS to unprivileged users, below series is a logical dependency:

https://lore.kernel.org/r/20241007034810.754-1-ravi.bangoria@amd.com

Thanks,
Ravi

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ