lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CAP-5=fWQUE4YxbAK4-qV44WFXYjo_EPy1XcVSrOYVP=rTspKnQ@mail.gmail.com>
Date: Fri, 12 Sep 2025 16:37:59 -0700
From: Ian Rogers <irogers@...gle.com>
To: Arnaldo Carvalho de Melo <acme@...nel.org>
Cc: Namhyung Kim <namhyung@...nel.org>, Ravi Bangoria <ravi.bangoria@....com>, 
	Peter Zijlstra <peterz@...radead.org>, Ingo Molnar <mingo@...hat.com>, 
	Mark Rutland <mark.rutland@....com>, 
	Alexander Shishkin <alexander.shishkin@...ux.intel.com>, Jiri Olsa <jolsa@...nel.org>, 
	Adrian Hunter <adrian.hunter@...el.com>, Kan Liang <kan.liang@...ux.intel.com>, 
	Collin Funk <collin.funk1@...il.com>, James Clark <james.clark@...aro.org>, 
	linux-perf-users@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: [PATCH v1] perf test: AMD IBS swfilt skip kernel tests if
 paranoia is >1

On Fri, Sep 12, 2025 at 2:53 PM Arnaldo Carvalho de Melo
<acme@...nel.org> wrote:
>
> On Mon, Sep 08, 2025 at 04:35:11PM -0700, Namhyung Kim wrote:
> > Hi Ian,
> >
> > On Mon, Sep 08, 2025 at 03:17:27PM -0700, Ian Rogers wrote:
> > > If not root and the perf_event_paranoid is set >1 swfilt will fail to
> > > open the event failing the test. Add check to skip the test in that
> > > case.
> >
> > Thanks for the fix!
>
> I'm taking this as an Acked-by, ok?

I have a new version but I'm discovering quite a few other issues on
the way. There are 7 patches on top of this here:
https://github.com/googleprodkernel/linux-perf/commits/google_tools_master/
I'll send the new version now, but I'd been tardy as it wasn't clear I
was done with fixes yet.

Thanks,
Ian

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ