aboutsummaryrefslogtreecommitdiffstats
path: root/kernel/events/core.c
diff options
context:
space:
mode:
authorStephane Eranian <eranian@google.com>2013-06-06 05:02:04 -0400
committerIngo Molnar <mingo@kernel.org>2013-06-19 06:50:21 -0400
commite712209a9e0b70e78b13847738eb66fe37412515 (patch)
tree06a024f28b795d3b8aee32ce01b4ec94026e7b2c /kernel/events/core.c
parenteff2108f020f30eb90462205ecf3ce10a420938b (diff)
perf: Fix hypervisor branch sampling permission check
Commit 2b923c8 perf/x86: Check branch sampling priv level in generic code was missing the check for the hypervisor (HV) priv level, so add it back. With this patch, we get the following correct behavior: # echo 2 >/proc/sys/kernel/perf_event_paranoid $ perf record -j any,k noploop 1 Error: You may not have permission to collect stats. Consider tweaking /proc/sys/kernel/perf_event_paranoid: -1 - Not paranoid at all 0 - Disallow raw tracepoint access for unpriv 1 - Disallow cpu events for unpriv 2 - Disallow kernel profiling for unpriv $ perf record -j any,hv noploop 1 Error: You may not have permission to collect stats. Consider tweaking /proc/sys/kernel/perf_event_paranoid: -1 - Not paranoid at all 0 - Disallow raw tracepoint access for unpriv 1 - Disallow cpu events for unpriv 2 - Disallow kernel profiling for unpriv Signed-off-by: Stephane Eranian <eranian@google.com> Acked-by: Petr Matousek <pmatouse@redhat.com> Signed-off-by: Peter Zijlstra <peterz@infradead.org> Link: http://lkml.kernel.org/r/20130606090204.GA3725@quad Signed-off-by: Ingo Molnar <mingo@kernel.org>
Diffstat (limited to 'kernel/events/core.c')
-rw-r--r--kernel/events/core.c4
1 files changed, 2 insertions, 2 deletions
diff --git a/kernel/events/core.c b/kernel/events/core.c
index d0e0d0d2025f..aca95bce34c8 100644
--- a/kernel/events/core.c
+++ b/kernel/events/core.c
@@ -6573,8 +6573,8 @@ static int perf_copy_attr(struct perf_event_attr __user *uattr,
6573 */ 6573 */
6574 attr->branch_sample_type = mask; 6574 attr->branch_sample_type = mask;
6575 } 6575 }
6576 /* kernel level capture: check permissions */ 6576 /* privileged levels capture (kernel, hv): check permissions */
6577 if ((mask & PERF_SAMPLE_BRANCH_KERNEL) 6577 if ((mask & PERF_SAMPLE_BRANCH_PERM_PLM)
6578 && perf_paranoid_kernel() && !capable(CAP_SYS_ADMIN)) 6578 && perf_paranoid_kernel() && !capable(CAP_SYS_ADMIN))
6579 return -EACCES; 6579 return -EACCES;
6580 } 6580 }