Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp842733pxu; Mon, 23 Nov 2020 05:40:49 -0800 (PST) X-Google-Smtp-Source: ABdhPJyBl+EpwLs8/UAalA62xWY/I0/J41XgwTtvJTlDN3J3fTtV+cyBC+xSX5xc9HYEoUTM3mRH X-Received: by 2002:a17:906:e15:: with SMTP id l21mr45786939eji.509.1606138848585; Mon, 23 Nov 2020 05:40:48 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1606138848; cv=none; d=google.com; s=arc-20160816; b=SsE4jxtke8Vq475Gg1DBFIfljWMjuUJIF2Pg2IvIJBl2taK28mWvYBOqkXwVJykW3E 2dj6HWaC21o7Csi4kV1xg21A2qSL3uT7cfaQ4VP9rIl0W1td0i0RZB+wghN0ekv80xYn 0FXVoiT2Ytma3G1Mar6/jwEtwNJ5jg+GUbW41PFL0I//hktgNbhp77p8clfvdLOsdeit MEiUz5VUuTUiAd0jXtrbrkt2bK9Jo3wIf7WASCcoH3UaNTN6EBXpk0oPkQ4YSKbkI9T/ jYTPQrp7tlno2ja2aSphOZpZ2Wtjhry9w1ucKhLfURMJKCfmsdL0EfW5DX9zpqskJqGU NAWQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=ZlTa/tkn48A/8dOuYRfQLbJI9IeiMq2MbyX26pf36mQ=; b=Z4ljOP03WWld6KyZ+BCVbkBteT8MCOAEoegQAo2X7wDJEksI9GP5S2i/gkCMs4s7eD BoVA5z9z/J1L2FfV6y9Mq6dnmQAuvQsoxNwIwdr8frVMr0MiVWtf/2meBnSwe93GVHsQ z6VvR4QfLLTk8I0GJO6c2dwQw6BvU91IhJBgtRH4VUU4XA+sYGN/qVckg6fM5dyIQJ9F aDfwBan0GWYY0uS4KzyjsP0PQPlADLtg4Ey4HTdntoFR5u0lpqJFQCfQoSWz+v1UdoXG VKtDHK8CB2CkzOrU8tNARViBQdE0WaCUpakW9CIrkqQ/zpo96MyTSZDRFZkX/x/vYXSx dACg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=ibujwRDr; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y1si3678474edp.385.2020.11.23.05.40.25; Mon, 23 Nov 2020 05:40:48 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=ibujwRDr; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730411AbgKWNe4 (ORCPT + 99 others); Mon, 23 Nov 2020 08:34:56 -0500 Received: from mail.kernel.org ([198.145.29.99]:33254 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729713AbgKWMX7 (ORCPT ); Mon, 23 Nov 2020 07:23:59 -0500 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 915A92076E; Mon, 23 Nov 2020 12:23:58 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1606134239; bh=aheUR8BdLnRwTwuMCdOH5VMxLk5EdkoELalPBNjEmZg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ibujwRDrwB8ZnAeALI1YR6DD2jTKgtX9xGE3yp/9TLz/KUZ9uUeGSco0aZKudQ0iF rh8QMBE2zUtZxXfRsrpitA3Eu16u4mQAedRQi2PUocBjTItbHChh2LYAAc62VH6AAu VWejgXArWfBTRrP0JJCFE2tuLuH+ldARNrrHzF60= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Thomas Richter , Sumanth Korikkar , Heiko Carstens Subject: [PATCH 4.4 37/38] s390/cpum_sf.c: fix file permission for cpum_sfb_size Date: Mon, 23 Nov 2020 13:22:23 +0100 Message-Id: <20201123121806.070380991@linuxfoundation.org> X-Mailer: git-send-email 2.29.2 In-Reply-To: <20201123121804.306030358@linuxfoundation.org> References: <20201123121804.306030358@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Thomas Richter commit 78d732e1f326f74f240d416af9484928303d9951 upstream. This file is installed by the s390 CPU Measurement sampling facility device driver to export supported minimum and maximum sample buffer sizes. This file is read by lscpumf tool to display the details of the device driver capabilities. The lscpumf tool might be invoked by a non-root user. In this case it does not print anything because the file contents can not be read. Fix this by allowing read access for all users. Reading the file contents is ok, changing the file contents is left to the root user only. For further reference and details see: [1] https://github.com/ibm-s390-tools/s390-tools/issues/97 Fixes: 69f239ed335a ("s390/cpum_sf: Dynamically extend the sampling buffer if overflows occur") Cc: # 3.14 Signed-off-by: Thomas Richter Acked-by: Sumanth Korikkar Signed-off-by: Heiko Carstens Signed-off-by: Greg Kroah-Hartman --- arch/s390/kernel/perf_cpum_sf.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/arch/s390/kernel/perf_cpum_sf.c +++ b/arch/s390/kernel/perf_cpum_sf.c @@ -1666,4 +1666,4 @@ out: return err; } arch_initcall(init_cpum_sampling_pmu); -core_param(cpum_sfb_size, CPUM_SF_MAX_SDB, sfb_size, 0640); +core_param(cpum_sfb_size, CPUM_SF_MAX_SDB, sfb_size, 0644);