55

I'm running debian testing with the 4.1 kernel and version 4.1 of the perf tool. In this version they seem to have added some sort of protection to keep normal users from collecting data from that tool. So running perf as normal user will give this error:

perf stat ls
Error:
You may not have permission to collect stats.
Consider tweaking /proc/sys/kernel/perf_event_paranoid:
 -1 - Not paranoid at all
  0 - Disallow raw tracepoint access for unpriv
  1 - Disallow cpu events for unpriv
  2 - Disallow kernel profiling for unpriv

perf_event_paranoid contains 3 in my installation. Unfortunately I can't change that file even as root. How can I allow my own user to use perf without sudo rights?

I have an application I would like to benchmark which doesn't need root and I don't want to run it as root to benchmark it.

2

1 Answer 1

86

Files in /proc that are writable are usually changed by echoing a value into them. You should try:

sudo sh -c 'echo 1 >/proc/sys/kernel/perf_event_paranoid'

The files under /proc/sys/ also have the sysctl command for easy access, so you can instead do:

sudo sysctl -w kernel.perf_event_paranoid=1

(though the -w for write seems to be optional). To ensure this is done at boot time create your own /etc/sysctl.d/99-mysettings.conf file with the line

kernel.perf_event_paranoid=1

Choose a filename that will not override existing files in /run/sysctl.d/ and /usr/lib/sysctl.d/. See man sysctl.d.

5
  • 17
    To persist across reboots: sudo sh -c 'echo kernel.perf_event_paranoid=1 > /etc/sysctl.d/local.conf'
    – Márcio
    Commented Mar 12, 2017 at 6:43
  • 1
    add the comment to the answer, please
    – Leos313
    Commented Aug 13, 2019 at 11:14
  • 13
    @Márcio: You want to append to local.conf, not truncate. Or write to /etc/sysctl.d/perf.conf Commented Nov 5, 2019 at 10:59
  • Was able to change the value, but still got the same error (Tried -1,0,1)
    – Jasper Wu
    Commented Jan 28, 2023 at 0:00
  • 1
    This is also useful reading unix.stackexchange.com/questions/519070/… (setting capabilities for perf) & the discussion it points to kernel.org/doc/html/latest/admin-guide/perf-security.html Commented May 1, 2023 at 8:46

You must log in to answer this question.

Not the answer you're looking for? Browse other questions tagged .