Home
last modified time | relevance | path

Searched refs:CAP_PERFMON (Results 1 – 13 of 13) sorted by relevance

/linux-6.3-rc2/tools/perf/util/
A Dcap.h32 #ifndef CAP_PERFMON
33 #define CAP_PERFMON 38 macro
A Dutil.c327 perf_cap__capable(CAP_PERFMON) || in perf_event_paranoid_check()
/linux-6.3-rc2/tools/testing/selftests/bpf/
A Dcap_helpers.h8 #ifndef CAP_PERFMON
9 #define CAP_PERFMON 38 macro
A Dtest_verifier.c77 1ULL << CAP_PERFMON | \
/linux-6.3-rc2/Documentation/admin-guide/
A Dperf-security.rst69 Unprivileged processes with enabled CAP_PERFMON capability are treated
72 checks in the kernel. CAP_PERFMON implements the principle of least
80 use cases is discouraged with respect to the CAP_PERFMON capability.
82 API contain denial records of acquiring both CAP_PERFMON and CAP_SYS_ADMIN
83 capabilities then providing the process with CAP_PERFMON capability singly
92 CAP_SYS_PTRACE capability is not required and CAP_PERFMON is enough to
158 To get kernel and user samples with a perf binary with just CAP_PERFMON.
169 inherent processes with CAP_PERFMON and other required capabilities so that
175 1. Create shell script that uses capsh utility [16]_ to assign CAP_PERFMON
197 shell and have CAP_PERFMON and other required capabilities enabled
[all …]
/linux-6.3-rc2/include/uapi/linux/
A Dcapability.h380 #define CAP_PERFMON 38 macro
/linux-6.3-rc2/include/linux/
A Dcapability.h197 return capable(CAP_PERFMON) || capable(CAP_SYS_ADMIN); in perfmon_capable()
/linux-6.3-rc2/tools/perf/Documentation/
A Dsecurity.txt131 can be limited for superuser or CAP_PERFMON or CAP_SYS_ADMIN privileged
144 without CAP_PERFMON or CAP_SYS_ADMIN Linux capability.
A Dperf-intel-pt.txt784 which in turn requires CAP_PERFMON or CAP_SYS_ADMIN.
/linux-6.3-rc2/tools/perf/
A Dbuiltin-ftrace.c572 if (!(perf_cap__capable(CAP_PERFMON) || in __cmd_ftrace()
886 if (!(perf_cap__capable(CAP_PERFMON) || in __cmd_latency()
A Ddesign.txt264 all events on CPU-x. Per CPU counters need CAP_PERFMON or CAP_SYS_ADMIN
/linux-6.3-rc2/Documentation/admin-guide/sysctl/
A Dkernel.rst885 users (without CAP_PERFMON). The default value is 2.
891 with respect to CAP_PERFMON use cases.
900 ``CAP_PERFMON``.
902 Disallow raw tracepoint access by users without ``CAP_PERFMON``.
904 >=1 Disallow CPU event access by users without ``CAP_PERFMON``.
906 >=2 Disallow kernel profiling by users without ``CAP_PERFMON``.
/linux-6.3-rc2/tools/bpf/bpftool/
A Dfeature.c1055 capability(CAP_PERFMON), in handle_perms()

Completed in 30 milliseconds