Home
last modified time | relevance | path

Searched refs:CAP_PERFMON (Results 1 – 25 of 25) sorted by relevance

/linux/tools/perf/util/
H A Dcap.h13 #ifndef CAP_PERFMON
14 #define CAP_PERFMON 38 macro
H A Dutil.c339 if (!used_root && perf_cap__capable(CAP_PERFMON, &used_root)) in perf_event_paranoid_check()
/linux/tools/testing/selftests/bpf/
H A Dcap_helpers.h9 #ifndef CAP_PERFMON
10 #define CAP_PERFMON 38 macro
H A Dtest_loader.c943 1ULL << CAP_PERFMON | 1ULL << CAP_BPF); in drop_capabilities()
H A Dtest_verifier.c70 1ULL << CAP_PERFMON | \
/linux/Documentation/admin-guide/
H A Dperf-security.rst69 Unprivileged processes with enabled CAP_PERFMON capability are treated
72 checks in the kernel. CAP_PERFMON implements the principle of least
80 use cases is discouraged with respect to the CAP_PERFMON capability.
82 API contain denial records of acquiring both CAP_PERFMON and CAP_SYS_ADMIN
83 capabilities then providing the process with CAP_PERFMON capability singly
92 CAP_SYS_PTRACE capability is not required and CAP_PERFMON is enough to
150 Using a libcap without support for CAP_PERFMON will make cap_get_flag(caps, 38,
158 To get kernel and user samples with a perf binary with just CAP_PERFMON.
169 inherent processes with CAP_PERFMON and other required capabilities so that
175 1. Create shell script that uses capsh utility [16]_ to assign CAP_PERFMON
[all …]
/linux/include/uapi/linux/
H A Dcapability.h383 #define CAP_PERFMON 38 macro
/linux/include/linux/
H A Dcapability.h192 return capable(CAP_PERFMON) || capable(CAP_SYS_ADMIN); in perfmon_capable()
H A Dbpf.h2561 return bpf_token_capable(token, CAP_PERFMON); in bpf_allow_ptr_leaks()
2566 return bpf_token_capable(token, CAP_PERFMON); in bpf_allow_uninit_stack()
2573 bpf_token_capable(token, CAP_PERFMON); in bpf_bypass_spec_v1()
2580 bpf_token_capable(token, CAP_PERFMON); in bpf_bypass_spec_v4()
/linux/tools/testing/selftests/bpf/progs/
H A Dbpf_misc.h166 #define CAP_PERFMON 38 macro
/linux/Documentation/trace/
H A Duser_events.rst20 requires CAP_PERFMON due to the event persisting, otherwise -EPERM is returned.
92 process closes or unregisters the event. Requires CAP_PERFMON otherwise
180 event that persists requires CAP_PERFMON, otherwise -EPERM is returned. When
/linux/tools/perf/Documentation/
H A Dsecurity.txt131 can be limited for superuser or CAP_PERFMON or CAP_SYS_ADMIN privileged
144 without CAP_PERFMON or CAP_SYS_ADMIN Linux capability.
H A Dperf-amd-ibs.txt37 CAP_SYS_ADMIN or CAP_PERFMON privilege.
H A Dperf-intel-pt.txt842 which in turn requires CAP_PERFMON or CAP_SYS_ADMIN.
/linux/drivers/media/rc/
H A Dbpf-lirc.c113 if (bpf_token_capable(prog->aux->token, CAP_PERFMON)) in lirc_mode2_func_proto()
/linux/tools/testing/selftests/bpf/prog_tests/
H A Dtc_bpf.c408 ret = cap_disable_effective(1ULL << CAP_SYS_ADMIN | 1ULL << CAP_PERFMON, NULL); in tc_bpf_non_root()
H A Dtoken.c61 (1ULL << CAP_PERFMON) | in drop_priv_caps()
/linux/Documentation/admin-guide/sysctl/
H A Dkernel.rst972 users (without CAP_PERFMON). The default value is 2.
978 with respect to CAP_PERFMON use cases.
987 ``CAP_PERFMON``.
989 Disallow raw tracepoint access by users without ``CAP_PERFMON``.
991 >=1 Disallow CPU event access by users without ``CAP_PERFMON``.
993 >=2 Disallow kernel profiling by users without ``CAP_PERFMON``.
/linux/tools/bpf/bpftool/
H A Dfeature.c997 capability(CAP_PERFMON), in handle_perms()
/linux/tools/perf/
H A Ddesign.txt264 all events on CPU-x. Per CPU counters need CAP_PERFMON or CAP_SYS_ADMIN
H A Dbuiltin-ftrace.c75 if (perf_cap__capable(CAP_PERFMON, &used_root)) in check_ftrace_capable()
/linux/kernel/bpf/
H A Dsyscall.c2931 if (is_perfmon_prog_type(type) && !bpf_token_capable(token, CAP_PERFMON)) in bpf_prog_load()
6407 return !bpf_token_capable(prog->aux->token, CAP_PERFMON) in syscall_prog_func_proto()
H A Dhelpers.c2057 if (!bpf_token_capable(prog->aux->token, CAP_PERFMON)) in bpf_base_func_proto()
/linux/Documentation/filesystems/
H A Dproc.rst113 PTRACE_MODE_READ access permissions, or, alternatively, CAP_PERFMON
117 PTRACE_MODE_ATTACH permissions; CAP_PERFMON capability does not grant access
/linux/net/core/
H A Dfilter.c12003 if (!bpf_token_capable(prog->aux->token, CAP_PERFMON)) in bpf_sk_base_func_proto()