| /linux/tools/perf/util/ |
| H A D | cap.h | 13 #ifndef CAP_PERFMON 14 #define CAP_PERFMON 38 macro
|
| H A D | util.c | 339 if (!used_root && perf_cap__capable(CAP_PERFMON, &used_root)) in perf_event_paranoid_check()
|
| /linux/tools/testing/selftests/bpf/ |
| H A D | cap_helpers.h | 9 #ifndef CAP_PERFMON 10 #define CAP_PERFMON 38 macro
|
| H A D | test_loader.c | 943 1ULL << CAP_PERFMON | 1ULL << CAP_BPF); in drop_capabilities()
|
| H A D | test_verifier.c | 70 1ULL << CAP_PERFMON | \
|
| /linux/Documentation/admin-guide/ |
| H A D | perf-security.rst | 69 Unprivileged processes with enabled CAP_PERFMON capability are treated 72 checks in the kernel. CAP_PERFMON implements the principle of least 80 use cases is discouraged with respect to the CAP_PERFMON capability. 82 API contain denial records of acquiring both CAP_PERFMON and CAP_SYS_ADMIN 83 capabilities then providing the process with CAP_PERFMON capability singly 92 CAP_SYS_PTRACE capability is not required and CAP_PERFMON is enough to 150 Using a libcap without support for CAP_PERFMON will make cap_get_flag(caps, 38, 158 To get kernel and user samples with a perf binary with just CAP_PERFMON. 169 inherent processes with CAP_PERFMON and other required capabilities so that 175 1. Create shell script that uses capsh utility [16]_ to assign CAP_PERFMON [all …]
|
| /linux/include/uapi/linux/ |
| H A D | capability.h | 383 #define CAP_PERFMON 38 macro
|
| /linux/include/linux/ |
| H A D | capability.h | 192 return capable(CAP_PERFMON) || capable(CAP_SYS_ADMIN); in perfmon_capable()
|
| H A D | bpf.h | 2561 return bpf_token_capable(token, CAP_PERFMON); in bpf_allow_ptr_leaks() 2566 return bpf_token_capable(token, CAP_PERFMON); in bpf_allow_uninit_stack() 2573 bpf_token_capable(token, CAP_PERFMON); in bpf_bypass_spec_v1() 2580 bpf_token_capable(token, CAP_PERFMON); in bpf_bypass_spec_v4()
|
| /linux/tools/testing/selftests/bpf/progs/ |
| H A D | bpf_misc.h | 166 #define CAP_PERFMON 38 macro
|
| /linux/Documentation/trace/ |
| H A D | user_events.rst | 20 requires CAP_PERFMON due to the event persisting, otherwise -EPERM is returned. 92 process closes or unregisters the event. Requires CAP_PERFMON otherwise 180 event that persists requires CAP_PERFMON, otherwise -EPERM is returned. When
|
| /linux/tools/perf/Documentation/ |
| H A D | security.txt | 131 can be limited for superuser or CAP_PERFMON or CAP_SYS_ADMIN privileged 144 without CAP_PERFMON or CAP_SYS_ADMIN Linux capability.
|
| H A D | perf-amd-ibs.txt | 37 CAP_SYS_ADMIN or CAP_PERFMON privilege.
|
| H A D | perf-intel-pt.txt | 842 which in turn requires CAP_PERFMON or CAP_SYS_ADMIN.
|
| /linux/drivers/media/rc/ |
| H A D | bpf-lirc.c | 113 if (bpf_token_capable(prog->aux->token, CAP_PERFMON)) in lirc_mode2_func_proto()
|
| /linux/tools/testing/selftests/bpf/prog_tests/ |
| H A D | tc_bpf.c | 408 ret = cap_disable_effective(1ULL << CAP_SYS_ADMIN | 1ULL << CAP_PERFMON, NULL); in tc_bpf_non_root()
|
| H A D | token.c | 61 (1ULL << CAP_PERFMON) | in drop_priv_caps()
|
| /linux/Documentation/admin-guide/sysctl/ |
| H A D | kernel.rst | 972 users (without CAP_PERFMON). The default value is 2. 978 with respect to CAP_PERFMON use cases. 987 ``CAP_PERFMON``. 989 Disallow raw tracepoint access by users without ``CAP_PERFMON``. 991 >=1 Disallow CPU event access by users without ``CAP_PERFMON``. 993 >=2 Disallow kernel profiling by users without ``CAP_PERFMON``.
|
| /linux/tools/bpf/bpftool/ |
| H A D | feature.c | 997 capability(CAP_PERFMON), in handle_perms()
|
| /linux/tools/perf/ |
| H A D | design.txt | 264 all events on CPU-x. Per CPU counters need CAP_PERFMON or CAP_SYS_ADMIN
|
| H A D | builtin-ftrace.c | 75 if (perf_cap__capable(CAP_PERFMON, &used_root)) in check_ftrace_capable()
|
| /linux/kernel/bpf/ |
| H A D | syscall.c | 2931 if (is_perfmon_prog_type(type) && !bpf_token_capable(token, CAP_PERFMON)) in bpf_prog_load() 6407 return !bpf_token_capable(prog->aux->token, CAP_PERFMON) in syscall_prog_func_proto()
|
| H A D | helpers.c | 2057 if (!bpf_token_capable(prog->aux->token, CAP_PERFMON)) in bpf_base_func_proto()
|
| /linux/Documentation/filesystems/ |
| H A D | proc.rst | 113 PTRACE_MODE_READ access permissions, or, alternatively, CAP_PERFMON 117 PTRACE_MODE_ATTACH permissions; CAP_PERFMON capability does not grant access
|
| /linux/net/core/ |
| H A D | filter.c | 12003 if (!bpf_token_capable(prog->aux->token, CAP_PERFMON)) in bpf_sk_base_func_proto()
|