Home
last modified time | relevance | path

Searched refs:kptr_restrict (Results 1 – 12 of 12) sorted by relevance

/linux/kernel/
H A Dksyms_common.c22 * kernel profiling and are explicitly not paranoid (so kptr_restrict
25 * Otherwise, require CAP_SYSLOG (assuming kptr_restrict isn't set to
30 switch (kptr_restrict) { in kallsyms_show_value()
/linux/tools/perf/util/
H A Dsymbol_conf.h31 kptr_restrict, member
H A Dsymbol.c1019 if (symbol_conf.kptr_restrict) { in symbol__restricted_filename()
2450 FILE *fp = fopen("/proc/sys/kernel/kptr_restrict", "r"); in symbol__read_kptr_restrict()
2579 symbol_conf.kptr_restrict = symbol__read_kptr_restrict(); in symbol__init()
/linux/include/linux/
H A Dprintk.h388 extern int kptr_restrict;
/linux/Documentation/translations/zh_CN/core-api/
H A Dprintk-formats.rst
/linux/Documentation/admin-guide/sysctl/
H A Dkernel.rst551 kptr_restrict chapter
557 When ``kptr_restrict`` is set to 0 (the default) the address is hashed
561 When ``kptr_restrict`` is set to 1, kernel pointers printed using the
576 When ``kptr_restrict`` is set to 2, kernel pointers printed using
/linux/tools/perf/Documentation/
H A Dperf-probe.txt306 - /proc/sys/kernel/kptr_restrict = 2 (restrict all users) also prevents perf probe to retrieve the important information from kallsyms. You also need to set to 1 (restrict non CAP_SYSLOG users) for the above commands. Since the user-space probe doesn't need to access kallsyms, this is only for probing the kernel function (kprobes).
/linux/lib/
H A Dvsprintf.c857 int kptr_restrict __read_mostly;
863 switch (kptr_restrict) { in restricted_pointer()
871 * kptr_restrict==1 cannot be used in IRQ context in restricted_pointer()
/linux/Documentation/core-api/
H A Dprintk-formats.rst163 users. The behaviour of %pK depends on the kptr_restrict sysctl - see
/linux/tools/perf/
H A Dbuiltin-top.c785 symbol_conf.kptr_restrict && in perf_event__process_sample()
790 "Check /proc/sys/kernel/kptr_restrict and /proc/sys/kernel/perf_event_paranoid.\n\n" in perf_event__process_sample()
H A Dbuiltin-record.c1415 if (symbol_conf.kptr_restrict && !evlist__exclude_kernel(evlist)) { in record__open()
1418 "check /proc/sys/kernel/kptr_restrict and /proc/sys/kernel/perf_event_paranoid.\n\n" in record__open()
H A Dbuiltin-trace.c1970 if (symbol_conf.kptr_restrict) { in trace__machine__resolve_kernel_addr()
1972 "Check /proc/sys/kernel/kptr_restrict and /proc/sys/kernel/perf_event_paranoid.\n\n" in trace__machine__resolve_kernel_addr()