Lines Matching refs:access
8 Enabling LSM based mandatory access control (MAC) to perf_event_open() syscall
11 LSM hooks for mandatory access control for perf_event_open() syscall can be
13 Targeted policy with perf_event_open() access control capabilities:
127 Opening access to perf_event_open() syscall on Fedora with SELinux
133 and prevent unauthorized access to perf_event_open() syscall. In such case
139 Enforced MAC policy settings (SELinux) can limit access to performance
141 more perf_event access control information and adjusting the policy.
143 access to performance monitoring and observability operations for users
148 >= 0: Disallow raw and ftrace function tracepoint access
149 >= 1: Disallow CPU event access
154 To make sure that access is limited by MAC policy settings inspect system
160 …python3[1318099]: SELinux is preventing perf from open access on the perf_event labeled unconfined…
161 …If you believe that perf should be allowed open access on perf_event labeled unconfined_t by defau…
162 …setroubleshoot[1318099]: SELinux is preventing perf from open access on the perf_event labeled unc…
165 In order to open access to perf_event_open() syscall MAC policy settings can
168 be generated using the system audit records about blocking perf_event access.
190 After all those taken steps above access to perf_event_open() syscall should
191 now be allowed by the policy settings. Check access running Perf like this: