Searched refs:CAP_PERFMON (Results 1 – 13 of 13) sorted by relevance
32 #ifndef CAP_PERFMON33 #define CAP_PERFMON 38 macro
293 perf_cap__capable(CAP_PERFMON) || in perf_event_paranoid_check()
8 #ifndef CAP_PERFMON9 #define CAP_PERFMON 38 macro
66 1ULL << CAP_PERFMON | \
69 Unprivileged processes with enabled CAP_PERFMON capability are treated72 checks in the kernel. CAP_PERFMON implements the principle of least80 use cases is discouraged with respect to the CAP_PERFMON capability.82 API contain denial records of acquiring both CAP_PERFMON and CAP_SYS_ADMIN83 capabilities then providing the process with CAP_PERFMON capability singly92 CAP_SYS_PTRACE capability is not required and CAP_PERFMON is enough to150 Using a libcap without support for CAP_PERFMON will make cap_get_flag(caps, 38,158 To get kernel and user samples with a perf binary with just CAP_PERFMON.169 inherent processes with CAP_PERFMON and other required capabilities so that175 1. Create shell script that uses capsh utility [16]_ to assign CAP_PERFMON[all …]
380 #define CAP_PERFMON 38 macro
259 return capable(CAP_PERFMON) || capable(CAP_SYS_ADMIN); in perfmon_capable()
131 can be limited for superuser or CAP_PERFMON or CAP_SYS_ADMIN privileged144 without CAP_PERFMON or CAP_SYS_ADMIN Linux capability.
775 which in turn requires CAP_PERFMON or CAP_SYS_ADMIN.
572 if (!(perf_cap__capable(CAP_PERFMON) || in __cmd_ftrace()886 if (!(perf_cap__capable(CAP_PERFMON) || in __cmd_latency()
264 all events on CPU-x. Per CPU counters need CAP_PERFMON or CAP_SYS_ADMIN
838 users (without CAP_PERFMON). The default value is 2.844 with respect to CAP_PERFMON use cases.853 ``CAP_PERFMON``.855 Disallow raw tracepoint access by users without ``CAP_PERFMON``.857 >=1 Disallow CPU event access by users without ``CAP_PERFMON``.859 >=2 Disallow kernel profiling by users without ``CAP_PERFMON``.
1036 capability(CAP_PERFMON), in handle_perms()