Searched refs:CAP_SYSLOG (Results 1 - 17 of 17) sorted by relevance
/kernel/linux/linux-5.10/tools/perf/util/ |
H A D | cap.h | 28 #ifndef CAP_SYSLOG 29 #define CAP_SYSLOG 34 macro
|
H A D | symbol.c | 2420 value = perf_cap__capable(CAP_SYSLOG) ? in symbol__read_kptr_restrict() 2428 * we also restrict when perf_event_paranoid > 1 w/o CAP_SYSLOG in symbol__read_kptr_restrict() 2430 if (perf_event_paranoid() > 1 && !perf_cap__capable(CAP_SYSLOG)) in symbol__read_kptr_restrict()
|
/kernel/linux/linux-6.6/tools/perf/util/ |
H A D | cap.h | 28 #ifndef CAP_SYSLOG 29 #define CAP_SYSLOG 34 macro
|
H A D | symbol.c | 2634 value = perf_cap__capable(CAP_SYSLOG) ? in symbol__read_kptr_restrict() 2642 * we also restrict when perf_event_paranoid > 1 w/o CAP_SYSLOG in symbol__read_kptr_restrict() 2644 if (perf_event_paranoid() > 1 && !perf_cap__capable(CAP_SYSLOG)) in symbol__read_kptr_restrict()
|
/kernel/linux/linux-6.6/kernel/ |
H A D | ksyms_common.c | 25 * Otherwise, require CAP_SYSLOG (assuming kptr_restrict isn't set to 36 if (security_capable(cred, &init_user_ns, CAP_SYSLOG, in kallsyms_show_value()
|
/kernel/linux/linux-5.10/include/uapi/linux/ |
H A D | capability.h | 362 #define CAP_SYSLOG 34 macro
|
/kernel/linux/linux-6.6/include/uapi/linux/ |
H A D | capability.h | 362 #define CAP_SYSLOG 34 macro
|
/kernel/linux/patches/linux-6.6/prebuilts/usr/include/linux/ |
H A D | capability.h | 104 #define CAP_SYSLOG 34 macro
|
/kernel/linux/patches/linux-5.10/prebuilts/usr/include/linux/ |
H A D | capability.h | 104 #define CAP_SYSLOG 34 macro
|
/kernel/linux/patches/linux-4.19/prebuilts/usr/include/linux/ |
H A D | capability.h | 93 #define CAP_SYSLOG 34 macro
|
/kernel/linux/linux-5.10/tools/testing/selftests/kmod/ |
H A D | kmod.sh | 483 local unpriv=$(capsh --drop=CAP_SYSLOG -- -c "$cmd") 526 echo "0012 x $(get_test_count 0012) - test /proc/modules address visibility under CAP_SYSLOG" 527 echo "0013 x $(get_test_count 0013) - test /sys/module/*/sections/* visibility under CAP_SYSLOG"
|
/kernel/linux/linux-6.6/tools/testing/selftests/kmod/ |
H A D | kmod.sh | 472 local unpriv=$(capsh --drop=CAP_SYSLOG -- -c "$cmd") 515 echo "0012 x $(get_test_count 0012) - test /proc/modules address visibility under CAP_SYSLOG" 516 echo "0013 x $(get_test_count 0013) - test /sys/module/*/sections/* visibility under CAP_SYSLOG"
|
/kernel/linux/linux-5.10/kernel/ |
H A D | kallsyms.c | 743 * Otherwise, require CAP_SYSLOG (assuming kptr_restrict isn't set to 754 if (security_capable(cred, &init_user_ns, CAP_SYSLOG, in kallsyms_show_value()
|
/kernel/linux/linux-5.10/kernel/printk/ |
H A D | printk.c | 566 if (capable(CAP_SYSLOG)) in check_syslog_permissions() 574 "CAP_SYS_ADMIN but no CAP_SYSLOG " in check_syslog_permissions()
|
/kernel/linux/linux-5.10/lib/ |
H A D | vsprintf.c | 867 * because its test for CAP_SYSLOG would be meaningless. in restricted_pointer() 877 * process has CAP_SYSLOG and is running with the in restricted_pointer() 885 if (!has_capability_noaudit(current, CAP_SYSLOG) || in restricted_pointer()
|
/kernel/linux/linux-6.6/kernel/printk/ |
H A D | printk.c | 599 if (capable(CAP_SYSLOG)) in check_syslog_permissions() 607 "CAP_SYS_ADMIN but no CAP_SYSLOG " in check_syslog_permissions()
|
/kernel/linux/linux-6.6/lib/ |
H A D | vsprintf.c | 864 * because its test for CAP_SYSLOG would be meaningless. in restricted_pointer() 874 * process has CAP_SYSLOG and is running with the in restricted_pointer() 882 if (!has_capability_noaudit(current, CAP_SYSLOG) || in restricted_pointer()
|
Completed in 29 milliseconds