Searched refs:kptr_restrict (Results 1 - 20 of 20) sorted by relevance
/kernel/linux/linux-6.6/kernel/ |
H A D | ksyms_common.c | 22 * kernel profiling and are explicitly not paranoid (so kptr_restrict 25 * Otherwise, require CAP_SYSLOG (assuming kptr_restrict isn't set to 30 switch (kptr_restrict) { in kallsyms_show_value()
|
/kernel/linux/linux-5.10/tools/perf/util/ |
H A D | symbol_conf.h | 30 kptr_restrict, member
|
H A D | symbol.c | 950 if (symbol_conf.kptr_restrict) { in symbol__restricted_filename() 2414 FILE *fp = fopen("/proc/sys/kernel/kptr_restrict", "r"); in symbol__read_kptr_restrict() 2510 symbol_conf.kptr_restrict = symbol__read_kptr_restrict(); in symbol__init()
|
H A D | auxtrace.c | 2338 if (symbol_conf.kptr_restrict) { in addr_filter__resolve_kernel_syms()
|
/kernel/linux/linux-6.6/tools/perf/util/ |
H A D | symbol_conf.h | 29 kptr_restrict, member
|
H A D | symbol.c | 1001 if (symbol_conf.kptr_restrict) { in symbol__restricted_filename() 2628 FILE *fp = fopen("/proc/sys/kernel/kptr_restrict", "r"); in symbol__read_kptr_restrict() 2724 symbol_conf.kptr_restrict = symbol__read_kptr_restrict(); in symbol__init()
|
H A D | auxtrace.c | 2508 if (symbol_conf.kptr_restrict) { in addr_filter__resolve_kernel_syms()
|
/kernel/linux/linux-6.6/kernel/printk/ |
H A D | sysctl.c | 71 .procname = "kptr_restrict", 72 .data = &kptr_restrict,
|
/kernel/linux/linux-5.10/include/linux/ |
H A D | printk.h | 285 extern int kptr_restrict;
|
/kernel/linux/linux-5.10/kernel/ |
H A D | kallsyms.c | 740 * kernel profiling and are explicitly not paranoid (so kptr_restrict 743 * Otherwise, require CAP_SYSLOG (assuming kptr_restrict isn't set to 748 switch (kptr_restrict) { in kallsyms_show_value()
|
H A D | sysctl.c | 2384 .procname = "kptr_restrict", 2385 .data = &kptr_restrict,
|
/kernel/linux/linux-6.6/include/linux/ |
H A D | printk.h | 329 extern int kptr_restrict;
|
/kernel/linux/linux-5.10/lib/ |
H A D | vsprintf.c | 852 int kptr_restrict __read_mostly; 858 switch (kptr_restrict) { in restricted_pointer() 866 * kptr_restrict==1 cannot be used in IRQ context in restricted_pointer()
|
/kernel/linux/linux-6.6/lib/ |
H A D | vsprintf.c | 849 int kptr_restrict __read_mostly; 855 switch (kptr_restrict) { in restricted_pointer() 863 * kptr_restrict==1 cannot be used in IRQ context in restricted_pointer()
|
/kernel/linux/linux-5.10/tools/perf/ |
H A D | builtin-top.c | 783 symbol_conf.kptr_restrict && in perf_event__process_sample() 788 "Check /proc/sys/kernel/kptr_restrict and /proc/sys/kernel/perf_event_paranoid.\n\n" in perf_event__process_sample()
|
H A D | builtin-record.c | 938 if (symbol_conf.kptr_restrict && !perf_evlist__exclude_kernel(evlist)) { in record__open() 941 "check /proc/sys/kernel/kptr_restrict and /proc/sys/kernel/perf_event_paranoid.\n\n" in record__open()
|
H A D | builtin-trace.c | 1598 if (symbol_conf.kptr_restrict) { in trace__machine__resolve_kernel_addr() 1600 "Check /proc/sys/kernel/kptr_restrict and /proc/sys/kernel/perf_event_paranoid.\n\n" in trace__machine__resolve_kernel_addr()
|
/kernel/linux/linux-6.6/tools/perf/ |
H A D | builtin-top.c | 784 symbol_conf.kptr_restrict && in perf_event__process_sample() 789 "Check /proc/sys/kernel/kptr_restrict and /proc/sys/kernel/perf_event_paranoid.\n\n" in perf_event__process_sample()
|
H A D | builtin-record.c | 1341 if (symbol_conf.kptr_restrict && !evlist__exclude_kernel(evlist)) { in record__open() 1344 "check /proc/sys/kernel/kptr_restrict and /proc/sys/kernel/perf_event_paranoid.\n\n" in record__open()
|
H A D | builtin-trace.c | 1641 if (symbol_conf.kptr_restrict) { in trace__machine__resolve_kernel_addr() 1643 "Check /proc/sys/kernel/kptr_restrict and /proc/sys/kernel/perf_event_paranoid.\n\n" in trace__machine__resolve_kernel_addr()
|
Completed in 66 milliseconds