Searched refs:CAP_SYSLOG (Results 1 – 8 of 8) sorted by relevance
9 #ifndef CAP_SYSLOG10 #define CAP_SYSLOG 34 macro
2327 bool cap_syslog = perf_cap__capable(CAP_SYSLOG, &used_root); in symbol__read_kptr_restrict()
36 if (security_capable(cred, &init_user_ns, CAP_SYSLOG, in kallsyms_show_value()
472 local unpriv=$(capsh --drop=CAP_SYSLOG -- -c "$cmd")
99 CAP_SYSLOG capability permits reading kernel space memory addresses from
306 …ant information from kallsyms. You also need to set to 1 (restrict non CAP_SYSLOG users) for the a…
874 * because its test for CAP_SYSLOG would be meaningless. in restricted_pointer() 884 * process has CAP_SYSLOG and is running with the in restricted_pointer() 892 if (!has_capability_noaudit(current, CAP_SYSLOG) || in restricted_pointer()
627 if (capable(CAP_SYSLOG)) in check_syslog_permissions()