diff options
author | Jordan Rome <linux@jordanrome.com> | 2024-12-04 18:59:11 +0300 |
---|---|---|
committer | Serge Hallyn <sergeh@kernel.org> | 2024-12-05 05:59:21 +0300 |
commit | d48da4d5ed7b4a022a4e54f210575baac71f58af (patch) | |
tree | 45c776f59fbef900cbfeb679e63fb4c9cbc5e797 /drivers/dma/ioat/dca.c | |
parent | 3f4f1f8a1ab75314ff5cc14f9ed134bc038926bd (diff) | |
download | linux-d48da4d5ed7b4a022a4e54f210575baac71f58af.tar.xz |
security: add trace event for cap_capable
In cases where we want a stable way to observe/trace
cap_capable (e.g. protection from inlining and API updates)
add a tracepoint that passes:
- The credentials used
- The user namespace of the resource being accessed
- The user namespace in which the credential provides the
capability to access the targeted resource
- The capability to check for
- The return value of the check
Signed-off-by: Jordan Rome <linux@jordanrome.com>
Acked-by: Andrii Nakryiko <andrii@kernel.org>
Reviewed-by: Paul Moore <paul@paul-moore.com>
Reviewed-by: Serge Hallyn <serge@hallyn.com>
Link: https://lore.kernel.org/r/20241204155911.1817092-1-linux@jordanrome.com
Signed-off-by: Serge Hallyn <sergeh@kernel.org>
Diffstat (limited to 'drivers/dma/ioat/dca.c')
0 files changed, 0 insertions, 0 deletions