summaryrefslogtreecommitdiffstats
path: root/scripts/generate_rust_analyzer.py
diff options
context:
space:
mode:
authorJordan Rome <linux@jordanrome.com>2024-12-04 07:59:11 -0800
committerSerge Hallyn <sergeh@kernel.org>2024-12-04 20:59:21 -0600
commitd48da4d5ed7b4a022a4e54f210575baac71f58af (patch)
tree45c776f59fbef900cbfeb679e63fb4c9cbc5e797 /scripts/generate_rust_analyzer.py
parent3f4f1f8a1ab75314ff5cc14f9ed134bc038926bd (diff)
downloadlinux-d48da4d5ed7b4a022a4e54f210575baac71f58af.tar.gz
linux-d48da4d5ed7b4a022a4e54f210575baac71f58af.tar.bz2
linux-d48da4d5ed7b4a022a4e54f210575baac71f58af.zip
security: add trace event for cap_capable
In cases where we want a stable way to observe/trace cap_capable (e.g. protection from inlining and API updates) add a tracepoint that passes: - The credentials used - The user namespace of the resource being accessed - The user namespace in which the credential provides the capability to access the targeted resource - The capability to check for - The return value of the check Signed-off-by: Jordan Rome <linux@jordanrome.com> Acked-by: Andrii Nakryiko <andrii@kernel.org> Reviewed-by: Paul Moore <paul@paul-moore.com> Reviewed-by: Serge Hallyn <serge@hallyn.com> Link: https://lore.kernel.org/r/20241204155911.1817092-1-linux@jordanrome.com Signed-off-by: Serge Hallyn <sergeh@kernel.org>
Diffstat (limited to 'scripts/generate_rust_analyzer.py')
0 files changed, 0 insertions, 0 deletions