Lines Matching refs:a
10 can impose a considerable risk of leaking sensitive data accessed by
19 1. System hardware and software configuration data, for example: a CPU
53 into two categories [6]_ : a) privileged processes (whose effective user
60 Unprivileged processes are subject to a full security permission check
74 observability operations in the kernel and provides a secure approach to
81 If system audit records [14]_ for a process using perf_events system call
98 performance analysis of monitored processes or a system. For example,
150 Using a libcap without support for CAP_PERFMON will make cap_get_flag(caps, 38,
152 so as a workaround explicitly ask for the 'cycles' event, i.e.:
158 To get kernel and user samples with a perf binary with just CAP_PERFMON.
160 As a result, members of perf_users group are capable of conducting
180 be a member of perf_users group:
189 2. Extend sudo policy at /etc/sudoers file with a rule for perf_users group:
215 As a result, members of perf_users group have access to the privileged
268 every configured PMU event. Open file descriptors are a per-process
271 configuring Perf collection for a long list of events on a large server
274 modifying content of the limits.conf file [12]_ . Ordinarily, a Perf
290 For example, if a machine has eight cores and perf_event_mlock_kb limit
291 is set to 516 KiB, then a user process is provided with 516 KiB * 8 =