Lines Matching refs:capable
1 Demonstrations of capable, the Linux eBPF/bcc version.
4 capable traces calls to the kernel cap_capable() function, which does security
7 # ./capable.py
47 It is possible to include a kernel stack trace to the capable events by passing
50 # ./capable.py -K
71 # ./capable.py -h
72 usage: capable.py [-h] [-v] [-p PID] [-K] [-U]
84 ./capable # trace capability checks
85 ./capable -v # verbose: include non-audit checks
86 ./capable -p 181 # only trace PID 181
87 ./capable -K # add kernel stacks to trace
88 ./capable -U # add user-space stacks to trace