Home
last modified time | relevance | path

Searched refs:bpf_token_capable (Results 1 – 12 of 12) sorted by relevance

/linux-6.14.4/kernel/bpf/
Dtoken.c16 bool bpf_token_capable(const struct bpf_token *token, int cap) in bpf_token_capable() function
Dsyscall.c1221 if (!bpf_token_capable(token, CAP_BPF)) { in map_check_btf()
1404 if (sysctl_unprivileged_bpf_disabled && !bpf_token_capable(token, CAP_BPF)) in map_create()
1439 if (!bpf_token_capable(token, CAP_BPF)) in map_create()
1447 if (!bpf_token_capable(token, CAP_NET_ADMIN)) in map_create()
2782 bpf_cap = bpf_token_capable(token, CAP_BPF); in bpf_prog_load()
2810 if (is_net_admin_prog_type(type) && !bpf_token_capable(token, CAP_NET_ADMIN)) in bpf_prog_load()
2812 if (is_perfmon_prog_type(type) && !bpf_token_capable(token, CAP_PERFMON)) in bpf_prog_load()
4108 if (!bpf_token_capable(prog->aux->token, CAP_NET_ADMIN)) in bpf_prog_attach_check_attach_type()
5114 if (!bpf_token_capable(token, CAP_BPF)) { in bpf_btf_load()
6050 return !bpf_token_capable(prog->aux->token, CAP_PERFMON) in syscall_prog_func_proto()
Dhelpers.c1961 if (!bpf_token_capable(prog->aux->token, CAP_BPF)) in bpf_base_func_proto()
2019 if (!bpf_token_capable(prog->aux->token, CAP_PERFMON)) in bpf_base_func_proto()
Dcore.c696 !bpf_token_capable(fp->aux->token, CAP_BPF)) in bpf_prog_kallsyms_add()
Dverifier.c23082 env->bpf_capable = is_priv = bpf_token_capable(env->prog->aux->token, CAP_BPF); in bpf_check()
/linux-6.14.4/drivers/media/rc/
Dbpf-lirc.c113 if (bpf_token_capable(prog->aux->token, CAP_PERFMON)) in lirc_mode2_func_proto()
/linux-6.14.4/include/linux/
Dbpf.h2407 bool bpf_token_capable(const struct bpf_token *token, int cap);
2411 return bpf_token_capable(token, CAP_PERFMON); in bpf_allow_ptr_leaks()
2416 return bpf_token_capable(token, CAP_PERFMON); in bpf_allow_uninit_stack()
2421 return cpu_mitigations_off() || bpf_token_capable(token, CAP_PERFMON); in bpf_bypass_spec_v1()
2426 return cpu_mitigations_off() || bpf_token_capable(token, CAP_PERFMON); in bpf_bypass_spec_v4()
2831 static inline bool bpf_token_capable(const struct bpf_token *token, int cap) in bpf_token_capable() function
Dlsm_hook_defs.h442 LSM_HOOK(int, 0, bpf_token_capable, const struct bpf_token *token, int cap)
Dfilter.h1306 if (bpf_jit_harden == 1 && bpf_token_capable(prog->aux->token, CAP_BPF)) in bpf_jit_blinding_enabled()
/linux-6.14.4/security/
Dsecurity.c5752 return call_int_hook(bpf_token_capable, token, cap); in security_bpf_token_capable()
/linux-6.14.4/kernel/trace/
Dbpf_trace.c1565 if (!bpf_token_capable(prog->aux->token, CAP_SYS_ADMIN)) in bpf_tracing_func_proto()
/linux-6.14.4/net/core/
Dfilter.c8700 if (!bpf_token_capable(prog->aux->token, CAP_BPF)) in cg_skb_is_valid_access()
8712 if (!bpf_token_capable(prog->aux->token, CAP_BPF)) in cg_skb_is_valid_access()
11916 if (!bpf_token_capable(prog->aux->token, CAP_PERFMON)) in bpf_sk_base_func_proto()