Symbol: bpf_token_capable
drivers/media/rc/bpf-lirc.c
113
if (bpf_token_capable(prog->aux->token, CAP_PERFMON))
include/linux/bpf.h
2732
bool bpf_token_capable(const struct bpf_token *token, int cap);
include/linux/bpf.h
2736
return bpf_token_capable(token, CAP_PERFMON);
include/linux/bpf.h
2741
return bpf_token_capable(token, CAP_PERFMON);
include/linux/bpf.h
2748
bpf_token_capable(token, CAP_PERFMON);
include/linux/bpf.h
2755
bpf_token_capable(token, CAP_PERFMON);
include/linux/filter.h
1358
if (bpf_jit_harden == 1 && bpf_token_capable(prog->aux->token, CAP_BPF))
include/linux/lsm_hook_defs.h
444
LSM_HOOK(int, 0, bpf_token_capable, const struct bpf_token *token, int cap)
kernel/bpf/core.c
672
!bpf_token_capable(fp->aux->token, CAP_BPF))
kernel/bpf/helpers.c
2109
if (!bpf_token_capable(prog->aux->token, CAP_BPF))
kernel/bpf/helpers.c
2177
if (!bpf_token_capable(prog->aux->token, CAP_PERFMON))
kernel/bpf/syscall.c
1275
if (!bpf_token_capable(token, CAP_BPF)) {
kernel/bpf/syscall.c
1455
if (sysctl_unprivileged_bpf_disabled && !bpf_token_capable(token, CAP_BPF))
kernel/bpf/syscall.c
1491
if (!bpf_token_capable(token, CAP_BPF))
kernel/bpf/syscall.c
1499
if (!bpf_token_capable(token, CAP_NET_ADMIN))
kernel/bpf/syscall.c
2913
bpf_cap = bpf_token_capable(token, CAP_BPF);
kernel/bpf/syscall.c
2941
if (is_net_admin_prog_type(type) && !bpf_token_capable(token, CAP_NET_ADMIN))
kernel/bpf/syscall.c
2943
if (is_perfmon_prog_type(type) && !bpf_token_capable(token, CAP_PERFMON))
kernel/bpf/syscall.c
4425
if (!bpf_token_capable(prog->aux->token, CAP_NET_ADMIN))
kernel/bpf/syscall.c
5493
if (!bpf_token_capable(token, CAP_BPF)) {
kernel/bpf/syscall.c
5525
if (!bpf_token_capable(token, CAP_SYS_ADMIN)) {
kernel/bpf/syscall.c
6510
return !bpf_token_capable(prog->aux->token, CAP_PERFMON)
kernel/bpf/verifier.c
25995
env->bpf_capable = is_priv = bpf_token_capable(env->prog->aux->token, CAP_BPF);
kernel/trace/bpf_trace.c
1269
if (!bpf_token_capable(prog->aux->token, CAP_SYS_ADMIN))
net/core/filter.c
12113
if (!bpf_token_capable(prog->aux->token, CAP_PERFMON))
net/core/filter.c
8890
if (!bpf_token_capable(prog->aux->token, CAP_BPF))
net/core/filter.c
8902
if (!bpf_token_capable(prog->aux->token, CAP_BPF))
security/security.c
5319
return call_int_hook(bpf_token_capable, token, cap);
security/selinux/hooks.c
7707
LSM_HOOK_INIT(bpf_token_capable, selinux_bpf_token_capable),