Searched refs:bpf_token_capable (Results 1 – 12 of 12) sorted by relevance
| /linux-6.15/kernel/bpf/ |
| H A D | token.c | 16 bool bpf_token_capable(const struct bpf_token *token, int cap) in bpf_token_capable() function
|
| H A D | syscall.c | 1241 if (!bpf_token_capable(token, CAP_BPF)) { in map_check_btf() 1425 if (sysctl_unprivileged_bpf_disabled && !bpf_token_capable(token, CAP_BPF)) in map_create() 1460 if (!bpf_token_capable(token, CAP_BPF)) in map_create() 1468 if (!bpf_token_capable(token, CAP_NET_ADMIN)) in map_create() 2801 bpf_cap = bpf_token_capable(token, CAP_BPF); in bpf_prog_load() 2829 if (is_net_admin_prog_type(type) && !bpf_token_capable(token, CAP_NET_ADMIN)) in bpf_prog_load() 2831 if (is_perfmon_prog_type(type) && !bpf_token_capable(token, CAP_PERFMON)) in bpf_prog_load() 4127 if (!bpf_token_capable(prog->aux->token, CAP_NET_ADMIN)) in bpf_prog_attach_check_attach_type() 5134 if (!bpf_token_capable(token, CAP_BPF)) { in bpf_btf_load() 5166 if (!bpf_token_capable(token, CAP_SYS_ADMIN)) { in bpf_btf_get_fd_by_id() [all …]
|
| H A D | helpers.c | 1972 if (!bpf_token_capable(prog->aux->token, CAP_BPF)) in bpf_base_func_proto() 2030 if (!bpf_token_capable(prog->aux->token, CAP_PERFMON)) in bpf_base_func_proto()
|
| H A D | core.c | 696 !bpf_token_capable(fp->aux->token, CAP_BPF)) in bpf_prog_kallsyms_add()
|
| H A D | verifier.c | 23940 env->bpf_capable = is_priv = bpf_token_capable(env->prog->aux->token, CAP_BPF); in bpf_check()
|
| /linux-6.15/drivers/media/rc/ |
| H A D | bpf-lirc.c | 113 if (bpf_token_capable(prog->aux->token, CAP_PERFMON)) in lirc_mode2_func_proto()
|
| /linux-6.15/include/linux/ |
| H A D | bpf.h | 2444 bool bpf_token_capable(const struct bpf_token *token, int cap); 2448 return bpf_token_capable(token, CAP_PERFMON); in bpf_allow_ptr_leaks() 2453 return bpf_token_capable(token, CAP_PERFMON); in bpf_allow_uninit_stack() 2458 return cpu_mitigations_off() || bpf_token_capable(token, CAP_PERFMON); in bpf_bypass_spec_v1() 2463 return cpu_mitigations_off() || bpf_token_capable(token, CAP_PERFMON); in bpf_bypass_spec_v4() 2868 static inline bool bpf_token_capable(const struct bpf_token *token, int cap) in bpf_token_capable() function
|
| H A D | lsm_hook_defs.h | 442 LSM_HOOK(int, 0, bpf_token_capable, const struct bpf_token *token, int cap)
|
| H A D | filter.h | 1326 if (bpf_jit_harden == 1 && bpf_token_capable(prog->aux->token, CAP_BPF)) in bpf_jit_blinding_enabled()
|
| /linux-6.15/security/ |
| H A D | security.c | 5755 return call_int_hook(bpf_token_capable, token, cap); in security_bpf_token_capable()
|
| /linux-6.15/kernel/trace/ |
| H A D | bpf_trace.c | 1558 if (!bpf_token_capable(prog->aux->token, CAP_SYS_ADMIN)) in bpf_tracing_func_proto()
|
| /linux-6.15/net/core/ |
| H A D | filter.c | 8765 if (!bpf_token_capable(prog->aux->token, CAP_BPF)) in cg_skb_is_valid_access() 8777 if (!bpf_token_capable(prog->aux->token, CAP_BPF)) in cg_skb_is_valid_access() 11981 if (!bpf_token_capable(prog->aux->token, CAP_PERFMON)) in bpf_sk_base_func_proto()
|