Home
last modified time | relevance | path

Searched refs:CAP_BPF (Results 1 – 19 of 19) sorted by relevance

/linux-6.12.1/tools/testing/selftests/bpf/
Dcap_helpers.h12 #ifndef CAP_BPF
13 #define CAP_BPF 39 macro
Dtest_loader.c732 1ULL << CAP_PERFMON | 1ULL << CAP_BPF); in drop_capabilities()
Dtest_verifier.c75 1ULL << CAP_BPF)
/linux-6.12.1/tools/bpf/bpftool/
Dfeature.c1049 #ifdef CAP_BPF in handle_perms()
1050 capability(CAP_BPF), in handle_perms()
1069 #ifdef CAP_BPF in handle_perms()
1070 if (CAP_IS_SUPPORTED(CAP_BPF)) in handle_perms()
1112 #ifdef CAP_BPF in handle_perms()
/linux-6.12.1/include/uapi/linux/
Dcapability.h412 #define CAP_BPF 39 macro
/linux-6.12.1/include/linux/
Dcapability.h202 return capable(CAP_BPF) || capable(CAP_SYS_ADMIN); in bpf_capable()
Dfilter.h1304 if (bpf_jit_harden == 1 && bpf_token_capable(prog->aux->token, CAP_BPF)) in bpf_jit_blinding_enabled()
/linux-6.12.1/tools/testing/selftests/bpf/prog_tests/
Dverifier.c233 ret = cap_enable_effective(1ULL << CAP_BPF | 1ULL << CAP_NET_ADMIN, &caps); in test_verifier_mtu()
Dunpriv_bpf_disabled.c18 #define ALL_CAPS ((2ULL << CAP_BPF) - 1)
Dtc_bpf.c405 ret = cap_enable_effective(1ULL << CAP_BPF | 1ULL << CAP_NET_ADMIN, &caps); in tc_bpf_non_root()
Dtoken.c59 return cap_disable_effective((1ULL << CAP_BPF) | in drop_priv_caps()
/linux-6.12.1/kernel/bpf/
Dtoken.c147 if (!ns_capable(userns, CAP_BPF)) in bpf_token_create()
Dsyscall.c1113 if (!bpf_token_capable(token, CAP_BPF)) { in map_check_btf()
1290 if (sysctl_unprivileged_bpf_disabled && !bpf_token_capable(token, CAP_BPF)) in map_create()
1325 if (!bpf_token_capable(token, CAP_BPF)) in map_create()
2676 bpf_cap = bpf_token_capable(token, CAP_BPF); in bpf_prog_load()
4973 if (!bpf_token_capable(token, CAP_BPF)) { in bpf_btf_load()
Dhelpers.c1947 if (!bpf_token_capable(prog->aux->token, CAP_BPF)) in bpf_base_func_proto()
Dcore.c691 !bpf_token_capable(fp->aux->token, CAP_BPF)) in bpf_prog_kallsyms_add()
Dverifier.c22337 env->bpf_capable = is_priv = bpf_token_capable(env->prog->aux->token, CAP_BPF); in bpf_check()
/linux-6.12.1/Documentation/admin-guide/sysctl/
Dnet.rst108 CAP_BPF or CAP_SYS_ADMIN in the root user name space.
Dkernel.rst1597 once disabled, calling ``bpf()`` without ``CAP_SYS_ADMIN`` or ``CAP_BPF``
/linux-6.12.1/net/core/
Dfilter.c8683 if (!bpf_token_capable(prog->aux->token, CAP_BPF)) in cg_skb_is_valid_access()
8695 if (!bpf_token_capable(prog->aux->token, CAP_BPF)) in cg_skb_is_valid_access()