Home
last modified time | relevance | path

Searched refs:CAP_BPF (Results 1 – 18 of 18) sorted by relevance

/linux/tools/perf/util/
H A Dcap.h17 #ifndef CAP_BPF
18 #define CAP_BPF 39 macro
H A Dbpf-filter.c634 if (perf_cap__capable(CAP_BPF, &used_root)) in check_bpf_filter_capable()
/linux/tools/testing/selftests/bpf/
H A Dcap_helpers.h13 #ifndef CAP_BPF macro
14 #define CAP_BPF 39
H A Dtest_loader.c960 1ULL << CAP_PERFMON | 1ULL << CAP_BPF); in run_subtest()
H A Dtest_verifier.c71 1ULL << CAP_BPF)
/linux/tools/testing/selftests/bpf/progs/
H A Dverifier_mtu.c10 __caps_unpriv(CAP_BPF|CAP_NET_ADMIN)
H A Dverifier_spill_fill.c1250 __caps_unpriv(CAP_BPF) in __caps_unpriv() argument
1268 __caps_unpriv(CAP_BPF) in __caps_unpriv() argument
H A Dbpf_misc.h171 #define CAP_BPF 39
147 #define CAP_BPF global() macro
/linux/kernel/bpf/
H A Dtoken.c146 if (!ns_capable(userns, CAP_BPF)) in bpf_token_create()
H A Dsyscall.c1275 if (!bpf_token_capable(token, CAP_BPF)) { in map_check_btf()
1455 if (sysctl_unprivileged_bpf_disabled && !bpf_token_capable(token, CAP_BPF)) in map_create()
1491 if (!bpf_token_capable(token, CAP_BPF)) in map_create()
2784 /* equivalent to SOCKET_FILTER. need CAP_BPF only */ in is_net_admin_prog_type()
2913 bpf_cap = bpf_token_capable(token, CAP_BPF); in bpf_prog_load()
5493 if (!bpf_token_capable(token, CAP_BPF)) { in bpf_btf_get_fd_by_id()
H A Dcore.c672 !bpf_token_capable(fp->aux->token, CAP_BPF)) in bpf_prog_kallsyms_add()
H A Dhelpers.c2109 if (!bpf_token_capable(prog->aux->token, CAP_BPF)) in bpf_base_func_proto()
H A Dverifier.c3640 verbose(env, "loading/calling other bpf or kernel functions are allowed for CAP_BPF and CAP_SYS_ADMIN\n"); in add_subprog_and_kfunc()
21711 verbose(env, "CAP_BPF and CAP_PERFMON are required to use arena\n"); in __add_used_map()
25995 env->bpf_capable = is_priv = bpf_token_capable(env->prog->aux->token, CAP_BPF); in bpf_check()
/linux/tools/testing/selftests/bpf/prog_tests/
H A Dunpriv_bpf_disabled.c18 #define ALL_CAPS ((2ULL << CAP_BPF) - 1)
H A Dtc_bpf.c405 ret = cap_enable_effective(1ULL << CAP_BPF | 1ULL << CAP_NET_ADMIN, &caps); in tc_bpf_non_root()
H A Dtoken.c60 return cap_disable_effective((1ULL << CAP_BPF) | in drop_priv_caps()
/linux/Documentation/admin-guide/sysctl/
H A Dnet.rst108 CAP_BPF or CAP_SYS_ADMIN in the root user name space.
/linux/net/core/
H A Dfilter.c8890 if (!bpf_token_capable(prog->aux->token, CAP_BPF)) in cg_skb_is_valid_access()
8902 if (!bpf_token_capable(prog->aux->token, CAP_BPF)) in cg_skb_is_valid_access()