Lines Matching refs:token

5706  * @token: BPF token used to grant user access

5715 struct bpf_token *token, bool kernel)
5717 return call_int_hook(bpf_map_create, map, attr, token, kernel);
5724 * @token: BPF token used to grant user access to BPF subsystem
5734 struct bpf_token *token, bool kernel)
5736 return call_int_hook(bpf_prog_load, prog, attr, token, kernel);
5740 * security_bpf_token_create() - Check if creating of BPF token is allowed
5741 * @token: BPF token object
5742 * @attr: BPF syscall attributes used to create BPF token
5743 * @path: path pointing to BPF FS mount point from which BPF token is created
5745 * Do a check when the kernel instantiates a new BPF token object from BPF FS
5750 int security_bpf_token_create(struct bpf_token *token, union bpf_attr *attr,
5753 return call_int_hook(bpf_token_create, token, attr, path);
5757 * security_bpf_token_cmd() - Check if BPF token is allowed to delegate
5759 * @token: BPF token object
5760 * @cmd: BPF syscall command requested to be delegated by BPF token
5762 * Do a check when the kernel decides whether provided BPF token should allow
5767 int security_bpf_token_cmd(const struct bpf_token *token, enum bpf_cmd cmd)
5769 return call_int_hook(bpf_token_cmd, token, cmd);
5773 * security_bpf_token_capable() - Check if BPF token is allowed to delegate
5775 * @token: BPF token object
5776 * @cap: capabilities requested to be delegated by BPF token
5778 * Do a check when the kernel decides whether provided BPF token should allow
5783 int security_bpf_token_capable(const struct bpf_token *token, int cap)
5785 return call_int_hook(bpf_token_capable, token, cap);
5811 * security_bpf_token_free() - Free a BPF token's LSM blob
5812 * @token: BPF token struct
5814 * Clean up the security information stored inside BPF token.
5816 void security_bpf_token_free(struct bpf_token *token)
5818 call_void_hook(bpf_token_free, token);