-v Include non-audit capability checks. These are those deemed not interesting and not necessary to audit, such as CAP_SYS_ADMIN checks on memory allocation to affect the behavior of overcommit.
-K Include kernel stack traces to the output.
-U Include user-space stack traces to the output.
-x Show extra fields in TID and INSETID columns.
--cgroupmap MAPPATH Trace cgroups in this BPF map only (filtered in-kernel).
--mntnsmap MAPPATH Trace mount namespaces in this BPF map only (filtered in-kernel).
--unique Don't repeat stacks for the same PID or cgroup.
Trace all capability checks system-wide: # capable
Trace capability checks for PID 181: # capable -p 181
Trace capability checks in a set of cgroups only (see special_filtering.md from bcc sources for more details): # capable --cgroupmap /sys/fs/bpf/test01
TIME(s) Time of capability check: HH:MM:SS.
UID User ID.
PID Process ID.
COMM Process name. CAP Capability number. NAME Capability name. See capabilities(7) for descriptions.
AUDIT Whether this was an audit event. Use -v to include non-audit events. INSETID Whether the INSETID bit was set (Linux >= 5.1).
Also look in the bcc distribution for a companion _examples.txt file containing example usage, output, and commentary for this tool.