/linux-master/net/netfilter/ |
H A D | nfnetlink_log.c | 170 u32 portid, struct user_namespace *user_ns) 202 inst->peer_user_ns = user_ns; 618 struct user_namespace *user_ns = inst->peer_user_ns; local 619 __be32 uid = htonl(from_kuid_munged(user_ns, cred->fsuid)); 620 __be32 gid = htonl(from_kgid_munged(user_ns, cred->fsgid)); 1136 root_uid = make_kuid(net->user_ns, 0); 1137 root_gid = make_kgid(net->user_ns, 0); 169 instance_create(struct net *net, u_int16_t group_num, u32 portid, struct user_namespace *user_ns) argument
|
/linux-master/include/net/ |
H A D | net_namespace.h | 88 struct user_namespace *user_ns; /* Owning user namespace */ member in struct:net 199 struct net *copy_net_ns(unsigned long flags, struct user_namespace *user_ns, 212 struct user_namespace *user_ns, struct net *old_net) 211 copy_net_ns(unsigned long flags, struct user_namespace *user_ns, struct net *old_net) argument
|
/linux-master/fs/ |
H A D | exec.c | 1440 struct user_namespace *old, *user_ns; local 1443 /* Ensure mm->user_ns contains the executable */ 1444 user_ns = old = bprm->mm->user_ns; 1445 while ((user_ns != &init_user_ns) && 1446 !privileged_wrt_inode_uidgid(user_ns, idmap, inode)) 1447 user_ns = user_ns->parent; 1449 if (old != user_ns) { 1450 bprm->mm->user_ns [all...] |
H A D | mount.h | 12 struct user_namespace *user_ns; member in struct:mnt_namespace
|
H A D | super.c | 309 * @user_ns: User namespace for the super_block 315 struct user_namespace *user_ns) 325 s->s_user_ns = get_user_ns(user_ns); 694 return ns_capable(fc->user_ns, CAP_SYS_ADMIN); 735 struct user_namespace *user_ns = fc->global ? &init_user_ns : fc->user_ns; local 748 s = alloc_super(fc->fs_type, fc->sb_flags, user_ns); 779 if (user_ns != old->s_user_ns || fc->exclusive) { 809 struct user_namespace *user_ns = current_user_ns(); local 819 user_ns 314 alloc_super(struct file_system_type *type, int flags, struct user_namespace *user_ns) argument [all...] |
H A D | posix_acl.c | 237 posix_acl_valid(struct user_namespace *user_ns, const struct posix_acl *acl) argument 257 if (!kuid_has_mapping(user_ns, pa->e_uid)) 272 if (!kgid_has_mapping(user_ns, pa->e_gid)) 834 posix_acl_to_xattr(struct user_namespace *user_ns, const struct posix_acl *acl, argument 857 cpu_to_le32(from_kuid(user_ns, acl_e->e_uid)); 861 cpu_to_le32(from_kgid(user_ns, acl_e->e_gid));
|
/linux-master/fs/fuse/ |
H A D | inode.c | 224 inode->i_uid = make_kuid(fc->user_ns, attr->uid); 225 inode->i_gid = make_kgid(fc->user_ns, attr->gid); 802 ctx->user_id = make_kuid(fsc->user_ns, result.uint_32); 809 ctx->group_id = make_kgid(fsc->user_ns, result.uint_32); 857 from_kuid_munged(fc->user_ns, fc->user_id)); 859 from_kgid_munged(fc->user_ns, fc->group_id)); 908 struct user_namespace *user_ns, 933 fc->user_ns = get_user_ns(user_ns); 950 put_user_ns(fc->user_ns); 907 fuse_conn_init(struct fuse_conn *fc, struct fuse_mount *fm, struct user_namespace *user_ns, const struct fuse_iqueue_ops *fiq_ops, void *fiq_priv) argument [all...] |
/linux-master/ipc/ |
H A D | msgutil.c | 30 .user_ns = &init_user_ns,
|
H A D | msg.c | 1344 struct user_namespace *user_ns = seq_user_ns(s); local 1357 from_kuid_munged(user_ns, msq->q_perm.uid), 1358 from_kgid_munged(user_ns, msq->q_perm.gid), 1359 from_kuid_munged(user_ns, msq->q_perm.cuid), 1360 from_kgid_munged(user_ns, msq->q_perm.cgid),
|
/linux-master/lib/ |
H A D | kobject_uevent.c | 348 struct user_namespace *owning_user_ns = sock_net(usk)->user_ns; 740 if (!netlink_ns_capable(skb, net->user_ns, CAP_SYS_ADMIN)) { 778 if (sock_net(ue_sk->sk)->user_ns == &init_user_ns) { 791 if (sock_net(ue_sk->sk)->user_ns == &init_user_ns) {
|
/linux-master/fs/proc/ |
H A D | proc_net.c | 373 uid = make_kuid(net->user_ns, 0); 377 gid = make_kgid(net->user_ns, 0);
|
/linux-master/kernel/ |
H A D | ucount.c | 43 struct user_namespace *user_ns = local 48 if (ns_capable(user_ns, CAP_SYS_RESOURCE))
|
H A D | acct.c | 516 ac.ac_uid = from_kuid_munged(file->f_cred->user_ns, orig_cred->uid); 517 ac.ac_gid = from_kgid_munged(file->f_cred->user_ns, orig_cred->gid);
|
/linux-master/security/yama/ |
H A D | yama_lsm.c | 372 !ns_capable(__task_cred(child)->user_ns, CAP_SYS_PTRACE)) 378 if (!ns_capable(__task_cred(child)->user_ns, CAP_SYS_PTRACE))
|
/linux-master/net/packet/ |
H A D | diag.c | 132 struct user_namespace *user_ns, 156 from_kuid_munged(user_ns, sock_i_uid(sk)))) 129 sk_diag_fill(struct sock *sk, struct sk_buff *skb, struct packet_diag_req *req, bool may_report_filterinfo, struct user_namespace *user_ns, u32 portid, u32 seq, u32 flags, int sk_ino) argument
|
/linux-master/net/sunrpc/ |
H A D | svcauth_unix.c | 562 struct user_namespace *user_ns = m->file->f_cred->user_ns; local 578 seq_printf(m, "%u %d:", from_kuid_munged(user_ns, ug->uid), glen); 580 seq_printf(m, " %d", from_kgid_munged(user_ns, ug->gi->gid[i])); 947 rqstp->rq_xprt->xpt_cred->user_ns : &init_user_ns;
|
H A D | auth_unix.c | 119 clnt->cl_cred->user_ns : &init_user_ns;
|
/linux-master/net/ipv4/ |
H A D | ip_options.c | 396 if (!skb && !ns_capable(net->user_ns, CAP_NET_RAW)) { 431 if ((!skb && !ns_capable(net->user_ns, CAP_NET_RAW)) || opt->cipso) { 444 if (!skb && !ns_capable(net->user_ns, CAP_NET_RAW)) {
|
H A D | sysctl_net_ipv4.c | 163 struct user_namespace *user_ns = current_user_ns(); local 176 urange[0] = from_kgid_munged(user_ns, low); 177 urange[1] = from_kgid_munged(user_ns, high); 181 low = make_kgid(user_ns, urange[0]); 182 high = make_kgid(user_ns, urange[1]);
|
/linux-master/include/linux/ |
H A D | cgroup.h | 771 struct user_namespace *user_ns; member in struct:cgroup_namespace 783 struct user_namespace *user_ns, 793 copy_cgroup_ns(unsigned long flags, struct user_namespace *user_ns, argument
|
H A D | fs_context.h | 97 struct user_namespace *user_ns; /* The user namespace for this mount */ member in struct:fs_context
|
/linux-master/drivers/connector/ |
H A D | connector.c | 176 if (ns_capable(net->user_ns, CAP_NET_ADMIN))
|
/linux-master/net/ieee802154/ |
H A D | socket.c | 905 if (!ns_capable(net->user_ns, CAP_NET_ADMIN) && 906 !ns_capable(net->user_ns, CAP_NET_RAW)) { 929 if (!ns_capable(net->user_ns, CAP_NET_ADMIN) && 930 !ns_capable(net->user_ns, CAP_NET_RAW)) {
|
/linux-master/net/core/ |
H A D | sock.c | 160 * @user_ns: The user namespace of the capability to use 165 * namespace @user_ns. 168 struct user_namespace *user_ns, int cap) 170 return file_ns_capable(sk->sk_socket->file, user_ns, cap) && 171 ns_capable(user_ns, cap); 201 return sk_ns_capable(sk, sock_net(sk)->user_ns, cap); 635 if (sk->sk_bound_dev_if && !ns_capable(net->user_ns, CAP_NET_RAW)) 1121 sockopt_ns_capable(sock_net(sk)->user_ns, CAP_NET_RAW) || 1122 sockopt_ns_capable(sock_net(sk)->user_ns, CAP_NET_ADMIN)) { 1425 if (!sockopt_ns_capable(sock_net(sk)->user_ns, CAP_NET_RA 167 sk_ns_capable(const struct sock *sk, struct user_namespace *user_ns, int cap) argument 1580 struct user_namespace *user_ns = current_user_ns(); local [all...] |
/linux-master/net/netlink/ |
H A D | af_netlink.c | 871 * @user_ns: The user namespace of the capability to use 876 * message has the capability @cap in the user namespace @user_ns. 879 struct user_namespace *user_ns, int cap) 882 file_ns_capable(nsp->sk->sk_socket->file, user_ns, cap)) && 883 ns_capable(user_ns, cap); 890 * @user_ns: The user namespace of the capability to use 895 * message has the capability @cap in the user namespace @user_ns. 898 struct user_namespace *user_ns, int cap) 900 return __netlink_ns_capable(&NETLINK_CB(skb), user_ns, cap); 931 return netlink_ns_capable(skb, sock_net(skb->sk)->user_ns, ca 878 __netlink_ns_capable(const struct netlink_skb_parms *nsp, struct user_namespace *user_ns, int cap) argument 897 netlink_ns_capable(const struct sk_buff *skb, struct user_namespace *user_ns, int cap) argument [all...] |