/linux-master/fs/ |
H A D | attr.c | 106 ns_capable(inode->i_sb->s_user_ns, CAP_CHOWN)) 137 ns_capable(inode->i_sb->s_user_ns, CAP_CHOWN)) 471 !vfsuid_has_fsmapping(idmap, inode->i_sb->s_user_ns, 475 !vfsgid_has_fsmapping(idmap, inode->i_sb->s_user_ns,
|
H A D | fs_context.c | 304 fc->user_ns = get_user_ns(reference->d_sb->s_user_ns); 308 fc->user_ns = get_user_ns(reference->d_sb->s_user_ns);
|
H A D | super.c | 278 put_user_ns(s->s_user_ns); 325 s->s_user_ns = get_user_ns(user_ns); 356 if (s->s_user_ns != &init_user_ns) 779 if (user_ns != old->s_user_ns || fc->exclusive) { 827 if (user_ns != old->s_user_ns) {
|
H A D | fsopen.c | 261 if (!ns_capable(sb->s_user_ns, CAP_SYS_ADMIN)) {
|
H A D | binfmt_misc.c | 643 return inode->i_sb->s_user_ns->binfmt_misc; 973 struct user_namespace *user_ns = sb->s_user_ns;
|
H A D | ioctl.c | 391 if (!ns_capable(sb->s_user_ns, CAP_SYS_ADMIN)) 408 if (!ns_capable(sb->s_user_ns, CAP_SYS_ADMIN))
|
H A D | namespace.c | 1172 if (mountpoint->d_sb->s_user_ns != &init_user_ns) 1770 if (!ns_capable(sb->s_user_ns, CAP_SYS_ADMIN)) 2891 if (ns_capable(sb->s_user_ns, CAP_SYS_ADMIN)) { 4293 struct user_namespace *fs_userns = m->mnt_sb->s_user_ns; 4302 if (kattr->mnt_userns == m->mnt_sb->s_user_ns) 5369 current_in_userns(mnt->mnt_sb->s_user_ns);
|
H A D | posix_acl.c | 951 int ret = posix_acl_valid(inode->i_sb->s_user_ns, acl);
|
/linux-master/fs/bcachefs/ |
H A D | fs-ioctl.c | 316 struct user_namespace *s_user_ns; local 386 s_user_ns = dir->i_sb->s_user_ns; 387 if (!kuid_has_mapping(s_user_ns, current_fsuid()) || 388 !kgid_has_mapping(s_user_ns, current_fsgid())) {
|
/linux-master/security/ |
H A D | commoncap.c | 409 fs_ns = inode->i_sb->s_user_ns; 539 *fs_ns = inode->i_sb->s_user_ns; 551 if (ns_capable(inode->i_sb->s_user_ns, CAP_SETFCAP)) 654 fs_ns = inode->i_sb->s_user_ns; 740 * explicit that capability bits are limited to s_user_ns and its 743 if (!current_in_userns(file->f_path.mnt->mnt_sb->s_user_ns)) 993 struct user_namespace *user_ns = dentry->d_sb->s_user_ns; 1034 struct user_namespace *user_ns = dentry->d_sb->s_user_ns;
|
/linux-master/fs/quota/ |
H A D | quota.c | 212 if (!qid_has_mapping(sb->s_user_ns, qid)) 248 if (!qid_has_mapping(sb->s_user_ns, qid)) 307 if (!qid_has_mapping(sb->s_user_ns, qid)) 636 if (!qid_has_mapping(sb->s_user_ns, qid)) 639 if (from_kqid(sb->s_user_ns, qid) == 0 && 716 if (!qid_has_mapping(sb->s_user_ns, qid)) 743 if (!qid_has_mapping(sb->s_user_ns, qid))
|
H A D | dquot.c | 928 if (!qid_has_mapping(sb->s_user_ns, qid)) 2425 if (sb->s_user_ns != &init_user_ns) {
|
/linux-master/kernel/bpf/ |
H A D | token.c | 144 userns = path.dentry->d_sb->s_user_ns;
|
/linux-master/drivers/android/ |
H A D | binderfs.c | 688 info->root_gid = make_kgid(sb->s_user_ns, 0); 691 info->root_uid = make_kuid(sb->s_user_ns, 0);
|
/linux-master/fs/9p/ |
H A D | acl.c | 165 retval = posix_acl_valid(inode->i_sb->s_user_ns, acl);
|
/linux-master/security/integrity/evm/ |
H A D | evm_crypto.c | 236 inode->i_sb->s_user_ns != &init_user_ns)
|
/linux-master/fs/xfs/ |
H A D | xfs_itable.c | 63 struct user_namespace *sb_userns = mp->m_super->s_user_ns;
|
H A D | xfs_icache.c | 1547 icw.icw_uid = make_kuid(mp->m_super->s_user_ns, udqp->q_id); 1553 icw.icw_gid = make_kgid(mp->m_super->s_user_ns, gdqp->q_id);
|
H A D | xfs_qm.c | 1689 struct user_namespace *user_ns = inode->i_sb->s_user_ns;
|
H A D | xfs_trace.h | 4417 __entry->uid = icw ? from_kuid(mp->m_super->s_user_ns, 4419 __entry->gid = icw ? from_kgid(mp->m_super->s_user_ns,
|
/linux-master/fs/f2fs/ |
H A D | recovery.c | 258 attr.ia_vfsuid = VFSUIDT_INIT(make_kuid(inode->i_sb->s_user_ns, i_uid)); 259 attr.ia_vfsgid = VFSGIDT_INIT(make_kgid(inode->i_sb->s_user_ns, i_gid));
|
/linux-master/include/linux/ |
H A D | fs.h | 1326 struct user_namespace *s_user_ns; member in struct:super_block 1355 return inode->i_sb->s_user_ns; 1521 * s_user_ns of the superblock @sb. If the caller is on an idmapped mount map 1529 struct user_namespace *fs_userns = sb->s_user_ns;
|
/linux-master/fs/fuse/ |
H A D | inode.c | 1557 if (sb->s_user_ns != &init_user_ns) 1783 (ctx->file->f_cred->user_ns != sb->s_user_ns))
|
/linux-master/security/smack/ |
H A D | smack_lsm.c | 830 if (sb->s_user_ns != &init_user_ns &&
|
/linux-master/security/selinux/ |
H A D | hooks.c | 758 if (sb->s_user_ns != &init_user_ns &&
|