/linux-master/include/linux/ |
H A D | posix_acl_xattr.h | 36 struct posix_acl *posix_acl_from_xattr(struct user_namespace *user_ns, 40 posix_acl_from_xattr(struct user_namespace *user_ns, const void *value, argument 47 int posix_acl_to_xattr(struct user_namespace *user_ns,
|
H A D | tsacct_kern.h | 14 extern void bacct_add_tsk(struct user_namespace *user_ns, 18 static inline void bacct_add_tsk(struct user_namespace *user_ns, argument
|
H A D | utsname.h | 26 struct user_namespace *user_ns; member in struct:uts_namespace 39 struct user_namespace *user_ns, struct uts_namespace *old_ns); 59 struct user_namespace *user_ns, struct uts_namespace *old_ns) 58 copy_utsname(unsigned long flags, struct user_namespace *user_ns, struct uts_namespace *old_ns) argument
|
H A D | pid_namespace.h | 37 struct user_namespace *user_ns; member in struct:pid_namespace 76 struct user_namespace *user_ns, struct pid_namespace *ns); 95 struct user_namespace *user_ns, struct pid_namespace *ns) 94 copy_pid_ns(unsigned long flags, struct user_namespace *user_ns, struct pid_namespace *ns) argument
|
H A D | ipc_namespace.h | 74 /* user_ns which owns the ipc ns */ 75 struct user_namespace *user_ns; member in struct:ipc_namespace 133 struct user_namespace *user_ns, struct ipc_namespace *ns); 155 struct user_namespace *user_ns, struct ipc_namespace *ns) 154 copy_ipcs(unsigned long flags, struct user_namespace *user_ns, struct ipc_namespace *ns) argument
|
H A D | time_namespace.h | 23 struct user_namespace *user_ns; member in struct:time_namespace 46 struct user_namespace *user_ns, 132 struct user_namespace *user_ns, 131 copy_time_ns(unsigned long flags, struct user_namespace *user_ns, struct time_namespace *old_ns) argument
|
/linux-master/kernel/ |
H A D | utsname.c | 45 static struct uts_namespace *clone_uts_ns(struct user_namespace *user_ns, argument 53 ucounts = inc_uts_namespaces(user_ns); 71 ns->user_ns = get_user_ns(user_ns); 90 struct user_namespace *user_ns, struct uts_namespace *old_ns) 100 new_ns = clone_uts_ns(user_ns, old_ns); 109 put_user_ns(ns->user_ns); 145 if (!ns_capable(ns->user_ns, CAP_SYS_ADMIN) || 146 !ns_capable(nsset->cred->user_ns, CAP_SYS_ADMIN)) 157 return to_uts_ns(ns)->user_ns; 89 copy_utsname(unsigned long flags, struct user_namespace *user_ns, struct uts_namespace *old_ns) argument [all...] |
H A D | nsproxy.c | 68 struct task_struct *tsk, struct user_namespace *user_ns, 78 new_nsp->mnt_ns = copy_mnt_ns(flags, tsk->nsproxy->mnt_ns, user_ns, new_fs); 84 new_nsp->uts_ns = copy_utsname(flags, user_ns, tsk->nsproxy->uts_ns); 90 new_nsp->ipc_ns = copy_ipcs(flags, user_ns, tsk->nsproxy->ipc_ns); 97 copy_pid_ns(flags, user_ns, tsk->nsproxy->pid_ns_for_children); 103 new_nsp->cgroup_ns = copy_cgroup_ns(flags, user_ns, 110 new_nsp->net_ns = copy_net_ns(flags, user_ns, tsk->nsproxy->net_ns); 116 new_nsp->time_ns_for_children = copy_time_ns(flags, user_ns, 154 struct user_namespace *user_ns = task_cred_xxx(tsk, user_ns); local 67 create_new_namespaces(unsigned long flags, struct task_struct *tsk, struct user_namespace *user_ns, struct fs_struct *new_fs) argument 216 struct user_namespace *user_ns; local 379 struct user_namespace *user_ns = NULL; local [all...] |
H A D | uid16.c | 70 ruid = high2lowuid(from_kuid_munged(cred->user_ns, cred->uid)); 71 euid = high2lowuid(from_kuid_munged(cred->user_ns, cred->euid)); 72 suid = high2lowuid(from_kuid_munged(cred->user_ns, cred->suid)); 93 rgid = high2lowgid(from_kgid_munged(cred->user_ns, cred->gid)); 94 egid = high2lowgid(from_kgid_munged(cred->user_ns, cred->egid)); 95 sgid = high2lowgid(from_kgid_munged(cred->user_ns, cred->sgid)); 117 struct user_namespace *user_ns = current_user_ns(); local 124 group = high2lowgid(from_kgid_munged(user_ns, kgid)); 135 struct user_namespace *user_ns = current_user_ns(); local 144 kgid = make_kgid(user_ns, low2highgi [all...] |
H A D | pid_namespace.c | 73 static struct pid_namespace *create_pid_namespace(struct user_namespace *user_ns, argument 82 if (!in_userns(parent_pid_ns->user_ns, user_ns)) 88 ucounts = inc_pid_namespaces(user_ns); 111 ns->user_ns = get_user_ns(user_ns); 133 put_user_ns(ns->user_ns); 147 struct user_namespace *user_ns, struct pid_namespace *old_ns) 153 return create_pid_namespace(user_ns, old_ns); 287 if (write && !checkpoint_restore_ns_capable(pid_ns->user_ns)) 146 copy_pid_ns(unsigned long flags, struct user_namespace *user_ns, struct pid_namespace *old_ns) argument [all...] |
H A D | groups.c | 40 struct user_namespace *user_ns = current_user_ns(); local 46 gid = from_kgid_munged(user_ns, group_info->gid[i]); 57 struct user_namespace *user_ns = current_user_ns(); local 67 kgid = make_kgid(user_ns, gid); 187 struct user_namespace *user_ns = current_user_ns(); local 189 return ns_capable_setid(user_ns, CAP_SETGID) && 190 userns_may_setgroups(user_ns);
|
H A D | cred.c | 60 .user_ns = &init_user_ns, 88 put_user_ns(cred->user_ns); 225 get_user_ns(new->user_ns); 355 const struct user_namespace *set_ns = set->user_ns; 356 const struct user_namespace *subset_ns = subset->user_ns; 436 if (new->user != old->user || new->user_ns != old->user_ns) 440 if (new->user != old->user || new->user_ns != old->user_ns) 591 if (old_ucounts->ns == new->user_ns [all...] |
H A D | pid_sysctl.h | 15 if (write && !ns_capable(ns->user_ns, CAP_SYS_ADMIN))
|
/linux-master/kernel/cgroup/ |
H A D | namespace.c | 44 put_user_ns(ns->user_ns); 51 struct user_namespace *user_ns, 66 if (!ns_capable(user_ns, CAP_SYS_ADMIN)) 69 ucounts = inc_cgroup_namespaces(user_ns); 86 new_ns->user_ns = get_user_ns(user_ns); 103 if (!ns_capable(nsset->cred->user_ns, CAP_SYS_ADMIN) || 104 !ns_capable(cgroup_ns->user_ns, CAP_SYS_ADMIN)) 141 return to_cg_ns(ns)->user_ns; 50 copy_cgroup_ns(unsigned long flags, struct user_namespace *user_ns, struct cgroup_namespace *old_ns) argument
|
/linux-master/net/netfilter/ |
H A D | xt_owner.c | 32 (current_user_ns() != net->user_ns)) 37 kuid_t uid_min = make_kuid(net->user_ns, info->uid_min); 38 kuid_t uid_max = make_kuid(net->user_ns, info->uid_max); 49 kgid_t gid_min = make_kgid(net->user_ns, info->gid_min); 50 kgid_t gid_max = make_kgid(net->user_ns, info->gid_max); 88 kuid_t uid_min = make_kuid(net->user_ns, info->uid_min); 89 kuid_t uid_max = make_kuid(net->user_ns, info->uid_max); 100 kgid_t gid_min = make_kgid(net->user_ns, info->gid_min); 101 kgid_t gid_max = make_kgid(net->user_ns, info->gid_max);
|
/linux-master/ipc/ |
H A D | namespace.c | 38 static struct ipc_namespace *create_ipc_ns(struct user_namespace *user_ns, argument 47 ucounts = inc_ipc_namespaces(user_ns); 70 ns->user_ns = get_user_ns(user_ns); 97 put_user_ns(ns->user_ns); 108 struct user_namespace *user_ns, struct ipc_namespace *ns) 112 return create_ipc_ns(user_ns, ns); 161 put_user_ns(ns->user_ns); 237 if (!ns_capable(ns->user_ns, CAP_SYS_ADMIN) || 238 !ns_capable(nsset->cred->user_ns, CAP_SYS_ADMI 107 copy_ipcs(unsigned long flags, struct user_namespace *user_ns, struct ipc_namespace *ns) argument [all...] |
/linux-master/fs/sysfs/ |
H A D | mount.c | 75 put_user_ns(fc->user_ns); 76 fc->user_ns = get_user_ns(netns->user_ns);
|
/linux-master/kernel/time/ |
H A D | namespace.c | 71 * @user_ns: User namespace which owns a new namespace. 78 static struct time_namespace *clone_time_ns(struct user_namespace *user_ns, argument 86 ucounts = inc_time_namespaces(user_ns); 107 ns->user_ns = get_user_ns(user_ns); 125 * @user_ns: User namespace which owns a new namespace. 134 struct user_namespace *user_ns, struct time_namespace *old_ns) 139 return clone_time_ns(user_ns, old_ns); 250 put_user_ns(ns->user_ns); 312 if (!ns_capable(ns->user_ns, CAP_SYS_ADMI 133 copy_time_ns(unsigned long flags, struct user_namespace *user_ns, struct time_namespace *old_ns) argument [all...] |
/linux-master/init/ |
H A D | version-timestamp.c | 20 .user_ns = &init_user_ns,
|
/linux-master/security/keys/ |
H A D | proc.c | 66 struct user_namespace *user_ns = seq_user_ns(p); local 71 if (kuid_has_mapping(user_ns, key->user->uid)) 80 struct user_namespace *user_ns = seq_user_ns(p); local 103 if (kuid_has_mapping(user_ns, minkey->user->uid)) 252 static struct rb_node *__key_user_next(struct user_namespace *user_ns, struct rb_node *n) argument 256 if (kuid_has_mapping(user_ns, user->uid)) 263 static struct rb_node *key_user_next(struct user_namespace *user_ns, struct rb_node *n) argument 265 return __key_user_next(user_ns, rb_next(n)); 268 static struct rb_node *key_user_first(struct user_namespace *user_ns, struct rb_root *r) argument 271 return __key_user_next(user_ns, [all...] |
H A D | process_keys.c | 38 static struct key *get_user_register(struct user_namespace *user_ns) argument 40 struct key *reg_keyring = READ_ONCE(user_ns->user_keyring_register); 45 down_write(&user_ns->keyring_sem); 50 reg_keyring = user_ns->user_keyring_register; 53 user_ns->owner, INVALID_GID, 60 smp_store_release(&user_ns->user_keyring_register, 64 up_write(&user_ns->keyring_sem); 66 /* We don't return a ref since the keyring is pinned by the user_ns */ 78 struct user_namespace *user_ns = current_user_ns(); local 82 uid_t uid = from_kuid(user_ns, cre [all...] |
/linux-master/net/bridge/ |
H A D | br_ioctl.c | 91 if (!ns_capable(net->user_ns, CAP_NET_ADMIN)) 219 if (!ns_capable(dev_net(dev)->user_ns, CAP_NET_ADMIN)) 226 if (!ns_capable(dev_net(dev)->user_ns, CAP_NET_ADMIN)) 233 if (!ns_capable(dev_net(dev)->user_ns, CAP_NET_ADMIN)) 240 if (!ns_capable(dev_net(dev)->user_ns, CAP_NET_ADMIN)) 280 if (!ns_capable(dev_net(dev)->user_ns, CAP_NET_ADMIN)) 287 if (!ns_capable(dev_net(dev)->user_ns, CAP_NET_ADMIN)) 296 if (!ns_capable(dev_net(dev)->user_ns, CAP_NET_ADMIN)) 310 if (!ns_capable(dev_net(dev)->user_ns, CAP_NET_ADMIN)) 379 if (!ns_capable(net->user_ns, CAP_NET_ADMI [all...] |
/linux-master/security/ |
H A D | commoncap.c | 78 if (ns == cred->user_ns) 85 if (ns->level <= cred->user_ns->level) 92 if ((ns->parent == cred->user_ns) && uid_eq(ns->owner, cred->euid)) 126 * If we are in the same or an ancestor user_ns and have all the target 128 * If we have the ptrace capability to the target user_ns, then ptrace 148 if (cred->user_ns == child_cred->user_ns && 151 if (ns_capable(child_cred->user_ns, CAP_SYS_PTRACE)) 163 * If parent is in the same or an ancestor user_ns and has all current's 165 * If parent has the ptrace capability to current's user_ns, the 993 struct user_namespace *user_ns = dentry->d_sb->s_user_ns; local 1034 struct user_namespace *user_ns = dentry->d_sb->s_user_ns; local [all...] |
/linux-master/net/ |
H A D | sysctl_net.c | 48 if (ns_capable_noaudit(net->user_ns, CAP_NET_ADMIN)) { 64 ns_root_uid = make_kuid(net->user_ns, 0); 68 ns_root_gid = make_kgid(net->user_ns, 0);
|
/linux-master/net/unix/ |
H A D | diag.c | 118 struct user_namespace *user_ns) 120 uid_t uid = from_kuid_munged(user_ns, sock_i_uid(sk)); 125 struct user_namespace *user_ns, 172 sk_diag_dump_uid(sk, skb, user_ns)) 184 struct user_namespace *user_ns, 196 return sk_diag_fill(sk, skb, req, user_ns, portid, seq, flags, sk_ino); 117 sk_diag_dump_uid(struct sock *sk, struct sk_buff *nlskb, struct user_namespace *user_ns) argument 124 sk_diag_fill(struct sock *sk, struct sk_buff *skb, struct unix_diag_req *req, struct user_namespace *user_ns, u32 portid, u32 seq, u32 flags, int sk_ino) argument 183 sk_diag_dump(struct sock *sk, struct sk_buff *skb, struct unix_diag_req *req, struct user_namespace *user_ns, u32 portid, u32 seq, u32 flags) argument
|