/Linux-v6.1/fs/ksmbd/ |
D | vfs.h | 74 int ksmbd_vfs_lock_parent(struct user_namespace *user_ns, struct dentry *parent, 76 int ksmbd_vfs_may_delete(struct user_namespace *user_ns, struct dentry *dentry); 77 int ksmbd_vfs_query_maximal_access(struct user_namespace *user_ns, 105 ssize_t ksmbd_vfs_getxattr(struct user_namespace *user_ns, 109 ssize_t ksmbd_vfs_casexattr_len(struct user_namespace *user_ns, 112 int ksmbd_vfs_setxattr(struct user_namespace *user_ns, 117 int ksmbd_vfs_remove_xattr(struct user_namespace *user_ns, 134 int ksmbd_vfs_unlink(struct user_namespace *user_ns, 138 struct user_namespace *user_ns, 144 int ksmbd_vfs_remove_acl_xattrs(struct user_namespace *user_ns, [all …]
|
D | vfs.c | 72 int ksmbd_vfs_lock_parent(struct user_namespace *user_ns, struct dentry *parent, in ksmbd_vfs_lock_parent() argument 79 dentry = lookup_one(user_ns, child->d_name.name, parent, in ksmbd_vfs_lock_parent() 99 int ksmbd_vfs_may_delete(struct user_namespace *user_ns, in ksmbd_vfs_may_delete() argument 106 ret = ksmbd_vfs_lock_parent(user_ns, parent, dentry); in ksmbd_vfs_may_delete() 112 ret = inode_permission(user_ns, d_inode(parent), in ksmbd_vfs_may_delete() 120 int ksmbd_vfs_query_maximal_access(struct user_namespace *user_ns, in ksmbd_vfs_query_maximal_access() argument 128 if (!inode_permission(user_ns, d_inode(dentry), MAY_OPEN | MAY_WRITE)) in ksmbd_vfs_query_maximal_access() 134 if (!inode_permission(user_ns, d_inode(dentry), MAY_OPEN | MAY_READ)) in ksmbd_vfs_query_maximal_access() 137 if (!inode_permission(user_ns, d_inode(dentry), MAY_OPEN | MAY_EXEC)) in ksmbd_vfs_query_maximal_access() 141 ret = ksmbd_vfs_lock_parent(user_ns, parent, dentry); in ksmbd_vfs_query_maximal_access() [all …]
|
D | smbacl.c | 257 static int sid_to_id(struct user_namespace *user_ns, in sid_to_id() argument 279 uid = from_vfsuid(user_ns, &init_user_ns, VFSUIDT_INIT(uid)); in sid_to_id() 290 gid = from_vfsgid(user_ns, &init_user_ns, VFSGIDT_INIT(gid)); in sid_to_id() 365 static void parse_dacl(struct user_namespace *user_ns, in parse_dacl() argument 492 ret = sid_to_id(user_ns, &ppace[i]->sid, SIDOWNER, &temp_fattr); in parse_dacl() 578 static void set_posix_acl_entries_dacl(struct user_namespace *user_ns, in set_posix_acl_entries_dacl() argument 603 uid = posix_acl_uid_translate(user_ns, pace); in set_posix_acl_entries_dacl() 610 gid = posix_acl_gid_translate(user_ns, pace); in set_posix_acl_entries_dacl() 669 uid = posix_acl_uid_translate(user_ns, pace); in set_posix_acl_entries_dacl() 674 gid = posix_acl_gid_translate(user_ns, pace); in set_posix_acl_entries_dacl() [all …]
|
/Linux-v6.1/kernel/ |
D | utsname.c | 45 static struct uts_namespace *clone_uts_ns(struct user_namespace *user_ns, in clone_uts_ns() argument 53 ucounts = inc_uts_namespaces(user_ns); in clone_uts_ns() 71 ns->user_ns = get_user_ns(user_ns); in clone_uts_ns() 90 struct user_namespace *user_ns, struct uts_namespace *old_ns) in copy_utsname() argument 100 new_ns = clone_uts_ns(user_ns, old_ns); in copy_utsname() 109 put_user_ns(ns->user_ns); in free_uts_ns() 145 if (!ns_capable(ns->user_ns, CAP_SYS_ADMIN) || in utsns_install() 146 !ns_capable(nsset->cred->user_ns, CAP_SYS_ADMIN)) in utsns_install() 157 return to_uts_ns(ns)->user_ns; in utsns_owner()
|
D | nsproxy.c | 68 struct task_struct *tsk, struct user_namespace *user_ns, in create_new_namespaces() argument 78 new_nsp->mnt_ns = copy_mnt_ns(flags, tsk->nsproxy->mnt_ns, user_ns, new_fs); in create_new_namespaces() 84 new_nsp->uts_ns = copy_utsname(flags, user_ns, tsk->nsproxy->uts_ns); in create_new_namespaces() 90 new_nsp->ipc_ns = copy_ipcs(flags, user_ns, tsk->nsproxy->ipc_ns); in create_new_namespaces() 97 copy_pid_ns(flags, user_ns, tsk->nsproxy->pid_ns_for_children); in create_new_namespaces() 103 new_nsp->cgroup_ns = copy_cgroup_ns(flags, user_ns, in create_new_namespaces() 110 new_nsp->net_ns = copy_net_ns(flags, user_ns, tsk->nsproxy->net_ns); in create_new_namespaces() 116 new_nsp->time_ns_for_children = copy_time_ns(flags, user_ns, in create_new_namespaces() 154 struct user_namespace *user_ns = task_cred_xxx(tsk, user_ns); in copy_namespaces() local 164 } else if (!ns_capable(user_ns, CAP_SYS_ADMIN)) in copy_namespaces() [all …]
|
D | pid_namespace.c | 71 static struct pid_namespace *create_pid_namespace(struct user_namespace *user_ns, in create_pid_namespace() argument 80 if (!in_userns(parent_pid_ns->user_ns, user_ns)) in create_pid_namespace() 86 ucounts = inc_pid_namespaces(user_ns); in create_pid_namespace() 109 ns->user_ns = get_user_ns(user_ns); in create_pid_namespace() 129 put_user_ns(ns->user_ns); in delayed_free_pidns() 143 struct user_namespace *user_ns, struct pid_namespace *old_ns) in copy_pid_ns() argument 149 return create_pid_namespace(user_ns, old_ns); in copy_pid_ns() 266 if (write && !checkpoint_restore_ns_capable(pid_ns->user_ns)) in pid_ns_ctl_handler() 381 if (!ns_capable(new->user_ns, CAP_SYS_ADMIN) || in pidns_install() 382 !ns_capable(nsset->cred->user_ns, CAP_SYS_ADMIN)) in pidns_install() [all …]
|
D | uid16.c | 70 ruid = high2lowuid(from_kuid_munged(cred->user_ns, cred->uid)); in SYSCALL_DEFINE3() 71 euid = high2lowuid(from_kuid_munged(cred->user_ns, cred->euid)); in SYSCALL_DEFINE3() 72 suid = high2lowuid(from_kuid_munged(cred->user_ns, cred->suid)); in SYSCALL_DEFINE3() 93 rgid = high2lowgid(from_kgid_munged(cred->user_ns, cred->gid)); in SYSCALL_DEFINE3() 94 egid = high2lowgid(from_kgid_munged(cred->user_ns, cred->egid)); in SYSCALL_DEFINE3() 95 sgid = high2lowgid(from_kgid_munged(cred->user_ns, cred->sgid)); in SYSCALL_DEFINE3() 117 struct user_namespace *user_ns = current_user_ns(); in groups16_to_user() local 124 group = high2lowgid(from_kgid_munged(user_ns, kgid)); in groups16_to_user() 135 struct user_namespace *user_ns = current_user_ns(); in groups16_from_user() local 144 kgid = make_kgid(user_ns, low2highgid(group)); in groups16_from_user()
|
D | groups.c | 40 struct user_namespace *user_ns = current_user_ns(); in groups_to_user() local 46 gid = from_kgid_munged(user_ns, group_info->gid[i]); in groups_to_user() 57 struct user_namespace *user_ns = current_user_ns(); in groups_from_user() local 67 kgid = make_kgid(user_ns, gid); in groups_from_user() 187 struct user_namespace *user_ns = current_user_ns(); in may_setgroups() local 189 return ns_capable_setid(user_ns, CAP_SETGID) && in may_setgroups() 190 userns_may_setgroups(user_ns); in may_setgroups()
|
D | cred.c | 61 .user_ns = &init_user_ns, 125 put_user_ns(cred->user_ns); in put_cred_rcu() 274 get_user_ns(new->user_ns); in prepare_creds() 410 const struct user_namespace *set_ns = set->user_ns; in cred_cap_issubset() 411 const struct user_namespace *subset_ns = subset->user_ns; in cred_cap_issubset() 498 if (new->user != old->user || new->user_ns != old->user_ns) in commit_creds() 502 if (new->user != old->user || new->user_ns != old->user_ns) in commit_creds() 674 if (old_ucounts->ns == new->user_ns && uid_eq(old_ucounts->uid, new->uid)) in set_cred_ucounts() 677 if (!(new_ucounts = alloc_ucounts(new->user_ns, new->uid))) in set_cred_ucounts() 735 get_user_ns(new->user_ns); in prepare_kernel_cred()
|
D | user_namespace.c | 43 static void set_cred_user_ns(struct cred *cred, struct user_namespace *user_ns) in set_cred_user_ns() argument 59 cred->user_ns = user_ns; in set_cred_user_ns() 84 struct user_namespace *ns, *parent_ns = new->user_ns; in create_user_ns() 883 const struct user_namespace *file_ns = file->f_cred->user_ns; in verify_root_map() 1322 struct user_namespace *user_ns; in userns_get() local 1325 user_ns = get_user_ns(__task_cred(task)->user_ns); in userns_get() 1328 return user_ns ? &user_ns->ns : NULL; in userns_get() 1338 struct user_namespace *user_ns = to_user_ns(ns); in userns_install() local 1344 if (user_ns == current_user_ns()) in userns_install() 1354 if (!ns_capable(user_ns, CAP_SYS_ADMIN)) in userns_install() [all …]
|
/Linux-v6.1/ipc/ |
D | namespace.c | 32 static struct ipc_namespace *create_ipc_ns(struct user_namespace *user_ns, in create_ipc_ns() argument 40 ucounts = inc_ipc_namespaces(user_ns); in create_ipc_ns() 55 ns->user_ns = get_user_ns(user_ns); in create_ipc_ns() 82 put_user_ns(ns->user_ns); in create_ipc_ns() 93 struct user_namespace *user_ns, struct ipc_namespace *ns) in copy_ipcs() argument 97 return create_ipc_ns(user_ns, ns); in copy_ipcs() 145 put_user_ns(ns->user_ns); in free_ipc_ns() 220 if (!ns_capable(ns->user_ns, CAP_SYS_ADMIN) || in ipcns_install() 221 !ns_capable(nsset->cred->user_ns, CAP_SYS_ADMIN)) in ipcns_install() 231 return to_ipc_ns(ns)->user_ns; in ipcns_owner()
|
/Linux-v6.1/kernel/cgroup/ |
D | namespace.c | 44 put_user_ns(ns->user_ns); in free_cgroup_ns() 51 struct user_namespace *user_ns, in copy_cgroup_ns() argument 66 if (!ns_capable(user_ns, CAP_SYS_ADMIN)) in copy_cgroup_ns() 69 ucounts = inc_cgroup_namespaces(user_ns); in copy_cgroup_ns() 86 new_ns->user_ns = get_user_ns(user_ns); in copy_cgroup_ns() 103 if (!ns_capable(nsset->cred->user_ns, CAP_SYS_ADMIN) || in cgroupns_install() 104 !ns_capable(cgroup_ns->user_ns, CAP_SYS_ADMIN)) in cgroupns_install() 141 return to_cg_ns(ns)->user_ns; in cgroupns_owner()
|
/Linux-v6.1/net/netfilter/ |
D | xt_owner.c | 32 (current_user_ns() != net->user_ns)) in owner_check() 37 kuid_t uid_min = make_kuid(net->user_ns, info->uid_min); in owner_check() 38 kuid_t uid_max = make_kuid(net->user_ns, info->uid_max); in owner_check() 49 kgid_t gid_min = make_kgid(net->user_ns, info->gid_min); in owner_check() 50 kgid_t gid_max = make_kgid(net->user_ns, info->gid_max); in owner_check() 85 kuid_t uid_min = make_kuid(net->user_ns, info->uid_min); in owner_mt() 86 kuid_t uid_max = make_kuid(net->user_ns, info->uid_max); in owner_mt() 95 kgid_t gid_min = make_kgid(net->user_ns, info->gid_min); in owner_mt() 96 kgid_t gid_max = make_kgid(net->user_ns, info->gid_max); in owner_mt()
|
/Linux-v6.1/kernel/time/ |
D | namespace.c | 78 static struct time_namespace *clone_time_ns(struct user_namespace *user_ns, in clone_time_ns() argument 86 ucounts = inc_time_namespaces(user_ns); in clone_time_ns() 107 ns->user_ns = get_user_ns(user_ns); in clone_time_ns() 134 struct user_namespace *user_ns, struct time_namespace *old_ns) in copy_time_ns() argument 139 return clone_time_ns(user_ns, old_ns); in copy_time_ns() 232 put_user_ns(ns->user_ns); in free_time_ns() 294 if (!ns_capable(ns->user_ns, CAP_SYS_ADMIN) || in timens_install() 295 !ns_capable(nsset->cred->user_ns, CAP_SYS_ADMIN)) in timens_install() 326 return to_time_ns(ns)->user_ns; in timens_owner() 375 if (!file_ns_capable(file, time_ns->user_ns, CAP_SYS_TIME)) { in proc_timens_set_offset() [all …]
|
/Linux-v6.1/security/keys/ |
D | proc.c | 66 struct user_namespace *user_ns = seq_user_ns(p); in key_serial_next() local 71 if (kuid_has_mapping(user_ns, key->user->uid)) in key_serial_next() 80 struct user_namespace *user_ns = seq_user_ns(p); in find_ge_key() local 103 if (kuid_has_mapping(user_ns, minkey->user->uid)) in find_ge_key() 252 static struct rb_node *__key_user_next(struct user_namespace *user_ns, struct rb_node *n) in __key_user_next() argument 256 if (kuid_has_mapping(user_ns, user->uid)) in __key_user_next() 263 static struct rb_node *key_user_next(struct user_namespace *user_ns, struct rb_node *n) in key_user_next() argument 265 return __key_user_next(user_ns, rb_next(n)); in key_user_next() 268 static struct rb_node *key_user_first(struct user_namespace *user_ns, struct rb_root *r) in key_user_first() argument 271 return __key_user_next(user_ns, n); in key_user_first()
|
D | process_keys.c | 38 static struct key *get_user_register(struct user_namespace *user_ns) in get_user_register() argument 40 struct key *reg_keyring = READ_ONCE(user_ns->user_keyring_register); in get_user_register() 45 down_write(&user_ns->keyring_sem); in get_user_register() 50 reg_keyring = user_ns->user_keyring_register; in get_user_register() 53 user_ns->owner, INVALID_GID, in get_user_register() 60 smp_store_release(&user_ns->user_keyring_register, in get_user_register() 64 up_write(&user_ns->keyring_sem); in get_user_register() 78 struct user_namespace *user_ns = current_user_ns(); in look_up_user_keyrings() local 82 uid_t uid = from_kuid(user_ns, cred->user->uid); in look_up_user_keyrings() 90 reg_keyring = get_user_register(user_ns); in look_up_user_keyrings() [all …]
|
/Linux-v6.1/net/bridge/ |
D | br_ioctl.c | 91 if (!ns_capable(net->user_ns, CAP_NET_ADMIN)) in add_del_if() 219 if (!ns_capable(dev_net(dev)->user_ns, CAP_NET_ADMIN)) in br_dev_siocdevprivate() 226 if (!ns_capable(dev_net(dev)->user_ns, CAP_NET_ADMIN)) in br_dev_siocdevprivate() 233 if (!ns_capable(dev_net(dev)->user_ns, CAP_NET_ADMIN)) in br_dev_siocdevprivate() 240 if (!ns_capable(dev_net(dev)->user_ns, CAP_NET_ADMIN)) in br_dev_siocdevprivate() 280 if (!ns_capable(dev_net(dev)->user_ns, CAP_NET_ADMIN)) in br_dev_siocdevprivate() 287 if (!ns_capable(dev_net(dev)->user_ns, CAP_NET_ADMIN)) in br_dev_siocdevprivate() 296 if (!ns_capable(dev_net(dev)->user_ns, CAP_NET_ADMIN)) in br_dev_siocdevprivate() 310 if (!ns_capable(dev_net(dev)->user_ns, CAP_NET_ADMIN)) in br_dev_siocdevprivate() 379 if (!ns_capable(net->user_ns, CAP_NET_ADMIN)) in old_deviceless() [all …]
|
/Linux-v6.1/security/ |
D | commoncap.c | 77 if (ns == cred->user_ns) in cap_capable() 84 if (ns->level <= cred->user_ns->level) in cap_capable() 91 if ((ns->parent == cred->user_ns) && uid_eq(ns->owner, cred->euid)) in cap_capable() 147 if (cred->user_ns == child_cred->user_ns && in cap_ptrace_access_check() 150 if (ns_capable(child_cred->user_ns, CAP_SYS_PTRACE)) in cap_ptrace_access_check() 179 if (cred->user_ns == child_cred->user_ns && in cap_ptrace_traceme() 182 if (has_ns_capability(parent, child_cred->user_ns, CAP_SYS_PTRACE)) in cap_ptrace_traceme() 224 if (cap_capable(current_cred(), current_cred()->user_ns, in cap_inh_is_capped() 909 root_uid = make_kuid(new->user_ns, 0); in cap_bprm_creds_from_file() 926 !ptracer_capable(current, new->user_ns))) { in cap_bprm_creds_from_file() [all …]
|
/Linux-v6.1/include/linux/ |
D | utsname.h | 26 struct user_namespace *user_ns; member 39 struct user_namespace *user_ns, struct uts_namespace *old_ns); 59 struct user_namespace *user_ns, struct uts_namespace *old_ns) in copy_utsname() argument
|
D | pid_namespace.h | 30 struct user_namespace *user_ns; member 49 struct user_namespace *user_ns, struct pid_namespace *ns); 63 struct user_namespace *user_ns, struct pid_namespace *ns) in copy_pid_ns() argument
|
D | ipc_namespace.h | 75 struct user_namespace *user_ns; member 133 struct user_namespace *user_ns, struct ipc_namespace *ns); 155 struct user_namespace *user_ns, struct ipc_namespace *ns) in copy_ipcs() argument
|
D | tsacct_kern.h | 14 extern void bacct_add_tsk(struct user_namespace *user_ns, 18 static inline void bacct_add_tsk(struct user_namespace *user_ns, in bacct_add_tsk() argument
|
/Linux-v6.1/fs/sysfs/ |
D | mount.c | 75 put_user_ns(fc->user_ns); in sysfs_init_fs_context() 76 fc->user_ns = get_user_ns(netns->user_ns); in sysfs_init_fs_context()
|
/Linux-v6.1/net/unix/ |
D | diag.c | 118 struct user_namespace *user_ns) in sk_diag_dump_uid() argument 120 uid_t uid = from_kuid_munged(user_ns, sock_i_uid(sk)); in sk_diag_dump_uid() 125 struct user_namespace *user_ns, in sk_diag_fill() argument 172 sk_diag_dump_uid(sk, skb, user_ns)) in sk_diag_fill() 184 struct user_namespace *user_ns, in sk_diag_dump() argument 196 return sk_diag_fill(sk, skb, req, user_ns, portid, seq, flags, sk_ino); in sk_diag_dump()
|
/Linux-v6.1/net/ |
D | sysctl_net.c | 48 if (ns_capable_noaudit(net->user_ns, CAP_NET_ADMIN)) { in net_ctl_permissions() 64 ns_root_uid = make_kuid(net->user_ns, 0); in net_ctl_set_ownership() 68 ns_root_gid = make_kgid(net->user_ns, 0); in net_ctl_set_ownership()
|