/linux/kernel/bpf/ |
H A D | token.c | 18 struct user_namespace *userns; in bpf_token_capable() local 21 userns = token ? token->userns : &init_user_ns; in bpf_token_capable() 22 if (!bpf_ns_capable(userns, cap)) in bpf_token_capable() 37 put_user_ns(token->userns); in bpf_token_free() 115 struct user_namespace *userns; in bpf_token_create() local 138 userns = sb->s_user_ns; in bpf_token_create() 144 if (current_user_ns() != userns) in bpf_token_create() 146 if (!ns_capable(userns, CAP_BPF)) in bpf_token_create() 184 token->userns = get_user_ns(userns); in bpf_token_create()
|
/linux/fs/nfs/ |
H A D | nfs3xdr.c | 534 struct user_namespace *userns) in encode_sattr3() argument 568 *p++ = cpu_to_be32(from_kuid_munged(userns, attr->ia_uid)); in encode_sattr3() 574 *p++ = cpu_to_be32(from_kgid_munged(userns, attr->ia_gid)); in encode_sattr3() 621 struct user_namespace *userns) in decode_fattr3() argument 634 fattr->uid = make_kuid(userns, be32_to_cpup(p++)); in decode_fattr3() 637 fattr->gid = make_kgid(userns, be32_to_cpup(p++)); in decode_fattr3() 675 struct user_namespace *userns) in decode_post_op_attr() argument 683 return decode_fattr3(xdr, fattr, userns); in decode_post_op_attr() 745 struct user_namespace *userns) in decode_wcc_data() argument 752 error = decode_post_op_attr(xdr, fattr, userns); in decode_wcc_data() [all …]
|
H A D | nfs2xdr.c | 263 struct user_namespace *userns) in decode_fattr() argument 278 fattr->uid = make_kuid(userns, be32_to_cpup(p++)); in decode_fattr() 281 fattr->gid = make_kgid(userns, be32_to_cpup(p++)); in decode_fattr() 337 struct user_namespace *userns) in encode_sattr() argument 348 *p++ = cpu_to_be32(from_kuid_munged(userns, attr->ia_uid)); in encode_sattr() 352 *p++ = cpu_to_be32(from_kgid_munged(userns, attr->ia_gid)); in encode_sattr() 463 struct user_namespace *userns) in decode_attrstat() argument 475 error = decode_fattr(xdr, result, userns); in decode_attrstat() 511 struct user_namespace *userns) in decode_diropok() argument 518 error = decode_fattr(xdr, result->fattr, userns); in decode_diropok() [all …]
|
/linux/include/linux/ |
H A D | mnt_idmapping.h | 153 static inline bool vfsuid_has_mapping(struct user_namespace *userns, in vfsuid_has_mapping() argument 156 return from_kuid(userns, AS_KUIDT(vfsuid)) != (uid_t)-1; in vfsuid_has_mapping() 191 static inline bool vfsgid_has_mapping(struct user_namespace *userns, in vfsgid_has_mapping() argument 194 return from_kgid(userns, AS_KGIDT(vfsgid)) != (gid_t)-1; in vfsgid_has_mapping()
|
H A D | bpf.h | 1733 struct user_namespace *userns; member
|
/linux/net/sunrpc/ |
H A D | auth_unix.c | 118 struct user_namespace *userns = clnt->cl_cred ? in unx_marshal() local 135 *p++ = cpu_to_be32(from_kuid_munged(userns, cred->cr_cred->fsuid)); in unx_marshal() 136 *p++ = cpu_to_be32(from_kgid_munged(userns, cred->cr_cred->fsgid)); in unx_marshal() 141 *p++ = cpu_to_be32(from_kgid_munged(userns, gi->gid[i])); in unx_marshal()
|
H A D | svcauth.c | 190 struct user_namespace *userns = clnt->cl_cred ? in svcauth_map_clnt_to_svc_cred_local() local 195 svc->cr_uid = KUIDT_INIT(from_kuid_munged(userns, cred->fsuid)); in svcauth_map_clnt_to_svc_cred_local() 196 svc->cr_gid = KGIDT_INIT(from_kgid_munged(userns, cred->fsgid)); in svcauth_map_clnt_to_svc_cred_local()
|
H A D | svcauth_unix.c | 921 struct user_namespace *userns; in svcauth_unix_accept() local 947 userns = (rqstp->rq_xprt && rqstp->rq_xprt->xpt_cred) ? in svcauth_unix_accept() 951 cred->cr_uid = make_kuid(userns, i); in svcauth_unix_accept() 954 cred->cr_gid = make_kgid(userns, i); in svcauth_unix_accept() 967 kgid_t kgid = make_kgid(userns, be32_to_cpup(p++)); in svcauth_unix_accept()
|
/linux/tools/testing/selftests/rlimits/ |
H A D | .gitignore | 2 rlimits-per-userns
|
H A D | Makefile | 4 TEST_GEN_PROGS := rlimits-per-userns
|
/linux/fs/nfsd/ |
H A D | export.c | 1393 struct user_namespace *userns = m->file->f_cred->user_ns; in exp_flags() local 1398 if (!uid_eq(anonu, make_kuid(userns, (uid_t)-2)) && in exp_flags() 1399 !uid_eq(anonu, make_kuid(userns, 0x10000-2))) in exp_flags() 1400 seq_printf(m, ",anonuid=%u", from_kuid_munged(userns, anonu)); in exp_flags() 1401 if (!gid_eq(anong, make_kgid(userns, (gid_t)-2)) && in exp_flags() 1402 !gid_eq(anong, make_kgid(userns, 0x10000-2))) in exp_flags() 1403 seq_printf(m, ",anongid=%u", from_kgid_munged(userns, anong)); in exp_flags()
|
H A D | nfsxdr.c | 217 struct user_namespace *userns = nfsd_user_namespace(rqstp); in svcxdr_encode_fattr() local 231 *p++ = cpu_to_be32((u32)from_kuid_munged(userns, stat->uid)); in svcxdr_encode_fattr() 232 *p++ = cpu_to_be32((u32)from_kgid_munged(userns, stat->gid)); in svcxdr_encode_fattr()
|
H A D | nfs3xdr.c | 338 struct user_namespace *userns = nfsd_user_namespace(rqstp); in svcxdr_encode_fattr3() local 349 *p++ = cpu_to_be32((u32)from_kuid_munged(userns, stat->uid)); in svcxdr_encode_fattr3() 350 *p++ = cpu_to_be32((u32)from_kgid_munged(userns, stat->gid)); in svcxdr_encode_fattr3()
|
/linux/fs/ |
H A D | posix_acl.c | 773 struct posix_acl *posix_acl_from_xattr(struct user_namespace *userns, in posix_acl_from_xattr() argument 805 acl_e->e_uid = make_kuid(userns, in posix_acl_from_xattr() 811 acl_e->e_gid = make_kgid(userns, in posix_acl_from_xattr()
|
/linux/net/sunrpc/auth_gss/ |
H A D | auth_gss.c | 408 struct user_namespace *userns = cred->user_ns; in gss_encode_v0_msg() local 410 uid_t uid = from_kuid_munged(userns, gss_msg->uid); in gss_encode_v0_msg() 435 struct user_namespace *userns = cred->user_ns; in gss_encode_v1_msg() local 442 from_kuid_munged(userns, gss_msg->uid)); in gss_encode_v1_msg()
|
/linux/Documentation/filesystems/ |
H A D | fuse.rst | 303 reason 'allow_other' restricts access to users in the same userns
|
/linux/Documentation/admin-guide/ |
H A D | cgroup-v2.rst | 2960 namespace's userns
|