/kernel/ |
D | cred.c | 63 .user_ns = &init_user_ns, 427 for (;subset_ns != &init_user_ns; subset_ns = subset_ns->parent) { in cred_cap_issubset() 856 from_kuid_munged(&init_user_ns, cred->uid), in dump_invalid_creds() 857 from_kuid_munged(&init_user_ns, cred->euid), in dump_invalid_creds() 858 from_kuid_munged(&init_user_ns, cred->suid), in dump_invalid_creds() 859 from_kuid_munged(&init_user_ns, cred->fsuid)); in dump_invalid_creds() 861 from_kgid_munged(&init_user_ns, cred->gid), in dump_invalid_creds() 862 from_kgid_munged(&init_user_ns, cred->egid), in dump_invalid_creds() 863 from_kgid_munged(&init_user_ns, cred->sgid), in dump_invalid_creds() 864 from_kgid_munged(&init_user_ns, cred->fsgid)); in dump_invalid_creds()
|
D | user.c | 29 struct user_namespace init_user_ns = { variable 69 .keyring_name_list = LIST_HEAD_INIT(init_user_ns.keyring_name_list), 70 .keyring_sem = __RWSEM_INITIALIZER(init_user_ns.keyring_sem), 73 EXPORT_SYMBOL_GPL(init_user_ns);
|
D | audit.c | 1046 if (current_user_ns() != &init_user_ns) in audit_netlink_ok() 1090 uid_t uid = from_kuid(&init_user_ns, current_uid()); in audit_log_common_recv_msg() 1488 sig_data->uid = from_kuid(&init_user_ns, audit_sig_uid); in audit_receive_msg() 1617 from_kuid(&init_user_ns, cred->uid), in audit_log_multicast() 1618 from_kuid(&init_user_ns, audit_get_loginuid(current)), in audit_log_multicast() 2168 uid_t auid = from_kuid(&init_user_ns, audit_get_loginuid(current)); in audit_log_session_info() 2263 from_kuid(&init_user_ns, audit_get_loginuid(current)), in audit_log_task_info() 2264 from_kuid(&init_user_ns, cred->uid), in audit_log_task_info() 2265 from_kgid(&init_user_ns, cred->gid), in audit_log_task_info() 2266 from_kuid(&init_user_ns, cred->euid), in audit_log_task_info() [all …]
|
D | auditsc.c | 1099 from_kuid(&init_user_ns, auid), in audit_log_pid_context() 1100 from_kuid(&init_user_ns, uid), sessionid); in audit_log_pid_context() 1315 from_kuid(&init_user_ns, name->fcap.rootid)); in audit_log_fcaps() 1387 from_kuid(&init_user_ns, context->ipc.uid), in show_special() 1388 from_kgid(&init_user_ns, context->ipc.gid), in show_special() 1553 from_kuid(&init_user_ns, n->uid), in audit_log_name() 1554 from_kgid(&init_user_ns, n->gid), in audit_log_name() 1661 from_kuid(&init_user_ns, cred->uid), in audit_log_uring() 1662 from_kgid(&init_user_ns, cred->gid), in audit_log_uring() 1663 from_kuid(&init_user_ns, cred->euid), in audit_log_uring() [all …]
|
D | capability.c | 318 return has_ns_capability(t, &init_user_ns, cap); in has_capability() 361 return has_ns_capability_noaudit(t, &init_user_ns, cap); in has_capability_noaudit() 450 return ns_capable(&init_user_ns, cap); in capable()
|
D | ucount.c | 12 .ns = &init_user_ns, 370 BUG_ON(!setup_userns_sysctls(&init_user_ns)); in user_namespace_sysctl_init()
|
D | taskstats.c | 306 if (current_user_ns() != &init_user_ns) in add_del_listener() 643 fill_stats(&init_user_ns, &init_pid_ns, tsk, stats); in taskstats_exit()
|
D | fork.c | 1032 init_user_ns.ucount_max[i] = max_threads/2; in fork_init() 1034 set_userns_rlimit_max(&init_user_ns, UCOUNT_RLIMIT_NPROC, RLIM_INFINITY); in fork_init() 1035 set_userns_rlimit_max(&init_user_ns, UCOUNT_RLIMIT_MSGQUEUE, RLIM_INFINITY); in fork_init() 1036 set_userns_rlimit_max(&init_user_ns, UCOUNT_RLIMIT_SIGPENDING, RLIM_INFINITY); in fork_init() 1037 set_userns_rlimit_max(&init_user_ns, UCOUNT_RLIMIT_MEMLOCK, RLIM_INFINITY); in fork_init()
|
D | pid.c | 81 .user_ns = &init_user_ns,
|
D | kallsyms.c | 987 if (security_capable(cred, &init_user_ns, CAP_SYSLOG, in kallsyms_show_value()
|
D | user_namespace.c | 68 (current_user_ns() != &init_user_ns)) in enforced_nproc_rlimit()
|
D | resource.c | 120 if (file_ns_capable(m->file, &init_user_ns, CAP_SYS_ADMIN)) { in r_show()
|
D | seccomp.c | 2435 if (!file_ns_capable(m->file, &init_user_ns, CAP_SYS_ADMIN)) in proc_pid_seccomp_cache()
|
/kernel/cgroup/ |
D | cgroup-v1.c | 560 if ((ctx->ns->user_ns != &init_user_ns) || in cgroup_release_agent_write() 561 !file_ns_capable(of->file, &init_user_ns, CAP_SYS_ADMIN)) in cgroup_release_agent_write() 985 if ((fc->user_ns != &init_user_ns) || !capable(CAP_SYS_ADMIN)) in cgroup1_parse_param()
|
D | cgroup.c | 217 .user_ns = &init_user_ns, 5100 ret = inode_permission(&init_user_ns, inode, MAY_WRITE); in cgroup_may_write()
|
/kernel/bpf/ |
D | inode.c | 125 inode_init_owner(&init_user_ns, inode, dir, mode); in bpf_get_inode() 562 int ret = inode_permission(&init_user_ns, inode, MAY_READ); in __get_prog_inode()
|
D | helpers.c | 243 return (u64) from_kgid(&init_user_ns, gid) << 32 | in BPF_CALL_0() 244 from_kuid(&init_user_ns, uid); in BPF_CALL_0()
|
/kernel/trace/ |
D | trace_events_user.c | 189 if (user_ns != &init_user_ns) { in user_event_group_system_name() 212 if (user_ns == &init_user_ns) in user_event_group_from_user_ns() 1902 init_group = user_event_group_create(&init_user_ns); in trace_events_user_init()
|
/kernel/time/ |
D | namespace.c | 463 .user_ns = &init_user_ns,
|