Lines Matching refs:user_ns
127 const struct user_namespace *cred_ns = cred->user_ns; in cap_capable()
177 if (cred->user_ns == child_cred->user_ns && in cap_ptrace_access_check()
180 if (ns_capable(child_cred->user_ns, CAP_SYS_PTRACE)) in cap_ptrace_access_check()
209 if (cred->user_ns == child_cred->user_ns && in cap_ptrace_traceme()
212 if (has_ns_capability(parent, child_cred->user_ns, CAP_SYS_PTRACE)) in cap_ptrace_traceme()
254 if (cap_capable(current_cred(), current_cred()->user_ns, in cap_inh_is_capped()
925 root_uid = make_kuid(new->user_ns, 0); in cap_bprm_creds_from_file()
942 !ptracer_capable(current, new->user_ns))) { in cap_bprm_creds_from_file()
944 if (!ns_capable(new->user_ns, CAP_SETUID) || in cap_bprm_creds_from_file()
1018 struct user_namespace *user_ns = dentry->d_sb->s_user_ns; in cap_inode_setxattr() local
1032 if (!ns_capable(user_ns, CAP_SYS_ADMIN)) in cap_inode_setxattr()
1059 struct user_namespace *user_ns = dentry->d_sb->s_user_ns; in cap_inode_removexattr() local
1076 if (!ns_capable(user_ns, CAP_SYS_ADMIN)) in cap_inode_removexattr()
1112 kuid_t root_uid = make_kuid(old->user_ns, 0); in cap_emulate_setxuid()
1169 kuid_t root_uid = make_kuid(old->user_ns, 0); in cap_task_fix_setuid()
1205 if (!is_subset && !ns_capable(__task_cred(p)->user_ns, CAP_SYS_NICE)) in cap_safe_nice()
1346 if (cap_capable(current_cred(), current_cred()->user_ns, in cap_task_prctl()