Lines Matching refs:ns
403 static int proc_pid_auxv(struct seq_file *m, struct pid_namespace *ns, in proc_pid_auxv() argument
425 static int proc_pid_wchan(struct seq_file *m, struct pid_namespace *ns, in proc_pid_wchan() argument
464 static int proc_pid_stack(struct seq_file *m, struct pid_namespace *ns, in proc_pid_stack() argument
501 static int proc_pid_schedstat(struct seq_file *m, struct pid_namespace *ns, in proc_pid_schedstat() argument
576 static int proc_oom_score(struct seq_file *m, struct pid_namespace *ns, in proc_oom_score() argument
617 static int proc_pid_limits(struct seq_file *m, struct pid_namespace *ns, in proc_pid_limits() argument
659 static int proc_pid_syscall(struct seq_file *m, struct pid_namespace *ns, in proc_pid_syscall() argument
777 struct pid_namespace *ns; in proc_single_show() local
782 ns = inode->i_sb->s_fs_info; in proc_single_show()
788 ret = PROC_I(inode)->op.proc_show(m, ns, pid, task); in proc_single_show()
2153 struct pid_namespace *ns; member
2214 pid_nr_ns(timer->it_pid, tp->ns)); in show_timer()
2237 tp->ns = inode->i_sb->s_fs_info; in proc_timers_open()
2571 static int proc_tid_io_accounting(struct seq_file *m, struct pid_namespace *ns, in proc_tid_io_accounting() argument
2577 static int proc_tgid_io_accounting(struct seq_file *m, struct pid_namespace *ns, in proc_tgid_io_accounting() argument
2588 struct user_namespace *ns = NULL; in proc_id_map_open() local
2596 ns = get_user_ns(task_cred_xxx(task, user_ns)); in proc_id_map_open()
2600 if (!ns) in proc_id_map_open()
2608 seq->private = ns; in proc_id_map_open()
2612 put_user_ns(ns); in proc_id_map_open()
2620 struct user_namespace *ns = seq->private; in proc_id_map_release() local
2621 put_user_ns(ns); in proc_id_map_release()
2666 struct user_namespace *ns = NULL; in proc_setgroups_open() local
2674 ns = get_user_ns(task_cred_xxx(task, user_ns)); in proc_setgroups_open()
2678 if (!ns) in proc_setgroups_open()
2683 if (!ns_capable(ns, CAP_SYS_ADMIN)) in proc_setgroups_open()
2687 ret = single_open(file, &proc_setgroups_show, ns); in proc_setgroups_open()
2693 put_user_ns(ns); in proc_setgroups_open()
2701 struct user_namespace *ns = seq->private; in proc_setgroups_release() local
2703 put_user_ns(ns); in proc_setgroups_release()
2716 static int proc_pid_personality(struct seq_file *m, struct pid_namespace *ns, in proc_pid_personality() argument
2933 proc_flush_task_mnt(upid->ns->proc_mnt, upid->nr, in proc_flush_task()
2971 struct pid_namespace *ns; in proc_pid_lookup() local
2977 ns = dentry->d_sb->s_fs_info; in proc_pid_lookup()
2979 task = find_task_by_pid_ns(tgid, ns); in proc_pid_lookup()
3000 static struct tgid_iter next_tgid(struct pid_namespace *ns, struct tgid_iter iter) in next_tgid() argument
3009 pid = find_ge_pid(iter.tgid, ns); in next_tgid()
3011 iter.tgid = pid_nr_ns(pid, ns); in next_tgid()
3041 struct pid_namespace *ns = file_inode(file)->i_sb->s_fs_info; in proc_pid_readdir() local
3048 struct inode *inode = d_inode(ns->proc_self); in proc_pid_readdir()
3054 struct inode *inode = d_inode(ns->proc_thread_self); in proc_pid_readdir()
3061 for (iter = next_tgid(ns, iter); in proc_pid_readdir()
3063 iter.tgid += 1, iter = next_tgid(ns, iter)) { in proc_pid_readdir()
3066 if (!has_pid_permissions(ns, iter.task, 2)) in proc_pid_readdir()
3225 struct pid_namespace *ns; in proc_task_lookup() local
3234 ns = dentry->d_sb->s_fs_info; in proc_task_lookup()
3236 task = find_task_by_pid_ns(tid, ns); in proc_task_lookup()
3267 struct pid_namespace *ns) in first_tid() argument
3282 pos = find_task_by_pid_ns(tid, ns); in first_tid()
3336 struct pid_namespace *ns; in proc_task_readdir() local
3348 ns = inode->i_sb->s_fs_info; in proc_task_readdir()
3351 for (task = first_tid(proc_pid(inode), tid, ctx->pos - 2, ns); in proc_task_readdir()
3356 tid = task_pid_nr_ns(task, ns); in proc_task_readdir()