Lines Matching refs:ns
409 static int proc_pid_wchan(struct seq_file *m, struct pid_namespace *ns, in proc_pid_wchan() argument
448 static int proc_pid_stack(struct seq_file *m, struct pid_namespace *ns, in proc_pid_stack() argument
485 static int proc_pid_schedstat(struct seq_file *m, struct pid_namespace *ns, in proc_pid_schedstat() argument
560 static int proc_oom_score(struct seq_file *m, struct pid_namespace *ns, in proc_oom_score() argument
598 static int proc_pid_limits(struct seq_file *m, struct pid_namespace *ns, in proc_pid_limits() argument
640 static int proc_pid_syscall(struct seq_file *m, struct pid_namespace *ns, in proc_pid_syscall() argument
758 struct pid_namespace *ns; in proc_single_show() local
763 ns = inode->i_sb->s_fs_info; in proc_single_show()
769 ret = PROC_I(inode)->op.proc_show(m, ns, pid, task); in proc_single_show()
2187 struct pid_namespace *ns; member
2248 pid_nr_ns(timer->it_pid, tp->ns)); in show_timer()
2271 tp->ns = inode->i_sb->s_fs_info; in proc_timers_open()
2689 static int proc_tid_io_accounting(struct seq_file *m, struct pid_namespace *ns, in proc_tid_io_accounting() argument
2695 static int proc_tgid_io_accounting(struct seq_file *m, struct pid_namespace *ns, in proc_tgid_io_accounting() argument
2706 struct user_namespace *ns = NULL; in proc_id_map_open() local
2714 ns = get_user_ns(task_cred_xxx(task, user_ns)); in proc_id_map_open()
2718 if (!ns) in proc_id_map_open()
2726 seq->private = ns; in proc_id_map_open()
2730 put_user_ns(ns); in proc_id_map_open()
2738 struct user_namespace *ns = seq->private; in proc_id_map_release() local
2739 put_user_ns(ns); in proc_id_map_release()
2784 struct user_namespace *ns = NULL; in proc_setgroups_open() local
2792 ns = get_user_ns(task_cred_xxx(task, user_ns)); in proc_setgroups_open()
2796 if (!ns) in proc_setgroups_open()
2801 if (!ns_capable(ns, CAP_SYS_ADMIN)) in proc_setgroups_open()
2805 ret = single_open(file, &proc_setgroups_show, ns); in proc_setgroups_open()
2811 put_user_ns(ns); in proc_setgroups_open()
2819 struct user_namespace *ns = seq->private; in proc_setgroups_release() local
2821 put_user_ns(ns); in proc_setgroups_release()
2834 static int proc_pid_personality(struct seq_file *m, struct pid_namespace *ns, in proc_pid_personality() argument
3055 proc_flush_task_mnt(upid->ns->proc_mnt, upid->nr, in proc_flush_task()
3093 struct pid_namespace *ns; in proc_pid_lookup() local
3099 ns = dentry->d_sb->s_fs_info; in proc_pid_lookup()
3101 task = find_task_by_pid_ns(tgid, ns); in proc_pid_lookup()
3122 static struct tgid_iter next_tgid(struct pid_namespace *ns, struct tgid_iter iter) in next_tgid() argument
3131 pid = find_ge_pid(iter.tgid, ns); in next_tgid()
3133 iter.tgid = pid_nr_ns(pid, ns); in next_tgid()
3163 struct pid_namespace *ns = file_inode(file)->i_sb->s_fs_info; in proc_pid_readdir() local
3170 struct inode *inode = d_inode(ns->proc_self); in proc_pid_readdir()
3176 struct inode *inode = d_inode(ns->proc_thread_self); in proc_pid_readdir()
3183 for (iter = next_tgid(ns, iter); in proc_pid_readdir()
3185 iter.tgid += 1, iter = next_tgid(ns, iter)) { in proc_pid_readdir()
3190 if (!has_pid_permissions(ns, iter.task, 2)) in proc_pid_readdir()
3392 struct pid_namespace *ns; in proc_task_lookup() local
3401 ns = dentry->d_sb->s_fs_info; in proc_task_lookup()
3403 task = find_task_by_pid_ns(tid, ns); in proc_task_lookup()
3434 struct pid_namespace *ns) in first_tid() argument
3449 pos = find_task_by_pid_ns(tid, ns); in first_tid()
3503 struct pid_namespace *ns; in proc_task_readdir() local
3515 ns = inode->i_sb->s_fs_info; in proc_task_readdir()
3518 for (task = first_tid(proc_pid(inode), tid, ctx->pos - 2, ns); in proc_task_readdir()
3523 tid = task_pid_nr_ns(task, ns); in proc_task_readdir()