Lines Matching refs:user_ns
127 const struct user_namespace *cred_ns = cred->user_ns; in cap_capable()
177 if (cred->user_ns == child_cred->user_ns && in cap_ptrace_access_check()
180 if (ns_capable(child_cred->user_ns, CAP_SYS_PTRACE)) in cap_ptrace_access_check()
209 if (cred->user_ns == child_cred->user_ns && in cap_ptrace_traceme()
212 if (has_ns_capability(parent, child_cred->user_ns, CAP_SYS_PTRACE)) in cap_ptrace_traceme()
254 if (cap_capable(current_cred(), current_cred()->user_ns, in cap_inh_is_capped()
935 root_uid = make_kuid(new->user_ns, 0); in cap_bprm_creds_from_file()
952 !ptracer_capable(current, new->user_ns))) { in cap_bprm_creds_from_file()
954 if (!ns_capable(new->user_ns, CAP_SETUID) || in cap_bprm_creds_from_file()
1028 struct user_namespace *user_ns = dentry->d_sb->s_user_ns; in cap_inode_setxattr() local
1042 if (!ns_capable(user_ns, CAP_SYS_ADMIN)) in cap_inode_setxattr()
1069 struct user_namespace *user_ns = dentry->d_sb->s_user_ns; in cap_inode_removexattr() local
1086 if (!ns_capable(user_ns, CAP_SYS_ADMIN)) in cap_inode_removexattr()
1122 kuid_t root_uid = make_kuid(old->user_ns, 0); in cap_emulate_setxuid()
1179 kuid_t root_uid = make_kuid(old->user_ns, 0); in cap_task_fix_setuid()
1215 if (!is_subset && !ns_capable(__task_cred(p)->user_ns, CAP_SYS_NICE)) in cap_safe_nice()
1356 if (cap_capable(current_cred(), current_cred()->user_ns, in cap_task_prctl()