Lines Matching full:namespace

39 	/* Open a namespace file descriptor */  in TEST()
43 /* Get handle for the namespace */ in TEST()
67 /* Verify we opened the correct namespace */ in TEST()
94 /* Open UTS namespace file descriptor */ in TEST()
98 /* Get handle for the namespace */ in TEST()
117 /* Verify we opened the correct namespace */ in TEST()
144 /* Open IPC namespace file descriptor */ in TEST()
148 /* Get handle for the namespace */ in TEST()
167 /* Verify we opened the correct namespace */ in TEST()
194 /* Open PID namespace file descriptor */ in TEST()
198 /* Get handle for the namespace */ in TEST()
217 /* Verify we opened the correct namespace */ in TEST()
244 /* Open mount namespace file descriptor */ in TEST()
248 /* Get handle for the namespace */ in TEST()
267 /* Verify we opened the correct namespace */ in TEST()
294 /* Open user namespace file descriptor */ in TEST()
298 /* Get handle for the namespace */ in TEST()
317 /* Verify we opened the correct namespace */ in TEST()
344 /* Open cgroup namespace file descriptor */ in TEST()
347 SKIP(free(handle); return, "cgroup namespace not available"); in TEST()
350 /* Get handle for the namespace */ in TEST()
369 /* Verify we opened the correct namespace */ in TEST()
396 /* Open time namespace file descriptor */ in TEST()
399 SKIP(free(handle); return, "time namespace not available"); in TEST()
402 /* Get handle for the namespace */ in TEST()
421 /* Verify we opened the correct namespace */ in TEST()
450 /* Get handle for current network namespace */ in TEST()
471 /* First create new user namespace to drop privileges */ in TEST()
475 1); /* Unable to create user namespace */ in TEST()
495 /* Map current uid/gid to root in the new namespace */ in TEST()
505 /* Now create new network namespace */ in TEST()
509 1); /* Unable to create network namespace */ in TEST()
514 /* Try to open parent's network namespace handle from new user+net namespace */ in TEST()
518 /* Should NOT succeed - we're in a different user namespace */ in TEST()
543 return, "Cannot create new user namespace"); in TEST()
551 return, "Cannot create new network namespace"); in TEST()
554 /* Should fail with permission denied since we're in a different user namespace */ in TEST()
579 /* Get handle for current UTS namespace */ in TEST()
600 /* First create new user namespace to drop privileges */ in TEST()
604 1); /* Unable to create user namespace */ in TEST()
624 /* Map current uid/gid to root in the new namespace */ in TEST()
634 /* Now create new UTS namespace */ in TEST()
638 1); /* Unable to create UTS namespace */ in TEST()
643 /* Try to open parent's UTS namespace handle from new user+uts namespace */ in TEST()
647 /* Should NOT succeed - we're in a different user namespace */ in TEST()
672 return, "Cannot create new user namespace"); in TEST()
680 return, "Cannot create new UTS namespace"); in TEST()
683 /* Should fail with ESTALE since we're in a different user namespace */ in TEST()
708 /* Get handle for current IPC namespace */ in TEST()
729 /* First create new user namespace to drop privileges */ in TEST()
733 1); /* Unable to create user namespace */ in TEST()
753 /* Map current uid/gid to root in the new namespace */ in TEST()
763 /* Now create new IPC namespace */ in TEST()
767 1); /* Unable to create IPC namespace */ in TEST()
772 /* Try to open parent's IPC namespace handle from new user+ipc namespace */ in TEST()
776 /* Should NOT succeed - we're in a different user namespace */ in TEST()
801 return, "Cannot create new user namespace"); in TEST()
809 return, "Cannot create new IPC namespace"); in TEST()
812 /* Should fail with ESTALE since we're in a different user namespace */ in TEST()
837 /* Get handle for current mount namespace */ in TEST()
858 /* First create new user namespace to drop privileges */ in TEST()
862 1); /* Unable to create user namespace */ in TEST()
882 /* Map current uid/gid to root in the new namespace */ in TEST()
892 /* Now create new mount namespace */ in TEST()
896 1); /* Unable to create mount namespace */ in TEST()
901 /* Try to open parent's mount namespace handle from new user+mnt namespace */ in TEST()
905 /* Should NOT succeed - we're in a different user namespace */ in TEST()
930 return, "Cannot create new user namespace"); in TEST()
938 return, "Cannot create new mount namespace"); in TEST()
941 /* Should fail with ESTALE since we're in a different user namespace */ in TEST()
966 /* Get handle for current cgroup namespace */ in TEST()
970 return, "cgroup namespace not available"); in TEST()
990 /* First create new user namespace to drop privileges */ in TEST()
994 1); /* Unable to create user namespace */ in TEST()
1014 /* Map current uid/gid to root in the new namespace */ in TEST()
1024 /* Now create new cgroup namespace */ in TEST()
1028 1); /* Unable to create cgroup namespace */ in TEST()
1033 /* Try to open parent's cgroup namespace handle from new user+cgroup namespace */ in TEST()
1037 /* Should NOT succeed - we're in a different user namespace */ in TEST()
1062 return, "Cannot create new user namespace"); in TEST()
1070 return, "Cannot create new cgroup namespace"); in TEST()
1073 /* Should fail with ESTALE since we're in a different user namespace */ in TEST()
1098 /* Get handle for current PID namespace */ in TEST()
1119 /* First create new user namespace to drop privileges */ in TEST()
1123 1); /* Unable to create user namespace */ in TEST()
1143 /* Map current uid/gid to root in the new namespace */ in TEST()
1153 /* Now create new PID namespace - requires fork to take effect */ in TEST()
1157 1); /* Unable to create PID namespace */ in TEST()
1162 /* Fork again for PID namespace to take effect */ in TEST()
1166 1); /* Unable to fork in PID namespace */ in TEST()
1172 /* Grandchild in new PID namespace */ in TEST()
1173 /* Try to open parent's PID namespace handle from new user+pid namespace */ in TEST()
1177 /* Should NOT succeed - we're in a different user namespace */ in TEST()
1208 return, "Cannot create new user namespace"); in TEST()
1216 return, "Cannot create new PID namespace"); in TEST()
1219 /* Should fail with ESTALE since we're in a different user namespace */ in TEST()
1244 /* Get handle for current time namespace */ in TEST()
1248 return, "time namespace not available"); in TEST()
1268 /* First create new user namespace to drop privileges */ in TEST()
1272 1); /* Unable to create user namespace */ in TEST()
1292 /* Map current uid/gid to root in the new namespace */ in TEST()
1302 /* Now create new time namespace - requires fork to take effect */ in TEST()
1306 1); /* Unable to create time namespace */ in TEST()
1311 /* Fork again for time namespace to take effect */ in TEST()
1315 1); /* Unable to fork in time namespace */ in TEST()
1321 /* Grandchild in new time namespace */ in TEST()
1322 /* Try to open parent's time namespace handle from new user+time namespace */ in TEST()
1326 /* Should NOT succeed - we're in a different user namespace */ in TEST()
1357 return, "Cannot create new user namespace"); in TEST()
1365 return, "Cannot create new time namespace"); in TEST()
1368 /* Should fail with ESTALE since we're in a different user namespace */ in TEST()
1386 /* Open a namespace file descriptor */ in TEST()
1390 /* Get handle for the namespace */ in TEST()