Lines Matching full:namespace
29 /* Open the current mount namespace */ in TEST()
33 /* Get the mount namespace ID */ in TEST()
56 /* Get parent's mount namespace ID */ in TEST()
73 /* Create new mount namespace */ in TEST()
88 /* Keep namespace alive */ in TEST()
101 /* Child couldn't create namespace, skip test */ in TEST()
105 SKIP(return, "No permission to create mount namespace"); in TEST()
110 /* Open child's mount namespace */ in TEST()
116 /* Get child's mount namespace ID */ in TEST()
121 /* Parent and child should have different mount namespace IDs */ in TEST()
138 /* Open the current cgroup namespace */ in TEST()
142 /* Get the cgroup namespace ID */ in TEST()
165 /* Get parent's cgroup namespace ID */ in TEST()
182 /* Create new cgroup namespace */ in TEST()
197 /* Keep namespace alive */ in TEST()
210 /* Child couldn't create namespace, skip test */ in TEST()
214 SKIP(return, "No permission to create cgroup namespace"); in TEST()
219 /* Open child's cgroup namespace */ in TEST()
225 /* Get child's cgroup namespace ID */ in TEST()
230 /* Parent and child should have different cgroup namespace IDs */ in TEST()
247 /* Open the current IPC namespace */ in TEST()
251 /* Get the IPC namespace ID */ in TEST()
274 /* Get parent's IPC namespace ID */ in TEST()
291 /* Create new IPC namespace */ in TEST()
306 /* Keep namespace alive */ in TEST()
319 /* Child couldn't create namespace, skip test */ in TEST()
323 SKIP(return, "No permission to create IPC namespace"); in TEST()
328 /* Open child's IPC namespace */ in TEST()
334 /* Get child's IPC namespace ID */ in TEST()
339 /* Parent and child should have different IPC namespace IDs */ in TEST()
356 /* Open the current UTS namespace */ in TEST()
360 /* Get the UTS namespace ID */ in TEST()
383 /* Get parent's UTS namespace ID */ in TEST()
400 /* Create new UTS namespace */ in TEST()
415 /* Keep namespace alive */ in TEST()
428 /* Child couldn't create namespace, skip test */ in TEST()
432 SKIP(return, "No permission to create UTS namespace"); in TEST()
437 /* Open child's UTS namespace */ in TEST()
443 /* Get child's UTS namespace ID */ in TEST()
448 /* Parent and child should have different UTS namespace IDs */ in TEST()
465 /* Open the current user namespace */ in TEST()
469 /* Get the user namespace ID */ in TEST()
492 /* Get parent's user namespace ID */ in TEST()
509 /* Create new user namespace */ in TEST()
524 /* Keep namespace alive */ in TEST()
537 /* Child couldn't create namespace, skip test */ in TEST()
541 SKIP(return, "No permission to create user namespace"); in TEST()
546 /* Open child's user namespace */ in TEST()
552 /* Get child's user namespace ID */ in TEST()
557 /* Parent and child should have different user namespace IDs */ in TEST()
574 /* Open the current time namespace */ in TEST()
580 /* Get the time namespace ID */ in TEST()
603 /* Open the current time namespace */ in TEST()
609 /* Get parent's time namespace ID */ in TEST()
624 /* Create new time namespace */ in TEST()
635 /* Fork a grandchild to actually enter the new namespace */ in TEST()
638 /* Grandchild is in the new namespace */ in TEST()
662 /* Child couldn't create namespace, skip test */ in TEST()
667 SKIP(return, "Cannot create time namespace"); in TEST()
676 /* Open grandchild's time namespace */ in TEST()
682 /* Get child's time namespace ID */ in TEST()
687 /* Parent and child should have different time namespace IDs */ in TEST()
704 /* Open the current PID namespace */ in TEST()
708 /* Get the PID namespace ID */ in TEST()
731 /* Get parent's PID namespace ID */ in TEST()
748 /* Create new PID namespace */ in TEST()
759 /* Fork a grandchild to actually enter the new namespace */ in TEST()
762 /* Grandchild is in the new namespace */ in TEST()
786 /* Child couldn't create namespace, skip test */ in TEST()
791 SKIP(return, "No permission to create PID namespace"); in TEST()
800 /* Open grandchild's PID namespace */ in TEST()
806 /* Get child's PID namespace ID */ in TEST()
811 /* Parent and child should have different PID namespace IDs */ in TEST()
831 /* Open the current network namespace */ in TEST()
835 /* Get the network namespace ID via ioctl */ in TEST()
844 /* Get the network namespace cookie via socket option */ in TEST()
850 /* The namespace ID and cookie should be identical */ in TEST()
876 /* Get parent's network namespace ID */ in TEST()
883 /* Get parent's network namespace cookie */ in TEST()
903 /* Create new network namespace */ in TEST()
918 /* Keep namespace alive */ in TEST()
931 /* Child couldn't create namespace, skip test */ in TEST()
936 SKIP(return, "No permission to create network namespace"); in TEST()
941 /* Open child's network namespace */ in TEST()
947 /* Get child's network namespace ID */ in TEST()
952 /* Create socket in child's namespace to get cookie */ in TEST()
967 /* Return to parent namespace */ in TEST()
971 /* Parent and child should have different network namespace IDs */ in TEST()