| /linux/kernel/ |
| H A D | nsproxy.c | 173 if (likely(!(flags & (CLONE_NEWNS | CLONE_NEWUTS | CLONE_NEWIPC | in copy_namespaces() 217 if (!(unshare_flags & (CLONE_NEWNS | CLONE_NEWUTS | CLONE_NEWIPC | in unshare_nsproxy_namespaces() 295 if (!flags || (flags & ~(CLONE_NEWNS | CLONE_NEWUTS | CLONE_NEWIPC | in check_setns_flags() 342 if (nsset->fs && (flags & CLONE_NEWNS) && (flags & ~CLONE_NEWNS)) in put_nsset() 364 if (flags == CLONE_NEWNS) { in prepare_nsset() 366 } else if (flags & CLONE_NEWNS) { in prepare_nsset() 456 if (flags & CLONE_NEWNS) { in validate_nsset() 543 if ((flags & CLONE_NEWNS) && (flags & ~CLONE_NEWNS)) { in commit_nsset()
|
| H A D | nscommon.c | 24 case CLONE_NEWNS: in ns_debug()
|
| /linux/tools/testing/selftests/pid_namespace/ |
| H A D | pid_max.c | 206 pid = do_clone(pid_max_nested_inner, NULL, CLONE_NEWPID | CLONE_NEWNS); in pid_max_nested_outer() 317 pid = do_clone(pid_max_nested_limit_inner, NULL, CLONE_NEWPID | CLONE_NEWNS); in pid_max_nested_limit_outer() 336 pid = do_clone(pid_max_cb, NULL, CLONE_NEWPID | CLONE_NEWNS); in TEST() 345 pid = do_clone(pid_max_nested_limit_outer, NULL, CLONE_NEWPID | CLONE_NEWNS); in TEST() 354 pid = do_clone(pid_max_nested_outer, NULL, CLONE_NEWPID | CLONE_NEWNS); in TEST()
|
| /linux/tools/testing/selftests/mount/ |
| H A D | unprivileged-remount-test.c | 19 #ifndef CLONE_NEWNS 20 # define CLONE_NEWNS 0x00020000 macro 211 if (unshare(CLONE_NEWNS) != 0) { in test_unpriv_remount() 225 if (unshare(CLONE_NEWNS) != 0) { in test_unpriv_remount() 291 ret = unshare(CLONE_NEWNS); in test_priv_mount_unpriv_remount()
|
| /linux/tools/testing/selftests/move_mount_set_group/ |
| H A D | move_mount_set_group_test.c | 20 #ifndef CLONE_NEWNS 21 #define CLONE_NEWNS 0x00020000 macro 115 if (unshare(CLONE_NEWNS)) in prepare_unpriv_mountns() 371 ASSERT_EQ(setns(ca_to.mntnsfd, CLONE_NEWNS), 0); in TEST_F()
|
| /linux/tools/testing/selftests/filesystems/nsfs/ |
| H A D | iterate_mntns.c | 54 ASSERT_EQ(unshare(CLONE_NEWNS), 0); in FIXTURE_SETUP() 117 ASSERT_EQ(setns(self->fd_mnt_ns[0], CLONE_NEWNS), 0); in TEST_F() 136 ASSERT_EQ(setns(self->fd_mnt_ns[MNT_NS_LAST_INDEX], CLONE_NEWNS), 0); in TEST_F()
|
| /linux/tools/testing/selftests/namespaces/ |
| H A D | listns_efault_test.c | 116 pid = create_child(&pidfds[i], CLONE_NEWNS); in TEST() 322 pid = create_child(&pidfds[i], CLONE_NEWNS); in TEST() 438 .ns_type = CLONE_NEWNS, /* Only mount namespaces */ in TEST() 464 pid = create_child(&pidfds[i], CLONE_NEWNS); in TEST()
|
| /linux/tools/testing/selftests/filesystems/ |
| H A D | fclog.c | 41 ASSERT_SUCCESS(unshare(CLONE_NEWNS)); in FIXTURE_SETUP() 47 ASSERT_SUCCESS(setns(self->host_mntns, CLONE_NEWNS)); in FIXTURE_TEARDOWN()
|
| /linux/fs/ |
| H A D | nsfs.c | 268 if (ns->ns_type != CLONE_NEWNS) in ns_ioctl() 288 if (ns->ns_type != CLONE_NEWNS) in ns_ioctl() 308 if (ns->ns_type != CLONE_NEWNS) in ns_ioctl() 464 case CLONE_NEWNS: in is_current_namespace() 562 case CLONE_NEWNS: in nsfs_fh_to_dentry()
|
| /linux/tools/testing/selftests/filesystems/overlayfs/ |
| H A D | set_layers_via_fds.c | 54 ASSERT_EQ(unshare(CLONE_NEWNS), 0); in TEST_F() 171 ASSERT_EQ(unshare(CLONE_NEWNS), 0); in TEST_F() 238 ASSERT_EQ(unshare(CLONE_NEWNS), 0); in TEST_F() 383 ASSERT_EQ(unshare(CLONE_NEWNS), 0); in TEST_F() 457 ASSERT_EQ(unshare(CLONE_NEWNS), 0); in TEST_F() 534 ASSERT_EQ(unshare(CLONE_NEWNS), 0); in TEST_F() 603 ASSERT_EQ(unshare(CLONE_NEWNS), 0); in TEST_F()
|
| H A D | dev_in_maps.c | 144 if (unshare(CLONE_NEWNS) == -1) { in main()
|
| /linux/tools/testing/selftests/exec/ |
| H A D | recursion-depth.c | 35 if (unshare(CLONE_NEWNS) == -1) { in main()
|
| /linux/tools/testing/selftests/tmpfs/ |
| H A D | bug-link-o-tmpfile.c | 42 if (unshare(CLONE_NEWNS) == -1) { in main()
|
| /linux/tools/testing/selftests/proc/ |
| H A D | proc-pidns.c | 53 ASSERT_SUCCESS(unshare(CLONE_NEWNS)); in FIXTURE_SETUP() 96 ASSERT_SUCCESS(setns(self->host_mntns, CLONE_NEWNS)); in FIXTURE_TEARDOWN()
|
| H A D | proc-subset-pid.c | 42 if (unshare(CLONE_NEWNS) == -1) { in make_private_proc()
|
| /linux/tools/include/uapi/linux/ |
| H A D | sched.h | |
| /linux/include/uapi/linux/ |
| H A D | sched.h | 20 #define CLONE_NEWNS 0x00020000 /* New mount namespace group */ macro
|
| /linux/tools/perf/trace/beauty/include/uapi/linux/ |
| H A D | sched.h | 20 #define CLONE_NEWNS 0x00020000 /* New mount namespace group */ macro
|
| /linux/samples/binderfs/ |
| H A D | binderfs_example.c | 23 ret = unshare(CLONE_NEWNS); in main()
|
| /linux/tools/testing/selftests/mount_setattr/ |
| H A D | mount_setattr_test.c | 26 #ifndef CLONE_NEWNS 27 #define CLONE_NEWNS 0x00020000 macro 217 if (unshare(CLONE_NEWNS)) in prepare_unpriv_mountns() 984 ASSERT_EQ(unshare(CLONE_NEWNS), 0); in TEST_F() 998 ASSERT_EQ(unshare(CLONE_NEWNS), 0); in FIXTURE_SETUP() 1284 ASSERT_EQ(unshare(CLONE_NEWNS), 0); in TEST_F() 1351 ASSERT_EQ(unshare(CLONE_NEWNS), 0); in TEST_F() 1636 ASSERT_EQ(unshare(CLONE_NEWNS), 0); in TEST_F() 2090 ASSERT_EQ(unshare(CLONE_NEWNS), 0); in TEST_F()
|
| /linux/tools/perf/util/ |
| H A D | namespaces.c | 310 if (setns(newns, CLONE_NEWNS) < 0) in nsinfo__mountns_enter() 331 setns(nc->oldns, CLONE_NEWNS); in nsinfo__mountns_exit()
|
| /linux/tools/testing/selftests/capabilities/ |
| H A D | test_execve.c | 91 if (outer_uid == 0 && unshare(CLONE_NEWNS) == 0) { in create_and_enter_ns() 112 } else if (unshare(CLONE_NEWUSER | CLONE_NEWNS) == 0) { in create_and_enter_ns()
|
| /linux/tools/testing/selftests/firmware/ |
| H A D | fw_namespace.c | 97 if (unshare(CLONE_NEWNS) != 0) { in test_fw_in_ns()
|
| /linux/tools/testing/selftests/filesystems/fuse/ |
| H A D | fusectl_test.c | 53 ASSERT_EQ(unshare(CLONE_NEWNS|CLONE_NEWUSER), 0); in FIXTURE_SETUP()
|
| /linux/tools/testing/selftests/bpf/prog_tests/ |
| H A D | connect_ping.c | 101 if (!ASSERT_OK(unshare(CLONE_NEWNET | CLONE_NEWNS), "unshare")) in test_connect_ping()
|