| /linux/tools/testing/selftests/pid_namespace/ |
| H A D | pid_max.c | 206 pid = do_clone(pid_max_nested_inner, NULL, CLONE_NEWPID | CLONE_NEWNS); in pid_max_nested_outer() 317 pid = do_clone(pid_max_nested_limit_inner, NULL, CLONE_NEWPID | CLONE_NEWNS); in pid_max_nested_limit_outer() 336 pid = do_clone(pid_max_cb, NULL, CLONE_NEWPID | CLONE_NEWNS); in TEST() 345 pid = do_clone(pid_max_nested_limit_outer, NULL, CLONE_NEWPID | CLONE_NEWNS); in TEST() 354 pid = do_clone(pid_max_nested_outer, NULL, CLONE_NEWPID | CLONE_NEWNS); in TEST()
|
| /linux/tools/testing/selftests/mount/ |
| H A D | unprivileged-remount-test.c | 19 #ifndef CLONE_NEWNS 20 # define CLONE_NEWNS 0x00020000 macro 211 if (unshare(CLONE_NEWNS) != 0) { in test_unpriv_remount() 225 if (unshare(CLONE_NEWNS) != 0) { in test_unpriv_remount() 291 ret = unshare(CLONE_NEWNS); in test_priv_mount_unpriv_remount()
|
| /linux/tools/testing/selftests/move_mount_set_group/ |
| H A D | move_mount_set_group_test.c | 20 #ifndef CLONE_NEWNS 21 #define CLONE_NEWNS 0x00020000 macro 115 if (unshare(CLONE_NEWNS)) in prepare_unpriv_mountns() 371 ASSERT_EQ(setns(ca_to.mntnsfd, CLONE_NEWNS), 0); in TEST_F()
|
| /linux/tools/testing/selftests/filesystems/nsfs/ |
| H A D | iterate_mntns.c | 57 ASSERT_EQ(unshare(CLONE_NEWNS), 0); in FIXTURE_SETUP() 124 ASSERT_EQ(setns(self->fd_mnt_ns[0], CLONE_NEWNS), 0); in TEST_F() 142 ASSERT_EQ(setns(self->fd_mnt_ns[MNT_NS_LAST_INDEX], CLONE_NEWNS), 0); in TEST_F()
|
| /linux/tools/testing/selftests/namespaces/ |
| H A D | listns_efault_test.c | 115 pid = create_child(&pidfds[i], CLONE_NEWNS); in TEST() 321 pid = create_child(&pidfds[i], CLONE_NEWNS); in TEST() 437 .ns_type = CLONE_NEWNS, /* Only mount namespaces */ in TEST() 463 pid = create_child(&pidfds[i], CLONE_NEWNS); in TEST()
|
| /linux/tools/testing/selftests/filesystems/ |
| H A D | fclog.c | 41 ASSERT_SUCCESS(unshare(CLONE_NEWNS)); in FIXTURE_SETUP() 47 ASSERT_SUCCESS(setns(self->host_mntns, CLONE_NEWNS)); in FIXTURE_TEARDOWN()
|
| /linux/tools/testing/selftests/filesystems/overlayfs/ |
| H A D | set_layers_via_fds.c | 54 ASSERT_EQ(unshare(CLONE_NEWNS), 0); in TEST_F() 171 ASSERT_EQ(unshare(CLONE_NEWNS), 0); in TEST_F() 238 ASSERT_EQ(unshare(CLONE_NEWNS), 0); in TEST_F() 383 ASSERT_EQ(unshare(CLONE_NEWNS), 0); in TEST_F() 457 ASSERT_EQ(unshare(CLONE_NEWNS), 0); in TEST_F() 534 ASSERT_EQ(unshare(CLONE_NEWNS), 0); in TEST_F() 603 ASSERT_EQ(unshare(CLONE_NEWNS), 0); in TEST_F()
|
| H A D | dev_in_maps.c | 144 if (unshare(CLONE_NEWNS) == -1) { in main()
|
| /linux/fs/ |
| H A D | nsfs.c | 294 if (ns->ns_type != CLONE_NEWNS) in ns_ioctl() 314 if (ns->ns_type != CLONE_NEWNS) in ns_ioctl() 334 if (ns->ns_type != CLONE_NEWNS) in ns_ioctl() 490 case CLONE_NEWNS: in is_current_namespace() 588 case CLONE_NEWNS: in nsfs_fh_to_dentry()
|
| /linux/tools/testing/selftests/exec/ |
| H A D | recursion-depth.c | 35 if (unshare(CLONE_NEWNS) == -1) { in main()
|
| /linux/tools/testing/selftests/tmpfs/ |
| H A D | bug-link-o-tmpfile.c | 42 if (unshare(CLONE_NEWNS) == -1) { in main()
|
| /linux/tools/testing/selftests/proc/ |
| H A D | proc-pidns.c | 53 ASSERT_SUCCESS(unshare(CLONE_NEWNS)); in FIXTURE_SETUP() 96 ASSERT_SUCCESS(setns(self->host_mntns, CLONE_NEWNS)); in FIXTURE_TEARDOWN()
|
| H A D | proc-subset-pid.c | 42 if (unshare(CLONE_NEWNS) == -1) { in make_private_proc()
|
| /linux/tools/include/uapi/linux/ |
| H A D | sched.h | |
| /linux/tools/testing/selftests/mount_setattr/ |
| H A D | mount_setattr_test.c | 26 #ifndef CLONE_NEWNS 27 #define CLONE_NEWNS 0x00020000 macro 217 if (unshare(CLONE_NEWNS)) in prepare_unpriv_mountns() 984 ASSERT_EQ(unshare(CLONE_NEWNS), 0); in TEST_F() 998 ASSERT_EQ(unshare(CLONE_NEWNS), 0); in FIXTURE_SETUP() 1284 ASSERT_EQ(unshare(CLONE_NEWNS), 0); in TEST_F() 1351 ASSERT_EQ(unshare(CLONE_NEWNS), 0); in TEST_F() 1636 ASSERT_EQ(unshare(CLONE_NEWNS), 0); in TEST_F() 2090 ASSERT_EQ(unshare(CLONE_NEWNS), 0); in TEST_F()
|
| /linux/tools/perf/trace/beauty/include/uapi/linux/ |
| H A D | sched.h | 20 #define CLONE_NEWNS 0x00020000 /* New mount namespace group */ macro
|
| /linux/samples/binderfs/ |
| H A D | binderfs_example.c | 23 ret = unshare(CLONE_NEWNS); in main()
|
| /linux/tools/perf/util/ |
| H A D | namespaces.c | 310 if (setns(newns, CLONE_NEWNS) < 0) in nsinfo__mountns_enter() 331 setns(nc->oldns, CLONE_NEWNS); in nsinfo__mountns_exit()
|
| /linux/tools/testing/selftests/capabilities/ |
| H A D | test_execve.c | 91 if (outer_uid == 0 && unshare(CLONE_NEWNS) == 0) { in create_and_enter_ns() 112 } else if (unshare(CLONE_NEWUSER | CLONE_NEWNS) == 0) { in create_and_enter_ns()
|
| /linux/tools/testing/selftests/firmware/ |
| H A D | fw_namespace.c | 97 if (unshare(CLONE_NEWNS) != 0) { in test_fw_in_ns()
|
| /linux/tools/testing/selftests/filesystems/fuse/ |
| H A D | fusectl_test.c | 53 ASSERT_EQ(unshare(CLONE_NEWNS|CLONE_NEWUSER), 0); in FIXTURE_SETUP()
|
| /linux/kernel/ |
| H A D | nscommon.c | 24 case CLONE_NEWNS: in ns_debug()
|
| /linux/tools/testing/selftests/bpf/prog_tests/ |
| H A D | connect_ping.c | 101 if (!ASSERT_OK(unshare(CLONE_NEWNET | CLONE_NEWNS), "unshare")) in test_connect_ping()
|
| /linux/tools/testing/selftests/pidfd/ |
| H A D | pidfd_bind_mount.c | 35 ASSERT_EQ(unshare(CLONE_NEWNS), 0); in FIXTURE_SETUP()
|
| H A D | pidfd_setns_test.c | 43 …[PIDFD_NS_MNT] = { "mnt", CLONE_NEWNS, PIDFD_GET_MNT_NAMESPACE, … 172 if (self->nsfds[PIDFD_NS_MNT] >= 0 && unshare(CLONE_NEWNS) < 0) { in FIXTURE_SETUP() 226 if (self->nsfds[PIDFD_NS_MNT] >= 0 && unshare(CLONE_NEWNS) < 0) { in FIXTURE_SETUP()
|