| /OK3568_Linux_fs/kernel/tools/testing/selftests/uevent/ |
| H A D | uevent_filtering.c | 137 if (post_flags & CLONE_NEWNET) { in uevent_listener() 138 ret = unshare(CLONE_NEWNET); in uevent_listener() 283 if (pre_flags & CLONE_NEWNET) { in do_test() 284 ret = unshare(CLONE_NEWNET); in do_test() 401 ret = do_test(CLONE_NEWNET, 0, true, sync_fd); in TEST() 430 ret = do_test(CLONE_NEWUSER | CLONE_NEWNET, 0, false, sync_fd); in TEST() 445 ret = do_test(0, CLONE_NEWNET, true, sync_fd); in TEST() 476 ret = do_test(0, CLONE_NEWUSER | CLONE_NEWNET, true, sync_fd); in TEST()
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/proc/ |
| H A D | setns-dcache.c | 54 if (unshare(CLONE_NEWNET) == -1) { in main() 75 if (unshare(CLONE_NEWNET) == -1) { in main() 104 if (setns(nsfd, CLONE_NEWNET) == -1) { in main()
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/bpf/prog_tests/ |
| H A D | flow_dissector_reattach.c | 76 err = unshare(CLONE_NEWNET); in unshare_net() 84 setns(old_net, CLONE_NEWNET); in unshare_net() 455 err = setns(old_net, CLONE_NEWNET); in test_link_update_netns_gone() 539 err = setns(old_net, CLONE_NEWNET); in test_link_get_info() 567 setns(old_net, CLONE_NEWNET); in test_link_get_info() 647 err = setns(init_net, CLONE_NEWNET); in test_flow_dissector_reattach() 671 err = setns(saved_net, CLONE_NEWNET); in test_flow_dissector_reattach()
|
| H A D | sk_assign.c | 35 if (CHECK_FAIL(unshare(CLONE_NEWNET))) in configure_stack() 326 if (CHECK_FAIL(setns(self_net, CLONE_NEWNET))) in test_sk_assign()
|
| H A D | btf_skc_cls_ingress.c | 47 if (CHECK(unshare(CLONE_NEWNET), "create netns", in prepare_netns()
|
| H A D | sock_fields.c | 51 if (!ASSERT_OK(unshare(CLONE_NEWNET), "create netns")) in create_netns()
|
| H A D | tcp_hdr_options.c | 45 if (CHECK(unshare(CLONE_NEWNET), "create netns", in create_netns()
|
| H A D | sk_lookup.c | 1350 err = unshare(CLONE_NEWNET); in switch_netns()
|
| /OK3568_Linux_fs/kernel/kernel/ |
| H A D | nsproxy.c | 159 CLONE_NEWPID | CLONE_NEWNET | in copy_namespaces() 223 CLONE_NEWNET | CLONE_NEWPID | CLONE_NEWCGROUP | in unshare_nsproxy_namespaces() 265 CLONE_NEWNET | CLONE_NEWTIME | CLONE_NEWUSER | in check_setns_flags() 290 if (flags & CLONE_NEWNET) in check_setns_flags() 464 if (flags & CLONE_NEWNET) { in validate_nsset()
|
| H A D | fork.c | 2928 CLONE_NEWUTS|CLONE_NEWIPC|CLONE_NEWNET| in check_unshare_flags()
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/pidfd/ |
| H A D | pidfd_setns_test.c | 46 [PIDFD_NS_NET] = { "net", CLONE_NEWNET, }, 160 CLONE_NEWUSER | CLONE_NEWNET); in FIXTURE_SETUP() 181 CLONE_NEWNET); in FIXTURE_SETUP() 210 CLONE_NEWNET); in FIXTURE_SETUP() 364 ASSERT_NE(setns(self->child_pidfd_exited, CLONE_NEWUSER | CLONE_NEWNET), in TEST_F()
|
| /OK3568_Linux_fs/prebuilts/gcc/linux-x86/arm/gcc-arm-10.3-2021.07-x86_64-arm-none-linux-gnueabihf/arm-none-linux-gnueabihf/libc/usr/include/linux/ |
| H A D | sched.h | 30 #define CLONE_NEWNET 0x40000000 /* New network namespace */ macro
|
| /OK3568_Linux_fs/prebuilts/gcc/linux-x86/aarch64/gcc-arm-10.3-2021.07-x86_64-aarch64-none-linux-gnu/aarch64-none-linux-gnu/libc/usr/include/linux/ |
| H A D | sched.h | 30 #define CLONE_NEWNET 0x40000000 /* New network namespace */ macro
|
| /OK3568_Linux_fs/prebuilts/gcc/linux-x86/arm/gcc-arm-10.3-2021.07-x86_64-arm-none-linux-gnueabihf/arm-none-linux-gnueabihf/libc/usr/include/bits/ |
| H A D | sched.h | 72 # define CLONE_NEWNET 0x40000000 /* New network namespace. */ macro
|
| /OK3568_Linux_fs/prebuilts/gcc/linux-x86/aarch64/gcc-arm-10.3-2021.07-x86_64-aarch64-none-linux-gnu/aarch64-none-linux-gnu/libc/usr/include/bits/ |
| H A D | sched.h | 72 # define CLONE_NEWNET 0x40000000 /* New network namespace. */ macro
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/mount/ |
| H A D | unprivileged-remount-test.c | 28 #ifndef CLONE_NEWNET 29 # define CLONE_NEWNET 0x40000000 macro
|
| /OK3568_Linux_fs/kernel/include/uapi/linux/ |
| H A D | sched.h | 33 #define CLONE_NEWNET 0x40000000 /* New network namespace */ macro
|
| /OK3568_Linux_fs/kernel/tools/include/uapi/linux/ |
| H A D | sched.h | 33 #define CLONE_NEWNET 0x40000000 /* New network namespace */ macro
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-core/glibc/glibc/ |
| H A D | 0024-fix-create-thread-failed-in-unprivileged-process-BZ-.patch | 14 CLONE_NEWIPC, CLONE_NEWNET, CLONE_NEWNS, CLONE_NEWPID, or CLONE_NEWUTS
|
| /OK3568_Linux_fs/kernel/include/net/ |
| H A D | net_namespace.h | 214 if (flags & CLONE_NEWNET) in copy_net_ns()
|
| /OK3568_Linux_fs/kernel/net/core/ |
| H A D | net_namespace.c | 472 if (!(flags & CLONE_NEWNET)) in copy_net_ns() 1406 .type = CLONE_NEWNET,
|
| /OK3568_Linux_fs/yocto/poky/bitbake/lib/bb/ |
| H A D | utils.py | 1626 CLONE_NEWNET = 0x40000000 1633 ret = libc.unshare(CLONE_NEWNET | CLONE_NEWUSER)
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/net/ |
| H A D | ipsec.c | 105 if (unshare(CLONE_NEWNET) != 0) { in unshare_open() 121 if (setns(fd, CLONE_NEWNET)) { in switch_ns()
|