| /OK3568_Linux_fs/kernel/kernel/ |
| H A D | nsproxy.c | 158 if (likely(!(flags & (CLONE_NEWNS | CLONE_NEWUTS | CLONE_NEWIPC | in copy_namespaces() 222 if (!(unshare_flags & (CLONE_NEWNS | CLONE_NEWUTS | CLONE_NEWIPC | in unshare_nsproxy_namespaces() 264 if (!flags || (flags & ~(CLONE_NEWNS | CLONE_NEWUTS | CLONE_NEWIPC | in check_setns_flags() 311 if (nsset->fs && (flags & CLONE_NEWNS) && (flags & ~CLONE_NEWNS)) in put_nsset() 333 if (flags == CLONE_NEWNS) { in prepare_nsset() 335 } else if (flags & CLONE_NEWNS) { in prepare_nsset() 425 if (flags & CLONE_NEWNS) { in validate_nsset() 512 if ((flags & CLONE_NEWNS) && (flags & ~CLONE_NEWNS)) { in commit_nsset()
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/mount/ |
| H A D | unprivileged-remount-test.c | 19 #ifndef CLONE_NEWNS 20 # define CLONE_NEWNS 0x00020000 macro 211 if (unshare(CLONE_NEWNS) != 0) { in test_unpriv_remount() 225 if (unshare(CLONE_NEWNS) != 0) { in test_unpriv_remount() 291 ret = unshare(CLONE_NEWNS); in test_priv_mount_unpriv_remount()
|
| H A D | nosymfollow-test.c | 111 if (unshare(CLONE_NEWNS) != 0) in create_and_enter_ns()
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/firmware/ |
| H A D | fw_namespace.c | 20 #ifndef CLONE_NEWNS 21 # define CLONE_NEWNS 0x00020000 macro 101 if (unshare(CLONE_NEWNS) != 0) { in test_fw_in_ns()
|
| /OK3568_Linux_fs/kernel/tools/perf/util/ |
| H A D | namespaces.c | 233 if (setns(newns, CLONE_NEWNS) < 0) in nsinfo__mountns_enter() 254 setns(nc->oldns, CLONE_NEWNS); in nsinfo__mountns_exit()
|
| /OK3568_Linux_fs/prebuilts/gcc/linux-x86/arm/gcc-arm-10.3-2021.07-x86_64-arm-none-linux-gnueabihf/arm-none-linux-gnueabihf/libc/usr/include/linux/ |
| H A D | sched.h | 17 #define CLONE_NEWNS 0x00020000 /* New mount namespace group */ macro
|
| /OK3568_Linux_fs/prebuilts/gcc/linux-x86/aarch64/gcc-arm-10.3-2021.07-x86_64-aarch64-none-linux-gnu/aarch64-none-linux-gnu/libc/usr/include/linux/ |
| H A D | sched.h | 17 #define CLONE_NEWNS 0x00020000 /* New mount namespace group */ macro
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/tmpfs/ |
| H A D | bug-link-o-tmpfile.c | 30 if (unshare(CLONE_NEWNS) == -1) { in main()
|
| /OK3568_Linux_fs/prebuilts/gcc/linux-x86/arm/gcc-arm-10.3-2021.07-x86_64-arm-none-linux-gnueabihf/arm-none-linux-gnueabihf/libc/usr/include/bits/ |
| H A D | sched.h | 55 # define CLONE_NEWNS 0x00020000 /* Set to create new namespace. */ macro
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/exec/ |
| H A D | recursion-depth.c | 29 if (unshare(CLONE_NEWNS) == -1) { in main()
|
| /OK3568_Linux_fs/prebuilts/gcc/linux-x86/aarch64/gcc-arm-10.3-2021.07-x86_64-aarch64-none-linux-gnu/aarch64-none-linux-gnu/libc/usr/include/bits/ |
| H A D | sched.h | 55 # define CLONE_NEWNS 0x00020000 /* Set to create new namespace. */ macro
|
| /OK3568_Linux_fs/kernel/include/uapi/linux/ |
| H A D | sched.h | 20 #define CLONE_NEWNS 0x00020000 /* New mount namespace group */ macro
|
| /OK3568_Linux_fs/kernel/tools/include/uapi/linux/ |
| H A D | sched.h | 20 #define CLONE_NEWNS 0x00020000 /* New mount namespace group */ macro
|
| /OK3568_Linux_fs/kernel/samples/binderfs/ |
| H A D | binderfs_example.c | 23 ret = unshare(CLONE_NEWNS); in main()
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/pidfd/ |
| H A D | pidfd_setns_test.c | 42 [PIDFD_NS_MNT] = { "mnt", CLONE_NEWNS, }, 178 CLONE_NEWUSER | CLONE_NEWNS | in FIXTURE_SETUP() 207 CLONE_NEWUSER | CLONE_NEWNS | in FIXTURE_SETUP()
|
| H A D | pidfd_fdinfo_test.c | 95 static int flags = CLONE_PIDFD | CLONE_NEWPID | CLONE_NEWNS | SIGCHLD; in clone_newns()
|
| H A D | pidfd_test.c | 175 ret = unshare(CLONE_NEWNS); in test_pidfd_send_signal_recycled_pid_fail()
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/capabilities/ |
| H A D | test_execve.c | 103 if (unshare(CLONE_NEWNS) == 0) { in create_and_enter_ns() 121 } else if (unshare(CLONE_NEWUSER | CLONE_NEWNS) == 0) { in create_and_enter_ns()
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/bpf/prog_tests/ |
| H A D | test_bpffs.c | 34 err = unshare(CLONE_NEWNS); in fn()
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/bpf/ |
| H A D | test_current_pid_tgid_new_ns.c | 45 if (CHECK_NEWNS(unshare(CLONE_NEWPID | CLONE_NEWNS), in main()
|
| H A D | cgroup_helpers.c | 105 if (unshare(CLONE_NEWNS)) { in setup_cgroup_environment()
|
| /OK3568_Linux_fs/kernel/Documentation/userspace-api/ |
| H A D | unshare.rst | 157 CLONE_NEWNS 158 If CLONE_NEWNS is set, the namespace of the caller is 169 EPERM CLONE_NEWNS was specified by a non-root process (process 266 CLONE_NEWNS is set, force CLONE_FS.
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/filesystems/ |
| H A D | devpts_pts.c | 290 ret = unshare(CLONE_NEWNS); in main()
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-core/glibc/glibc/ |
| H A D | 0024-fix-create-thread-failed-in-unprivileged-process-BZ-.patch | 14 CLONE_NEWIPC, CLONE_NEWNET, CLONE_NEWNS, CLONE_NEWPID, or CLONE_NEWUTS
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/proc/ |
| H A D | proc-pid-vm.c | 56 if (unshare(CLONE_NEWNS) == -1) { in make_private_tmp()
|