/external/ltp/testcases/kernel/containers/sysvipc/ |
runipctests_noltp.sh | 24 for type in none clone unshare; do
|
/external/ltp/testcases/kernel/fs/fs_bind/regression/ |
00_Descriptions.txt | 25 test01 - bind unshared directory to unshare mountpoint. 26 test02 - rbind unshared directory to unshare mountpoint. 27 test03 - move unshared directory to unshare mountpoint. 32 bind unshared directory to unshare mountpoint. 37 rbind unshared directory to unshare mountpoint. 42 move unshared directory to unshare mountpoint.
|
/bionic/libc/arch-arm/syscalls/ |
unshare.S | 5 ENTRY(unshare) function 16 END(unshare)
|
/bionic/libc/arch-arm64/syscalls/ |
unshare.S | 5 ENTRY(unshare) function 14 END(unshare)
|
/bionic/libc/arch-mips/syscalls/ |
unshare.S | 5 ENTRY(unshare) function 19 END(unshare)
|
/bionic/libc/arch-x86_64/syscalls/ |
unshare.S | 5 ENTRY(unshare) function 15 END(unshare)
|
/bionic/libc/arch-mips64/syscalls/ |
unshare.S | 5 ENTRY(unshare) function 25 END(unshare)
|
/bionic/libc/arch-x86/syscalls/ |
unshare.S | 5 ENTRY(unshare) function 29 END(unshare)
|
/external/ltp/testcases/kernel/containers/utsname/ |
runutstests_noltp.sh | 24 echo "unshare tests" 26 echo "test $i (unshare)" 27 ./utstest_noltp unshare $i
|
/external/ltp/testcases/kernel/syscalls/unshare/ |
unshare01.c | 23 /* Description: This tests the unshare() syscall. */ 24 /* unshare() allows a process to disassociate parts of its */ 32 /* The main use of unshare() is to allow a process to control its */ 43 /* Unshare the file descriptor table, so that the calling */ 47 /* Reverse the effect of the clone(2) CLONE_FS flag.Unshare*/ 53 /* flag. Unshare the namespace, so that the calling process*/ 58 /* If flags is specified as zero, then unshare() is a no-op; no */ 175 switch (unshare(CLONE_FILES)) { 177 printf("unshare with CLONE_FILES call " 185 perror("unshare failed") [all...] |
unshare02.c | 23 /* Description: This tests the unshare error() syscall */ 140 TEST_RETURN = unshare(-1); 151 perror("unshare failed"); 162 "unshare call unsupported " 167 "unshare call failed"); 178 TEST_RETURN = unshare(0); 186 perror("unshare failed"); 197 "unshare call unsupported " 202 "unshare call failed"); 216 tst_brkm(TCONF, NULL, "unshare is undefined.") [all...] |
/external/ltp/testcases/kernel/containers/mountns/ |
mountns04.c | 48 if (unshare(CLONE_NEWNS) == -1) 49 tst_brkm(TBROK | TERRNO, cleanup, "unshare failed");
|
mountns01.c | 81 if (unshare(CLONE_NEWNS) == -1) 82 tst_brkm(TBROK | TERRNO, cleanup, "unshare failed");
|
mountns02.c | 81 if (unshare(CLONE_NEWNS) == -1) 82 tst_brkm(TBROK | TERRNO, cleanup, "unshare failed");
|
mountns03.c | 94 if (unshare(CLONE_NEWNS) == -1) 95 tst_brkm(TBROK | TERRNO, cleanup, "unshare failed");
|
/system/core/libnativebridge/tests/ |
PreInitializeNativeBridge_test.cpp | 40 if (unshare(CLONE_NEWNS) != -1) {
|
/external/linux-kselftest/tools/testing/selftests/nsfs/ |
owner.c | 42 if (unshare(CLONE_NEWUTS | CLONE_NEWUSER)) 43 return pr_err("unshare"); 81 if (unshare(CLONE_NEWUSER)) 82 return pr_err("unshare");
|
/external/toybox/toys/other/ |
nsenter.c | 7 * unshare.c - run command in new context 11 * See http://man7.org/linux/man-pages/man1/unshare.1.html 16 USE_UNSHARE(NEWTOY(unshare, "<1^f(fork);r(map-root-user);i:(ipc);m:(mount);n:(net);p:(pid);u:(uts);U:(user);", TOYFLAG_USR|TOYFLAG_BIN)) 18 config UNSHARE 19 bool "unshare" 23 usage: unshare [-imnpuUr] COMMAND... 68 int unshare(int flags); 76 // Code that must run in unshare's flag context 125 // For -r, we have to save our original [ug]id before calling unshare() 128 // unshare -U does not imply -r, so we cannot use [+rU [all...] |
/external/iproute2/testsuite/ |
Makefile | 3 PREFIX := sudo -E unshare -n 7 HAVE_UNSHARED_UTIL := $(shell unshare --version 2> /dev/null)
|
/external/linux-kselftest/tools/testing/selftests/mount/ |
unprivileged-remount-test.c | 162 if (unshare(CLONE_NEWUSER) !=0) { 163 die("unshare(CLONE_NEWUSER) failed: %s\n", 211 if (unshare(CLONE_NEWNS) != 0) { 212 die("unshare(CLONE_NEWNS) failed: %s\n", 225 if (unshare(CLONE_NEWNS) != 0) { 226 die("unshare(CLONE_NEWNS) failed: %s\n", 291 ret = unshare(CLONE_NEWNS); 293 die("unshare(CLONE_NEWNS) failed: %s\n",
|
/prebuilts/go/darwin-x86/src/syscall/ |
exec_linux_test.go | 170 // Make sure we are running as root so we have permissions to use unshare 173 t.Skip("kernel prohibits unshare in unprivileged process, unless using user namespace") 309 fmt.Fprintf(os.Stderr, "unshare: mount %v failed: %v", os.Args, err) 314 // Test for Issue 38471: unshare fails because systemd has forced / to be shared 317 // Make sure we are running as root so we have permissions to use unshare 320 t.Skip("kernel prohibits unshare in unprivileged process, unless using user namespace") 331 d, err := ioutil.TempDir("", "unshare") 343 t.Skipf("Skipping test (golang.org/issue/19698); unshare failed due to permissions: %s, %v", o, err) 345 t.Fatalf("unshare failed: %s, %v", o, err) 364 // Test for Issue 20103: unshare fails when chroot is use [all...] |
/prebuilts/go/linux-x86/src/syscall/ |
exec_linux_test.go | 170 // Make sure we are running as root so we have permissions to use unshare 173 t.Skip("kernel prohibits unshare in unprivileged process, unless using user namespace") 309 fmt.Fprintf(os.Stderr, "unshare: mount %v failed: %v", os.Args, err) 314 // Test for Issue 38471: unshare fails because systemd has forced / to be shared 317 // Make sure we are running as root so we have permissions to use unshare 320 t.Skip("kernel prohibits unshare in unprivileged process, unless using user namespace") 331 d, err := ioutil.TempDir("", "unshare") 343 t.Skipf("Skipping test (golang.org/issue/19698); unshare failed due to permissions: %s, %v", o, err) 345 t.Fatalf("unshare failed: %s, %v", o, err) 364 // Test for Issue 20103: unshare fails when chroot is use [all...] |
/external/honggfuzz/libcommon/ |
ns.c | 50 if (unshare(cloneFlags) == -1) { 51 PLOG_E("unshare(%tx)", cloneFlags);
|
/external/linux-kselftest/tools/testing/selftests/bpf/ |
cgroup_helpers.c | 50 if (unshare(CLONE_NEWNS)) { 51 log_err("unshare");
|
/external/ltp/testcases/kernel/containers/userns/ |
userns05.c | 19 * When unshare an user namespace, the calling process is moved into 101 if (unshare(CLONE_NEWUSER) == -1) { 102 printf("parent pid unshare failure: (%d) %s", 108 /* When unshare an user namespace, the calling process
|