/linux-master/mm/ |
H A D | hugetlb.c | 5250 * split, unshare PMDs in the PUD_SIZE interval surrounding addr now. 5255 * split the VMA. We will need to unshare PMDs in the old and 5256 * new VMAs, so let's unshare before we split. 5931 const bool unshare = flags & FAULT_FLAG_UNSHARE; local 5949 if (!unshare && huge_pte_uffd_wp(pte)) 5956 if (WARN_ON_ONCE(!unshare && !(vma->vm_flags & VM_WRITE))) 5979 if (likely(!unshare)) 6084 pte_t newpte = make_huge_pte(vma, &new_folio->page, !unshare); 6086 /* Break COW or unshare */ 6102 * unshare) [all...] |
H A D | huge_memory.c | 1515 const bool unshare = vmf->flags & FAULT_FLAG_UNSHARE; local 1580 if (unlikely(unshare)) {
|
H A D | gup.c | 920 unsigned long address, unsigned int *flags, bool unshare, 952 if (unshare) { 919 faultin_page(struct vm_area_struct *vma, unsigned long address, unsigned int *flags, bool unshare, int *locked) argument
|
H A D | memory.c | 3243 const bool unshare = vmf->flags & FAULT_FLAG_UNSHARE; local 3313 if (unlikely(unshare)) { 3337 BUG_ON(unshare && pte_write(entry)); 3573 const bool unshare = vmf->flags & FAULT_FLAG_UNSHARE; variable 3578 if (likely(!unshare)) { 3642 if (unlikely(unshare)) { 5185 const bool unshare = vmf->flags & FAULT_FLAG_UNSHARE; local 5189 if (likely(!unshare) &&
|
/linux-master/tools/testing/selftests/net/tcp_ao/lib/ |
H A D | setup.c | 125 if (unshare(CLONE_NEWNET) != 0) 126 test_error("unshare()");
|
/linux-master/kernel/ |
H A D | fork.c | 3193 * Check constraints on flags passed to the unshare system call. 3205 * to unshare. Note that unsharing the address space or the 3206 * signal handlers also need to unshare the signal queues (aka 3266 * unshare allows a process to 'unshare' part of the process 3283 * If unsharing a user namespace must also unshare the thread group 3284 * and unshare the filesystem root and working directories. 3289 * If unsharing vm, must also unshare signal handlers. 3294 * If unsharing a signal handlers, must also unshare the signal queues. 3299 * If unsharing namespace, must also unshare filesyste [all...] |
/linux-master/tools/testing/selftests/exec/ |
H A D | recursion-depth.c | 35 if (unshare(CLONE_NEWNS) == -1) { 37 ksft_test_result_skip("error: unshare, errno %d\n", errno); 40 ksft_exit_fail_msg("error: unshare, errno %d\n", errno);
|
/linux-master/tools/perf/ |
H A D | builtin-top.c | 628 * unshare(2) the fs so that we may continue to setns into namespaces 631 unshare(CLONE_FS); 682 * unshare(2) the fs so that we may continue to setns into namespaces 685 unshare(CLONE_FS);
|
/linux-master/tools/testing/selftests/seccomp/ |
H A D | seccomp_bpf.c | 3658 ASSERT_EQ(unshare(CLONE_NEWUSER | CLONE_NEWPID), 0) { 3711 ASSERT_EQ(unshare(CLONE_NEWPID), 0) { 3731 ASSERT_EQ(unshare(CLONE_NEWPID), 0) { 3776 ASSERT_EQ(unshare(CLONE_NEWUSER), 0) {
|
/linux-master/tools/testing/selftests/move_mount_set_group/ |
H A D | move_mount_set_group_test.c | 85 if (unshare(CLONE_NEWUSER)) 115 if (unshare(CLONE_NEWNS))
|
/linux-master/tools/testing/selftests/landlock/ |
H A D | net_test.c | 109 ASSERT_EQ(0, unshare(CLONE_NEWNET));
|
H A D | fs_test.c | 269 ASSERT_EQ(0, unshare(CLONE_NEWNS | CLONE_NEWCGROUP));
|
/linux-master/tools/testing/selftests/filesystems/overlayfs/ |
H A D | dev_in_maps.c | 168 if (unshare(CLONE_NEWNS) == -1) {
|
/linux-master/tools/testing/selftests/bpf/prog_tests/ |
H A D | token.c | 258 if (unshare(CLONE_NEWUSER)) 307 err = unshare(CLONE_NEWNS);
|
H A D | tcp_custom_syncookie.c | 35 if (!ASSERT_OK(unshare(CLONE_NEWNET), "create netns"))
|
H A D | bind_perm.c | 14 if (!ASSERT_OK(unshare(CLONE_NEWNET), "create netns"))
|
H A D | test_bpffs.c | 39 err = unshare(CLONE_NEWNS); 40 if (!ASSERT_OK(err, "unshare"))
|
/linux-master/tools/testing/selftests/net/ |
H A D | so_incoming_cpu.c | 71 ASSERT_EQ(unshare(CLONE_NEWNET), 0);
|
H A D | ipsec.c | 143 if (unshare(CLONE_NEWNET) != 0) { 144 pr_err("unshare()");
|
/linux-master/tools/testing/selftests/bpf/ |
H A D | cgroup_helpers.c | 210 if (unshare(CLONE_NEWNS)) { 211 log_err("unshare");
|
/linux-master/tools/testing/selftests/capabilities/ |
H A D | test_execve.c | 91 if (outer_uid == 0 && unshare(CLONE_NEWNS) == 0) { 109 } else if (unshare(CLONE_NEWUSER | CLONE_NEWNS) == 0) {
|
/linux-master/tools/testing/selftests/filesystems/statmount/ |
H A D | statmount_test.c | 140 ret = unshare(CLONE_NEWNS|CLONE_NEWUSER);
|
/linux-master/tools/testing/selftests/net/af_unix/ |
H A D | diag_uid.c | 29 int unshare; local 35 .unshare = 0, 41 .unshare = CLONE_NEWUSER, 51 if (variant->unshare) 52 ASSERT_EQ(unshare(variant->unshare), 0);
|
/linux-master/tools/testing/selftests/uevent/ |
H A D | uevent_filtering.c | 129 ret = unshare(CLONE_NEWUSER); 132 "%s - Failed to unshare user namespace\n", 139 ret = unshare(CLONE_NEWNET); 142 "%s - Failed to unshare network namespace\n", 276 ret = unshare(CLONE_NEWUSER); 279 "%s - Failed to unshare user namespace\n", 286 ret = unshare(CLONE_NEWNET); 289 "%s - Failed to unshare network namespace\n", 410 * - unshare user namespace 441 * - unshare networ [all...] |
/linux-master/tools/testing/selftests/pidfd/ |
H A D | pidfd_test.c | 165 ret = unshare(CLONE_NEWPID); 172 ksft_exit_fail_msg("%s test: Failed to unshare pid namespace\n", 176 ret = unshare(CLONE_NEWNS); 183 ksft_exit_fail_msg("%s test: Failed to unshare mount namespace\n",
|