Searched refs:fork (Results 1 – 25 of 125) sorted by relevance
12345
203 auto child_pid = fork(); in llkd_driver_ABA()263 pid_t child_pid = fork(); in TEST()266 auto zombie_pid = fork(); in TEST()287 auto child_pid = fork(); in TEST()316 auto child_pid = fork(); in TEST()319 child_pid = fork(); in TEST()347 pid_t child_pid = fork(); in TEST()351 auto zombie_pid = fork(); in TEST()
34 switch(fork()) { in main()45 switch(pid = fork()) { in main()
84 switch(pid = fork()) { in main()104 switch(pid = fork()) { in main()
62 if ((pid = fork()) == 0) { in TEST_F()90 if ((pid = fork()) == 0) { in TEST_F()120 if ((pid = fork()) == 0) { in TEST_F()165 if ((pid = fork()) == 0) { in TEST_F()196 if ((pid = fork()) == 0) { in TEST_F()217 if ((pid = fork()) == 0) { in TEST_F()244 if ((pid = fork()) == 0) { in TEST_F()277 if ((pid = fork()) == 0) { in TEST_F()313 if ((pid = fork()) == 0) { in TEST_F()
247 if ((pid = fork()) == 0) { in TEST_F()271 if ((pid = fork()) == 0) { in TEST_F()299 if ((pid = fork()) == 0) { in RemoteCheckForLeaks()395 if ((pid = fork()) == 0) { in RemoteThroughSignal()
39 switch (fork()) { in main()50 switch (pid = fork()) { in main()
29 pid_t id = fork(); in StartBoringSslSelfTest()
54 pid_t forkpid = fork(); in TEST()111 pid_t forkpid = fork(); in TEST()
30 expect fork
24 pid_t pid = fork(); in main()
70 const pid_t pidWriter = fork(); in main()133 const pid_t pidReader = fork(); in main()
38 auto pid = fork(); in do_remount()
9 # Ignore reading /proc/<pid>/maps after a fork.
55 if ((pid = fork()) == 0) { in run()
79 pid_t pid = fork(); in TEST()
96 pid = fork(); in main()
98 pid_t pid = fork(); in main()
126 fork(); in TEST_F()
69 pid_t ret = fork(); in Run()
11 # Ignore reading /proc/<pid>/maps after a fork.
161 pid_t pid = fork(); in InvokePerf()255 pid_t pid = fork(); in FindSupportedPerfCounters()
6 neverallow { untrusted_app_all -untrusted_app -untrusted_app_25 } domain:process fork;38 # on attribute assignment, this relies on the fact that fork41 # and an untrusted app is allowed fork permission to itself.42 neverallow all_untrusted_apps mlstrustedsubject:process fork;
156 # on attribute assignment, this relies on the fact that fork159 # and priv_app is allowed fork permission to itself.160 neverallow priv_app mlstrustedsubject:process fork;
147 # on attribute assignment, this relies on the fact that fork150 # and priv_app is allowed fork permission to itself.151 neverallow priv_app mlstrustedsubject:process fork;