Searched refs:CLONE_NEWPID (Results 1 – 9 of 9) sorted by relevance
/external/libchrome/sandbox/linux/suid/ |
D | sandbox.c | 36 #if !defined(CLONE_NEWPID) 37 #define CLONE_NEWPID 0x20000000 macro 230 const int kCloneExtraFlags[] = {CLONE_NEWPID | CLONE_NEWNET, CLONE_NEWPID, }; in MoveToNewNamespaces() 279 if (kCloneExtraFlags[i] & CLONE_NEWPID) { in MoveToNewNamespaces() 301 if (kCloneExtraFlags[i] & CLONE_NEWPID) { in MoveToNewNamespaces()
|
/external/strace/xlat/ |
D | clone_flags.h | 62 #if !(defined(CLONE_NEWPID) || (defined(HAVE_DECL_CLONE_NEWPID) && HAVE_DECL_CLONE_NEWPID)) 63 # define CLONE_NEWPID 0x20000000 macro 100 XLAT(CLONE_NEWPID),
|
D | clone_flags.in | 21 CLONE_NEWPID 0x20000000
|
/external/libchrome/sandbox/linux/services/ |
D | namespace_sandbox.cc | 91 : ns_types(CLONE_NEWUSER | CLONE_NEWPID | CLONE_NEWNET), in Options() 129 const int kSupportedTypes[] = {CLONE_NEWUSER, CLONE_NEWPID, CLONE_NEWNET}; in LaunchProcessWithOptions() 151 std::make_pair(CLONE_NEWPID, kSandboxPIDNSEnvironmentVarName), in LaunchProcessWithOptions() 169 base::ForkWithFlags(CLONE_NEWPID | LINUX_SIGCHLD, nullptr, nullptr); in ForkInNewPidNamespace()
|
D | namespace_sandbox_unittest.cc | 79 NamespaceUtils::KernelSupportsUnprivilegedNamespace(CLONE_NEWPID)); in MULTIPROCESS_TEST_MAIN() 98 NamespaceUtils::KernelSupportsUnprivilegedNamespace(CLONE_NEWPID)); in MULTIPROCESS_TEST_MAIN() 109 options.ns_types = CLONE_NEWUSER | CLONE_NEWPID; in TEST_F()
|
D | namespace_utils.cc | 84 case CLONE_NEWPID: in KernelSupportsUnprivilegedNamespace()
|
/external/kernel-headers/original/uapi/linux/ |
D | sched.h | 29 #define CLONE_NEWPID 0x20000000 /* New pid namespace */ macro
|
/external/toybox/toys/other/ |
D | nsenter.c | 118 unsigned flags[]={CLONE_NEWUSER, CLONE_NEWUTS, CLONE_NEWPID, CLONE_NEWNET, in unshare_main()
|
/external/minijail/ |
D | libminijail.c | 1760 int clone_flags = CLONE_NEWPID | SIGCHLD; in minijail_run_internal()
|