/external/strace/xlat/ |
D | setns_types.h | 20 #if !(defined(CLONE_NEWNET) || (defined(HAVE_DECL_CLONE_NEWNET) && HAVE_DECL_CLONE_NEWNET)) 21 # define CLONE_NEWNET 0x40000000 macro 39 XLAT(CLONE_NEWNET),
|
D | clone_flags.h | 65 #if !(defined(CLONE_NEWNET) || (defined(HAVE_DECL_CLONE_NEWNET) && HAVE_DECL_CLONE_NEWNET)) 66 # define CLONE_NEWNET 0x40000000 macro 101 XLAT(CLONE_NEWNET),
|
D | unshare_flags.h | 38 #if defined(CLONE_NEWNET) || (defined(HAVE_DECL_CLONE_NEWNET) && HAVE_DECL_CLONE_NEWNET) 39 XLAT(CLONE_NEWNET),
|
D | unshare_flags.in | 10 CLONE_NEWNET
|
D | setns_types.in | 8 CLONE_NEWNET 0x40000000
|
D | clone_flags.in | 22 CLONE_NEWNET 0x40000000
|
/external/ltp/include/lapi/ |
D | namespaces_constants.h | 25 #ifndef CLONE_NEWNET 26 # define CLONE_NEWNET 0x40000000 macro
|
/external/libchrome/sandbox/linux/suid/ |
D | sandbox.c | 39 #if !defined(CLONE_NEWNET) 40 #define CLONE_NEWNET 0x40000000 macro 230 const int kCloneExtraFlags[] = {CLONE_NEWPID | CLONE_NEWNET, CLONE_NEWPID, }; in MoveToNewNamespaces() 285 if (kCloneExtraFlags[i] & CLONE_NEWNET) { in MoveToNewNamespaces() 304 if (kCloneExtraFlags[i] & CLONE_NEWNET) { in MoveToNewNamespaces()
|
/external/iproute2/include/ |
D | namespace.h | 13 #ifndef CLONE_NEWNET 14 #define CLONE_NEWNET 0x40000000 /* New network namespace (lo, device, names sockets, etc) */ macro
|
/external/ltp/testcases/kernel/syscalls/setns/ |
D | setns.h | 70 #if defined(CLONE_NEWNET) in init_available_ns() 71 init_ns_type(CLONE_NEWNET, "net"); in init_available_ns()
|
/external/libchrome/sandbox/linux/services/ |
D | namespace_sandbox.cc | 91 : ns_types(CLONE_NEWUSER | CLONE_NEWPID | CLONE_NEWNET), in Options() 129 const int kSupportedTypes[] = {CLONE_NEWUSER, CLONE_NEWPID, CLONE_NEWNET}; in LaunchProcessWithOptions() 152 std::make_pair(CLONE_NEWNET, kSandboxNETNSEnvironmentVarName), in LaunchProcessWithOptions()
|
D | namespace_utils.cc | 78 case CLONE_NEWNET: in KernelSupportsUnprivilegedNamespace()
|
D | namespace_sandbox_unittest.cc | 80 NamespaceUtils::KernelSupportsUnprivilegedNamespace(CLONE_NEWNET)); in MULTIPROCESS_TEST_MAIN()
|
/external/ltp/testcases/kernel/containers/share/ |
D | ns_common.h | 34 {"net", CLONE_NEWNET},
|
/external/kernel-headers/original/uapi/linux/ |
D | sched.h | 29 #define CLONE_NEWNET 0x40000000 /* New network namespace */ macro
|
/external/ltp/testcases/kernel/containers/netns/ |
D | netns_helper.h | 67 pid = do_clone_unshare_test(T_UNSHARE, CLONE_NEWNET | CLONE_NEWNS, NULL, in check_netns()
|
D | netns_netlink.c | 131 if (unshare(CLONE_NEWNET) == -1) in test()
|
/external/linux-kselftest/tools/testing/selftests/mount/ |
D | unprivileged-remount-test.c | 27 #ifndef CLONE_NEWNET 28 # define CLONE_NEWNET 0x40000000 macro
|
/external/toybox/toys/other/ |
D | nsenter.c | 119 unsigned flags[]={CLONE_NEWUSER, CLONE_NEWUTS, CLONE_NEWPID, CLONE_NEWNET, in unshare_main()
|
/external/toybox/scripts/ |
D | genconfig.sh | 37 int x=CLONE_NEWNS|CLONE_NEWUTS|CLONE_NEWIPC|CLONE_NEWNET;
|
/external/iproute2/lib/ |
D | namespace.c | 58 if (setns(netns, CLONE_NEWNET) < 0) { in netns_switch()
|
/external/minijail/linux-x86/ |
D | libconstants.gen.c | 80 #ifdef CLONE_NEWNET 81 { "CLONE_NEWNET", (unsigned long) CLONE_NEWNET },
|
/external/iproute2/ip/ |
D | ipnetns.c | 661 if (unshare(CLONE_NEWNET) < 0) { in netns_add()
|
/external/minijail/ |
D | libminijail.c | 1648 if (setns(j->netns_fd, CLONE_NEWNET)) in minijail_enter() 1651 if (unshare(CLONE_NEWNET)) in minijail_enter()
|