Home
last modified time | relevance | path

Searched refs:CLONE_NEWUSER (Results 1 – 25 of 27) sorted by relevance

12

/external/ltp/testcases/kernel/containers/userns/
Duserns04.c59 ret = ltp_syscall(__NR_setns, ((long)arg), CLONE_NEWUSER); in child_fn2()
80 cpid1 = ltp_clone_quick(CLONE_NEWUSER | SIGCHLD, in test_cap_sys_admin()
88 cpid2 = ltp_clone_quick(CLONE_NEWUSER | SIGCHLD, in test_cap_sys_admin()
98 if (ltp_syscall(__NR_setns, fd, CLONE_NEWUSER) == -1) { in test_cap_sys_admin()
Duserns05.c87 cpid2 = ltp_clone_quick(CLONE_NEWUSER | SIGCHLD, in test_userns_id()
101 if (unshare(CLONE_NEWUSER) == -1) { in test_userns_id()
Duserns07.c59 cpid1 = ltp_clone_quick(CLONE_NEWUSER | SIGCHLD, in child_fn1()
96 cpid1 = ltp_clone_quick(CLONE_NEWUSER | SIGCHLD, in test_max_nest()
Duserns06.c125 cpid1 = ltp_clone_quick(CLONE_NEWUSER | SIGCHLD, in main()
131 cpid2 = ltp_clone_quick(CLONE_NEWUSER | SIGCHLD, in main()
Duserns03.c179 cpid1 = ltp_clone_quick(CLONE_NEWUSER | SIGCHLD, in main()
185 cpid2 = ltp_clone_quick(CLONE_NEWUSER | SIGCHLD, in main()
Duserns_helper.h35 pid = do_clone_unshare_test(T_CLONE, CLONE_NEWUSER, dummy_child, NULL); in check_newuser()
Duserns01.c108 TEST(do_clone_unshare_test(T_CLONE, CLONE_NEWUSER, in main()
Duserns02.c84 childpid = ltp_clone_quick(CLONE_NEWUSER | SIGCHLD, in main()
/external/strace/xlat/
Dsetns_types.h14 #if !(defined(CLONE_NEWUSER) || (defined(HAVE_DECL_CLONE_NEWUSER) && HAVE_DECL_CLONE_NEWUSER))
15 # define CLONE_NEWUSER 0x10000000 macro
37 XLAT(CLONE_NEWUSER),
Dclone_flags.h59 #if !(defined(CLONE_NEWUSER) || (defined(HAVE_DECL_CLONE_NEWUSER) && HAVE_DECL_CLONE_NEWUSER))
60 # define CLONE_NEWUSER 0x10000000 macro
99 XLAT(CLONE_NEWUSER),
Dunshare_flags.h41 #if defined(CLONE_NEWUSER) || (defined(HAVE_DECL_CLONE_NEWUSER) && HAVE_DECL_CLONE_NEWUSER)
42 XLAT(CLONE_NEWUSER),
Dunshare_flags.in11 CLONE_NEWUSER
Dsetns_types.in6 CLONE_NEWUSER 0x10000000
Dclone_flags.in20 CLONE_NEWUSER 0x10000000
/external/ltp/include/lapi/
Dnamespaces_constants.h31 #ifndef CLONE_NEWUSER
32 # define CLONE_NEWUSER 0x10000000 macro
/external/libchrome/sandbox/linux/services/
Dnamespace_sandbox.cc91 : ns_types(CLONE_NEWUSER | CLONE_NEWPID | CLONE_NEWNET), in Options()
129 const int kSupportedTypes[] = {CLONE_NEWUSER, CLONE_NEWPID, CLONE_NEWNET}; in LaunchProcessWithOptions()
141 CHECK(clone_flags & CLONE_NEWUSER); in LaunchProcessWithOptions()
150 std::make_pair(CLONE_NEWUSER, kSandboxUSERNSEnvironmentVarName), in LaunchProcessWithOptions()
Dnamespace_utils_unittest.cc26 NamespaceUtils::KernelSupportsUnprivilegedNamespace(CLONE_NEWUSER); in SANDBOX_TEST()
47 base::ForkWithFlags(CLONE_NEWUSER | SIGCHLD, nullptr, nullptr); in SANDBOX_TEST()
Dcredentials.cc257 const pid_t pid = sys_clone(CLONE_NEWUSER | SIGCHLD, 0, 0, 0, 0); in CanCreateProcessInNewUserNS()
290 int ret = sys_unshare(CLONE_NEWUSER); in MoveToNewUserNS()
Dnamespace_utils.cc73 case CLONE_NEWUSER: in KernelSupportsUnprivilegedNamespace()
Dnamespace_sandbox_unittest.cc108 options.ns_types = CLONE_NEWUSER | CLONE_NEWPID; in TEST_F()
/external/linux-kselftest/tools/testing/selftests/mount/
Dunprivileged-remount-test.c30 #ifndef CLONE_NEWUSER
31 # define CLONE_NEWUSER 0x10000000 macro
161 if (unshare(CLONE_NEWUSER) !=0) { in create_and_enter_userns()
/external/ltp/testcases/kernel/containers/share/
Dns_common.h36 {"user", CLONE_NEWUSER},
/external/kernel-headers/original/uapi/linux/
Dsched.h27 #define CLONE_NEWUSER 0x10000000 /* New user namespace */ macro
/external/toybox/toys/other/
Dnsenter.c119 unsigned flags[]={CLONE_NEWUSER, CLONE_NEWUTS, CLONE_NEWPID, CLONE_NEWNET, in unshare_main()
/external/minijail/linux-x86/
Dlibconstants.gen.c89 #ifdef CLONE_NEWUSER
90 { "CLONE_NEWUSER", (unsigned long) CLONE_NEWUSER },

12