/linux/Documentation/sphinx/ |
H A D | load_config.py | 10 def loadConfig(namespace): argument 13 """Load an additional configuration file into *namespace*. 22 and os.path.normpath(namespace["__file__"]) != os.path.normpath(config_file) ): 36 latex_documents = namespace['latex_documents'] 45 namespace['latex_documents'] = new_latex_docs 50 config = namespace.copy() 56 namespace.update(config) 58 config = namespace.copy() 60 namespace.update(config)
|
/linux/Documentation/core-api/ |
H A D | symbol-namespaces.rst | 15 documentation purposes (think of the SUBSYSTEM_DEBUG namespace) as well as for 18 are required to import the namespace. Otherwise the kernel will, depending on 21 Additionally, it is possible to put symbols into a module namespace, strictly 27 Symbols can be exported into namespace using different methods. All of them are 36 available to export symbols into a certain namespace: EXPORT_SYMBOL_NS() and 37 EXPORT_SYMBOL_NS_GPL(). They take one additional argument: the namespace as a 40 namespace ``USB_STORAGE``, use:: 45 ``namespace`` set accordingly. A symbol that is exported without a namespace will 46 refer to ``NULL``. There is no default namespace i [all...] |
/linux/Documentation/admin-guide/sysctl/ |
H A D | user.rst | 16 per user per user namespace limits. 24 The creation of per user per user namespace objects are charged to 25 the user in the user namespace who created the object and 26 verified to be below the per user limit in that user namespace. 34 user namespace does not allow a user to escape their current limits. 42 user namespace may create. 48 user namespace may create. 54 user namespace may create. 60 current user namespace may create. 66 user namespace ma [all...] |
/linux/Documentation/networking/ |
H A D | sysfs-tagging.rst | 11 namespace active multiple devices with the same name can show up in 18 By using the network namespace pointers as tags to separate out 23 Each sysfs directory entry may be tagged with a namespace via the 26 and KOBJ_NS_TYPES, and ns will point to the namespace to which it 30 ``void *ns[KOBJ_NS_TYPES]``. When a task in a tagging namespace 33 ``s_fs_info->ns[kobj_nstype]`` set to the new namespace. Note that 36 namespace exits, it will call kobj_ns_exit() to invalidate any 44 - current_ns() which returns current's namespace 45 - netlink_ns() which returns a socket's namespace 46 - initial_ns() which returns the initial namespace [all...] |
H A D | mptcp-sysctl.rst | 15 The default value matches TCP_RTO_MAX. This is a per-namespace 29 This is a per-namespace sysctl. 48 0 to disable the blackhole detection. This is a per-namespace sysctl. 56 per-namespace sysctl. 66 The default value matches TCP_TIMEWAIT_LEN. This is a per-namespace 75 per-namespace sysctl. 83 per-namespace values configured over the MPTCP netlink 89 This is a per-namespace sysctl. 100 per-namespace values configured over the MPTCP netlink 106 This is a per-namespace sysct [all...] |
/linux/Documentation/firmware-guide/acpi/ |
H A D | namespace.rst | 17 The Linux ACPI subsystem converts ACPI namespace objects into a Linux 42 data structure called the ACPI namespace whose topology reflects the 83 All definition blocks are loaded into a single namespace. The namespace 86 namespace: 93 5. The '\' symbol represents the root of the namespace (i.e. names 94 prepended with '\' are relative to the namespace root). 95 6. The '^' symbol represents the parent of the current namespace node 97 current namespace node). 99 The figure below shows an example ACPI namespace [all...] |
/linux/tools/testing/selftests/bpf/prog_tests/ |
H A D | test_xdp_veth.c | 72 char local_veth[VETH_NAME_MAX_LEN]; /* Interface in main namespace */ 73 char remote_veth[VETH_NAME_MAX_LEN]; /* Peer interface in dedicated namespace*/ 74 char namespace[NS_NAME_MAX_LEN]; /* Namespace for the remote veth */ member 92 .namespace = "ns-veth11-" 99 .namespace = "ns-veth22-" 106 .namespace = "ns-veth33-" 151 nstoken = open_netns(net_config->veth_cfg[index].namespace); in attach_programs_to_veth_pair() 152 if (!ASSERT_OK_PTR(nstoken, "switch to remote veth namespace")) in attach_programs_to_veth_pair() 186 err = append_tid(net_config->veth_cfg[i].namespace, NS_NAME_MAX_LEN); in create_network() 189 SYS(fail, "ip netns add %s", net_config->veth_cfg[i].namespace); in create_network() [all...] |
/linux/tools/net/ynl/pyynl/ |
H A D | ynl_gen_rst.py | 85 def rst_section(namespace: str, prefix: str, title: str) -> str: 87 return f".. _{namespace}-{prefix}-{title}:\n\n{title}\n" + "=" * len(title) 105 def rst_ref(namespace: str, prefix: str, name: str) -> str: 113 return f":ref:`{namespace}-{prefix}-{name}`" 176 def parse_operations(operations: List[Dict[str, Any]], namespace: str) -> str: 183 lines.append(rst_section(namespace, 'operation', operation["name"])) 192 value = rst_ref(namespace, key, value) 235 def parse_definitions(defs: Dict[str, Any], namespace: str) -> str: 242 lines.append(rst_section(namespace, 'definition', definition["name"])) 260 def parse_attr_sets(entries: List[Dict[str, Any]], namespace [all...] |
/linux/Documentation/admin-guide/namespaces/ |
H A D | compatibility-list.rst | 9 occur when tasks share some namespace (the columns) while living 28 other task living in a different namespace via a shared filesystem 30 within the namespace it was obtained in and may refer to some 31 other object in another namespace. 35 words, user 10 in one user namespace shouldn't have the same 37 namespace.
|
/linux/drivers/net/ethernet/mellanox/mlx5/core/en/ |
H A D | mod_hdr.h | 31 char *mlx5e_mod_hdr_alloc(struct mlx5_core_dev *mdev, int namespace, 39 enum mlx5_flow_namespace_type namespace, 49 static inline int mlx5e_mod_hdr_max_actions(struct mlx5_core_dev *mdev, int namespace) in mlx5e_mod_hdr_max_actions() argument 51 if (namespace == MLX5_FLOW_NAMESPACE_FDB) /* FDB offloading */ in mlx5e_mod_hdr_max_actions() 53 else /* namespace is MLX5_FLOW_NAMESPACE_KERNEL - NIC offloading */ in mlx5e_mod_hdr_max_actions()
|
H A D | mod_hdr.c | 74 enum mlx5_flow_namespace_type namespace, in mlx5e_mod_hdr_attach() argument 118 mh->modify_hdr = mlx5_modify_header_alloc(mdev, namespace, in mlx5e_mod_hdr_attach() 160 mlx5e_mod_hdr_alloc(struct mlx5_core_dev *mdev, int namespace, in mlx5e_mod_hdr_alloc() argument 170 max_hw_actions = mlx5e_mod_hdr_max_actions(mdev, namespace); in mlx5e_mod_hdr_alloc()
|
/linux/Documentation/admin-guide/LSM/ |
H A D | SafeSetID.rst | 8 allowing a user to set up user namespace UID/GID mappings. 40 namespace). The higher level goal is to allow for uid-based sandboxing of system 69 namespace and give programs in the tree setid capabilities. In this way, 71 own user namespace, and only approved UIDs/GIDs could be mapped back to the 72 initial system user namespace, affectively preventing privilege escalation. 74 without pairing them with other namespace types, which is not always an option. 75 Linux checks for capabilities based off of the user namespace that "owns" some 77 the user namespace in which they were created. A consequence of this is that 78 capability checks for access to a given network namespace are done by checking 79 whether a task has the given capability in the context of the user namespace [all...] |
/linux/Documentation/driver-api/acpi/ |
H A D | scan_handlers.rst | 12 During system initialization and ACPI-based device hot-add, the ACPI namespace 15 registered with the driver core for every device object in the ACPI namespace 16 and the hierarchy of those struct acpi_device objects reflects the namespace 17 layout (i.e. parent device objects in the namespace are represented by parent 26 The core ACPI namespace scanning code in drivers/acpi/scan.c carries out basic 54 The namespace scanning function, acpi_bus_scan(), first registers all of the 55 device nodes in the given namespace scope with the driver core. Then, it tries 68 the namespace scan should be terminated due to a serious error. The error code 71 The namespace trimming function, acpi_bus_trim(), first executes .detach() 72 callbacks from the scan handlers of all device nodes in the given namespace [all...] |
/linux/scripts/mod/ |
H A D | modpost.c | 221 char *namespace; member 285 char namespace[]; member 288 static bool contains_namespace(struct list_head *head, const char *namespace) in contains_namespace() argument 293 * The default namespace is null string "", which is always implicitly in contains_namespace() 296 if (!namespace[0]) in contains_namespace() 300 if (!strcmp(list->namespace, namespace)) in contains_namespace() 307 static void add_namespace(struct list_head *head, const char *namespace) in add_namespace() argument 311 if (!contains_namespace(head, namespace)) { in add_namespace() 312 ns_entry = xmalloc(sizeof(*ns_entry) + strlen(namespace) in add_namespace() 352 sym_add_exported(const char * name,struct module * mod,bool gpl_only,const char * namespace) sym_add_exported() argument 1564 char *namespace; read_symbols() local 1702 verify_module_namespace(const char * namespace,const char * modname) verify_module_namespace() argument 2129 char *symname, *namespace, *modname, *d, *export; read_dump() local [all...] |
/linux/Documentation/driver-api/nvdimm/ |
H A D | nvdimm.rst | 36 libnvdimm: namespace 37 libndctl: namespace enumeration example 38 libndctl: namespace creation example 39 Why the Term "namespace"? 85 the namespace. Note that traditional partition tables, GPT/MBR, are 86 layered on top of a PMEM namespace, or an address abstraction like BTT 140 namespace label index block is found), then no block device is created 181 single PMEM namespace is created in the REGION0-SPA-range that spans most 184 another PMEM namespace to be defined. 188 well as DIMM2 and DIMM3. Some of REGION1 is allocated to a PMEM namespace [all...] |
/linux/drivers/nvdimm/ |
H A D | Kconfig | 13 namespaces (/dev/pmemX). A PMEM namespace refers to a 54 NVDIMM namespace, i.e. a namespace can be in raw mode pmemX, 83 namespace. For environments that want to hard partition 85 sub-divide a namespace into character devices that can only be 115 the life of the given NVDIMM namespace. If you are using KMSAN
|
/linux/Documentation/ABI/testing/ |
H A D | sysfs-devices-firmware_node | 15 namespace. This attribute is read-only. If the device does not have 16 an _STR method associated with it in the ACPI namespace, this
|
/linux/scripts/coccinelle/misc/ |
H A D | add_namespace.cocci | 5 /// This script is usually called from scripts/nsdeps with -D ns=<namespace> to 6 /// add a missing namespace tag to a module source file.
|
/linux/tools/testing/selftests/tc-testing/ |
H A D | README | 6 execute them inside a network namespace dedicated to the task. 14 * The kernel must have network namespace support if using nsPlugin 57 network namespace and creates a veth pair which may be used in those test 58 cases. To disable execution within the namespace, pass the -N option 101 A test that runs inside a namespace (requires "nsPlugin") will run in parallel 104 Tests that use netdevsim or don't run inside a namespace run serially with regards 188 sets up a network namespace and runs all commands in that namespace,
|
/linux/drivers/net/ethernet/mellanox/mlx5/core/en/tc/act/ |
H A D | vlan_mangle.c | 12 mlx5e_tc_act_vlan_add_rewrite_action(struct mlx5e_priv *priv, int namespace, in mlx5e_tc_act_vlan_add_rewrite_action() argument 46 err = mlx5e_tc_act_pedit_parse_action(priv, &pedit_act, namespace, parse_attr->hdrs, in mlx5e_tc_act_vlan_add_rewrite_action()
|
H A D | pedit.c | 47 const struct flow_action_entry *act, int namespace, in mlx5e_tc_act_pedit_parse_action() argument 62 if (!mlx5e_mod_hdr_max_actions(priv->mdev, namespace)) { in mlx5e_tc_act_pedit_parse_action()
|
/linux/Documentation/userspace-api/ |
H A D | unshare.rst | 60 from default shared namespace. The following lists two use-cases 67 the kernel's per-process namespace mechanism. Polyinstantiated directories, 71 module can easily setup a private namespace for a user at login. 136 of execution context, such as the namespace, is shared by default 158 If CLONE_NEWNS is set, the namespace of the caller is 159 disassociated from the shared namespace. 204 both virtual memory and namespace. After successfully unsharing 206 new namespace structure, the error return code will have to 306 namespace without specifying unsharing of filesystem, correctly 307 unshares both namespace an [all...] |
/linux/scripts/gdb/linux/ |
H A D | proc.py | 113 # Mount namespace viewer 142 """Report the VFS mounts of the current process namespace. 146 values of that process namespace""" 169 namespace = task['nsproxy']['mnt_ns'] 170 if not namespace: 171 raise gdb.GdbError("No namespace for current process") 176 for mnt in rbtree.rb_inorder_for_each_entry(namespace['mounts'], mount_ptr_type, "mnt_node"):
|
/linux/Documentation/arch/powerpc/ |
H A D | elfnote.rst | 5 The PowerPC namespace in an ELF Note of the kernel binary is used to store 11 The types to be used with the "PowerPC" namespace are defined in [#f1]_.
|
/linux/drivers/net/ethernet/mellanox/mlx5/core/ |
H A D | fs_cmd.h | 81 enum mlx5_flow_namespace_type namespace, 88 u8 namespace, u8 num_actions,
|