/linux/Documentation/admin-guide/sysctl/ |
H A D | user.rst | 15 limits on the number of namespaces and other objects that have 29 who created user namespaces the creation of the object happens 30 in (user namespaces can be nested) and verified to be below the per user 31 limits in the user namespaces of those users. 41 The maximum number of cgroup namespaces that any user in the current 47 The maximum number of ipc namespaces that any user in the current 53 The maximum number of mount namespaces that any user in the current 59 The maximum number of network namespaces that any user in the 65 The maximum number of pid namespaces that any user in the current 71 The maximum number of time namespaces tha [all...] |
/linux/tools/perf/util/ |
H A D | namespaces.c | 7 #include "namespaces.h" 40 struct namespaces *namespaces__new(struct perf_record_namespaces *event) in namespaces__new() 42 struct namespaces *namespaces; in namespaces__new() local 46 namespaces = zalloc(sizeof(struct namespaces) + link_info_size); in namespaces__new() 47 if (!namespaces) in namespaces__new() 50 namespaces->end_time = -1; in namespaces__new() 53 memcpy(namespaces->link_info, event->link_info, link_info_size); in namespaces__new() 55 return namespaces; in namespaces__new() 58 namespaces__free(struct namespaces * namespaces) namespaces__free() argument [all...] |
H A D | namespaces.h | 24 struct namespaces { struct 30 struct namespaces *namespaces__new(struct perf_record_namespaces *event); argument 31 void namespaces__free(struct namespaces *namespaces);
|
H A D | thread.c | 15 #include "namespaces.h" 95 struct namespaces *namespaces, *tmp_namespaces; in thread__delete() local 105 list_for_each_entry_safe(namespaces, tmp_namespaces, in thread__delete() 107 list_del_init(&namespaces->list); in thread__delete() 108 namespaces__free(namespaces); in thread__delete() 150 static struct namespaces *__thread__namespaces(struct thread *thread) in __thread__namespaces() 155 return list_first_entry(thread__namespaces_list(thread), struct namespaces, list); in __thread__namespaces() 158 struct namespaces *thread__namespaces(struct thread *thread) in thread__namespaces() 160 struct namespaces *n in thread__namespaces() [all...] |
H A D | tool.h | 49 namespaces, member
|
H A D | synthetic-events.c | 14 #include "util/namespaces.h" 234 memset(&event->namespaces, 0, (sizeof(event->namespaces) + in perf_event__synthesize_namespaces() 238 event->namespaces.pid = tgid; in perf_event__synthesize_namespaces() 239 event->namespaces.tid = pid; in perf_event__synthesize_namespaces() 241 event->namespaces.nr_namespaces = NR_NAMESPACES; in perf_event__synthesize_namespaces() 243 ns_link_info = event->namespaces.link_info; in perf_event__synthesize_namespaces() 245 for (idx = 0; idx < event->namespaces.nr_namespaces; idx++) in perf_event__synthesize_namespaces() 249 event->namespaces.header.type = PERF_RECORD_NAMESPACES; in perf_event__synthesize_namespaces() 251 event->namespaces in perf_event__synthesize_namespaces() [all...] |
/linux/Documentation/admin-guide/namespaces/ |
H A D | compatibility-list.rst | 6 may have when creating tasks living in different namespaces. 10 in different other namespaces (the rows): 23 1. Both the IPC and the PID namespaces provide IDs to address 33 2. Intentionally, two equal user IDs in different user namespaces 39 The same is true for the IPC namespaces being shared - two users 40 from different user namespaces should not access the same IPC objects
|
H A D | resource-control.rst | 2 User namespaces and resource control 9 user namespaces expose the system to potential misuse of resources. 12 control groups on any system that enables user namespaces.
|
/linux/tools/testing/selftests/net/forwarding/ |
H A D | README | 4 One of the nice things about network namespaces is that they allow one 7 Unfortunately, these namespaces can not be used with actual switching 8 ASICs, as their ports can not be migrated to other network namespaces 10 L1-separation provided by namespaces. 26 The VRFs act as lightweight namespaces representing hosts connected to
|
/linux/Documentation/core-api/ |
H A D | symbol-namespaces.rst | 14 their exported symbols into separate namespaces. That is useful for 17 kernel. As of today, modules that make use of symbols exported into namespaces, 53 Defining namespaces for all symbols of a subsystem can be very verbose and may 98 In order to use symbols that are exported into namespaces, kernel modules need 99 to explicitly import these namespaces. Otherwise the kernel might reject to 101 for the namespaces it uses symbols from. E.g. a module using the 108 This has the side effect, that the imported namespaces of a module can be 135 Missing namespaces imports can easily be detected at build time. In fact,
|
/linux/tools/testing/selftests/net/ |
H A D | pmtu.sh | 10 # Set up two namespaces, A and B, with two paths between them over routers 11 # R1 and R2 (also implemented with namespaces), with different MTUs: 72 # Set up three namespaces, A, B, and C, with routing between A and B over 91 # Set up two namespaces, B, and C, with routing between the init namespace 124 # namespaces with matching endpoints. Check that route exception is not 142 # namespaces with matching endpoints. Check that route exception is 155 # Set up vti4 tunnel on top of veth, in two namespaces with matching 1161 setup namespaces routing || return $ksft_skip 1255 setup namespaces policy_routing || return $ksft_skip 1300 setup namespaces policy_routin [all...] |
/linux/Documentation/translations/zh_CN/core-api/ |
H A D | symbol-namespaces.rst | 3 :Original: Documentation/core-api/symbol-namespaces.rst 9 .. _cn_symbol-namespaces.rst:
|
/linux/net/ipv6/ |
H A D | ioam6.c | 124 ns = rhashtable_lookup_fast(&nsdata->namespaces, &id, rht_ns_params); in ioam6_genl_addns() 147 err = rhashtable_lookup_insert_fast(&nsdata->namespaces, &ns->head, in ioam6_genl_addns() 173 ns = rhashtable_lookup_fast(&nsdata->namespaces, &id, rht_ns_params); in ioam6_genl_delns() 182 err = rhashtable_remove_fast(&nsdata->namespaces, &ns->head, in ioam6_genl_delns() 255 rhashtable_walk_enter(&nsdata->namespaces, iter); in ioam6_genl_dumpns_start() 513 ns = rhashtable_lookup_fast(&nsdata->namespaces, &ns_id, rht_ns_params); in ioam6_genl_ns_set_schema() 690 return rhashtable_lookup_fast(&nsdata->namespaces, &id, rht_ns_params); in ioam6_namespace() 971 err = rhashtable_init(&nsdata->namespaces, &rht_ns_params); in ioam6_net_init() 982 rhashtable_destroy(&nsdata->namespaces); in ioam6_net_init() 993 rhashtable_free_and_destroy(&nsdata->namespaces, ioam6_free_n in ioam6_net_exit() [all...] |
/linux/tools/testing/selftests/drivers/net/bonding/ |
H A D | lag_lib.sh | 77 # between the namespaces 91 local namespaces="lag_node1 lag_node2" 93 # create namespaces 94 for n in ${namespaces}; do 98 # wire up namespaces 107 NAMESPACES="${namespaces}" 110 # cleanup all lag related namespaces
|
/linux/Documentation/networking/ |
H A D | sysfs-tagging.rst | 15 namespaces to see the same interface that is currently presented in 35 the contents of other namespaces' sysfs mounts. Therefore, when a
|
H A D | netfilter-sysctl.rst | 17 namespaces. This variable is only accessible from init_net.
|
/linux/Documentation/admin-guide/LSM/ |
H A D | SafeSetID.rst | 66 Use user namespaces 73 Unfortunately, it is not generally feasible to use user namespaces in isolation, 76 entity. For example, Linux has the notion that network namespaces are owned by 85 configurations. Using user namespaces in isolation causes problems regarding 86 other system interactions, including use of pid namespaces and device creation.
|
/linux/scripts/ |
H A D | nsdeps | 30 local namespaces="$*" 33 for ns in $namespaces; do
|
/linux/tools/perf/tests/shell/attr/ |
H A D | test-record-dummy-C0 | 47 namespaces=0
|
H A D | system-wide-dummy | 44 namespaces=0
|
/linux/include/net/ |
H A D | ioam6.h | 44 struct rhashtable namespaces; member
|
/linux/lib/vdso/ |
H A D | Kconfig | 30 Selected by architectures which support time namespaces in the
|
/linux/drivers/nvme/target/ |
H A D | core.c | 123 nvmet_for_each_enabled_ns(&subsys->namespaces, idx, cur) in nvmet_max_nsid() 439 req->ns = xa_load(&subsys->namespaces, nsid); in nvmet_req_find_ns() 481 pr_err("peer-to-peer DMA is not supported by non-block device namespaces\n"); in nvmet_p2pmem_ns_enable() 577 pr_info("cannot enable both passthru and regular namespaces for a single subsystem"); in nvmet_ns_enable() 608 xa_set_mark(&subsys->namespaces, ns->nsid, NVMET_NS_ENABLED); in nvmet_ns_enable() 634 xa_clear_mark(&subsys->namespaces, ns->nsid, NVMET_NS_ENABLED); in nvmet_ns_disable() 642 * Now that we removed the namespaces from the lookup list, we in nvmet_ns_disable() 646 * use call_rcu here as we need to ensure the namespaces have in nvmet_ns_disable() 672 xa_erase(&subsys->namespaces, ns->nsid); in nvmet_ns_free() 708 if (xa_insert(&subsys->namespaces, n in nvmet_ns_alloc() [all...] |
/linux/Documentation/driver-api/nvdimm/ |
H A D | nvdimm.rst | 83 (persistently names) capacity allocated to different PMEM namespaces. It 523 Idle namespaces are automatically created by the kernel if a given 544 /* unlike pmem namespaces, blk namespaces have a sector size */ 559 https://www.nvmexpress.org/specifications/), and NFIT namespaces are 561 NVME-namespaces. 593 Similar to namespaces an idle BTT device is automatically created per
|
/linux/Documentation/translations/zh_CN/admin-guide/ |
H A D | index.rst | 111 * namespaces/index
|