Lines Matching refs:namespace
174 through remount from the init namespace. The mount option is
175 ignored on non-init namespace mounts. Please refer to the
453 cgroup namespace on namespace creation.
460 "cgroup.subtree_control" on a namespace root from inside the
461 namespace.
514 namespace of the process which is attempting the migration. If either
1702 cgroup namespace provides a mechanism to virtualize the view of the
1705 namespace. The process running inside the cgroup namespace will have
1708 the cgroup namespace.
1710 Without cgroup namespace, the "/proc/$PID/cgroup" file shows the
1720 and undesirable to expose to the isolated processes. cgroup namespace
1722 creating a cgroup namespace, one would see::
1729 After unsharing a new namespace, the view changes::
1737 namespace, the new cgroupns gets applied to the entire process (all
1741 A cgroup namespace is alive as long as there are processes inside or
1743 namespace is destroyed. The cgroupns root and the actual cgroups
1750 The 'cgroupns root' for a cgroup namespace is the cgroup in which the
1756 The cgroupns root cgroup does not change even if the namespace creator
1767 Each process gets its namespace-specific view of "/proc/$PID/cgroup"
1769 Processes running inside the cgroup namespace will be able to see
1779 From the initial cgroup namespace, the real cgroup path will be
1785 From a sibling cgroup namespace (that is, a namespace rooted at a
1787 namespace root will be shown. For instance, if PID 7353's cgroup
1788 namespace root is at '/batchjobs/container_id2', then it will see::
1794 its relative to the cgroup namespace root of the caller.
1800 Processes inside a cgroup namespace can move into and out of the
1801 namespace root if they have proper access to external cgroups. For
1802 example, from inside a namespace with cgroupns root at
1813 namespace should only be exposed to its own cgroupns hierarchy.
1815 setns(2) to another cgroup namespace is allowed when:
1817 (a) the process has CAP_SYS_ADMIN against its current user namespace
1819 namespace's userns
1822 namespace. It is expected that the someone moves the attaching
1823 process under the target cgroup namespace root.
1830 running inside a non-init cgroup namespace::
1839 the view of cgroup hierarchy by namespace-private cgroupfs mount