| /Linux-v6.6/security/apparmor/ |
| D | policy_ns.c | 11 * to be loaded for tasks within the namespace. 28 /* root profile namespace */ 34 * @curr: namespace to treat as the parent (NOT NULL) 35 * @view: namespace to test if visible from @curr (NOT NULL) 58 * @curr: current namespace (NOT NULL) 59 * @view: namespace attempting to view (NOT NULL) 66 /* if view == curr then the namespace name isn't displayed */ in aa_ns_name() 99 * alloc_ns - allocate, initialize and return a new namespace 100 * @prefix: parent namespace name (MAYBE NULL) 103 * Returns: refcounted namespace or NULL on failure. [all …]
|
| /Linux-v6.6/tools/testing/selftests/uevent/ |
| D | uevent_filtering.c | 131 "%s - Failed to unshare user namespace\n", in uevent_listener() 141 "%s - Failed to unshare network namespace\n", in uevent_listener() 277 "%s - Failed to unshare user namespace\n", in do_test() 287 "%s - Failed to unshare network namespace\n", in do_test() 380 * - Open uevent listening socket in initial network namespace owned by in TEST() 381 * initial user namespace. in TEST() 382 * - Trigger uevent in initial network namespace owned by initial user in TEST() 383 * namespace. in TEST() 394 * - Open uevent listening socket in non-initial network namespace in TEST() 395 * owned by initial user namespace. in TEST() [all …]
|
| /Linux-v6.6/Documentation/core-api/ |
| D | symbol-namespaces.rst | 25 documentation purposes (think of the SUBSYSTEM_DEBUG namespace) as well as for 28 are required to import the namespace. Otherwise the kernel will, depending on 34 Symbols can be exported into namespace using different methods. All of them are 43 available to export symbols into a certain namespace: EXPORT_SYMBOL_NS() and 44 EXPORT_SYMBOL_NS_GPL(). They take one additional argument: the namespace. 47 namespace ``USB_STORAGE``, use:: 52 ``namespace`` set accordingly. A symbol that is exported without a namespace will 53 refer to ``NULL``. There is no default namespace if none is defined. ``modpost`` 54 and kernel/module/main.c make use the namespace at build time or module load 63 and EXPORT_SYMBOL_GPL() macro expansions that do not specify a namespace. [all …]
|
| /Linux-v6.6/security/apparmor/include/ |
| D | policy_ns.h | 22 /* struct aa_ns_acct - accounting of profiles in namespace 23 * @max_size: maximum space allowed for all profiles in namespace 24 * @max_count: maximum number of profiles that can be in this namespace 35 /* struct aa_ns - namespace for a set of profiles 37 * @parent: parent of namespace 39 * @acct: accounting for the namespace 40 * @unconfined: special unconfined profile for the namespace 41 * @sub_ns: list of namespaces under the current namespace. 43 * @uniq_id: a unique id count for the profiles in the namespace 49 * and profile names within a namespace are guaranteed to be unique. When [all …]
|
| /Linux-v6.6/Documentation/admin-guide/sysctl/ |
| D | user.rst | 16 per user per user namespace limits. 24 The creation of per user per user namespace objects are charged to 25 the user in the user namespace who created the object and 26 verified to be below the per user limit in that user namespace. 34 user namespace does not allow a user to escape their current limits. 42 user namespace may create. 48 user namespace may create. 54 user namespace may create. 60 current user namespace may create. 66 user namespace may create. [all …]
|
| /Linux-v6.6/Documentation/networking/ |
| D | sysfs-tagging.rst | 11 namespace active multiple devices with the same name can show up in 18 By using the network namespace pointers as tags to separate out 23 Each sysfs directory entry may be tagged with a namespace via the 26 and KOBJ_NS_TYPES, and ns will point to the namespace to which it 30 ``void *ns[KOBJ_NS_TYPES]``. When a task in a tagging namespace 33 ``s_fs_info->ns[kobj_nstype]`` set to the new namespace. Note that 36 namespace exits, it will call kobj_ns_exit() to invalidate any 44 - current_ns() which returns current's namespace 45 - netlink_ns() which returns a socket's namespace 46 - initial_ns() which returns the initial namespace
|
| D | mptcp-sysctl.rst | 14 per-namespace sysctl. 23 The default value matches TCP_RTO_MAX. This is a per-namespace 32 per-namespace sysctl. 45 This is a per-namespace sysctl. 53 per-namespace values configured over the MPTCP netlink 59 This is a per-namespace sysctl. 74 This is a per-namespace sysctl. 81 Support for selection of different schedulers. This is a per-namespace
|
| /Linux-v6.6/include/linux/ |
| D | nd.h | 94 * struct nd_namespace_common - core infrastructure of a namespace 95 * @force_raw: ignore other personalities for the namespace (e.g. btt) 97 * @claim: when set a another personality has taken ownership of the namespace 99 * @rw_bytes: access the raw namespace capacity with byte-aligned transfers 117 * @dev: namespace device created by the nd region driver 120 * @addr: virtual address to access the namespace range 121 * @bb: badblocks list for the namespace range 132 * struct nd_namespace_pmem - namespace device for dimm-backed interleaved memory 134 * @lbasize: logical sector size for the namespace in block-device-mode 135 * @alt_name: namespace name supplied in the dimm label [all …]
|
| /Linux-v6.6/Documentation/admin-guide/LSM/ |
| D | SafeSetID.rst | 8 allowing a user to set up user namespace UID/GID mappings. 40 namespace). The higher level goal is to allow for uid-based sandboxing of system 69 namespace and give programs in the tree setid capabilities. In this way, 71 own user namespace, and only approved UIDs/GIDs could be mapped back to the 72 initial system user namespace, affectively preventing privilege escalation. 74 without pairing them with other namespace types, which is not always an option. 75 Linux checks for capabilities based off of the user namespace that "owns" some 77 the user namespace in which they were created. A consequence of this is that 78 capability checks for access to a given network namespace are done by checking 79 whether a task has the given capability in the context of the user namespace [all …]
|
| /Linux-v6.6/tools/testing/selftests/tc-testing/plugin-lib/ |
| D | nsPlugin.py | 19 if self.args.namespace: 30 if self.args.namespace: 39 'options for nsPlugin(run commands in net namespace)') 41 '-N', '--no-namespace', action='store_false', default=True, 42 dest='namespace', help='Don\'t run commands in namespace') 50 if not self.args.namespace: 85 if not self.args.namespace: 95 Create the network namespace in which the tests will be run and set up 99 if self.args.namespace: 114 Destroy the network namespace for testing (and any associated network [all …]
|
| /Linux-v6.6/Documentation/driver-api/acpi/ |
| D | scan_handlers.rst | 12 During system initialization and ACPI-based device hot-add, the ACPI namespace 15 registered with the driver core for every device object in the ACPI namespace 16 and the hierarchy of those struct acpi_device objects reflects the namespace 17 layout (i.e. parent device objects in the namespace are represented by parent 26 The core ACPI namespace scanning code in drivers/acpi/scan.c carries out basic 54 The namespace scanning function, acpi_bus_scan(), first registers all of the 55 device nodes in the given namespace scope with the driver core. Then, it tries 68 the namespace scan should be terminated due to a serious error. The error code 71 The namespace trimming function, acpi_bus_trim(), first executes .detach() 72 callbacks from the scan handlers of all device nodes in the given namespace [all …]
|
| /Linux-v6.6/Documentation/sphinx/ |
| D | load_config.py | 9 def loadConfig(namespace): argument 12 u"""Load an additional configuration file into *namespace*. 21 and os.path.normpath(namespace["__file__"]) != os.path.normpath(config_file) ): 35 latex_documents = namespace['latex_documents'] 44 namespace['latex_documents'] = new_latex_docs 49 config = namespace.copy() 55 namespace.update(config) 57 config = namespace.copy() 59 namespace.update(config)
|
| D | cdomain.py | 51 # Namespace to be prepended to the full name 52 namespace = None variable 56 # - Store the namespace if ".. c:namespace::" tag is found 58 RE_namespace = re.compile(r'^\s*..\s*c:namespace::\s*(\S+)\s*$') 61 global namespace 63 namespace = match.group(1) 128 # Handle easy Sphinx 3.1+ simple new tags: :c:expr and .. c:namespace:: 158 global namespace 192 if namespace: 193 fullname = namespace + "." + fullname [all …]
|
| /Linux-v6.6/Documentation/driver-api/nvdimm/ |
| D | nvdimm.rst | 35 LIBNVDIMM/LIBNDCTL: Namespace 36 libnvdimm: namespace 37 libndctl: namespace enumeration example 38 libndctl: namespace creation example 39 Why the Term "namespace"? 85 the namespace. Note that traditional partition tables, GPT/MBR, are 86 layered on top of a PMEM namespace, or an address abstraction like BTT 108 NVDIMM Namespace: 140 namespace label index block is found), then no block device is created 181 single PMEM namespace is created in the REGION0-SPA-range that spans most [all …]
|
| /Linux-v6.6/Documentation/firmware-guide/acpi/ |
| D | namespace.rst | 5 ACPI Device Tree - Representation of ACPI Namespace 17 The Linux ACPI subsystem converts ACPI namespace objects into a Linux 42 data structure called the ACPI namespace whose topology reflects the 69 | ACPI Namespace | 80 Example ACPI Namespace 83 All definition blocks are loaded into a single namespace. The namespace 86 namespace: 93 5. The '\' symbol represents the root of the namespace (i.e. names 94 prepended with '\' are relative to the namespace root). 95 6. The '^' symbol represents the parent of the current namespace node [all …]
|
| /Linux-v6.6/drivers/acpi/acpica/ |
| D | nsload.c | 4 * Module Name: nsload - namespace loading/expanding/contracting procedures 36 * DESCRIPTION: Load one ACPI table into the namespace 47 /* If table already loaded into namespace, just return */ in acpi_ns_load_table() 55 "**** Loading table into namespace ****\n")); in acpi_ns_load_table() 63 * Parse the table and load the namespace with all named in acpi_ns_load_table() 66 * parsed until the entire namespace is loaded, because in acpi_ns_load_table() 76 * On error, delete any namespace objects created by this table. in acpi_ns_load_table() 79 * AE_ALREADY_EXISTS - namespace collision. in acpi_ns_load_table() 82 * namespace, as per the ACPI specification. in acpi_ns_load_table() 143 * Load the namespace. The DSDT is required, in acpi_ns_load_namespace() [all …]
|
| /Linux-v6.6/tools/include/uapi/linux/ |
| D | sched.h | 20 #define CLONE_NEWNS 0x00020000 /* New mount namespace group */ 28 #define CLONE_NEWCGROUP 0x02000000 /* New cgroup namespace */ 29 #define CLONE_NEWUTS 0x04000000 /* New utsname namespace */ 30 #define CLONE_NEWIPC 0x08000000 /* New ipc namespace */ 31 #define CLONE_NEWUSER 0x10000000 /* New user namespace */ 32 #define CLONE_NEWPID 0x20000000 /* New pid namespace */ 33 #define CLONE_NEWNET 0x40000000 /* New network namespace */ 44 #define CLONE_NEWTIME 0x00000080 /* New time namespace */ 76 * namespace. Each additional element in the array 77 * defines the PID in the parent PID namespace of [all …]
|
| /Linux-v6.6/include/uapi/linux/ |
| D | sched.h | 20 #define CLONE_NEWNS 0x00020000 /* New mount namespace group */ 28 #define CLONE_NEWCGROUP 0x02000000 /* New cgroup namespace */ 29 #define CLONE_NEWUTS 0x04000000 /* New utsname namespace */ 30 #define CLONE_NEWIPC 0x08000000 /* New ipc namespace */ 31 #define CLONE_NEWUSER 0x10000000 /* New user namespace */ 32 #define CLONE_NEWPID 0x20000000 /* New pid namespace */ 33 #define CLONE_NEWNET 0x40000000 /* New network namespace */ 44 #define CLONE_NEWTIME 0x00000080 /* New time namespace */ 76 * namespace. Each additional element in the array 77 * defines the PID in the parent PID namespace of [all …]
|
| D | nsfs.h | 9 /* Returns a file descriptor that refers to an owning user namespace */ 11 /* Returns a file descriptor that refers to a parent namespace */ 13 /* Returns the type of namespace (CLONE_NEW* value) referred to by 16 /* Get owner UID (in the caller's user namespace) for a user namespace */
|
| /Linux-v6.6/drivers/nvdimm/ |
| D | label.h | 20 NSLABEL_FLAG_LOCAL = 0x2, /* DIMM-local namespace */ 21 NSLABEL_FLAG_BTT = 0x4, /* namespace contains a BTT */ 102 * struct nvdimm_efi_label - namespace superblock 111 * @rawsize: size of namespace 113 * @align: physical address alignment of the namespace 145 * @type: uuid identifying this label format (namespace) 146 * @uuid: uuid for the namespace this label describes 147 * @name: friendly name for the namespace 149 * @nrange: discontiguous namespace support 152 * @rawsize: size of this label's contribution to namespace [all …]
|
| /Linux-v6.6/kernel/ |
| D | user_namespace.c | 46 * anything as the capabilities are bound to the new user namespace. in set_cred_user_ns() 75 * Create a new user namespace, deriving the creator from the user in the 77 * new namespace. 102 * mount namespace which allows all files to be accessed. in create_user_ns() 108 /* The creator needs a mapping in the parent user namespace in create_user_ns() 133 /* Leave the new->user_ns reference with the new user namespace. */ in create_user_ns() 396 * make_kuid - Map a user-namespace uid pair into a kuid. 397 * @ns: User namespace that the uid is in 400 * Maps a user-namespace uid pair into a kernel internal kuid, 403 * When there is no mapping defined for the user-namespace uid [all …]
|
| D | pid_namespace.c | 35 * @level: pid namespace level 177 /* Don't allow any more processes into the pid namespace */ in zap_pid_ns_processes() 182 * This speeds up the namespace shutdown, plus see the comment in zap_pid_ns_processes() 191 * Find remaining pid_ts in the namespace, signal and wait for them in zap_pid_ns_processes() 194 * Note: This signals each threads in the namespace - even those that in zap_pid_ns_processes() 197 * namespace, but that could be unnecessarily expensive if the in zap_pid_ns_processes() 198 * pid namespace has just a few processes. Or we need to in zap_pid_ns_processes() 199 * maintain a tasklist for each pid namespace. in zap_pid_ns_processes() 216 * parent namespace are detached and become EXIT_DEAD. in zap_pid_ns_processes() 226 * namespace. Such processes are created with setns()+fork(). in zap_pid_ns_processes() [all …]
|
| /Linux-v6.6/tools/testing/selftests/bpf/ |
| D | test_tunnel.sh | 9 # root namespace | at_ns0 namespace 24 # Root namespace with metadata-mode tunnel + BPF 29 # Namespace at_ns0 with native tunnel 37 # Most of the tests start by namespace creation, device configuration, 39 # from root namespace, the following operations happen: 44 # 4) veth0's ingress queue receive the tunneled packet at namespace at_ns0 74 # at_ns0 namespace 81 # root namespace 96 # at_ns0 namespace 105 # root namespace [all …]
|
| /Linux-v6.6/drivers/nvme/host/ |
| D | constants.c | 38 [nvme_admin_ns_mgmt] = "Namespace Management", 42 [nvme_admin_ns_attach] = "Namespace Attach", 77 [NVME_SC_INVALID_NS] = "Invalid Namespace or Format", 98 [NVME_SC_NS_WRITE_PROTECTED] = "Namespace is Write Protected", 105 [NVME_SC_NS_NOT_READY] = "Namespace Not Ready", 123 [NVME_SC_FEATURE_NOT_PER_NS] = "Feature Not Namespace Specific", 129 [NVME_SC_NS_INSUFFICIENT_CAP] = "Namespace Insufficient Capacity", 130 [NVME_SC_NS_ID_UNAVAILABLE] = "Namespace Identifier Unavailable", 131 [NVME_SC_NS_ALREADY_ATTACHED] = "Namespace Already Attached", 132 [NVME_SC_NS_IS_PRIVATE] = "Namespace Is Private", [all …]
|
| /Linux-v6.6/tools/testing/selftests/pidfd/ |
| D | pidfd_setns_test.c | 147 TH_LOG("%m - Failed to open %s namespace for process %d", in FIXTURE_SETUP() 240 TH_LOG("%m - Failed to open %s namespace for process %d", in FIXTURE_SETUP() 253 TH_LOG("%m - Failed to open %s namespace for process %d", in FIXTURE_SETUP() 266 TH_LOG("%m - Failed to open %s namespace for process %d", in FIXTURE_SETUP() 333 /* processes are in the same namespace */ in in_same_namespace() 392 TH_LOG("%m - Failed to setns to %s namespace of %d via pidfd %d", in TEST_F() 404 TH_LOG("setns failed to place us correctly into %s namespace of %d via pidfd %d", in TEST_F() 408 TH_LOG("Managed to correctly setns to %s namespace of %d via pidfd %d", in TEST_F() 428 TH_LOG("%m - Failed to setns to %s namespace of %d via nsfd %d", in TEST_F() 440 TH_LOG("setns failed to place us correctly into %s namespace of %d via nsfd %d", in TEST_F() [all …]
|