| /Linux-v5.15/Documentation/admin-guide/sysctl/ | 
| D | user.rst | 15 limits on the number of namespaces and other objects that have29 who created user namespaces the creation of the object happens
 30 in (user namespaces can be nested) and verified to be below the per user
 31 limits in the user namespaces of those users.
 41   The maximum number of cgroup namespaces that any user in the current
 47   The maximum number of ipc namespaces that any user in the current
 53   The maximum number of mount namespaces that any user in the current
 59   The maximum number of network namespaces that any user in the
 65   The maximum number of pid namespaces that any user in the current
 71   The maximum number of time namespaces that any user in the current
 [all …]
 
 | 
| /Linux-v5.15/tools/perf/util/ | 
| D | namespaces.c | 40 struct namespaces *namespaces__new(struct perf_record_namespaces *event)  in namespaces__new()42 	struct namespaces *namespaces;  in namespaces__new()  local
 46 	namespaces = zalloc(sizeof(struct namespaces) + link_info_size);  in namespaces__new()
 47 	if (!namespaces)  in namespaces__new()
 50 	namespaces->end_time = -1;  in namespaces__new()
 53 		memcpy(namespaces->link_info, event->link_info, link_info_size);  in namespaces__new()
 55 	return namespaces;  in namespaces__new()
 58 void namespaces__free(struct namespaces *namespaces)  in namespaces__free()  argument
 60 	free(namespaces);  in namespaces__free()
 
 | 
| D | namespaces.h | 23 struct namespaces {  struct29 struct namespaces *namespaces__new(struct perf_record_namespaces *event);  argument
 30 void namespaces__free(struct namespaces *namespaces);
 
 | 
| D | thread.c | 83 	struct namespaces *namespaces, *tmp_namespaces;  in thread__delete()  local95 	list_for_each_entry_safe(namespaces, tmp_namespaces,  in thread__delete()
 97 		list_del_init(&namespaces->list);  in thread__delete()
 98 		namespaces__free(namespaces);  in thread__delete()
 154 static struct namespaces *__thread__namespaces(const struct thread *thread)  in __thread__namespaces()
 159 	return list_first_entry(&thread->namespaces_list, struct namespaces, list);  in __thread__namespaces()
 162 struct namespaces *thread__namespaces(struct thread *thread)  in thread__namespaces()
 164 	struct namespaces *ns;  in thread__namespaces()
 176 	struct namespaces *new, *curr = __thread__namespaces(thread);  in __thread__set_namespaces()
 
 | 
| D | thread.h | 65 struct namespaces;88 struct namespaces *thread__namespaces(struct thread *thread);
 
 | 
| D | tool.h | 48 			namespaces,  member
 | 
| D | synthetic-events.c | 233 	memset(&event->namespaces, 0, (sizeof(event->namespaces) +  in perf_event__synthesize_namespaces()237 	event->namespaces.pid = tgid;  in perf_event__synthesize_namespaces()
 238 	event->namespaces.tid = pid;  in perf_event__synthesize_namespaces()
 240 	event->namespaces.nr_namespaces = NR_NAMESPACES;  in perf_event__synthesize_namespaces()
 242 	ns_link_info = event->namespaces.link_info;  in perf_event__synthesize_namespaces()
 244 	for (idx = 0; idx < event->namespaces.nr_namespaces; idx++)  in perf_event__synthesize_namespaces()
 248 	event->namespaces.header.type = PERF_RECORD_NAMESPACES;  in perf_event__synthesize_namespaces()
 250 	event->namespaces.header.size = (sizeof(event->namespaces) +  in perf_event__synthesize_namespaces()
 827 	namespaces_event = malloc(sizeof(namespaces_event->namespaces) +  in perf_event__synthesize_thread_map()
 909 	namespaces_event = malloc(sizeof(namespaces_event->namespaces) +  in __perf_event__synthesize_threads()
 
 | 
| /Linux-v5.15/Documentation/admin-guide/namespaces/ | 
| D | compatibility-list.rst | 6 may have when creating tasks living in different namespaces.10 in different other namespaces (the rows):
 23 1. Both the IPC and the PID namespaces provide IDs to address
 33 2. Intentionally, two equal user IDs in different user namespaces
 39    The same is true for the IPC namespaces being shared - two users
 40    from different user namespaces should not access the same IPC objects
 
 | 
| D | resource-control.rst | 7 of processes is allowed to switch user ids.  With user namespaces12 kernels that enable user namespaces, and it is further recommended
 
 | 
| /Linux-v5.15/tools/testing/selftests/net/forwarding/ | 
| D | README | 4 One of the nice things about network namespaces is that they allow one7 Unfortunately, these namespaces can not be used with actual switching
 8 ASICs, as their ports can not be migrated to other network namespaces
 10 L1-separation provided by namespaces.
 26 The VRFs act as lightweight namespaces representing hosts connected to
 
 | 
| /Linux-v5.15/Documentation/core-api/ | 
| D | symbol-namespaces.rst | 24 their exported symbols into separate namespaces. That is useful for27 kernel. As of today, modules that make use of symbols exported into namespaces,
 60 Defining namespaces for all symbols of a subsystem can be very verbose and may
 90 In order to use symbols that are exported into namespaces, kernel modules need
 91 to explicitly import these namespaces. Otherwise the kernel might reject to
 93 for the namespaces it uses symbols from. E.g. a module using the
 100 This has the side effect, that the imported namespaces of a module can be
 128 Missing namespaces imports can easily be detected at build time. In fact,
 
 | 
| /Linux-v5.15/tools/testing/selftests/net/ | 
| D | pmtu.sh | 971 	setup namespaces routing || return $ksft_skip1069 		setup namespaces routing ${type}4 || return $ksft_skip
 1073 		setup namespaces routing ${type}6 || return $ksft_skip
 1144 		setup namespaces routing bridge bridged_${type}4 || return $ksft_skip
 1148 		setup namespaces routing bridge bridged_${type}6 || return $ksft_skip
 1228 		setup namespaces routing ovs_bridge ovs_${type}4 || return $ksft_skip
 1232 		setup namespaces routing ovs_bridge ovs_${type}6 || return $ksft_skip
 1314 	setup namespaces routing ${encap}${outer_family}${inner_family} || return $ksft_skip
 1393 	setup namespaces routing ip${inner}ip${outer} || return $ksft_skip
 1447 	setup namespaces veth vti4 xfrm4 || return $ksft_skip
 [all …]
 
 | 
| /Linux-v5.15/scripts/ | 
| D | nsdeps | 36 	local namespaces="$*"40 	for ns in $namespaces; do
 
 | 
| /Linux-v5.15/Documentation/translations/zh_CN/core-api/ | 
| D | symbol-namespaces.rst | 3 :Original: Documentation/core-api/symbol-namespaces.rst9 .. _cn_symbol-namespaces.rst:
 
 | 
| D | index.rst | 31    symbol-namespaces
 | 
| /Linux-v5.15/net/ipv6/ | 
| D | ioam6.c | 122 	ns = rhashtable_lookup_fast(&nsdata->namespaces, &id, rht_ns_params);  in ioam6_genl_addns()149 	err = rhashtable_lookup_insert_fast(&nsdata->namespaces, &ns->head,  in ioam6_genl_addns()
 175 	ns = rhashtable_lookup_fast(&nsdata->namespaces, &id, rht_ns_params);  in ioam6_genl_delns()
 184 	err = rhashtable_remove_fast(&nsdata->namespaces, &ns->head,  in ioam6_genl_delns()
 257 	rhashtable_walk_enter(&nsdata->namespaces, iter);  in ioam6_genl_dumpns_start()
 515 	ns = rhashtable_lookup_fast(&nsdata->namespaces, &ns_id, rht_ns_params);  in ioam6_genl_ns_set_schema()
 627 	return rhashtable_lookup_fast(&nsdata->namespaces, &id, rht_ns_params);  in ioam6_namespace()
 895 	err = rhashtable_init(&nsdata->namespaces, &rht_ns_params);  in ioam6_net_init()
 906 	rhashtable_destroy(&nsdata->namespaces);  in ioam6_net_init()
 917 	rhashtable_free_and_destroy(&nsdata->namespaces, ioam6_free_ns, NULL);  in ioam6_net_exit()
 
 | 
| /Linux-v5.15/Documentation/translations/it_IT/core-api/ | 
| D | index.rst | 11    symbol-namespaces
 | 
| /Linux-v5.15/Documentation/networking/ | 
| D | sysfs-tagging.rst | 15 namespaces to see the same interface that is currently presented in35 the contents of other namespaces' sysfs mounts.  Therefore, when a
 
 | 
| D | netfilter-sysctl.rst | 17 	namespaces. This variable is only accessible from init_net.
 | 
| /Linux-v5.15/Documentation/admin-guide/LSM/ | 
| D | SafeSetID.rst | 66 Use user namespaces73 Unfortunately, it is not generally feasible to use user namespaces in isolation,
 76 entity. For example, Linux has the notion that network namespaces are owned by
 85 configurations. Using user namespaces in isolation causes problems regarding
 86 other system interactions, including use of pid namespaces and device creation.
 
 | 
| /Linux-v5.15/include/net/ | 
| D | ioam6.h | 43 	struct rhashtable namespaces;  member
 | 
| /Linux-v5.15/tools/perf/tests/attr/ | 
| D | system-wide-dummy | 42 namespaces=0
 | 
| /Linux-v5.15/lib/vdso/ | 
| D | Kconfig | 30 	  Selected by architectures which support time namespaces in the
 | 
| /Linux-v5.15/Documentation/driver-api/nvdimm/ | 
| D | nvdimm.rst | 220 reasons to allow multiple BLK namespaces per REGION is so that each263        reclaimed space we create two BLK-aperture "namespaces" from REGION2 and
 270        named "pm1.0", the rest is reclaimed in 4 BLK-aperture namespaces (for
 276        offset (b) are also included in the "blk4.0" and "blk5.0" namespaces.
 277        Note, that this example shows that BLK-aperture namespaces don't need to
 584     2. A region with zero child-namespaces is a possible configuration.  For
 627     the resulting namespaces.  The output from module resolution is more
 745 Idle namespaces are automatically created by the kernel if a given
 766           /* unlike pmem namespaces, blk namespaces have a sector size */
 781        https://www.nvmexpress.org/specifications/), and NFIT namespaces are
 [all …]
 
 | 
| /Linux-v5.15/fs/proc/ | 
| D | Makefile | 27 proc-y	+= namespaces.o
 |