Home
last modified time | relevance | path

Searched full:namespace (Results 1 – 25 of 1113) sorted by relevance

12345678910>>...45

/linux-6.14.4/include/uapi/linux/
Dnsfs.h10 /* Returns a file descriptor that refers to an owning user namespace */
12 /* Returns a file descriptor that refers to a parent namespace */
14 /* Returns the type of namespace (CLONE_NEW* value) referred to by
17 /* Get owner UID (in the caller's user namespace) for a user namespace */
19 /* Get the id for a mount namespace */
21 /* Translate pid from target pid namespace into the caller's pid namespace. */
23 /* Return thread-group leader id of pid in the callers pid namespace. */
25 /* Translate pid from caller's pid namespace into a target pid namespace. */
27 /* Return thread-group leader id of pid in the target pid namespace. */
38 /* Get information about namespace. */
[all …]
Dsched.h20 #define CLONE_NEWNS 0x00020000 /* New mount namespace group */
28 #define CLONE_NEWCGROUP 0x02000000 /* New cgroup namespace */
29 #define CLONE_NEWUTS 0x04000000 /* New utsname namespace */
30 #define CLONE_NEWIPC 0x08000000 /* New ipc namespace */
31 #define CLONE_NEWUSER 0x10000000 /* New user namespace */
32 #define CLONE_NEWPID 0x20000000 /* New pid namespace */
33 #define CLONE_NEWNET 0x40000000 /* New network namespace */
44 #define CLONE_NEWTIME 0x00000080 /* New time namespace */
76 * namespace. Each additional element in the array
77 * defines the PID in the parent PID namespace of
[all …]
/linux-6.14.4/tools/testing/selftests/uevent/
Duevent_filtering.c132 "%s - Failed to unshare user namespace\n", in uevent_listener()
142 "%s - Failed to unshare network namespace\n", in uevent_listener()
279 "%s - Failed to unshare user namespace\n", in do_test()
289 "%s - Failed to unshare network namespace\n", in do_test()
382 * - Open uevent listening socket in initial network namespace owned by in TEST()
383 * initial user namespace. in TEST()
384 * - Trigger uevent in initial network namespace owned by initial user in TEST()
385 * namespace. in TEST()
396 * - Open uevent listening socket in non-initial network namespace in TEST()
397 * owned by initial user namespace. in TEST()
[all …]
/linux-6.14.4/Documentation/core-api/
Dsymbol-namespaces.rst25 documentation purposes (think of the SUBSYSTEM_DEBUG namespace) as well as for
28 are required to import the namespace. Otherwise the kernel will, depending on
34 Symbols can be exported into namespace using different methods. All of them are
43 available to export symbols into a certain namespace: EXPORT_SYMBOL_NS() and
44 EXPORT_SYMBOL_NS_GPL(). They take one additional argument: the namespace as a
47 namespace ``USB_STORAGE``, use::
52 ``namespace`` set accordingly. A symbol that is exported without a namespace will
53 refer to ``NULL``. There is no default namespace if none is defined. ``modpost``
54 and kernel/module/main.c make use the namespace at build time or module load
63 and EXPORT_SYMBOL_GPL() macro expansions that do not specify a namespace.
[all …]
/linux-6.14.4/security/apparmor/
Dpolicy_ns.c11 * to be loaded for tasks within the namespace.
28 /* root profile namespace */
34 * @curr: namespace to treat as the parent (NOT NULL)
35 * @view: namespace to test if visible from @curr (NOT NULL)
58 * @curr: current namespace (NOT NULL)
59 * @view: namespace attempting to view (NOT NULL)
66 /* if view == curr then the namespace name isn't displayed */ in aa_ns_name()
99 * alloc_ns - allocate, initialize and return a new namespace
100 * @prefix: parent namespace name (MAYBE NULL)
103 * Returns: refcounted namespace or NULL on failure.
[all …]
/linux-6.14.4/security/apparmor/include/
Dpolicy_ns.h22 /* struct aa_ns_acct - accounting of profiles in namespace
23 * @max_size: maximum space allowed for all profiles in namespace
24 * @max_count: maximum number of profiles that can be in this namespace
35 /* struct aa_ns - namespace for a set of profiles
37 * @parent: parent of namespace
39 * @acct: accounting for the namespace
40 * @unconfined: special unconfined profile for the namespace
41 * @sub_ns: list of namespaces under the current namespace.
43 * @uniq_id: a unique id count for the profiles in the namespace
49 * and profile names within a namespace are guaranteed to be unique. When
[all …]
/linux-6.14.4/Documentation/admin-guide/sysctl/
Duser.rst16 per user per user namespace limits.
24 The creation of per user per user namespace objects are charged to
25 the user in the user namespace who created the object and
26 verified to be below the per user limit in that user namespace.
34 user namespace does not allow a user to escape their current limits.
42 user namespace may create.
48 user namespace may create.
54 user namespace may create.
60 current user namespace may create.
66 user namespace may create.
[all …]
/linux-6.14.4/Documentation/networking/
Dsysfs-tagging.rst11 namespace active multiple devices with the same name can show up in
18 By using the network namespace pointers as tags to separate out
23 Each sysfs directory entry may be tagged with a namespace via the
26 and KOBJ_NS_TYPES, and ns will point to the namespace to which it
30 ``void *ns[KOBJ_NS_TYPES]``. When a task in a tagging namespace
33 ``s_fs_info->ns[kobj_nstype]`` set to the new namespace. Note that
36 namespace exits, it will call kobj_ns_exit() to invalidate any
44 - current_ns() which returns current's namespace
45 - netlink_ns() which returns a socket's namespace
46 - initial_ns() which returns the initial namespace
Dmptcp-sysctl.rst15 The default value matches TCP_RTO_MAX. This is a per-namespace
29 This is a per-namespace sysctl.
44 0 to disable the blackhole detection. This is a per-namespace sysctl.
52 per-namespace sysctl.
62 The default value matches TCP_TIMEWAIT_LEN. This is a per-namespace
71 per-namespace sysctl.
79 per-namespace values configured over the MPTCP netlink
85 This is a per-namespace sysctl.
95 Support for selection of different schedulers. This is a per-namespace
108 This is a per-namespace sysctl.
[all …]
/linux-6.14.4/include/linux/
Dnd.h90 * struct nd_namespace_common - core infrastructure of a namespace
91 * @force_raw: ignore other personalities for the namespace (e.g. btt)
93 * @claim: when set a another personality has taken ownership of the namespace
95 * @rw_bytes: access the raw namespace capacity with byte-aligned transfers
113 * @dev: namespace device created by the nd region driver
116 * @addr: virtual address to access the namespace range
117 * @bb: badblocks list for the namespace range
128 * struct nd_namespace_pmem - namespace device for dimm-backed interleaved memory
130 * @lbasize: logical sector size for the namespace in block-device-mode
131 * @alt_name: namespace name supplied in the dimm label
[all …]
/linux-6.14.4/tools/testing/selftests/pidfd/
Dpidfd_setns_test.c167 TH_LOG("%m - Failed to open %s namespace for process %d", in FIXTURE_SETUP()
175 TH_LOG("%m - Failed to derive %s namespace from pidfd of process %d", in FIXTURE_SETUP()
218 TH_LOG("%m - Failed to unshare mount namespace for process %d", self->pid); in FIXTURE_SETUP()
222 TH_LOG("%m - Failed to unshare cgroup namespace for process %d", self->pid); in FIXTURE_SETUP()
226 TH_LOG("%m - Failed to unshare ipc namespace for process %d", self->pid); in FIXTURE_SETUP()
230 TH_LOG("%m - Failed to unshare uts namespace for process %d", self->pid); in FIXTURE_SETUP()
234 TH_LOG("%m - Failed to unshare net namespace for process %d", self->pid); in FIXTURE_SETUP()
238 TH_LOG("%m - Failed to unshare time namespace for process %d", self->pid); in FIXTURE_SETUP()
272 TH_LOG("%m - Failed to unshare mount namespace for process %d", self->pid); in FIXTURE_SETUP()
276 TH_LOG("%m - Failed to unshare cgroup namespace for process %d", self->pid); in FIXTURE_SETUP()
[all …]
/linux-6.14.4/Documentation/admin-guide/LSM/
DSafeSetID.rst8 allowing a user to set up user namespace UID/GID mappings.
40 namespace). The higher level goal is to allow for uid-based sandboxing of system
69 namespace and give programs in the tree setid capabilities. In this way,
71 own user namespace, and only approved UIDs/GIDs could be mapped back to the
72 initial system user namespace, affectively preventing privilege escalation.
74 without pairing them with other namespace types, which is not always an option.
75 Linux checks for capabilities based off of the user namespace that "owns" some
77 the user namespace in which they were created. A consequence of this is that
78 capability checks for access to a given network namespace are done by checking
79 whether a task has the given capability in the context of the user namespace
[all …]
/linux-6.14.4/tools/testing/selftests/bpf/prog_tests/
Dtest_xdp_veth.c41 char local_veth[VETH_NAME_MAX_LEN]; /* Interface in main namespace */
42 char remote_veth[VETH_NAME_MAX_LEN]; /* Peer interface in dedicated namespace*/
43 const char *namespace; /* Namespace for the remote veth */ member
54 .namespace = "ns-veth11"
61 .namespace = "ns-veth22"
68 .namespace = "ns-veth33"
107 nstoken = open_netns(config[index].namespace); in attach_programs_to_veth_pair()
108 if (!ASSERT_OK_PTR(nstoken, "switch to remote veth namespace")) in attach_programs_to_veth_pair()
133 SYS(fail, "ip netns add %s", config[i].namespace); in configure_network()
135 config[i].local_veth, config[i].remote_veth, config[i].namespace); in configure_network()
[all …]
/linux-6.14.4/Documentation/driver-api/acpi/
Dscan_handlers.rst12 During system initialization and ACPI-based device hot-add, the ACPI namespace
15 registered with the driver core for every device object in the ACPI namespace
16 and the hierarchy of those struct acpi_device objects reflects the namespace
17 layout (i.e. parent device objects in the namespace are represented by parent
26 The core ACPI namespace scanning code in drivers/acpi/scan.c carries out basic
54 The namespace scanning function, acpi_bus_scan(), first registers all of the
55 device nodes in the given namespace scope with the driver core. Then, it tries
68 the namespace scan should be terminated due to a serious error. The error code
71 The namespace trimming function, acpi_bus_trim(), first executes .detach()
72 callbacks from the scan handlers of all device nodes in the given namespace
[all …]
/linux-6.14.4/Documentation/sphinx/
Dload_config.py9 def loadConfig(namespace): argument
12 u"""Load an additional configuration file into *namespace*.
21 and os.path.normpath(namespace["__file__"]) != os.path.normpath(config_file) ):
35 latex_documents = namespace['latex_documents']
44 namespace['latex_documents'] = new_latex_docs
49 config = namespace.copy()
55 namespace.update(config)
57 config = namespace.copy()
59 namespace.update(config)
Dcdomain.py51 # Namespace to be prepended to the full name
52 namespace = None variable
56 # - Store the namespace if ".. c:namespace::" tag is found
58 RE_namespace = re.compile(r'^\s*..\s*c:namespace::\s*(\S+)\s*$')
61 global namespace
63 namespace = match.group(1)
128 # Handle easy Sphinx 3.1+ simple new tags: :c:expr and .. c:namespace::
154 global namespace
188 if namespace:
189 fullname = namespace + "." + fullname
[all …]
/linux-6.14.4/Documentation/driver-api/nvdimm/
Dnvdimm.rst35 LIBNVDIMM/LIBNDCTL: Namespace
36 libnvdimm: namespace
37 libndctl: namespace enumeration example
38 libndctl: namespace creation example
39 Why the Term "namespace"?
85 the namespace. Note that traditional partition tables, GPT/MBR, are
86 layered on top of a PMEM namespace, or an address abstraction like BTT
108 NVDIMM Namespace:
140 namespace label index block is found), then no block device is created
181 single PMEM namespace is created in the REGION0-SPA-range that spans most
[all …]
/linux-6.14.4/Documentation/firmware-guide/acpi/
Dnamespace.rst5 ACPI Device Tree - Representation of ACPI Namespace
17 The Linux ACPI subsystem converts ACPI namespace objects into a Linux
42 data structure called the ACPI namespace whose topology reflects the
69 | ACPI Namespace |
80 Example ACPI Namespace
83 All definition blocks are loaded into a single namespace. The namespace
86 namespace:
93 5. The '\' symbol represents the root of the namespace (i.e. names
94 prepended with '\' are relative to the namespace root).
95 6. The '^' symbol represents the parent of the current namespace node
[all …]
/linux-6.14.4/drivers/acpi/acpica/
Dnsload.c4 * Module Name: nsload - namespace loading/expanding/contracting procedures
36 * DESCRIPTION: Load one ACPI table into the namespace
47 /* If table already loaded into namespace, just return */ in acpi_ns_load_table()
55 "**** Loading table into namespace ****\n")); in acpi_ns_load_table()
63 * Parse the table and load the namespace with all named in acpi_ns_load_table()
66 * parsed until the entire namespace is loaded, because in acpi_ns_load_table()
76 * On error, delete any namespace objects created by this table. in acpi_ns_load_table()
79 * AE_ALREADY_EXISTS - namespace collision. in acpi_ns_load_table()
82 * namespace, as per the ACPI specification. in acpi_ns_load_table()
143 * Load the namespace. The DSDT is required, in acpi_ns_load_namespace()
[all …]
/linux-6.14.4/tools/perf/trace/beauty/include/uapi/linux/
Dsched.h20 #define CLONE_NEWNS 0x00020000 /* New mount namespace group */
28 #define CLONE_NEWCGROUP 0x02000000 /* New cgroup namespace */
29 #define CLONE_NEWUTS 0x04000000 /* New utsname namespace */
30 #define CLONE_NEWIPC 0x08000000 /* New ipc namespace */
31 #define CLONE_NEWUSER 0x10000000 /* New user namespace */
32 #define CLONE_NEWPID 0x20000000 /* New pid namespace */
33 #define CLONE_NEWNET 0x40000000 /* New network namespace */
44 #define CLONE_NEWTIME 0x00000080 /* New time namespace */
76 * namespace. Each additional element in the array
77 * defines the PID in the parent PID namespace of
[all …]
/linux-6.14.4/tools/testing/selftests/bpf/
Dtest_tunnel.sh9 # root namespace | at_ns0 namespace
24 # Root namespace with metadata-mode tunnel + BPF
29 # Namespace at_ns0 with native tunnel
37 # Most of the tests start by namespace creation, device configuration,
39 # from root namespace, the following operations happen:
44 # 4) veth0's ingress queue receive the tunneled packet at namespace at_ns0
74 # at_ns0 namespace
81 # root namespace
96 # at_ns0 namespace
105 # root namespace
[all …]
/linux-6.14.4/drivers/nvdimm/
Dlabel.h20 NSLABEL_FLAG_LOCAL = 0x2, /* DIMM-local namespace */
21 NSLABEL_FLAG_BTT = 0x4, /* namespace contains a BTT */
102 * struct nvdimm_efi_label - namespace superblock
111 * @rawsize: size of namespace
113 * @align: physical address alignment of the namespace
145 * @type: uuid identifying this label format (namespace)
146 * @uuid: uuid for the namespace this label describes
147 * @name: friendly name for the namespace
149 * @nrange: discontiguous namespace support
152 * @rawsize: size of this label's contribution to namespace
[all …]
/linux-6.14.4/kernel/
Duser_namespace.c46 * anything as the capabilities are bound to the new user namespace. in set_cred_user_ns()
75 * Create a new user namespace, deriving the creator from the user in the
77 * new namespace.
102 * mount namespace which allows all files to be accessed. in create_user_ns()
108 /* The creator needs a mapping in the parent user namespace in create_user_ns()
133 /* Leave the new->user_ns reference with the new user namespace. */ in create_user_ns()
399 * make_kuid - Map a user-namespace uid pair into a kuid.
400 * @ns: User namespace that the uid is in
403 * Maps a user-namespace uid pair into a kernel internal kuid,
406 * When there is no mapping defined for the user-namespace uid
[all …]
/linux-6.14.4/tools/testing/selftests/drivers/net/lib/sh/
Dlib_netcons.sh26 # NAMESPACE will be populated by setup_ns with a random value
27 NAMESPACE=""
60 exec {NAMESPACE_FD}</var/run/netns/"${NAMESPACE}"
63 # Bind the dst interface to namespace
64 ip link set "${DSTIF}" netns "${NAMESPACE}"
66 # Linking one device to the other one (on the other namespace}
77 ip netns exec "${NAMESPACE}" ip addr add "${DSTIP}"/24 dev "${DSTIF}"
78 ip netns exec "${NAMESPACE}" ip link set "${DSTIF}" up
86 setup_ns NAMESPACE
89 # namespace
[all …]
/linux-6.14.4/drivers/nvme/host/
Dconstants.c38 [nvme_admin_ns_mgmt] = "Namespace Management",
42 [nvme_admin_ns_attach] = "Namespace Attach",
77 [NVME_SC_INVALID_NS] = "Invalid Namespace or Format",
98 [NVME_SC_NS_WRITE_PROTECTED] = "Namespace is Write Protected",
105 [NVME_SC_NS_NOT_READY] = "Namespace Not Ready",
123 [NVME_SC_FEATURE_NOT_PER_NS] = "Feature Not Namespace Specific",
129 [NVME_SC_NS_INSUFFICIENT_CAP] = "Namespace Insufficient Capacity",
130 [NVME_SC_NS_ID_UNAVAILABLE] = "Namespace Identifier Unavailable",
131 [NVME_SC_NS_ALREADY_ATTACHED] = "Namespace Already Attached",
132 [NVME_SC_NS_IS_PRIVATE] = "Namespace Is Private",
[all …]

12345678910>>...45