/openbmc/linux/Documentation/admin-guide/sysctl/ |
H A D | user.rst | 15 limits on the number of namespaces and other objects that have 29 who created user namespaces the creation of the object happens 31 limits in the user namespaces of those users. 41 The maximum number of cgroup namespaces that any user in the current 47 The maximum number of ipc namespaces that any user in the current 53 The maximum number of mount namespaces that any user in the current 59 The maximum number of network namespaces that any user in the 65 The maximum number of pid namespaces that any user in the current 71 The maximum number of time namespaces that any user in the current 77 The maximum number of user namespaces that any user in the current [all …]
|
/openbmc/linux/tools/perf/util/ |
H A D | namespaces.c | 40 struct namespaces *namespaces__new(struct perf_record_namespaces *event) in namespaces__new() 42 struct namespaces *namespaces; in namespaces__new() local 46 namespaces = zalloc(sizeof(struct namespaces) + link_info_size); in namespaces__new() 47 if (!namespaces) in namespaces__new() 50 namespaces->end_time = -1; in namespaces__new() 53 memcpy(namespaces->link_info, event->link_info, link_info_size); in namespaces__new() 55 return namespaces; in namespaces__new() 58 void namespaces__free(struct namespaces *namespaces) in namespaces__free() argument 60 free(namespaces); in namespaces__free()
|
H A D | namespaces.h | 24 struct namespaces { struct 30 struct namespaces *namespaces__new(struct perf_record_namespaces *event); argument 31 void namespaces__free(struct namespaces *namespaces);
|
H A D | thread.c | 90 struct namespaces *namespaces, *tmp_namespaces; in thread__delete() local 100 list_for_each_entry_safe(namespaces, tmp_namespaces, in thread__delete() 102 list_del_init(&namespaces->list); in thread__delete() 103 namespaces__free(namespaces); in thread__delete() 145 static struct namespaces *__thread__namespaces(struct thread *thread) in __thread__namespaces() 150 return list_first_entry(thread__namespaces_list(thread), struct namespaces, list); in __thread__namespaces() 153 struct namespaces *thread__namespaces(struct thread *thread) in thread__namespaces() 155 struct namespaces *ns; in thread__namespaces() 167 struct namespaces *new, *curr = __thread__namespaces(thread); in __thread__set_namespaces()
|
/openbmc/linux/Documentation/admin-guide/namespaces/ |
H A D | compatibility-list.rst | 6 may have when creating tasks living in different namespaces. 10 in different other namespaces (the rows): 23 1. Both the IPC and the PID namespaces provide IDs to address 33 2. Intentionally, two equal user IDs in different user namespaces 39 The same is true for the IPC namespaces being shared - two users 40 from different user namespaces should not access the same IPC objects
|
H A D | resource-control.rst | 7 of processes is allowed to switch user ids. With user namespaces 12 kernels that enable user namespaces, and it is further recommended
|
/openbmc/phosphor-logging/tools/phosphor-logging/templates/ |
H A D | elog-gen-template.mako.hpp | 56 namespaces, classname = phosphor_name(name) 59 namespace ${namespaces} 153 % if old_ns != namespaces or old_class != classname: 158 phosphor::logging::${namespaces}::${classname}; 174 phosphor::logging::${namespaces}::${classname};
|
/openbmc/linux/tools/testing/selftests/net/forwarding/ |
H A D | README | 4 One of the nice things about network namespaces is that they allow one 7 Unfortunately, these namespaces can not be used with actual switching 8 ASICs, as their ports can not be migrated to other network namespaces 10 L1-separation provided by namespaces. 26 The VRFs act as lightweight namespaces representing hosts connected to
|
/openbmc/sdbusplus/tools/sdbusplus/ |
H A D | error.py | 34 self.namespaces = [ 40 self.namespaces = "::".join(["sdbusplus", "error"] + self.namespaces)
|
H A D | namedelement.py | 20 self.namespaces = [ 53 return "::".join(self.namespaces)
|
/openbmc/sdbusplus/tools/sdbusplus/templates/ |
H A D | error.hpp.mako | 7 namespace ${error.namespaces} 42 } // namespace ${error.namespaces} 48 using ${e.name} = ${error.namespaces}::${e.CamelCase};
|
/openbmc/linux/Documentation/core-api/ |
H A D | symbol-namespaces.rst | 24 their exported symbols into separate namespaces. That is useful for 27 kernel. As of today, modules that make use of symbols exported into namespaces, 60 Defining namespaces for all symbols of a subsystem can be very verbose and may 90 In order to use symbols that are exported into namespaces, kernel modules need 91 to explicitly import these namespaces. Otherwise the kernel might reject to 93 for the namespaces it uses symbols from. E.g. a module using the 100 This has the side effect, that the imported namespaces of a module can be 128 Missing namespaces imports can easily be detected at build time. In fact,
|
/openbmc/linux/scripts/ |
H A D | nsdeps | 36 local namespaces="$*" 39 for ns in $namespaces; do
|
/openbmc/linux/tools/testing/selftests/net/ |
H A D | pmtu.sh | 1020 setup namespaces routing || return $ksft_skip 1114 setup namespaces policy_routing || return $ksft_skip 1159 setup namespaces policy_routing || return $ksft_skip 1809 setup namespaces veth vti4 || return $ksft_skip 1821 setup namespaces veth vti6 || return $ksft_skip 1833 setup namespaces || return $ksft_skip 1871 setup namespaces || return $ksft_skip 1909 setup namespaces || return $ksft_skip 2077 setup namespaces routing || return $ksft_skip 2131 setup namespaces routing || return $ksft_skip [all …]
|
/openbmc/linux/Documentation/translations/zh_CN/core-api/ |
H A D | symbol-namespaces.rst | 3 :Original: Documentation/core-api/symbol-namespaces.rst 9 .. _cn_symbol-namespaces.rst:
|
/openbmc/linux/net/ipv6/ |
H A D | ioam6.c | 124 ns = rhashtable_lookup_fast(&nsdata->namespaces, &id, rht_ns_params); in ioam6_genl_addns() 151 err = rhashtable_lookup_insert_fast(&nsdata->namespaces, &ns->head, in ioam6_genl_addns() 177 ns = rhashtable_lookup_fast(&nsdata->namespaces, &id, rht_ns_params); in ioam6_genl_delns() 186 err = rhashtable_remove_fast(&nsdata->namespaces, &ns->head, in ioam6_genl_delns() 259 rhashtable_walk_enter(&nsdata->namespaces, iter); in ioam6_genl_dumpns_start() 517 ns = rhashtable_lookup_fast(&nsdata->namespaces, &ns_id, rht_ns_params); in ioam6_genl_ns_set_schema() 630 return rhashtable_lookup_fast(&nsdata->namespaces, &id, rht_ns_params); in ioam6_namespace() 910 err = rhashtable_init(&nsdata->namespaces, &rht_ns_params); in ioam6_net_init() 921 rhashtable_destroy(&nsdata->namespaces); in ioam6_net_init() 932 rhashtable_free_and_destroy(&nsdata->namespaces, ioam6_free_ns, NULL); in ioam6_net_exit()
|
/openbmc/linux/tools/testing/selftests/drivers/net/team/ |
H A D | lag_lib.sh | 91 local namespaces="lag_node1 lag_node2" 94 for n in ${namespaces}; do 107 NAMESPACES="${namespaces}"
|
/openbmc/linux/tools/testing/selftests/drivers/net/bonding/ |
H A D | lag_lib.sh | 91 local namespaces="lag_node1 lag_node2" 94 for n in ${namespaces}; do 107 NAMESPACES="${namespaces}"
|
/openbmc/linux/Documentation/translations/it_IT/core-api/ |
H A D | index.rst | 11 symbol-namespaces
|
/openbmc/u-boot/doc/ |
H A D | README.nvme | 19 is comprised of some number of namespaces, where each namespace is comprised 30 it is able to scan all available namespaces attached to it. Scanning namespace 56 and print out detailed information for controller and namespaces via:
|
/openbmc/openbmc/meta-security/recipes-security/Firejail/ |
H A D | firejail_0.9.72.bb | 4 SUMMARY = "Linux namespaces and seccomp-bpf sandbox" 6 by restricting the running environment of untrusted applications using Linux namespaces, \
|
/openbmc/linux/Documentation/networking/ |
H A D | sysfs-tagging.rst | 15 namespaces to see the same interface that is currently presented in 35 the contents of other namespaces' sysfs mounts. Therefore, when a
|
H A D | netfilter-sysctl.rst | 17 namespaces. This variable is only accessible from init_net.
|
/openbmc/linux/Documentation/admin-guide/LSM/ |
H A D | SafeSetID.rst | 66 Use user namespaces 73 Unfortunately, it is not generally feasible to use user namespaces in isolation, 76 entity. For example, Linux has the notion that network namespaces are owned by 85 configurations. Using user namespaces in isolation causes problems regarding 86 other system interactions, including use of pid namespaces and device creation.
|
/openbmc/linux/include/net/ |
H A D | ioam6.h | 43 struct rhashtable namespaces; member
|