Home
last modified time | relevance | path

Searched refs:namespaces (Results 1 – 20 of 20) sorted by relevance

/linux-3.4.99/Documentation/namespaces/
Dcompatibility-list.txt4 may have when creating tasks living in different namespaces.
8 in different other namespaces (the rows):
18 1. Both the IPC and the PID namespaces provide IDs to address
28 2. Intentionally, two equal user IDs in different user namespaces
34 The same is true for the IPC namespaces being shared - two users
35 from different user namespaces should not access the same IPC objects
/linux-3.4.99/net/
Dsysctl_net.c34 net_ctl_header_lookup(struct ctl_table_root *root, struct nsproxy *namespaces) in net_ctl_header_lookup() argument
36 return &namespaces->net_ns->sysctls; in net_ctl_header_lookup()
63 struct nsproxy *namespaces, struct ctl_table *table) in net_ctl_ro_header_perms() argument
65 if (net_eq(namespaces->net_ns, &init_net)) in net_ctl_ro_header_perms()
/linux-3.4.99/Documentation/filesystems/
Dsysfs-tagging.txt12 namespaces to see the same interface that is currently presented in
21 namespaces. A sysfs_dirent is augmented with a void *s_ns. If a
32 the contents of other namespaces' sysfs mounts. Therefore, when a
D00-INDEX98 - a description of shared subtrees for namespaces.
Dsharedsubtree.txt167 namespaces.
196 namespaces. But namespaces are associated with processes. If
197 namespaces are made first class objects with user API to
/linux-3.4.99/fs/proc/
DMakefile23 proc-y += namespaces.o
Dproc_sysctl.c52 struct ctl_table **pentry, struct nsproxy *namespaces);
288 lookup_header_set(struct ctl_table_root *root, struct nsproxy *namespaces) in lookup_header_set() argument
292 set = root->lookup(root, namespaces); in lookup_header_set()
964 struct ctl_table **pentry, struct nsproxy *namespaces) in sysctl_follow_link() argument
976 set = lookup_header_set(root, namespaces); in sysctl_follow_link()
/linux-3.4.99/Documentation/ABI/stable/
Dsysfs-firmware-efi-vars11 into separate namespaces through the use of a vendor
/linux-3.4.99/include/linux/
Dsysctl.h1067 struct nsproxy *namespaces);
1069 struct nsproxy *namespaces, struct ctl_table *table);
/linux-3.4.99/drivers/block/
Dnvme.c78 struct list_head namespaces; member
1500 list_add_tail(&ns->list, &dev->namespaces); in nvme_dev_add()
1502 list_for_each_entry(ns, &dev->namespaces, list) in nvme_dev_add()
1508 list_for_each_entry_safe(ns, next, &dev->namespaces, list) { in nvme_dev_add()
1528 list_for_each_entry_safe(ns, next, &dev->namespaces, list) { in nvme_dev_remove()
1599 INIT_LIST_HEAD(&dev->namespaces); in nvme_probe()
/linux-3.4.99/Documentation/security/
DYama.txt46 so that any otherwise allowed process (even those in external pid namespaces)
DSmack.txt301 namespaces and access requests are only required to match the object in
/linux-3.4.99/Documentation/
Dunshare.txt55 resources is not possible. Since namespaces are shared by default
61 2.1 Per-security context namespaces
72 can benefit from setting up private namespaces at login and
D00-INDEX239 namespaces/
240 - directory with various information about namespaces
Dgpio.txt379 two logically distinct namespaces (GPIO 0 need not use IRQ 0). You can
/linux-3.4.99/Documentation/networking/
Dnetdev-features.txt145 network namespaces (e.g. loopback).
/linux-3.4.99/fs/
DKconfig159 security.* namespaces.
/linux-3.4.99/init/
DKconfig809 different namespaces.
826 different IPC objects in different namespaces.
833 This allows containers, i.e. vservers, to use user namespaces
841 Support process id namespaces. This allows having multiple
843 pid namespaces. This is a building block of containers.
/linux-3.4.99/drivers/tty/
DKconfig118 If you want to have isolated PTY namespaces (eg: in containers),
/linux-3.4.99/Documentation/cgroups/
Dcgroups.txt85 namespaces. These all require the basic notion of a