(5) Linux Network Namespaces – Background
http://www.opencloudblog.com/?p=116
Namespaces
Managing network namespaces using the ip command is the prefered way. It is helpful to understand, what’s going on in the (kernel) background.
If you create two network namespaces using
you find to entries in the directory /var/run/netns/
Each process has an unique inode assigned. This inode makes it possible to check, if two processes belongs to a name namespace. Look in /proc/self/ns/ to the entry net:
The shell process, which we are using and the namespaces ns1 and ns2 have different net:[] inodes assigned. These inodes are the inodes of the entries in /var/run/netns/ . If this is the default network namespace you will not see an entry.
Network namespaces might also be assigned to PIDs.
Newer versions if ip have the commands ip netns identify PID (This command walks through /var/run/netns and finds all the network namespace names for network namespace of the specified process) and ip netns pids NAME (This command walks through proc and finds all of the process who have the named network namespace as their primary network namespace).
A cat /proc/self/mounts shows the total number of network namespaces in the system:
If you exectute the same command in a network namespace using ip netns exec ns1 cat /proc/self/mounts you get:
Interfaces
If you create a veth pair and assign one side to ns1 and the other sinde to ns2 using the commands
Interfaces may also be assigned to a process:
This attaches the interface veth-f not only to PID 1234, it attaches the interface to the network namespace to which the process 1234 is belonging to. The network namespace survives, even if the process terminates.
How do you find the namespaces to which the interface are belonging to?
How do you find all interfaces in your system and the mapping to network namespaces/pids?
【推荐】国内首个AI IDE,深度理解中文开发场景,立即下载体验Trae
【推荐】编程新体验,更懂你的AI,立即体验豆包MarsCode编程助手
【推荐】抖音旗下AI助手豆包,你的智能百科全书,全免费不限次数
【推荐】轻量又高性能的 SSH 工具 IShell:AI 加持,快人一步
· 基于Microsoft.Extensions.AI核心库实现RAG应用
· Linux系列:如何用heaptrack跟踪.NET程序的非托管内存泄露
· 开发者必知的日志记录最佳实践
· SQL Server 2025 AI相关能力初探
· Linux系列:如何用 C#调用 C方法造成内存泄露
· 无需6万激活码!GitHub神秘组织3小时极速复刻Manus,手把手教你使用OpenManus搭建本
· Manus爆火,是硬核还是营销?
· 终于写完轮子一部分:tcp代理 了,记录一下
· 别再用vector<bool>了!Google高级工程师:这可能是STL最大的设计失误
· 单元测试从入门到精通