Provide better cross references for namespace concepts
For each namespace that is discussed, add more explicit references to the corresponding clone(2) flags and add references to relevant section 7 namespace pages. Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
This commit is contained in:
parent
4a3f07352b
commit
f85b9777c2
|
@ -21,10 +21,16 @@ See the \fBEXAMPLES\fR section for more details.
|
|||
The namespaces to be unshared are indicated via options. Unshareable namespaces are:
|
||||
.TP
|
||||
.BR "mount namespace"
|
||||
Mounting and unmounting filesystems will not affect the rest of the system
|
||||
(\fBCLONE_NEWNS\fP flag), except for filesystems which are explicitly marked as
|
||||
Mounting and unmounting filesystems will not affect the rest of the system,
|
||||
except for filesystems which are explicitly marked as
|
||||
shared (with \fBmount --make-shared\fP; see \fI/proc/self/mountinfo\fP or
|
||||
\fBfindmnt -o+PROPAGATION\fP for the \fBshared\fP flags).
|
||||
For further details, see
|
||||
.BR mount_namespaces (7)
|
||||
and the discussion of the
|
||||
.BR CLONE_NEWNS
|
||||
flag in
|
||||
.BR clone (2).
|
||||
.sp
|
||||
.B unshare
|
||||
since util-linux version 2.27 automatically sets propagation to \fBprivate\fP
|
||||
|
@ -35,31 +41,62 @@ Note that \fBprivate\fP is the kernel default.
|
|||
.TP
|
||||
.BR "UTS namespace"
|
||||
Setting hostname or domainname will not affect the rest of the system.
|
||||
(\fBCLONE_NEWUTS\fP flag)
|
||||
For further details, see
|
||||
.BR namespaces (7)
|
||||
and the discussion of the
|
||||
.BR CLONE_NEWUTS
|
||||
flag in
|
||||
.BR clone (2).
|
||||
.TP
|
||||
.BR "IPC namespace"
|
||||
The process will have an independent namespace for System V \%message queues,
|
||||
semaphore sets and shared memory segments. (\fBCLONE_NEWIPC\fP flag)
|
||||
semaphore sets and shared memory segments.
|
||||
For further details, see
|
||||
.BR namespaces (7)
|
||||
and the discussion of the
|
||||
.BR CLONE_NEWIPC
|
||||
flag in
|
||||
.BR clone (2).
|
||||
.TP
|
||||
.BR "network namespace"
|
||||
The process will have independent IPv4 and IPv6 stacks, IP routing tables,
|
||||
firewall rules, the \fI/proc/net\fP and \fI/sys/class/net\fP directory trees,
|
||||
sockets, etc. (\fBCLONE_NEWNET\fP flag)
|
||||
sockets, etc.
|
||||
For further details, see
|
||||
.BR namespaces (7)
|
||||
and the discussion of the
|
||||
.BR CLONE_NEWNET
|
||||
flag in
|
||||
.BR clone (2).
|
||||
.TP
|
||||
.BR "pid namespace"
|
||||
Children will have a distinct set of PID-to-process mappings from their parent.
|
||||
(\fBCLONE_NEWPID\fP flag)
|
||||
For further details, see
|
||||
.BR pid_namespaces (7)
|
||||
and
|
||||
the discussion of the
|
||||
.BR CLONE_NEWPID
|
||||
flag in
|
||||
.BR clone (2).
|
||||
.TP
|
||||
.BR "cgroup namespace"
|
||||
The process will have a virtualized view of \fI/proc\:/self\:/cgroup\fP, and new
|
||||
cgroup mounts will be rooted at the namespace cgroup root.
|
||||
(\fBCLONE_NEWCGROUP\fP flag)
|
||||
For further details, see
|
||||
.BR cgroup_namespaces (7)
|
||||
and the discussion of the
|
||||
.BR CLONE_NEWCGROUP
|
||||
flag in
|
||||
.BR clone (2).
|
||||
.TP
|
||||
.BR "user namespace"
|
||||
The process will have a distinct set of UIDs, GIDs and capabilities.
|
||||
(\fBCLONE_NEWUSER\fP flag)
|
||||
.PP
|
||||
See \fBclone\fR(2) for the exact semantics of the flags.
|
||||
For further details, see
|
||||
.BR user_namespaces (7)
|
||||
and the discussion of the
|
||||
.BR CLONE_NEWUSER
|
||||
flag in
|
||||
.BR clone (2).
|
||||
.SH OPTIONS
|
||||
.TP
|
||||
.BR \-i , " \-\-ipc" [ =\fIfile ]
|
||||
|
|
Loading…
Reference in New Issue