diff options
author | Karel Zak | 2016-03-21 21:08:05 +0100 |
---|---|---|
committer | Karel Zak | 2016-03-21 21:08:05 +0100 |
commit | ca8c69a9f2671d3dbf589736e5a62611d760cb77 (patch) | |
tree | 9ed97eb2c46a8779dd2029dc8736c4d98a628626 /sys-utils/unshare.1 | |
parent | ipcs: consolidate output header printing (diff) | |
parent | Implement support for cgroup namespaces (diff) | |
download | kernel-qcow2-util-linux-ca8c69a9f2671d3dbf589736e5a62611d760cb77.tar.gz kernel-qcow2-util-linux-ca8c69a9f2671d3dbf589736e5a62611d760cb77.tar.xz kernel-qcow2-util-linux-ca8c69a9f2671d3dbf589736e5a62611d760cb77.zip |
Merge branch '2016-03-02/cgns' of https://github.com/hallyn/util-linux
* '2016-03-02/cgns' of https://github.com/hallyn/util-linux:
Implement support for cgroup namespaces
Diffstat (limited to 'sys-utils/unshare.1')
-rw-r--r-- | sys-utils/unshare.1 | 9 |
1 files changed, 9 insertions, 0 deletions
diff --git a/sys-utils/unshare.1 b/sys-utils/unshare.1 index cd873cb46..085a92be0 100644 --- a/sys-utils/unshare.1 +++ b/sys-utils/unshare.1 @@ -50,6 +50,11 @@ sockets, etc. (\fBCLONE_NEWNET\fP flag) Children will have a distinct set of PID-to-process mappings from their parent. (\fBCLONE_NEWPID\fP flag) .TP +.BR "cgroup namespace" +The process will have a virtualized view of \fI/proc\:/self\:/cgroup\fP, and new +cgroup mounts will be rooted at the namespace cgroup root. +(\fBCLONE_NEWCGROUP\fP flag) +.TP .BR "user namespace" The process will have a distinct set of UIDs, GIDs and capabilities. (\fBCLONE_NEWUSER\fP flag) @@ -85,6 +90,10 @@ namespace is created by a bind mount. Unshare the user namespace. If \fIfile\fP is specified, then a persistent namespace is created by a bind mount. .TP +.BR \-C , " \-\-cgroup"[=\fIfile\fP] +Unshare the cgroup namespace. If \fIfile\fP is specified then persistent namespace is created +by bind mount. +.TP .BR \-f , " \-\-fork" Fork the specified \fIprogram\fR as a child process of \fBunshare\fR rather than running it directly. This is useful when creating a new PID namespace. |