From f9e7b66dbded19d798b883be68b0613749d7b8bb Mon Sep 17 00:00:00 2001 From: Serge Hallyn Date: Wed, 2 Mar 2016 17:53:42 -0800 Subject: Implement support for cgroup namespaces Currently these are supported in #for-next. Signed-off-by: Serge Hallyn --- sys-utils/nsenter.1 | 14 ++++++++++++++ 1 file changed, 14 insertions(+) (limited to 'sys-utils/nsenter.1') diff --git a/sys-utils/nsenter.1 b/sys-utils/nsenter.1 index 79fc2e5c6..ea5992e73 100644 --- a/sys-utils/nsenter.1 +++ b/sys-utils/nsenter.1 @@ -54,6 +54,12 @@ The process will have a distinct set of UIDs, GIDs and capabilities. .RB ( CLONE_\:NEWUSER flag) .TP +.B cgroup namespace +The process will have a virtualized view of \fI/proc\:/self\:/cgroup\fP, and new +cgroup mounts will be rooted at the namespace cgroup root. +.RB ( CLONE_\:NEWCGROUP +flag) +.TP See \fBclone\fP(2) for the exact semantics of the flags. .TP If \fIprogram\fP is not given, then ``${SHELL}'' is run (default: /bin\:/sh). @@ -87,6 +93,9 @@ the PID namespace /proc/\fIpid\fR/ns/user the user namespace .TP +/proc/\fIpid\fR/ns/cgroup +the cgroup namespace +.TP /proc/\fIpid\fR/root the root directory .TP @@ -125,6 +134,11 @@ Enter the user namespace. If no file is specified, enter the user namespace of the target process. If file is specified, enter the user namespace specified by file. See also the \fB\-\-setuid\fR and \fB\-\-setgid\fR options. .TP +\fB\-C\fR, \fB\-\-cgroup\fR[=\fIfile\fR] +Enter the cgroup namespace. If no file is specified, enter the cgroup namespace of +the target process. If file is specified, enter the cgroup namespace specified by +file. +.TP \fB\-G\fR, \fB\-\-setgid\fR \fIgid\fR Set the group ID which will be used in the entered namespace and drop supplementary groups. -- cgit v1.2.3-55-g7522