From f9e7b66dbded19d798b883be68b0613749d7b8bb Mon Sep 17 00:00:00 2001 From: Serge Hallyn Date: Wed, 2 Mar 2016 17:53:42 -0800 Subject: Implement support for cgroup namespaces Currently these are supported in #for-next. Signed-off-by: Serge Hallyn --- sys-utils/unshare.1 | 9 +++++++++ 1 file changed, 9 insertions(+) (limited to 'sys-utils/unshare.1') diff --git a/sys-utils/unshare.1 b/sys-utils/unshare.1 index 264f13969..973bc048c 100644 --- a/sys-utils/unshare.1 +++ b/sys-utils/unshare.1 @@ -49,6 +49,11 @@ sockets, etc. (\fBCLONE_NEWNET\fP flag) Children will have a distinct set of PID to process mappings from their parent. (\fBCLONE_NEWPID\fP flag) .TP +.BR "cgroup namespace" +The process will have a virtualized view of \fI/proc\:/self\:/cgroup\fP, and new +cgroup mounts will be rooted at the namespace cgroup root. +(\fBCLONE_NEWCGROUP\fP flag) +.TP .BR "user namespace" The process will have a distinct set of UIDs, GIDs and capabilities. (\fBCLONE_NEWUSER\fP flag) @@ -82,6 +87,10 @@ by bind mount. Unshare the user namespace. If \fIfile\fP is specified then persistent namespace is created by bind mount. .TP +.BR \-C , " \-\-cgroup"[=\fIfile\fP] +Unshare the cgroup namespace. If \fIfile\fP is specified then persistent namespace is created +by bind mount. +.TP .BR \-f , " \-\-fork" Fork the specified \fIprogram\fR as a child process of \fBunshare\fR rather than running it directly. This is useful when creating a new pid namespace. -- cgit v1.2.3-55-g7522