diff options
Diffstat (limited to 'man7/mount_namespaces.7')
-rw-r--r-- | man7/mount_namespaces.7 | 12 |
1 files changed, 6 insertions, 6 deletions
diff --git a/man7/mount_namespaces.7 b/man7/mount_namespaces.7 index d9394f8d8..0ce2feef7 100644 --- a/man7/mount_namespaces.7 +++ b/man7/mount_namespaces.7 @@ -4,7 +4,7 @@ .\" SPDX-License-Identifier: Linux-man-pages-copyleft .\" .\" -.TH mount_namespaces 7 2023-02-10 "Linux man-pages 6.03" +.TH mount_namespaces 7 2023-05-03 "Linux man-pages 6.05.01" .SH NAME mount_namespaces \- overview of Linux mount namespaces .SH DESCRIPTION @@ -608,7 +608,7 @@ Before going further, we show that unbindable mounts are indeed unbindable: # \fBmount \-\-bind /home/cecilia /mntZ\fP mount: wrong fs type, bad option, bad superblock on /home/cecilia, missing codepage or helper program, or other error - +\& In some cases useful info is found in syslog \- try dmesg | tail or so. .EE @@ -977,10 +977,10 @@ mount point before the .BR chroot (1) was performed). .\" -.SH VERSIONS -Mount namespaces first appeared in Linux 2.4.19. .SH STANDARDS -Namespaces are a Linux-specific feature. +Linux. +.SH HISTORY +Linux 2.4.19. .\" .SH NOTES The propagation type assigned to a new mount depends @@ -1014,7 +1014,7 @@ in the new namespace, .BR unshare (1) (since .I util\-linux - 2.27) in turn reverses the step performed by +2.27) in turn reverses the step performed by .BR systemd (1), by making all mounts private in the new namespace. That is, |