summaryrefslogtreecommitdiffstats
path: root/man2/setns.2
diff options
context:
space:
mode:
Diffstat (limited to 'man2/setns.2')
-rw-r--r--man2/setns.238
1 files changed, 19 insertions, 19 deletions
diff --git a/man2/setns.2 b/man2/setns.2
index 860ee7e10..947240554 100644
--- a/man2/setns.2
+++ b/man2/setns.2
@@ -29,7 +29,7 @@ a file descriptor referring to one of the magic links in a
directory (or a bind mount to such a link);
.IP \[bu]
a PID file descriptor (see
-.BR pidfd_open (2)).
+.MR pidfd_open 2 ).
.P
The
.I nstype
@@ -113,9 +113,9 @@ passed to the caller via a UNIX domain socket.)
Since Linux 5.8,
.I fd
may refer to a PID file descriptor obtained from
-.BR pidfd_open (2)
+.MR pidfd_open 2
or
-.BR clone (2).
+.MR clone 2 .
In this usage,
.BR setns ()
atomically moves the calling thread into one or more of the same namespaces
@@ -176,12 +176,12 @@ For security reasons,
a process can't join a new user namespace if it is sharing
filesystem-related attributes
(the attributes whose sharing is controlled by the
-.BR clone (2)
+.MR clone 2
.B CLONE_FS
flag) with another process.
.IP
For further details on user namespaces, see
-.BR user_namespaces (7).
+.MR user_namespaces 7 .
.TP
Mount namespaces
Changing the mount namespace requires that the caller possess both
@@ -195,13 +195,13 @@ in the user namespace that owns the target mount namespace.
A process can't join a new mount namespace if it is sharing
filesystem-related attributes
(the attributes whose sharing is controlled by the
-.BR clone (2)
+.MR clone 2
.B CLONE_FS
flag) with another process.
.\" Above check is in fs/namespace.c:mntns_install() [3.8 source]
.IP
See
-.BR user_namespaces (7)
+.MR user_namespaces 7
for details on the interaction of user namespaces and mount namespaces.
.TP
PID namespaces
@@ -223,7 +223,7 @@ PID namespace is a descendant (child, grandchild, etc.)
of, or is the same as, the current PID namespace of the caller.
.IP
For further details on PID namespaces, see
-.BR pid_namespaces (7).
+.MR pid_namespaces 7 .
.TP
Cgroup namespaces
In order to reassociate itself with a new cgroup namespace,
@@ -311,11 +311,11 @@ glibc 2.14.
For further information on the
.IR /proc/ pid /ns/
magic links, see
-.BR namespaces (7).
+.MR namespaces 7 .
.P
Not all of the attributes that can be shared when
a new thread is created using
-.BR clone (2)
+.MR clone 2
can be changed using
.BR setns ().
.SH EXAMPLES
@@ -334,12 +334,12 @@ The following shell session demonstrates the use of this program
in conjunction with the
.B CLONE_NEWUTS
example program in the
-.BR clone (2)
+.MR clone 2
man page (complied as a binary named
.IR newuts ).
.P
We begin by executing the example program in
-.BR clone (2)
+.MR clone 2
in the background.
That program creates a child in a separate UTS namespace.
The child changes the hostname in its namespace,
@@ -410,10 +410,10 @@ main(int argc, char *argv[])
.EE
.\" SRC END
.SH SEE ALSO
-.BR nsenter (1),
-.BR clone (2),
-.BR fork (2),
-.BR unshare (2),
-.BR vfork (2),
-.BR namespaces (7),
-.BR unix (7)
+.MR nsenter 1 ,
+.MR clone 2 ,
+.MR fork 2 ,
+.MR unshare 2 ,
+.MR vfork 2 ,
+.MR namespaces 7 ,
+.MR unix 7