diff options
Diffstat (limited to 'man2/setns.2')
-rw-r--r-- | man2/setns.2 | 38 |
1 files changed, 19 insertions, 19 deletions
diff --git a/man2/setns.2 b/man2/setns.2 index 860ee7e10..947240554 100644 --- a/man2/setns.2 +++ b/man2/setns.2 @@ -29,7 +29,7 @@ a file descriptor referring to one of the magic links in a directory (or a bind mount to such a link); .IP \[bu] a PID file descriptor (see -.BR pidfd_open (2)). +.MR pidfd_open 2 ). .P The .I nstype @@ -113,9 +113,9 @@ passed to the caller via a UNIX domain socket.) Since Linux 5.8, .I fd may refer to a PID file descriptor obtained from -.BR pidfd_open (2) +.MR pidfd_open 2 or -.BR clone (2). +.MR clone 2 . In this usage, .BR setns () atomically moves the calling thread into one or more of the same namespaces @@ -176,12 +176,12 @@ For security reasons, a process can't join a new user namespace if it is sharing filesystem-related attributes (the attributes whose sharing is controlled by the -.BR clone (2) +.MR clone 2 .B CLONE_FS flag) with another process. .IP For further details on user namespaces, see -.BR user_namespaces (7). +.MR user_namespaces 7 . .TP Mount namespaces Changing the mount namespace requires that the caller possess both @@ -195,13 +195,13 @@ in the user namespace that owns the target mount namespace. A process can't join a new mount namespace if it is sharing filesystem-related attributes (the attributes whose sharing is controlled by the -.BR clone (2) +.MR clone 2 .B CLONE_FS flag) with another process. .\" Above check is in fs/namespace.c:mntns_install() [3.8 source] .IP See -.BR user_namespaces (7) +.MR user_namespaces 7 for details on the interaction of user namespaces and mount namespaces. .TP PID namespaces @@ -223,7 +223,7 @@ PID namespace is a descendant (child, grandchild, etc.) of, or is the same as, the current PID namespace of the caller. .IP For further details on PID namespaces, see -.BR pid_namespaces (7). +.MR pid_namespaces 7 . .TP Cgroup namespaces In order to reassociate itself with a new cgroup namespace, @@ -311,11 +311,11 @@ glibc 2.14. For further information on the .IR /proc/ pid /ns/ magic links, see -.BR namespaces (7). +.MR namespaces 7 . .P Not all of the attributes that can be shared when a new thread is created using -.BR clone (2) +.MR clone 2 can be changed using .BR setns (). .SH EXAMPLES @@ -334,12 +334,12 @@ The following shell session demonstrates the use of this program in conjunction with the .B CLONE_NEWUTS example program in the -.BR clone (2) +.MR clone 2 man page (complied as a binary named .IR newuts ). .P We begin by executing the example program in -.BR clone (2) +.MR clone 2 in the background. That program creates a child in a separate UTS namespace. The child changes the hostname in its namespace, @@ -410,10 +410,10 @@ main(int argc, char *argv[]) .EE .\" SRC END .SH SEE ALSO -.BR nsenter (1), -.BR clone (2), -.BR fork (2), -.BR unshare (2), -.BR vfork (2), -.BR namespaces (7), -.BR unix (7) +.MR nsenter 1 , +.MR clone 2 , +.MR fork 2 , +.MR unshare 2 , +.MR vfork 2 , +.MR namespaces 7 , +.MR unix 7 |