diff options
Diffstat (limited to 'man7/cgroup_namespaces.7')
-rw-r--r-- | man7/cgroup_namespaces.7 | 34 |
1 files changed, 17 insertions, 17 deletions
diff --git a/man7/cgroup_namespaces.7 b/man7/cgroup_namespaces.7 index 10f16c666..c3671a873 100644 --- a/man7/cgroup_namespaces.7 +++ b/man7/cgroup_namespaces.7 @@ -8,10 +8,10 @@ cgroup_namespaces \- overview of Linux cgroup namespaces .SH DESCRIPTION For an overview of namespaces, see -.BR namespaces (7). +.MR namespaces 7 . .P Cgroup namespaces virtualize the view of a process's cgroups (see -.BR cgroups (7)) +.MR cgroups 7 ) as seen via .IR /proc/ pid /cgroup and @@ -23,9 +23,9 @@ locations displayed in the corresponding records in the .IR /proc/ pid /cgroup file. When a process creates a new cgroup namespace using -.BR clone (2) +.MR clone 2 or -.BR unshare (2) +.MR unshare 2 with the .B CLONE_NEWCGROUP flag, its current @@ -79,7 +79,7 @@ hierarchy and put the shell into that cgroup: .in .P Next, we use -.BR unshare (1) +.MR unshare 1 to create a process running a new shell in new cgroup and mount namespaces: .P .in +4n @@ -89,7 +89,7 @@ to create a process running a new shell in new cgroup and mount namespaces: .in .P From the new shell started by -.BR unshare (1), +.MR unshare 1 , we then inspect the .IR /proc/ pid /cgroup files of, respectively, the new shell, @@ -203,9 +203,9 @@ that is namespaced under the cgroup (i.e., .I X was placed in a new cgroup namespace via -.BR clone (2) +.MR clone 2 or -.BR unshare (2) +.MR unshare 2 with the .B CLONE_NEWCGROUP flag). @@ -237,12 +237,12 @@ this prevents process .I X from escaping the limits imposed by ancestor cgroups. .SH SEE ALSO -.BR unshare (1), -.BR clone (2), -.BR setns (2), -.BR unshare (2), -.BR proc (5), -.BR cgroups (7), -.BR credentials (7), -.BR namespaces (7), -.BR user_namespaces (7) +.MR unshare 1 , +.MR clone 2 , +.MR setns 2 , +.MR unshare 2 , +.MR proc 5 , +.MR cgroups 7 , +.MR credentials 7 , +.MR namespaces 7 , +.MR user_namespaces 7 |