aboutsummaryrefslogtreecommitdiffstats
path: root/man2
diff options
context:
space:
mode:
authorMichael Kerrisk <mtk.manpages@gmail.com>2008-11-19 14:23:47 -0500
committerMichael Kerrisk <mtk.manpages@gmail.com>2008-11-25 20:54:07 -0500
commit4df2eb09d1718c5979a640a398e49ce2041f67df (patch)
tree9e162eef71e0888d8ab7dac8c7845f0852c6c5d3 /man2
parent667417b33c102e4b0e39d544fe131eabd54c6442 (diff)
downloadman-pages-4df2eb09d1718c5979a640a398e49ce2041f67df.tar.gz
clone.2, mount.2, unshare.2, proc.5, path_resolution.7: Global fix: s/namespace/mount-point namespace/, as appropriate
In recent times, a number of other namespace flags have been added to clone(2). As such, it is no longer clear to use the generic term "namespace" to refer to the particular namespace controlled by CLONE_NEWNS; instead, use the term "mount-point namespace". Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
Diffstat (limited to 'man2')
-rw-r--r--man2/clone.213
-rw-r--r--man2/mount.223
-rw-r--r--man2/unshare.27
3 files changed, 24 insertions, 19 deletions
diff --git a/man2/clone.2 b/man2/clone.2
index cdae8ecf02..3fa947e382 100644
--- a/man2/clone.2
+++ b/man2/clone.2
@@ -255,9 +255,9 @@ This flag can't be specified in conjunction with
.BR CLONE_SYSVSEM .
.TP
.BR CLONE_NEWNS " (since Linux 2.4.19)"
-Start the child in a new namespace.
+Start the child in a new mount-point namespace.
-Every process lives in a namespace.
+Every process lives in a mount-point namespace.
The
.I namespace
of a process is the data (the set of mounts) describing the file hierarchy
@@ -268,20 +268,21 @@ or
.BR clone ()
where the
.B CLONE_NEWNS
-flag is not set, the child lives in the same namespace as the parent.
+flag is not set, the child lives in the same mount-point
+namespace as the parent.
The system calls
.BR mount (2)
and
.BR umount (2)
-change the namespace of the calling process, and hence affect
+change the mount-point namespace of the calling process, and hence affect
all processes that live in the same namespace, but do not affect
-processes in a different namespace.
+processes in a different mount-point namespace.
After a
.BR clone ()
where the
.B CLONE_NEWNS
-flag is set, the cloned child is started in a new namespace,
+flag is set, the cloned child is started in a new mount-point namespace,
initialized with a copy of the namespace of the parent.
Only a privileged process (one having the \fBCAP_SYS_ADMIN\fP capability)
diff --git a/man2/mount.2 b/man2/mount.2
index 6915c3ac5c..96566df701 100644
--- a/man2/mount.2
+++ b/man2/mount.2
@@ -37,7 +37,7 @@
.\" 2008-10-06, mtk: move umount*() material into separate umount.2 page.
.\" 2008-10-06, mtk: Add discussion of namespaces.
.\"
-.TH MOUNT 2 2008-10-06 "Linux" "Linux Programmer's Manual"
+.TH MOUNT 2 2008-11-19 "Linux" "Linux Programmer's Manual"
.SH NAME
mount \- mount file system
.SH SYNOPSIS
@@ -376,9 +376,12 @@ Since Linux 2.4 the set-user-ID and set-group-ID bits are
just silently ignored in this case.
.\" The change is in patch-2.4.0-prerelease.
.SS Per-process Namespaces
-Starting with kernel 2.4.19, Linux provides per-process namespaces.
-A namespace is the set of file system mounts that are visible to a process.
-Namespaces can be (and usually are) shared between multiple processes,
+Starting with kernel 2.4.19, Linux provides
+per-process mount-point namespaces.
+A mount-point namespace is the set of file system mounts that
+are visible to a process.
+Mount-point namespaces can be (and usually are)
+shared between multiple processes,
and changes to the namespace (i.e., mounts and unmounts) by one process
are visible to all other processes sharing the same namespace.
(The pre-2.4.19 Linux situation can be considered as one in which there
@@ -386,11 +389,11 @@ was a single namespace was shared by every process on the system.)
A child process created by
.BR fork (2)
-shares its parent's namespace;
-the namespace is preserved across an
+shares its parent's mount-point namespace;
+the mount-point namespace is preserved across an
.BR execve (2).
-A process can obtain a private namespace if:
+A process can obtain a private mount-point namespace if:
it was created using the
.BR clone ()
.BR CLONE_NEWNS
@@ -404,7 +407,7 @@ or it calls
with the
.BR CLONE_NEWNS
flag,
-which causes the caller's namespace to obtain a private copy
+which causes the caller's mount-point namespace to obtain a private copy
of the namespace that it was previously sharing with other processes,
so that future mounts and unmounts by the caller are invisible
to other processes (except child processes that the caller
@@ -412,8 +415,8 @@ subsequently creates) and vice versa.
The Linux-specific
.I /proc/PID/self
-file exposes the list of mount points in the namespace of the process with
-the specified ID; see
+file exposes the list of mount points in the mount-point
+namespace of the process with the specified ID; see
.BR proc (5)
for details.
.SH "SEE ALSO"
diff --git a/man2/unshare.2 b/man2/unshare.2
index ed3bd5d90f..0895f01db4 100644
--- a/man2/unshare.2
+++ b/man2/unshare.2
@@ -18,7 +18,7 @@
.\" FIXME Document CLONE_NEWUTS, which is new in 2.6.19
.\" FIXME Document CLONE_SYSVSEM, which is new in 2.6.26
.\"
-.TH UNSHARE 2 2007-07-26 "Linux" "Linux Programmer's Manual"
+.TH UNSHARE 2 2008-11-19 "Linux" "Linux Programmer's Manual"
.SH NAME
unshare \- disassociate parts of the process execution context
.SH SYNOPSIS
@@ -34,7 +34,7 @@ unshare \- disassociate parts of the process execution context
.BR unshare ()
allows a process to disassociate parts of its execution
context that are currently being shared with other processes.
-Part of the execution context, such as the namespace, is shared
+Part of the execution context, such as the mount-point namespace, is shared
implicitly when a new process is created using
.BR fork (2)
or
@@ -87,7 +87,8 @@ effect as the
.BR clone (2)
.B CLONE_NEWNS
flag.
-Unshare the namespace, so that the calling process has a private copy of
+Unshare the mount-point namespace,
+so that the calling process has a private copy of
its namespace which is not shared with any other process.
Specifying this flag automatically implies
.B CLONE_FS