diff options
| -rw-r--r-- | man7/pid_namespaces.7 | 18 |
1 files changed, 13 insertions, 5 deletions
diff --git a/man7/pid_namespaces.7 b/man7/pid_namespaces.7 index 12f690c4fe..575c58f890 100644 --- a/man7/pid_namespaces.7 +++ b/man7/pid_namespaces.7 @@ -224,7 +224,7 @@ the calling thread. .\" .\" ============================================================ .\" -.SS Miscellaneous +.SS /proc and PID namespaces After creating a new PID namespace, it is useful for the child to change its root directory and mount a new procfs instance at @@ -232,8 +232,13 @@ and mount a new procfs instance at so that tools such as .BR ps (1) work correctly. -.\" mount -t proc proc /proc -(If a new mount namespace is simultaneously created by including +From a shell, the command to mount +.I /proc +is: + + $ mount -t proc proc /proc + +If a new mount namespace is simultaneously created by including .BR CLONE_NEWNS in the .IR flags @@ -243,7 +248,7 @@ or .BR unshare (2)), then it isn't necessary to change the root directory: a new procfs instance can be mounted directly over -.IR /proc .) +.IR /proc . Calling .BR readlink (2) @@ -251,7 +256,10 @@ on the path .I /proc/self yields the process ID of the caller in the PID namespace of the procfs mount (i.e., the PID namespace of the process that mounted the procfs). - +.\" +.\" ============================================================ +.\" +.SS Miscellaneous When a process ID is passed over a UNIX domain socket to a process in a different PID namespace (see the description of .B SCM_CREDENTIALS |
