Linux Man Page Viewer
The following form allows you to view linux man pages.
unshare [options] program [arguments]
Unshares the indicated namespaces from the parent process and then exe-
cutes the specified program. The namespaces to be unshared are indi-
cated via options. Unshareable namespaces are:
Mounting and unmounting filesystems will not affect the rest of
the system (CLONE_NEWNS flag), except for filesystems which are
explicitly marked as shared (with mount --make-shared; see
/proc/self/mountinfo for the shared flags).
It's recommended to use mount --make-rprivate or mount --make-
rslave after unshare --mount to make sure that mountpoints in
the new namespace are really unshared from parental namespace.
Setting hostname or domainname will not affect the rest of the
system. (CLONE_NEWUTS flag)
The process will have an independent namespace for System V mes-
sage queues, semaphore sets and shared memory segments.
The process will have independent IPv4 and IPv6 stacks, IP rout-
ing tables, firewall rules, the /proc/net and /sys/class/net
directory trees, sockets, etc. (CLONE_NEWNET flag)
Children will have a distinct set of PID to process mappings
from their parent. (CLONE_NEWPID flag)
See clone(2) for the exact semantics of the flags.
Display help text and exit.
Unshare the IPC namespace.
Unshare the mount namespace.
Unshare the network namespace.
a new pid namespace. It also implies creating a new mount
namespace since the /proc mount would otherwise mess up existing
programs on the system. The new proc filesystem is explicitly
mounted as private (by MS_PRIVATE|MS_REC).
unshare(2), clone(2), mount(8)
None known so far.
Mikhail Gusarov <firstname.lastname@example.org>
The unshare command is part of the util-linux package and is available
util-linux July 2013 UNSHARE(1)