Skip to content
Fetching contributors…
Cannot retrieve contributors at this time
63 lines (62 sloc) 1.81 KB
.\" Process this file with
.\" groff -man -Tascii lscpu.1
.TH UNSHARE 1 "October 2008" "util-linux" "User Commands"
unshare \- run program with some namespaces unshared from parent
.B unshare
.RI [ options ]
.RI [ arguments ]
Unshares specified namespaces from parent process and then executes specified
program. Unshareable namespaces are:
.BR "mount namespace"
mounting and unmounting filesystems will not affect rest of the system
(\fBCLONE_NEWNS\fP flag), except for filesystems which are explicitly marked as
shared (by mount --make-shared). See /proc/self/mountinfo for the shared flags.
.BR "UTS namespace"
setting hostname, domainname will not affect rest of the system
(\fBCLONE_NEWUTS\fP flag).
.BR "IPC namespace"
process will have independent namespace for System V message queues, semaphore
sets and shared memory segments (\fBCLONE_NEWIPC\fP flag).
.BR "network namespace"
process will have independent IPv4 and IPv6 stacks, IP routing tables, firewall
rules, the \fI/proc/net\fP and \fI/sys/class/net\fP directory trees, sockets
etc. (\fBCLONE_NEWNET\fP flag).
See the clone(2) for exact semantics of the flags.
.BR \-h , " \-\-help"
Print a help message,
.BR \-m , " \-\-mount"
Unshare the mount namespace,
.BR \-u , " \-\-uts"
Unshare the UTC namespace,
.BR \-i , " \-\-ipc"
Unshare the IPC namespace,
.BR \-n , " \-\-net"
Unshare the network namespace.
The unshare command drops potential privileges before executing the
target program. This allows to setuid unshare.
unshare(2), clone(2)
None known so far.
Mikhail Gusarov <>
The unshare command is part of the util-linux package and is available from
Jump to Line
Something went wrong with that request. Please try again.