Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
I
iproute2
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
Kirill Smelkov
iproute2
Commits
ee9b3477
Commit
ee9b3477
authored
Mar 15, 2015
by
Vadim Kochan
Committed by
Stephen Hemminger
Mar 15, 2015
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
man ip-netns: Notice about loose device when do 'del'
Signed-off-by:
Vadim Kochan
<
vadim4j@gmail.com
>
parent
8ce21c6b
Changes
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
22 additions
and
3 deletions
+22
-3
man/man8/ip-netns.8
man/man8/ip-netns.8
+22
-3
No files found.
man/man8/ip-netns.8
View file @
ee9b3477
...
...
@@ -46,6 +46,9 @@ ip-netns \- process network namespace management
A network namespace is logically another copy of the network stack,
with its own routes, firewall rules, and network devices.
By default process inherits network namespace from its parent. Initially all
the processes share the same default network namespace from the init process.
By convention a named network namespace is an object at
.BR "/var/run/netns/" NAME
that can be opened. The file descriptor resulting from opening
...
...
@@ -88,14 +91,30 @@ network namespace and assigns NAME.
.sp
If NAME is present in /var/run/netns it is umounted and the mount
point is removed. If this is the last user of the network namespace the
network namespace will be freed, otherwise the network namespace
persists until it has no more users. ip netns delete may fail if
the mount point is in use in another mount namespace.
network namespace will be freed and all physical devices will be moved to the
default one, otherwise the network namespace persists until it has no more
users. ip netns delete may fail if the mount point is in use in another mount
namespace.
If
.B -all
option was specified then all the network namespace names will be removed.
It is possible to lose the physical device when it was moved to netns and
then this netns was deleted with a running process:
$ ip netns add net0
$ ip link set dev eth0 netns net0
$ ip netns exec net0 SOME_PROCESS_IN_BACKGROUND
$ ip netns del net0
and eth0 will appear in the default netns only after SOME_PROCESS_IN_BACKGROUND
will exit or will be killed. To prevent this the processes running in net0
should be killed before deleting the netns:
$ ip netns pids net0 | xargs kill
$ ip netns del net0
.TP
.B ip netns set NAME NETNSID - assign an id to a peer network namespace
.sp
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment