-.\" Copyright (c) 2013 by Michael Kerrisk <mtk.manpages@gmail.com>
+.\" Copyright (c) 2013, 2016, 2017 by Michael Kerrisk <mtk.manpages@gmail.com>
.\" and Copyright (c) 2012 by Eric W. Biederman <ebiederm@xmission.com>
.\"
.\" %%%LICENSE_START(VERBATIM)
.\" %%%LICENSE_END
.\"
.\"
-.TH NAMESPACES 7 2018-02-02 "Linux" "Linux Programmer's Manual"
+.TH NAMESPACES 7 2019-08-02 "Linux" "Linux Programmer's Manual"
.SH NAME
namespaces \- overview of Linux namespaces
.SH DESCRIPTION
.BR unshare (2)
in most cases requires the
.BR CAP_SYS_ADMIN
-capability.
+capability, since, in the new namespace,
+the creator will have the power to change global resources
+that are visible to other processes that are subsequently created in,
+or join the namespace.
User namespaces are the exception: since Linux 3.8,
no privilege is required to create a user namespace.
.\"
.TP
.IR max_uts_namespaces
The value in this file defines a per-user limit on the number of
-user namespaces that may be created in the user namespace.
+uts namespaces that may be created in the user namespace.
.PP
Note the following details about these files:
.IP * 3
cannot be used as a means to escape the limits in force
in the current user namespace.
.RE
-.PP
.\"
.\" ==================== Cgroup namespaces ====================
.\"
.SS IPC namespaces (CLONE_NEWIPC)
IPC namespaces isolate certain IPC resources,
namely, System V IPC objects (see
-.BR svipc (7))
+.BR sysvipc (7))
and (since Linux 2.6.30)
.\" commit 7eafd7c74c3f2e67c27621b987b28397110d643f
.\" https://lwn.net/Articles/312232/
and
.BR getdomainname (2).
.PP
+.PP
+When a process creates a new UTS namespace using
+.BR clone (2)
+or
+.BR unshare (2)
+with the
+.BR CLONE_NEWUTS
+flag, the hostname and domain of the new UTS namespace are copied
+from the corresponding values in the caller's UTS namespace.
+.PP
Use of UTS namespaces requires a kernel that is configured with the
.B CONFIG_UTS_NS
option.
.BR mq_overview (7))
refers to this namespace.
.IP *
-It is an PID namespace, and a corresponding mount of a
+It is a PID namespace, and a corresponding mount of a
.BR proc (5)
filesystem refers to this namespace.
.SH EXAMPLE
.BR pid_namespaces (7),
.BR user_namespaces (7),
.BR lsns (8),
+.BR pam_namespace (8),
.BR switch_root (8)