NAME
       unshare - run program with some namespaces unshared from parent
SYNOPSIS
       unshare [options] program [arguments]
DESCRIPTION
       Unshares  specified  namespaces  from  parent process and then executes
       specified program. Unshareable namespaces are:
       mount namespace
              mounting and unmounting filesystems will not affect rest of  the
              system (CLONE_NEWNS flag),
       UTS namespace
              setting  hostname, domainname will not affect rest of the system
              (CLONE_NEWUTS flag),
       IPC namespace
              process will have indpendent  namespace  for  System  V  message
              queues,  semaphore sets and shared memory segments (CLONE_NEWIPC
              flag),
       network namespace
              process will have independent IPv4 and IPv6 stacks,  IP  routing
              tables,   firewall   rules,  the  /proc/net  and  /sys/class/net
              directory trees, sockets etc. (CLONE_NEWNET flag).
       See the clone(2) for exact semantics of the flags.
OPTIONS
       -h, --help
              Print a help message,
       -m, --mount
              Unshare the mount namespace,
       -u, --uts
              Unshare the UTC namespace,
       -i, --ipc
              Unshare the IPC namespace,
       -n, --net
              Unshare the network namespace.
SEE ALSO
       unshare(2), clone(2)
BUGS
       None known so far.
AUTHOR
       Mikhail Gusarov <dottedmag@dottedmag.net>
AVAILABILITY
       The unshare command  is  part  of  the  util-linux-ng  package  and  is
       available from ftp://ftp.kernel.org/pub/linux/utils/util-linux-ng/.