summaryrefslogtreecommitdiffstats
path: root/po/es/man7/cgroup_namespaces.7.po
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-15 19:43:11 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-15 19:43:11 +0000
commitfc22b3d6507c6745911b9dfcc68f1e665ae13dbc (patch)
treece1e3bce06471410239a6f41282e328770aa404a /po/es/man7/cgroup_namespaces.7.po
parentInitial commit. (diff)
downloadmanpages-l10n-fc22b3d6507c6745911b9dfcc68f1e665ae13dbc.tar.xz
manpages-l10n-fc22b3d6507c6745911b9dfcc68f1e665ae13dbc.zip
Adding upstream version 4.22.0.upstream/4.22.0
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'po/es/man7/cgroup_namespaces.7.po')
-rw-r--r--po/es/man7/cgroup_namespaces.7.po399
1 files changed, 399 insertions, 0 deletions
diff --git a/po/es/man7/cgroup_namespaces.7.po b/po/es/man7/cgroup_namespaces.7.po
new file mode 100644
index 00000000..e8447228
--- /dev/null
+++ b/po/es/man7/cgroup_namespaces.7.po
@@ -0,0 +1,399 @@
+# Spanish translation of manpages
+# This file is distributed under the same license as the manpages-l10n package.
+# Copyright © of this file:
+msgid ""
+msgstr ""
+"Project-Id-Version: manpages-l10n 4.11.0\n"
+"POT-Creation-Date: 2024-03-01 16:53+0100\n"
+"PO-Revision-Date: 2021-09-03 21:22+0200\n"
+"Last-Translator: Automatically generated\n"
+"Language-Team: Spanish <debian-l10n-spanish@lists.debian.org>\n"
+"Language: es\n"
+"MIME-Version: 1.0\n"
+"Content-Type: text/plain; charset=UTF-8\n"
+"Content-Transfer-Encoding: 8bit\n"
+"Plural-Forms: nplurals=2; plural=(n != 1);\n"
+
+#. type: TH
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "cgroup_namespaces"
+msgstr ""
+
+#. type: TH
+#: archlinux fedora-40 fedora-rawhide mageia-cauldron
+#, no-wrap
+msgid "2023-10-31"
+msgstr "31 Octubre 2023"
+
+#. type: TH
+#: archlinux fedora-40 fedora-rawhide mageia-cauldron
+#, no-wrap
+msgid "Linux man-pages 6.06"
+msgstr "Páginas de manual de Linux 6.06"
+
+#. type: SH
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "NAME"
+msgstr "NOMBRE"
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid "cgroup_namespaces - overview of Linux cgroup namespaces"
+msgstr ""
+
+#. type: SH
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "DESCRIPTION"
+msgstr "DESCRIPCIÓN"
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid "For an overview of namespaces, see B<namespaces>(7)."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"Cgroup namespaces virtualize the view of a process's cgroups (see "
+"B<cgroups>(7)) as seen via I</proc/>pidI</cgroup> and I</proc/>pidI</"
+"mountinfo>."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"Each cgroup namespace has its own set of cgroup root directories. These "
+"root directories are the base points for the relative locations displayed in "
+"the corresponding records in the I</proc/>pidI</cgroup> file. When a "
+"process creates a new cgroup namespace using B<clone>(2) or B<unshare>(2) "
+"with the B<CLONE_NEWCGROUP> flag, its current cgroups directories become the "
+"cgroup root directories of the new namespace. (This applies both for the "
+"cgroups version 1 hierarchies and the cgroups version 2 unified hierarchy.)"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"When reading the cgroup memberships of a \"target\" process from I</proc/"
+">pidI</cgroup>, the pathname shown in the third field of each record will be "
+"relative to the reading process's root directory for the corresponding "
+"cgroup hierarchy. If the cgroup directory of the target process lies "
+"outside the root directory of the reading process's cgroup namespace, then "
+"the pathname will show I<../> entries for each ancestor level in the cgroup "
+"hierarchy."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"The following shell session demonstrates the effect of creating a new cgroup "
+"namespace."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"First, (as superuser) in a shell in the initial cgroup namespace, we create "
+"a child cgroup in the I<freezer> hierarchy, and place a process in that "
+"cgroup that we will use as part of the demonstration below:"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid ""
+"# B<mkdir -p /sys/fs/cgroup/freezer/sub2>\n"
+"# B<sleep 10000 &> # Create a process that lives for a while\n"
+"[1] 20124\n"
+"# B<echo 20124 E<gt> /sys/fs/cgroup/freezer/sub2/cgroup.procs>\n"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"We then create another child cgroup in the I<freezer> hierarchy and put the "
+"shell into that cgroup:"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid ""
+"# B<mkdir -p /sys/fs/cgroup/freezer/sub>\n"
+"# B<echo $$> # Show PID of this shell\n"
+"30655\n"
+"# B<echo 30655 E<gt> /sys/fs/cgroup/freezer/sub/cgroup.procs>\n"
+"# B<cat /proc/self/cgroup | grep freezer>\n"
+"7:freezer:/sub\n"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"Next, we use B<unshare>(1) to create a process running a new shell in new "
+"cgroup and mount namespaces:"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "# B<PS1=\"sh2# \" unshare -Cm bash>\n"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"From the new shell started by B<unshare>(1), we then inspect the I</proc/"
+">pidI</cgroup> files of, respectively, the new shell, a process that is in "
+"the initial cgroup namespace (I<init>, with PID 1), and the process in the "
+"sibling cgroup (I<sub2>):"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid ""
+"sh2# B<cat /proc/self/cgroup | grep freezer>\n"
+"7:freezer:/\n"
+"sh2# B<cat /proc/1/cgroup | grep freezer>\n"
+"7:freezer:/..\n"
+"sh2# B<cat /proc/20124/cgroup | grep freezer>\n"
+"7:freezer:/../sub2\n"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"From the output of the first command, we see that the freezer cgroup "
+"membership of the new shell (which is in the same cgroup as the initial "
+"shell) is shown defined relative to the freezer cgroup root directory that "
+"was established when the new cgroup namespace was created. (In absolute "
+"terms, the new shell is in the I</sub> freezer cgroup, and the root "
+"directory of the freezer cgroup hierarchy in the new cgroup namespace is "
+"also I</sub>. Thus, the new shell's cgroup membership is displayed as "
+"\\[aq]/\\[aq].)"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"However, when we look in I</proc/self/mountinfo> we see the following "
+"anomaly:"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid ""
+"sh2# B<cat /proc/self/mountinfo | grep freezer>\n"
+"155 145 0:32 /.. /sys/fs/cgroup/freezer ...\n"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"The fourth field of this line (I</..>) should show the directory in the "
+"cgroup filesystem which forms the root of this mount. Since by the "
+"definition of cgroup namespaces, the process's current freezer cgroup "
+"directory became its root freezer cgroup directory, we should see \\[aq]/"
+"\\[aq] in this field. The problem here is that we are seeing a mount entry "
+"for the cgroup filesystem corresponding to the initial cgroup namespace "
+"(whose cgroup filesystem is indeed rooted at the parent directory of "
+"I<sub>). To fix this problem, we must remount the freezer cgroup filesystem "
+"from the new shell (i.e., perform the mount from a process that is in the "
+"new cgroup namespace), after which we see the expected results:"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid ""
+"sh2# B<mount --make-rslave /> # Don\\[aq]t propagate mount events\n"
+" # to other namespaces\n"
+"sh2# B<umount /sys/fs/cgroup/freezer>\n"
+"sh2# B<mount -t cgroup -o freezer freezer /sys/fs/cgroup/freezer>\n"
+"sh2# B<cat /proc/self/mountinfo | grep freezer>\n"
+"155 145 0:32 / /sys/fs/cgroup/freezer rw,relatime ...\n"
+msgstr ""
+
+#. type: SH
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "STANDARDS"
+msgstr "ESTÁNDARES"
+
+#. type: Plain text
+#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron
+#: opensuse-leap-15-6 opensuse-tumbleweed
+msgid "Linux."
+msgstr "Linux."
+
+#. type: SH
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "NOTES"
+msgstr "NOTAS"
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"Use of cgroup namespaces requires a kernel that is configured with the "
+"B<CONFIG_CGROUPS> option."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"The virtualization provided by cgroup namespaces serves a number of purposes:"
+msgstr ""
+
+#. type: IP
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "\\[bu]"
+msgstr "\\[bu]"
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"It prevents information leaks whereby cgroup directory paths outside of a "
+"container would otherwise be visible to processes in the container. Such "
+"leakages could, for example, reveal information about the container "
+"framework to containerized applications."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"It eases tasks such as container migration. The virtualization provided by "
+"cgroup namespaces allows containers to be isolated from knowledge of the "
+"pathnames of ancestor cgroups. Without such isolation, the full cgroup "
+"pathnames (displayed in I</proc/self/cgroups>) would need to be replicated "
+"on the target system when migrating a container; those pathnames would also "
+"need to be unique, so that they don't conflict with other pathnames on the "
+"target system."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"It allows better confinement of containerized processes, because it is "
+"possible to mount the container's cgroup filesystems such that the container "
+"processes can't gain access to ancestor cgroup directories. Consider, for "
+"example, the following scenario:"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid "We have a cgroup directory, I</cg/1>, that is owned by user ID 9000."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"We have a process, I<X>, also owned by user ID 9000, that is namespaced "
+"under the cgroup I</cg/1/2> (i.e., I<X> was placed in a new cgroup namespace "
+"via B<clone>(2) or B<unshare>(2) with the B<CLONE_NEWCGROUP> flag)."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"In the absence of cgroup namespacing, because the cgroup directory I</cg/1> "
+"is owned (and writable) by UID 9000 and process I<X> is also owned by user "
+"ID 9000, process I<X> would be able to modify the contents of cgroups files "
+"(i.e., change cgroup settings) not only in I</cg/1/2> but also in the "
+"ancestor cgroup directory I</cg/1>. Namespacing process I<X> under the "
+"cgroup directory I</cg/1/2>, in combination with suitable mount operations "
+"for the cgroup filesystem (as shown above), prevents it modifying files in "
+"I</cg/1>, since it cannot even see the contents of that directory (or of "
+"further removed cgroup ancestor directories). Combined with correct "
+"enforcement of hierarchical limits, this prevents process I<X> from escaping "
+"the limits imposed by ancestor cgroups."
+msgstr ""
+
+#. type: SH
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "SEE ALSO"
+msgstr "VÉASE TAMBIÉN"
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"B<unshare>(1), B<clone>(2), B<setns>(2), B<unshare>(2), B<proc>(5), "
+"B<cgroups>(7), B<credentials>(7), B<namespaces>(7), B<user_namespaces>(7)"
+msgstr ""
+
+#. type: TH
+#: debian-bookworm
+#, no-wrap
+msgid "2023-02-05"
+msgstr "5 Febrero 2023"
+
+#. type: TH
+#: debian-bookworm
+#, no-wrap
+msgid "Linux man-pages 6.03"
+msgstr "Páginas de manual de Linux 6.03"
+
+#. type: Plain text
+#: debian-bookworm
+msgid "Namespaces are a Linux-specific feature."
+msgstr ""
+
+#. type: TH
+#: debian-unstable opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "2023-03-30"
+msgstr "30 Marzo 2023"
+
+#. type: TH
+#: debian-unstable opensuse-tumbleweed
+#, no-wrap
+msgid "Linux man-pages 6.05.01"
+msgstr "Páginas de manual de Linux 6.05.01"
+
+#. type: TH
+#: opensuse-leap-15-6
+#, no-wrap
+msgid "Linux man-pages 6.04"
+msgstr "Linux man-pages 6.04"