1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
|
# French translation of manpages
# This file is distributed under the same license as the manpages-l10n package.
# Copyright © of this file:
# Christophe Blaess <https://www.blaess.fr/christophe/>, 1996-2003.
# Stéphan Rafin <stephan.rafin@laposte.net>, 2002.
# Thierry Vignaud <tvignaud@mandriva.com>, 1999, 2002.
# François Micaux, 2002.
# Alain Portal <aportal@univ-montp2.fr>, 2003-2008.
# Jean-Philippe Guérard <fevrier@tigreraye.org>, 2005-2006.
# Jean-Luc Coulon (f5ibh) <jean-luc.coulon@wanadoo.fr>, 2006-2007.
# Julien Cristau <jcristau@debian.org>, 2006-2007.
# Thomas Huriaux <thomas.huriaux@gmail.com>, 2006-2008.
# Nicolas François <nicolas.francois@centraliens.net>, 2006-2008.
# Florentin Duneau <fduneau@gmail.com>, 2006-2010.
# Simon Paillard <simon.paillard@resel.enst-bretagne.fr>, 2006, 2013.
# Denis Barbier <barbier@debian.org>, 2006, 2010.
# David Prévot <david@tilapin.org>, 2010, 2012, 2013.
# Cédric Boutillier <cedric.boutillier@gmail.com>, 2011, 2012.
# Frédéric Hantrais <fhantrais@gmail.com>, 2013, 2014.
# Jean-Paul Guillonneau <guillonneau.jeanpaul@free.fr>, 2021.
msgid ""
msgstr ""
"Project-Id-Version: perkamon\n"
"POT-Creation-Date: 2024-03-01 17:03+0100\n"
"PO-Revision-Date: 2022-11-20 09:04+0100\n"
"Last-Translator: Jean-Paul Guillonneau <guillonneau.jeanpaul@free.fr>\n"
"Language-Team: French <debian-l10n-french@lists.debian.org>\n"
"Language: fr\n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
"Plural-Forms: nplurals=2; plural=n > 1;\n"
"X-Generator: vim\n"
#. type: TH
#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
#, fuzzy, no-wrap
#| msgid "See B<pid_namespaces>(7)."
msgid "pid_namespaces"
msgstr "Consultez B<pid_namespaces>(7)."
#. type: TH
#: archlinux fedora-40 fedora-rawhide mageia-cauldron
#, no-wrap
msgid "2023-10-31"
msgstr "31 octobre 2023"
#. type: TH
#: archlinux fedora-40 fedora-rawhide mageia-cauldron
#, no-wrap
msgid "Linux man-pages 6.06"
msgstr "Pages du manuel de Linux 6.06"
#. type: SH
#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
#, no-wrap
msgid "NAME"
msgstr "NOM"
#. type: Plain text
#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
msgid "pid_namespaces - overview of Linux PID namespaces"
msgstr ""
"pid_namespaces - Présentation des espaces de noms d'identifiants de "
"processus (ou PID) sous Linux"
#. type: SH
#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
#, no-wrap
msgid "DESCRIPTION"
msgstr "DESCRIPTION"
#. type: Plain text
#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
msgid "For an overview of namespaces, see B<namespaces>(7)."
msgstr ""
"Pour une présentation générale des espaces de noms, consultez "
"B<namespaces>(7)."
#. type: Plain text
#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
msgid ""
"PID namespaces isolate the process ID number space, meaning that processes "
"in different PID namespaces can have the same PID. PID namespaces allow "
"containers to provide functionality such as suspending/resuming the set of "
"processes in the container and migrating the container to a new host while "
"the processes inside the container maintain the same PIDs."
msgstr ""
"Les espaces de noms PID isolent les espaces de numéros d'identifiants de "
"processus, ce qui signifie que des processus de différents espaces de noms "
"PID peuvent avoir le même PID. Les espaces de noms PID permettent aux "
"conteneurs de fournir des possibilités telles que la suspension et la "
"reprise de l’ensemble des processus d’un conteneur et la migration du "
"conteneur vers un nouvel hôte tout en permettant aux processus du conteneur "
"de conserver leurs PID."
#. type: Plain text
#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
msgid ""
"PIDs in a new PID namespace start at 1, somewhat like a standalone system, "
"and calls to B<fork>(2), B<vfork>(2), or B<clone>(2) will produce processes "
"with PIDs that are unique within the namespace."
msgstr ""
"Dans un nouvel espace de noms PID, la numérotation commence à 1 comme pour "
"un système autonome et les appels à B<fork>(2), B<vfork>(2) ou B<clone>(2) "
"génèrent des identifiants de processus uniques dans l'espace de noms PID."
#
#. ============================================================
#. type: Plain text
#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
msgid ""
"Use of PID namespaces requires a kernel that is configured with the "
"B<CONFIG_PID_NS> option."
msgstr ""
"Le noyau doit avoir été configuré avec l'option B<CONFIG_PID_NS> pour "
"permettre l'utilisation des espaces noms PID."
#. type: SS
#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
#, no-wrap
msgid "The namespace init process"
msgstr "Le processus d'initialisation (init) de l'espace de noms"
#. type: Plain text
#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
msgid ""
"The first process created in a new namespace (i.e., the process created "
"using B<clone>(2) with the B<CLONE_NEWPID> flag, or the first child created "
"by a process after a call to B<unshare>(2) using the B<CLONE_NEWPID> flag) "
"has the PID 1, and is the \"init\" process for the namespace (see "
"B<init>(1)). This process becomes the parent of any child processes that "
"are orphaned because a process that resides in this PID namespace terminated "
"(see below for further details)."
msgstr ""
"Le premier processus créé dans un nouvel espace de noms (c'est-à-dire le "
"processus créé par B<clone>(2) avec l'attribut B<CLONE_NEWPID> ou le premier "
"processus enfant créé après un appel à B<unshare>(2) avec l'attribut "
"B<CLONE_NEWPID>) a pour PID 1. Il est le processus « init » pour l'espace de "
"noms (consultez B<init>(1)). Ce processus devient le parent pour n’importe "
"quel processus enfant qui devient orphelin parce qu’un processus résidant "
"dans cet espace de noms PID se termine (voir ci-après pour plus de détails)."
#. type: Plain text
#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
#, fuzzy
#| msgid ""
#| "If the \"init\" process of a PID namespace terminates, the kernel "
#| "terminates all of the processes in the namespace via a B<SIGKILL> "
#| "signal. This behavior reflects the fact that the \"init\" process is "
#| "essential for the correct operation of a PID namespace. In this case, a "
#| "subsequent B<fork>(2) into this PID namespace fail with the error "
#| "B<ENOMEM>; it is not possible to create a new process in a PID namespace "
#| "whose \"init\" process has terminated. Such scenarios can occur when, "
#| "for example, a process uses an open file descriptor for a I</proc/[pid]/"
#| "ns/pid> file corresponding to a process that was in a namespace to "
#| "B<setns>(2) into that namespace after the \"init\" process has "
#| "terminated. Another possible scenario can occur after a call to "
#| "B<unshare>(2): if the first child subsequently created by a B<fork>(2) "
#| "terminates, then subsequent calls to B<fork>(2) fail with B<ENOMEM>."
msgid ""
"If the \"init\" process of a PID namespace terminates, the kernel terminates "
"all of the processes in the namespace via a B<SIGKILL> signal. This "
"behavior reflects the fact that the \"init\" process is essential for the "
"correct operation of a PID namespace. In this case, a subsequent "
"B<fork>(2) into this PID namespace fail with the error B<ENOMEM>; it is not "
"possible to create a new process in a PID namespace whose \"init\" process "
"has terminated. Such scenarios can occur when, for example, a process uses "
"an open file descriptor for a I</proc/>pidI</ns/pid> file corresponding to a "
"process that was in a namespace to B<setns>(2) into that namespace after "
"the \"init\" process has terminated. Another possible scenario can occur "
"after a call to B<unshare>(2): if the first child subsequently created by a "
"B<fork>(2) terminates, then subsequent calls to B<fork>(2) fail with "
"B<ENOMEM>."
msgstr ""
"Si le processus « init » d'un espace de noms PID se termine, le noyau tue "
"tous les processus de cet espace de noms au moyen du signal B<SIGKILL>. Ce "
"comportement illustre le fait que le processus « init » est essentiel au bon "
"fonctionnement de l'espace de noms PID. Dans ce cas, une commande B<fork>(2) "
"ultérieure dans cet espace de noms PID échouera en renvoyant l'erreur "
"B<ENOMEM>. Il n'est plus possible de créer des processus dans un espace de "
"noms PID dont le processus « init » est terminé. Cela peut, par exemple, se "
"produire lorsqu'un processus utilise un descripteur de fichier ouvert pour "
"un fichier I</proc/[pid]/ns/pid> correspondant à un processus d'un espace de "
"noms pour une réassociation (B<setns>(2)) dans cet espace de noms après que "
"le processus « init » soit terminé. Un autre scénario est possible après un "
"appel à B<unshare>(2) : si le premier enfant créé par un appel à B<fork>(2) "
"se termine, alors les appels ultérieurs à B<fork>(2) échoueront en renvoyant "
"l'erreur B<ENOMEM>."
#. type: Plain text
#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
msgid ""
"Only signals for which the \"init\" process has established a signal handler "
"can be sent to the \"init\" process by other members of the PID namespace. "
"This restriction applies even to privileged processes, and prevents other "
"members of the PID namespace from accidentally killing the \"init\" process."
msgstr ""
"Seuls les signaux pour lesquels le processus « init » a défini un "
"gestionnaire de signal peuvent être envoyés au processus « init » par les "
"autres processus de l'espace de noms PID. Cette règle s'applique également "
"aux processus disposant de privilèges et permet d'éviter qu'un processus "
"membre de l'espace de noms PID ne tue accidentellement le processus « init »."
#. type: Plain text
#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
#, fuzzy
#| msgid ""
#| "Likewise, a process in an ancestor namespace can\\(emsubject to the usual "
#| "permission checks described in B<kill>(2)\\(emsend signals to the "
#| "\"init\" process of a child PID namespace only if the \"init\" process "
#| "has established a handler for that signal. (Within the handler, the "
#| "I<siginfo_t> I<si_pid> field described in B<sigaction>(2) will be "
#| "zero.) B<SIGKILL> or B<SIGSTOP> are treated exceptionally: these signals "
#| "are forcibly delivered when sent from an ancestor PID namespace. Neither "
#| "of these signals can be caught by the \"init\" process, and so will "
#| "result in the usual actions associated with those signals (respectively, "
#| "terminating and stopping the process)."
msgid ""
"Likewise, a process in an ancestor namespace can\\[em]subject to the usual "
"permission checks described in B<kill>(2)\\[em]send signals to the \"init\" "
"process of a child PID namespace only if the \"init\" process has "
"established a handler for that signal. (Within the handler, the "
"I<siginfo_t> I<si_pid> field described in B<sigaction>(2) will be zero.) "
"B<SIGKILL> or B<SIGSTOP> are treated exceptionally: these signals are "
"forcibly delivered when sent from an ancestor PID namespace. Neither of "
"these signals can be caught by the \"init\" process, and so will result in "
"the usual actions associated with those signals (respectively, terminating "
"and stopping the process)."
msgstr ""
"De même, un processus d'un espace ancêtre peut \\(em en tenant compte des "
"vérifications de droits habituelles décrites dans B<kill>(2) \\(em envoyer "
"des signaux au processus « init » d’un espace de noms enfant, à la condition "
"que le processus « init » ait établi un gestionnaire pour ce signal. Le "
"champ I<si_pid> de I<siginfo_t> décrit dans B<sigaction>(2) pour ce "
"gestionnaire vaudra zéro. B<SIGKILL> et B<SIGSTOP> font figure d'exception : "
"ces signaux seront appliqués « de force » lorsqu'ils sont émis depuis un "
"espace de noms PID ancêtre. Ces signaux ne peuvent pas être interceptés par "
"le processus « init » et les actions associées à ces processus seront "
"exécutées (respectivement, tuer ou suspendre l'exécution du processus)."
#
#. ============================================================
#. type: Plain text
#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
msgid ""
"Starting with Linux 3.4, the B<reboot>(2) system call causes a signal to be "
"sent to the namespace \"init\" process. See B<reboot>(2) for more details."
msgstr ""
"Depuis Linux 3.4, l’appel système B<reboot>(2) déclenche l'envoi d'un signal "
"aux processus « init » des espaces de noms. Consultez B<reboot>(2) pour "
"obtenir plus d'informations."
#. type: SS
#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
#, no-wrap
msgid "Nesting PID namespaces"
msgstr "Imbrication des espaces de noms PID"
#. commit f2302505775fd13ba93f034206f1e2a587017929
#. The kernel constant MAX_PID_NS_LEVEL
#. type: Plain text
#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
msgid ""
"PID namespaces can be nested: each PID namespace has a parent, except for "
"the initial (\"root\") PID namespace. The parent of a PID namespace is the "
"PID namespace of the process that created the namespace using B<clone>(2) "
"or B<unshare>(2). PID namespaces thus form a tree, with all namespaces "
"ultimately tracing their ancestry to the root namespace. Since Linux 3.7, "
"the kernel limits the maximum nesting depth for PID namespaces to 32."
msgstr ""
"Les espaces de noms PID peuvent être imbriqués : tous les espaces de noms "
"PID ont un parent, sauf l'espace de noms PID initial (« root »). Le parent "
"d'un espace de noms PID est l'espace de noms PID du processus qui a créé "
"l'espace de noms à l’aide de B<clone>(2) ou B<unshare>(2). Les espaces de "
"noms PID forment donc une arborescence dans laquelle chaque espace de noms "
"peut remonter jusqu'à l'espace « root ». Depuis Linux 3.7, le noyau limite "
"la profondeur maximale d’imbrication pour les espace de noms PID à 32."
#. type: Plain text
#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
msgid ""
"A process is visible to other processes in its PID namespace, and to the "
"processes in each direct ancestor PID namespace going back to the root PID "
"namespace. In this context, \"visible\" means that one process can be the "
"target of operations by another process using system calls that specify a "
"process ID. Conversely, the processes in a child PID namespace can't see "
"processes in the parent and further removed ancestor namespaces. More "
"succinctly: a process can see (e.g., send signals with B<kill>(2), set nice "
"values with B<setpriority>(2), etc.) only processes contained in its own PID "
"namespace and in descendants of that namespace."
msgstr ""
"Un processus est visible de tous les processus de son espace de noms PID, et "
"de tous les processus des espaces de noms PID ancêtres qui le séparent de "
"l'espace PID « root ». Ici, on entend par « visible » qu'un autre processus "
"peut être la cible d’opérations d’un autre processus utilisant des appels "
"système qui précisent l’ID du processus. Inversement, les processus d'un "
"espace de noms PID enfant ne peuvent pas voir les processus de l’espace "
"parent et des espaces de noms ancêtre éloignés. En résumé, un processus peut "
"seulement voir (c'est-à-dire envoyer des signaux avec B<kill>(2), définir "
"des valeurs de courtoisie avec B<setpriority>(2), etc.) les processus de son "
"propre espace de noms PID et des espaces de noms de sa descendance."
#. type: Plain text
#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
msgid ""
"A process has one process ID in each of the layers of the PID namespace "
"hierarchy in which is visible, and walking back though each direct ancestor "
"namespace through to the root PID namespace. System calls that operate on "
"process IDs always operate using the process ID that is visible in the PID "
"namespace of the caller. A call to B<getpid>(2) always returns the PID "
"associated with the namespace in which the process was created."
msgstr ""
"Un processus a un identifiant dans chaque niveau de la hiérarchie des "
"espaces de noms PID dans lequel il est visible, et ce en remontant chaque "
"espace de noms ancêtre jusqu'à l'espace de noms PID « root ». Les appels "
"système qui s'exécutent sur des identifiants de processus s'appliquent à "
"l'identifiant du processus qui est visible dans l’espace de noms PID de "
"l'appelant. Un appel à B<getpid>(2) renvoie toujours le PID associé à "
"l'espace de noms dans lequel le processus a été créé."
#
#. type: Plain text
#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
msgid ""
"Some processes in a PID namespace may have parents that are outside of the "
"namespace. For example, the parent of the initial process in the namespace "
"(i.e., the B<init>(1) process with PID 1) is necessarily in another "
"namespace. Likewise, the direct children of a process that uses "
"B<setns>(2) to cause its children to join a PID namespace are in a "
"different PID namespace from the caller of B<setns>(2). Calls to "
"B<getppid>(2) for such processes return 0."
msgstr ""
"Certains processus d'un espace de noms PID peuvent avoir des parents en "
"dehors de cet espace. Par exemple, le parent du processus initial de "
"l'espace de noms (B<init>(1), processus dont le PID est 1) se trouve "
"forcément en dehors de cet espace. De même, l’enfant direct d'un processus "
"qui a invoqué B<setns>(2) pour que son enfant rejoigne un espace de noms "
"PID, se trouve dans un espace de noms PID différent de celui de l'appelant à "
"B<setns>(2). Les appels à B<getppid>(2) pour de tels processus "
"renvoient B<0>."
#. type: Plain text
#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
msgid ""
"While processes may freely descend into child PID namespaces (e.g., using "
"B<setns>(2) with a PID namespace file descriptor), they may not move in the "
"other direction. That is to say, processes may not enter any ancestor "
"namespaces (parent, grandparent, etc.). Changing PID namespaces is a one-"
"way operation."
msgstr ""
"Alors que les processus peuvent descendre librement dans les espaces de noms "
"enfant (par exemple, en utilisant B<setns>(2) avec un descripteur de fichier "
"d’espace de noms PID), ils ne peuvent pas se déplacer dans l’autre "
"direction. Cela veut dire que les processus ne peuvent entrer dans aucun "
"espace de noms ancêtre (parent, grand-parent, etc.). La modification "
"d’espace de noms PID est une opération à sens unique."
#
#. ============================================================
#. type: Plain text
#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
msgid ""
"The B<NS_GET_PARENT> B<ioctl>(2) operation can be used to discover the "
"parental relationship between PID namespaces; see B<ioctl_ns>(2)."
msgstr ""
"L’opération B<NS_GET_PARENT> d’B<ioctl>(2) peut être utilisée pour découvrir "
"la relation parentale entre les espaces de noms PID. Consultez "
"B<ioctl_ns>(2)."
#. type: SS
#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
#, no-wrap
msgid "setns(2) and unshare(2) semantics"
msgstr "Sémantiques de setns(2) et de unshare(2) "
#. type: Plain text
#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
#, fuzzy
#| msgid ""
#| "Calls to B<setns>(2) that specify a PID namespace file descriptor and "
#| "calls to B<unshare>(2) with the B<CLONE_NEWPID> flag cause children "
#| "subsequently created by the caller to be placed in a different PID "
#| "namespace from the caller. (Since Linux 4.12, that PID namespace is "
#| "shown via the I</proc/[pid]/ns/pid_for_children> file, as described in "
#| "B<namespaces>(7).) These calls do not, however, change the PID namespace "
#| "of the calling process, because doing so would change the caller's idea "
#| "of its own PID (as reported by B<getpid>()), which would break many "
#| "applications and libraries."
msgid ""
"Calls to B<setns>(2) that specify a PID namespace file descriptor and calls "
"to B<unshare>(2) with the B<CLONE_NEWPID> flag cause children subsequently "
"created by the caller to be placed in a different PID namespace from the "
"caller. (Since Linux 4.12, that PID namespace is shown via the I</proc/"
">pidI</ns/pid_for_children> file, as described in B<namespaces>(7).) These "
"calls do not, however, change the PID namespace of the calling process, "
"because doing so would change the caller's idea of its own PID (as reported "
"by B<getpid>()), which would break many applications and libraries."
msgstr ""
"Les appels à B<setns>(2) qui indiquent un descripteur de fichier d'un espace "
"de noms PID et les appels à B<unshare>(2) avec l'attribut B<CLONE_NEWPID> "
"font que les processus enfant qui seront créés par la suite seront placés "
"dans un espace de noms PID différent de celui de l'appelant. Depuis "
"Linux 4.12, cet espace de noms PID est affiché à l’aide du fichier I</proc/"
"[pid]/ns/pid_for_children>, comme décrit dans B<namespaces>(7). Cependant, "
"ces appels ne changent pas l’espace de noms PID du processus appelant, parce "
"que le faire modifierait la perception par l'appelant de son propre PID "
"(comme indiqué dans B<getpid>()), cassant de nombreuses applications et "
"bibliothèques."
#. type: Plain text
#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
msgid ""
"To put things another way: a process's PID namespace membership is "
"determined when the process is created and cannot be changed thereafter. "
"Among other things, this means that the parental relationship between "
"processes mirrors the parental relationship between PID namespaces: the "
"parent of a process is either in the same namespace or resides in the "
"immediate parent PID namespace."
msgstr ""
"Pour présenter les choses différemment, l'appartenance d'un processus à un "
"espace de noms PID est déterminée lors de la création du processus et ne "
"peut plus être changée ensuite. Cela signifie que la relation parent-enfant "
"entre processus reproduit la relation parentale entre des espaces de noms "
"PID : le parent d'un processus est soit dans le même espace de noms, soit "
"dans l'espace de noms PID du parent immédiat."
#
#. ============================================================
#. type: Plain text
#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
#, fuzzy
#| msgid ""
#| "A process may call B<unshare>(2) with the B<CLONE_NEWPID> flag only "
#| "once. After it has performed this operation, its I</proc/PID/ns/"
#| "pid_for_children> symbolic link will be empty until the first child is "
#| "created in the namespace."
msgid ""
"A process may call B<unshare>(2) with the B<CLONE_NEWPID> flag only once. "
"After it has performed this operation, its I</proc/>pidI</ns/"
"pid_for_children> symbolic link will be empty until the first child is "
"created in the namespace."
msgstr ""
"Un processus peut appeler B<unshare>(2) avec l’indicateur B<CLONE_NEWPID> "
"seulement une fois. Après avoir réalisé cette opération, son lien symbolique "
"I</proc/PID/ns/pid_for_children> sera vide jusqu’à la création du premier "
"enfant dans l’espace de noms."
#. type: SS
#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
#, no-wrap
msgid "Adoption of orphaned children"
msgstr "Adoption d’un enfant orphelin"
#. Furthermore, by definition, the parent of the "init" process
#. of a PID namespace resides in the parent PID namespace.
#. ============================================================
#. type: Plain text
#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
msgid ""
"When a child process becomes orphaned, it is reparented to the \"init\" "
"process in the PID namespace of its parent (unless one of the nearer "
"ancestors of the parent employed the B<prctl>(2) B<PR_SET_CHILD_SUBREAPER> "
"command to mark itself as the reaper of orphaned descendant processes). "
"Note that because of the B<setns>(2) and B<unshare>(2) semantics described "
"above, this may be the \"init\" process in the PID namespace that is the "
"I<parent> of the child's PID namespace, rather than the \"init\" process in "
"the child's own PID namespace."
msgstr ""
"Quand un processus enfant devient orphelin, il est réapparenté au processus "
"« init » dans l’espace de noms PID de son parent (sinon un des ancêtres les "
"plus proches du parent employé dans la commande B<PR_SET_CHILD_SUBREAPER> de "
"B<prctl>(2) pour être marqué comme le récupérateur des processus de "
"descendants orphelins). Il est à noter qu’à cause des sémantiques de "
"B<setns>(2) et B<unshare>(2) décrites ci-dessus, cela peut être le processus "
"« init » dans l’espace de noms PID qui est le I<parent> de l’espace de noms "
"PID de l’enfant, plutôt que le processus « init » dans le propre espace de "
"noms PID de l’enfant."
#. type: SS
#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
#, no-wrap
msgid "Compatibility of CLONE_NEWPID with other CLONE_* flags"
msgstr "Compatibilité de CLONE_NEWPID avec les autres attributs CLONE_*"
#. type: Plain text
#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
#, fuzzy
#| msgid ""
#| "In current versions of Linux, B<CLONE_NEWPID> can't be combined with "
#| "B<CLONE_THREAD>. Threads are required to be in the same PID namespace "
#| "such that the threads in a process can send signals to each other. "
#| "Similarly, it must be possible to see all of the threads of a processes "
#| "in the B<proc>(5) filesystem. Additionally, if two threads were in "
#| "different PID namespaces, the process ID of the process sending a signal "
#| "could not be meaningfully encoded when a signal is sent (see the "
#| "description of the I<siginfo_t> type in B<sigaction>(2)). Since this is "
#| "computed when a signal is enqueued, a signal queue shared by processes in "
#| "multiple PID namespaces would defeat that."
msgid ""
"In current versions of Linux, B<CLONE_NEWPID> can't be combined with "
"B<CLONE_THREAD>. Threads are required to be in the same PID namespace such "
"that the threads in a process can send signals to each other. Similarly, it "
"must be possible to see all of the threads of a process in the B<proc>(5) "
"filesystem. Additionally, if two threads were in different PID namespaces, "
"the process ID of the process sending a signal could not be meaningfully "
"encoded when a signal is sent (see the description of the I<siginfo_t> type "
"in B<sigaction>(2)). Since this is computed when a signal is enqueued, a "
"signal queue shared by processes in multiple PID namespaces would defeat "
"that."
msgstr ""
"Dans les versions actuelles de Linux, B<CLONE_NEWPID> ne peut pas être "
"combiné avec B<CLONE_THREAD>. Les threads doivent être dans le même espace "
"de noms PID de telle façon que les threads puissent s’envoyer des signaux "
"les uns aux autres. De la même façon, il doit être possible de voir tous les "
"threads d’un processus dans le système de fichiers B<proc>(5). De plus, si "
"deux threads étaient dans des espaces de noms PID différents, l’ID de "
"processus du processus envoyant un signal ne pourrait pas être encodé "
"judicieusement lors de l’envoi d’un signal (consultez la description du type "
"I<siginfo_t> dans B<sigaction>(2)). Puisque que cela a du sens lorsqu'un "
"signal est mis en file d’attente, une file de signaux partagée par des "
"processus dans plusieurs espaces de noms PID irait à l’encontre de cela."
#
#. Note these restrictions were all introduced in
#. 8382fcac1b813ad0a4e68a838fc7ae93fa39eda0
#. when CLONE_NEWPID|CLONE_VM was disallowed
#. (restriction lifted in faf00da544045fdc1454f3b9e6d7f65c841de302)
#. (restriction lifted in e79f525e99b04390ca4d2366309545a836c03bf1)
#. ============================================================
#. type: Plain text
#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
msgid ""
"In earlier versions of Linux, B<CLONE_NEWPID> was additionally disallowed "
"(failing with the error B<EINVAL>) in combination with B<CLONE_SIGHAND> "
"(before Linux 4.3) as well as B<CLONE_VM> (before Linux 3.12). The changes "
"that lifted these restrictions have also been ported to earlier stable "
"kernels."
msgstr ""
"De plus dans les premières versions de Linux, B<CLONE_NEWPID> n’était pas "
"autorisé (échouant avec l’erreur B<EINVAL>) en combinaison avec "
"B<CLONE_SIGHAND> (avant Linux 4.3) ainsi que B<CLONE_VM> (avant Linux 3.12). "
"Les modifications qui ont apporté ces restrictions ont été aussi portées sur "
"les précédents noyaux stables."
#
#. type: SS
#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
#, no-wrap
msgid "/proc and PID namespaces"
msgstr "/proc et espaces de noms PID"
#. type: Plain text
#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
#, fuzzy
#| msgid ""
#| "A I</proc> filesystem shows (in the I</proc/[pid]> directories) only "
#| "processes visible in the PID namespace of the process that performed the "
#| "mount, even if the I</proc> filesystem is viewed from processes in other "
#| "namespaces."
msgid ""
"A I</proc> filesystem shows (in the I</proc/>pid directories) only processes "
"visible in the PID namespace of the process that performed the mount, even "
"if the I</proc> filesystem is viewed from processes in other namespaces."
msgstr ""
"Un système de fichiers I</proc> ne présente (dans les répertoires I</proc/"
"[pid]>) que les processus visibles dans l'espace de noms PID du processus "
"qui a effectué le montage, même si le système de fichiers I</proc> est vu "
"par des processus appartenant à d'autres espaces de noms."
#. type: Plain text
#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
msgid ""
"After creating a new PID namespace, it is useful for the child to change its "
"root directory and mount a new procfs instance at I</proc> so that tools "
"such as B<ps>(1) work correctly. If a new mount namespace is "
"simultaneously created by including B<CLONE_NEWNS> in the I<flags> argument "
"of B<clone>(2) or B<unshare>(2), then it isn't necessary to change the root "
"directory: a new procfs instance can be mounted directly over I</proc>."
msgstr ""
"Après la création d'un nouvel espace de noms PID, un enfant peut avoir "
"intérêt à changer son répertoire racine et à monter une nouvelle instance "
"procfs sur I</proc> afin d'assurer que des commandes comme B<ps>(1) "
"fonctionneront correctement. Si un nouvel espace de noms montage est créé "
"simultanément en invoquant B<clone>(2) ou B<unshare>(2) avec l'argument "
"B<CLONE_NEWNS>, il n'est alors pas nécessaire de changer le répertoire "
"racine : une nouvelle instance procfs peut être montée directement dans I</"
"proc>."
#. type: Plain text
#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
msgid "From a shell, the command to mount I</proc> is:"
msgstr ""
"Depuis un interpréteur de commandes, la commande permettant de monter I</"
"proc> est :"
#. type: Plain text
#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
#, no-wrap
msgid "$ mount -t proc proc /proc\n"
msgstr "$ mount -t proc proc /proc\n"
#
#. ============================================================
#. type: Plain text
#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
msgid ""
"Calling B<readlink>(2) on the path I</proc/self> yields the process ID of "
"the caller in the PID namespace of the procfs mount (i.e., the PID namespace "
"of the process that mounted the procfs). This can be useful for "
"introspection purposes, when a process wants to discover its PID in other "
"namespaces."
msgstr ""
"L'appel de B<readlink>(2) appliqué au chemin I</proc/self> affiche les "
"identifiants des processus de l'appelant dans l'espace de noms PID du "
"montage procfs (c'est-à-dire l'espace de noms PID du processus qui a monté "
"procfs). Cela peut être utile lorsque qu'un processus a besoin de connaître "
"son PID dans un autre espace de noms. "
#. type: SS
#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
#, no-wrap
msgid "/proc files"
msgstr "Fichiers /proc"
#. type: TP
#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
#, no-wrap
msgid "B</proc/sys/kernel/ns_last_pid> (since Linux 3.3)"
msgstr "I</proc/sys/kernel/ns_last_pid> (depuis Linux 3.3)"
#. commit b8f566b04d3cddd192cfd2418ae6d54ac6353792
#. type: Plain text
#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
msgid ""
"This file (which is virtualized per PID namespace) displays the last PID "
"that was allocated in this PID namespace. When the next PID is allocated, "
"the kernel will search for the lowest unallocated PID that is greater than "
"this value, and when this file is subsequently read it will show that PID."
msgstr ""
"Ce fichier (virtualisé par espace de noms PID) affiche le dernier PID qui a "
"été alloué dans cet espace de noms PID. Quand le prochain PID est alloué, le "
"noyau recherchera le plus petit PID non alloué qui est supérieur à cette "
"valeur, et quand ce fichier est lu ultérieurement, il affiche ce PID."
#
#. This ability is necessary to support checkpoint restore in user-space
#. ============================================================
#. type: Plain text
#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
msgid ""
"This file is writable by a process that has the B<CAP_SYS_ADMIN> or (since "
"Linux 5.9) B<CAP_CHECKPOINT_RESTORE> capability inside the user namespace "
"that owns the PID namespace. This makes it possible to determine the PID "
"that is allocated to the next process that is created inside this PID "
"namespace."
msgstr ""
"Un processus peut écrire sur ce fichier s’il a la capacité B<CAP_SYS_ADMIN> "
"ou (depuis Linux 5.9) B<CAP_CHECKPOINT_RESTORE> à l’intérieur de l’espace de "
"noms utilisateur qui possède l’espace de noms PID. Cela rend possible de "
"déterminer le PID qui est alloué au prochain processus créé dans cet espace "
"de noms PID."
#. type: SS
#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
#, no-wrap
msgid "Miscellaneous"
msgstr "Divers"
#. type: Plain text
#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
msgid ""
"When a process ID is passed over a UNIX domain socket to a process in a "
"different PID namespace (see the description of B<SCM_CREDENTIALS> in "
"B<unix>(7)), it is translated into the corresponding PID value in the "
"receiving process's PID namespace."
msgstr ""
"Lorsqu'un identifiant de processus est transmis à l’aide d’un socket de "
"domaine UNIX à un processus d'un autre espace de noms PID (consultez "
"B<SCM_CREDENTIALS> dans B<unix>(7)), il est transformé pour devenir le PID "
"correspondant dans l'espace de noms PID du processus recevant. "
#. type: SH
#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
#, no-wrap
msgid "STANDARDS"
msgstr "STANDARDS"
#. type: Plain text
#: archlinux debian-unstable fedora-40 fedora-rawhide mageia-cauldron
#: opensuse-leap-15-6 opensuse-tumbleweed
msgid "Linux."
msgstr "Linux."
#. type: SH
#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
#, no-wrap
msgid "EXAMPLES"
msgstr "EXEMPLES"
#. type: Plain text
#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
msgid "See B<user_namespaces>(7)."
msgstr "Consulter B<user_namespaces>(7)."
#. type: SH
#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
#, no-wrap
msgid "SEE ALSO"
msgstr "VOIR AUSSI"
#. type: Plain text
#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
msgid ""
"B<clone>(2), B<reboot>(2), B<setns>(2), B<unshare>(2), B<proc>(5), "
"B<capabilities>(7), B<credentials>(7), B<mount_namespaces>(7), "
"B<namespaces>(7), B<user_namespaces>(7), B<switch_root>(8)"
msgstr ""
"B<clone>(2), B<reboot>(2), B<setns>(2), B<unshare>(2), B<proc>(5), "
"B<capabilities>(7), B<credentials>(7), B<mount_namespaces>(7), "
"B<namespaces>(7), B<user_namespaces>(7), B<switch_root>(8)"
#. type: TH
#: debian-bookworm
#, no-wrap
msgid "2023-02-05"
msgstr "5 février 2023"
#. type: TH
#: debian-bookworm
#, no-wrap
msgid "Linux man-pages 6.03"
msgstr "Pages du manuel de Linux 6.03"
#. type: Plain text
#: debian-bookworm
msgid "Namespaces are a Linux-specific feature."
msgstr "Les espaces de noms sont propres à Linux."
#. type: TH
#: debian-unstable opensuse-leap-15-6 opensuse-tumbleweed
#, no-wrap
msgid "2023-03-30"
msgstr "30 mars 2023"
#. type: TH
#: debian-unstable opensuse-tumbleweed
#, no-wrap
msgid "Linux man-pages 6.05.01"
msgstr "Pages du manuel de Linux 6.05.01"
#. type: TH
#: opensuse-leap-15-6
#, no-wrap
msgid "Linux man-pages 6.04"
msgstr "Pages du manuel de Linux 6.04"
|