úÎ$7" %      !"#$ provisionalnon-portable (requires Linux)NoneK!? 8A single group mapping, used with user namespaces. See user_namespaces(7) for more details.7A single user mapping, used with user namespaces. See user_namespaces(7) for more details.A unique namespace id.Types of namespaces. ]Detach the process from one or more namespaces and move it to new ones. See the man page of  unshare(2) for more details. HMove the process to an already existing namespace. See the man page of setns(2) for more details. See also 7 for a slightly higher level version of this function.MMove the process to an already existing namespace. This is a wrapper around  . This function requires /proc to be mounted.NRetrieve the id of a Namespace. Useful for debugging. This function requires /proc to be mounted.SDefine the user mappings for the specified user namespace. This function requires /proc to be mounted. See user_namespaces(7) for more details.TDefine the group mappings for the specified user namespace. This function requires /proc to be mounted. See user_namespaces(7) for more details. 6A file descriptor referring to a namespace file in a /proc/[pid]/ns/ directory.€Specify the namespace type that the file descriptor must refer to. If the two types do not match, the function will fail. Use % to allow any type.The pid( of any process in the target namespace.The type of the namespace.The pid. of any process in the target namespace. Use %+ for the namespace of the calling process.The type of the namespace.The pid3 of any process in the target user namespace. Use %+ for the namespace of the calling process. The mappings.The pid3 of any process in the target user namespace. Use %+ for the namespace of the calling process. The mappings.<Prevent processes in the child user namespace from calling  setgroups;. This is needed if the calling process does not have the  CAP_SETGID% capability in the parent namespace.  & '      !"#$%&'(/linux-namespaces-0.1.3.0-GdYwWFI9ZaT3035P8OhXoUSystem.Linux.Namespaces GroupMapping UserMapping NamespaceID NamespaceIPCNetworkMountPIDUserUTSunshare setNamespaceenterNamespacegetNamespaceIDwriteUserMappingswriteGroupMappings$fReadNamespaceID$fShowNamespaceID$fShowNamespace$fReadNamespace $fEqNamespace$fBoundedNamespace$fEnumNamespace$fEqNamespaceID$fOrdNamespaceID$fEnumNamespaceID$fIntegralNamespaceID$fNumNamespaceID$fRealNamespaceID$fShowUserMapping$fReadUserMapping$fEqUserMapping$fShowGroupMapping$fReadGroupMapping$fEqGroupMappingbaseGHC.BaseNothing