X-Git-Url: https://www.chiark.greenend.org.uk/ucgi/~ianmdlvl/git?a=blobdiff_plain;f=man%2Fsystemd-nspawn.xml;h=dbd2ff5a8add5448ea0a2c0dc1e40473cb593d25;hb=15e9fbd851c15ecaad4888932584f37dcd26111a;hp=667e75c2cd70dd131c0572ce0bef4bdd517276ca;hpb=2b583ce6576d4a074ce6f1570b3e60b65c64ae7d;p=elogind.git
diff --git a/man/systemd-nspawn.xml b/man/systemd-nspawn.xml
index 667e75c2c..dbd2ff5a8 100644
--- a/man/systemd-nspawn.xml
+++ b/man/systemd-nspawn.xml
@@ -61,7 +61,7 @@
container. In many ways it is similar to
chroot1,
but more powerful since it fully virtualizes the file
- system hierachy, as well as the process tree, the
+ system hierarchy, as well as the process tree, the
various IPC subsystems and the host and domain
name.
@@ -69,11 +69,12 @@
to various kernel interfaces in the container to
read-only, such as /sys,
/proc/sys or
- /selinux. Network interfaces and
- the system clock may not be changed from within the
- container. Device nodes may not be created. The host
- system cannot be rebooted and kernel modules may not
- be loaded from within the container.
+ /sys/fs/selinux. Network
+ interfaces and the system clock may not be changed
+ from within the container. Device nodes may not be
+ created. The host system cannot be rebooted and kernel
+ modules may not be loaded from within the
+ container.
Note that even though these security precautions
are taken systemd-nspawn is not
@@ -106,7 +107,7 @@
Note that running two
systemd-nspawn containers from the
same directory tree will not make processes in them
- see each other. The PID namespace seperation of the
+ see each other. The PID namespace separation of the
two containers is complete and the containers will
share very few runtime objects except for the
underlying file system.
@@ -123,6 +124,7 @@
+ Prints a short help
text and exits.
@@ -130,7 +132,7 @@
-
+ Directory to use as
file system root for the namespace
@@ -139,6 +141,29 @@
used.
+
+
+
+
+ Run the command
+ under specified user, create home
+ directory and cd into it. As rest
+ of systemd-nspawn, this is not
+ the security feature and limits
+ against accidental changes only.
+
+
+
+
+
+
+ Turn off networking in
+ the container. This makes all network
+ interfaces unavailable in the
+ container, with the exception of the
+ loopback device.
+
+
@@ -160,7 +185,7 @@
Example 2# mock --init
-# systemd-nspawn -D /var/lib/mock/fedora-rawhide-x86_64/root/ /bin/systemd systemd.log_level=debug
+# systemd-nspawn -D /var/lib/mock/fedora-rawhide-x86_64/root/ /sbin/init systemd.log_level=debug
This installs a minimal Fedora distribution into
a subdirectory of /var/lib/mock/
@@ -182,7 +207,7 @@
systemd1,
chroot1,
- debootstrap8
+ debootstrap8,
mock1