X-Git-Url: https://www.chiark.greenend.org.uk/ucgi/~ianmdlvl/git?a=blobdiff_plain;f=man%2Fsystemd-nspawn.xml;h=ffd707092c013d87553066f9ac46ff26a4cd2275;hb=c8a202b7d47f9d6bba3100a208abdadfc383499e;hp=9d8db83e81ba9e845c0fe41f919e58c869b365de;hpb=89f7c8465cd1ab37347dd0c15920bce31e8225df;p=elogind.git diff --git a/man/systemd-nspawn.xml b/man/systemd-nspawn.xml index 9d8db83e8..ffd707092 100644 --- a/man/systemd-nspawn.xml +++ b/man/systemd-nspawn.xml @@ -143,19 +143,6 @@ contain this file out-of-the-box. - - Incompatibility with Auditing - - Note that the kernel auditing subsystem is - currently broken when used together with - containers. We hence recommend turning it off entirely - by booting with audit=0 on the - kernel command line, or by turning it off at kernel - build time. If auditing is enabled in the kernel, - operating systems booted in an nspawn container might - refuse log-in attempts. - - Options @@ -290,7 +277,34 @@ the container. This makes all network interfaces unavailable in the container, with the exception of the - loopback device. + loopback device and those specified + with + . If + this option is specified the + CAP_NET_ADMIN capability will be added + to the set of capabilities the + container retains. The latter may be + disabled by using + . + + + + + + Assign the specified + network interface to the + container. This will move the + specified interface from the calling + namespace and place it in the + container. When the container + terminates it is moved back to the + host namespace. Note that + + implies + . This + option may be used more than once to + add multiple network interfaces to the + container. @@ -324,7 +338,13 @@ CAP_SYS_PTRACE, CAP_SYS_TTY_CONFIG, CAP_SYS_RESOURCE, CAP_SYS_BOOT, CAP_AUDIT_WRITE, - CAP_AUDIT_CONTROL. + CAP_AUDIT_CONTROL. Also CAP_NET_ADMIN + is retained if + is + specified. If the special value + all is passed all + capabilities are + retained.