From: Zbigniew Jędrzejewski-Szmek Date: Wed, 20 Nov 2019 17:35:26 +0000 (+0100) Subject: man: use for capability names in nspawn page X-Git-Tag: v244-rc1~1^2~5 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=ec562515331ee0d1b8de0e1a3364a35762206fa5;p=thirdparty%2Fsystemd.git man: use for capability names in nspawn page --- diff --git a/man/systemd-nspawn.xml b/man/systemd-nspawn.xml index 55809934f14..8a2f792c5e6 100644 --- a/man/systemd-nspawn.xml +++ b/man/systemd-nspawn.xml @@ -754,7 +754,7 @@ container, with the exception of the loopback device and those specified with and configured with . If this - option is specified, the CAP_NET_ADMIN capability will be + option is specified, the CAP_NET_ADMIN capability will be added to the set of capabilities the container retains. The latter may be disabled by using . If this option is not specified (or implied by one of the options @@ -943,17 +943,24 @@ - List one or more additional capabilities to grant the container. - Takes a comma-separated list of capability names, see - capabilities7 + List one or more additional capabilities to grant the container. Takes a + comma-separated list of capability names, see capabilities7 for more information. Note that the following capabilities will be granted in any way: - CAP_AUDIT_CONTROL, CAP_AUDIT_WRITE, CAP_CHOWN, CAP_DAC_OVERRIDE, CAP_DAC_READ_SEARCH, - CAP_FOWNER, CAP_FSETID, CAP_IPC_OWNER, CAP_KILL, CAP_LEASE, CAP_LINUX_IMMUTABLE, - CAP_MKNOD, CAP_NET_BIND_SERVICE, CAP_NET_BROADCAST, CAP_NET_RAW, CAP_SETFCAP, - CAP_SETGID, CAP_SETPCAP, CAP_SETUID, CAP_SYS_ADMIN, CAP_SYS_BOOT, CAP_SYS_CHROOT, - CAP_SYS_NICE, CAP_SYS_PTRACE, CAP_SYS_RESOURCE, CAP_SYS_TTY_CONFIG. Also CAP_NET_ADMIN - is retained if is specified. If the special value - all is passed, all capabilities are retained. + CAP_AUDIT_CONTROL, CAP_AUDIT_WRITE, + CAP_CHOWN, CAP_DAC_OVERRIDE, + CAP_DAC_READ_SEARCH, CAP_FOWNER, + CAP_FSETID, CAP_IPC_OWNER, CAP_KILL, + CAP_LEASE, CAP_LINUX_IMMUTABLE, + CAP_MKNOD, CAP_NET_BIND_SERVICE, + CAP_NET_BROADCAST, CAP_NET_RAW, + CAP_SETFCAP, CAP_SETGID, CAP_SETPCAP, + CAP_SETUID, CAP_SYS_ADMIN, + CAP_SYS_BOOT, CAP_SYS_CHROOT, + CAP_SYS_NICE, CAP_SYS_PTRACE, + CAP_SYS_RESOURCE, CAP_SYS_TTY_CONFIG. Also + CAP_NET_ADMIN is retained if is specified. + If the special value all is passed, all capabilities are retained. If the special value of help is passed, the program will print known capability names and exit.