@@ -165,6 +165,8 @@ read the configuration from `config.json`.
165165
166166** --linux-device-remove-all** =true|false
167167 Remove all devices for linux inside the container. The default is * false* .
168+ This option conflicts with --linux-device-add and --linux-device-remove.
169+ When combined with them, no matter what the options' order is, parse this option first.
168170
169171** --linux-device-cgroup-add** =allow|deny[ ,type=TYPE] [ ,major=MAJOR ] [ ,minor=MINOR] [ ,access=ACCESS ]
170172 Add a device control rule.
@@ -244,6 +246,8 @@ read the configuration from `config.json`.
244246** --linux-namespace-remove-all** =true|false
245247 Removes all namespaces from the set of namespaces configured for a container,
246248 such that the container will effectively run on the host.
249+ This option conflicts with --linux-namespace-add and --linux-namespace-remove.
250+ When combined with them, no matter what the options' order is, parse this option first.
247251
248252** --linux-network-classid** =CLASSID
249253 Specifies network class identifier which will be tagged by container's network packets.
@@ -296,14 +300,16 @@ read the configuration from `config.json`.
296300** --linux-seccomp-kill** =SYSCALL
297301 Specifies syscalls to create seccomp rule to respond with KILL.
298302
299- ** --linux-seccomp-only** == true|false
303+ ** --linux-seccomp-only** =true|false
300304 Option to only export the seccomp section of output
301305
302306** --linux-seccomp-remove** =[ ]
303307 Specifies syscall restrictions to remove from the configuration.
304308
305- ** --linux-seccomp-remove-all** == true|false
309+ ** --linux-seccomp-remove-all** =true|false
306310 Option to remove all syscall restrictions.
311+ This option conflicts with other --linux-seccomp-xxx options.
312+ When combined with them, no matter what the options' order is, parse this option first.
307313
308314** --linux-seccomp-trace** =SYSCALL
309315 Specifies syscalls to create seccomp rule to respond with TRACE.
@@ -374,8 +380,10 @@ read the configuration from `config.json`.
374380** --process-cap-add-permitted** =[ ]
375381 Add Linux permitted capabilities
376382
377- ** --process-cap-drop-all** true|false
383+ ** --process-cap-drop-all** = true|false
378384 Drop all Linux capabilities
385+ This option conflicts with other cap options, as --process-cap-* .
386+ When combined with them, no matter what the options' order is, parse this option first.
379387
380388** --process-cap-drop-ambient** =[ ]
381389 Drop Linux ambient capabilities
@@ -420,6 +428,8 @@ read the configuration from `config.json`.
420428
421429** --process-rlimits-remove-all** =true|false
422430 Remove all resource limits for process inside the container. The default is * false* .
431+ This option conflicts with --linux-rlimits-add and --linux-rlimits-remove.
432+ When combined with them, no matter what the options' order is, parse this option first.
423433
424434** --process-terminal** =true|false
425435 Specifies whether a terminal is attached to the process. The default is * false* .
0 commit comments