@@ -165,6 +165,8 @@ read the configuration from `config.json`.
165165
166166** --linux-device-remove-all** =true|false
167167 Remove all devices for linux inside the container. The default is * false* .
168+ This option conflicts with --linux-device-add and --linux-device-remove.
169+ When combined with them, no matter what the options' order is, parse this option first.
168170
169171** --linux-device-cgroup-add** =allow|deny[ ,type=TYPE] [ ,major=MAJOR ] [ ,minor=MINOR] [ ,access=ACCESS ]
170172 Add a device control rule.
@@ -241,6 +243,8 @@ read the configuration from `config.json`.
241243** --linux-namespace-remove-all** =true|false
242244 Removes all namespaces from the set of namespaces configured for a container,
243245 such that the container will effectively run on the host.
246+ This option conflicts with --linux-namespace-add and --linux-namespace-remove.
247+ When combined with them, no matter what the options' order is, parse this option first.
244248
245249** --linux-network-classid** =CLASSID
246250 Specifies network class identifier which will be tagged by container's network packets.
@@ -293,14 +297,16 @@ read the configuration from `config.json`.
293297** --linux-seccomp-kill** =SYSCALL
294298 Specifies syscalls to create seccomp rule to respond with KILL.
295299
296- ** --linux-seccomp-only** == true|false
300+ ** --linux-seccomp-only** =true|false
297301 Option to only export the seccomp section of output
298302
299303** --linux-seccomp-remove** =[ ]
300304 Specifies syscall restrictions to remove from the configuration.
301305
302- ** --linux-seccomp-remove-all** == true|false
306+ ** --linux-seccomp-remove-all** =true|false
303307 Option to remove all syscall restrictions.
308+ This option conflicts with other --linux-seccomp-xxx options.
309+ When combined with them, no matter what the options' order is, parse this option first.
304310
305311** --linux-seccomp-trace** =SYSCALL
306312 Specifies syscalls to create seccomp rule to respond with TRACE.
@@ -371,8 +377,10 @@ read the configuration from `config.json`.
371377** --process-cap-add-permitted** =[ ]
372378 Add Linux permitted capabilities
373379
374- ** --process-cap-drop-all** true|false
380+ ** --process-cap-drop-all** = true|false
375381 Drop all Linux capabilities
382+ This option conflicts with other cap options, as --process-cap-* .
383+ When combined with them, no matter what the options' order is, parse this option first.
376384
377385** --process-cap-drop-ambient** =[ ]
378386 Drop Linux ambient capabilities
@@ -417,6 +425,8 @@ read the configuration from `config.json`.
417425
418426** --process-rlimits-remove-all** =true|false
419427 Remove all resource limits for process inside the container. The default is * false* .
428+ This option conflicts with --linux-rlimits-add and --linux-rlimits-remove.
429+ When combined with them, no matter what the options' order is, parse this option first.
420430
421431** --process-terminal** =true|false
422432 Specifies whether a terminal is attached to the process. The default is * false* .
0 commit comments