diff options
author | Daniel J Walsh <dwalsh@redhat.com> | 2018-11-16 06:51:26 -0500 |
---|---|---|
committer | Daniel J Walsh <dwalsh@redhat.com> | 2018-11-28 07:53:28 -0500 |
commit | 3beacb73bced227b211bf3b8710382b94358614b (patch) | |
tree | 5cd787b22935645c92c613b79081bb132e361944 /docs/podman-create.1.md | |
parent | 193e6197567e47f9650a33ed09d435a0ec0df803 (diff) | |
download | podman-3beacb73bced227b211bf3b8710382b94358614b.tar.gz podman-3beacb73bced227b211bf3b8710382b94358614b.tar.bz2 podman-3beacb73bced227b211bf3b8710382b94358614b.zip |
Disable mount options when running --privileged
We now default to setting storage options to "nodev", when running
privileged containers, we need to turn this off so the processes can
manipulate the image.
Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>
Diffstat (limited to 'docs/podman-create.1.md')
-rw-r--r-- | docs/podman-create.1.md | 7 |
1 files changed, 4 insertions, 3 deletions
diff --git a/docs/podman-create.1.md b/docs/podman-create.1.md index 68c00685b..ab2cb8c60 100644 --- a/docs/podman-create.1.md +++ b/docs/podman-create.1.md @@ -465,9 +465,10 @@ By default, podman containers are This is because by default a container is not allowed to access any devices. A “privileged” container is given access to all devices. -When the operator executes **podman run --privileged**, podman enables access -to all devices on the host as well as set turn off most of the security measures -protecting the host from the container. +When the operator executes a privileged container, podman enables access +to all devices on the host, turns off graphdriver mount options, as well as +turning off most of the security measures protecting the host from the +container. **-p**, **--publish**=[] |