summaryrefslogtreecommitdiff
path: root/docs/source/markdown/podman-run.1.md
diff options
context:
space:
mode:
authorMark Stosberg <mark@rideamigos.com>2020-01-10 22:02:08 -0500
committerMark Stosberg <mark@rideamigos.com>2020-01-12 23:28:12 -0500
commit9c8e2822cb95679106a26fd4eb92f8323148a619 (patch)
tree76df9806af8fdb5912e6461ec863e3271f755330 /docs/source/markdown/podman-run.1.md
parent0e9c208d3f9fc6f160f7e7746119ddf99ae6f220 (diff)
downloadpodman-9c8e2822cb95679106a26fd4eb92f8323148a619.tar.gz
podman-9c8e2822cb95679106a26fd4eb92f8323148a619.tar.bz2
podman-9c8e2822cb95679106a26fd4eb92f8323148a619.zip
docs: --privileged docs completeness, consistency
As discussed in https://github.com/containers/libpod/issues/4840 Signed-off-by: Mark Stosberg <mark@rideamigos.com>
Diffstat (limited to 'docs/source/markdown/podman-run.1.md')
-rw-r--r--docs/source/markdown/podman-run.1.md19
1 files changed, 10 insertions, 9 deletions
diff --git a/docs/source/markdown/podman-run.1.md b/docs/source/markdown/podman-run.1.md
index 3f6effb75..d9fdd9650 100644
--- a/docs/source/markdown/podman-run.1.md
+++ b/docs/source/markdown/podman-run.1.md
@@ -599,15 +599,16 @@ If a container is run with a pod, and the pod has an infra-container, the infra-
Give extended privileges to this container. The default is *false*.
-By default, Podman containers are “unprivileged” (=false) and cannot,
-for example, modify parts of the kernel. This is because by default a
-container is not allowed to access any devices. A “privileged” container
-is given access to all devices.
-
-When the operator executes **podman run --privileged**, Podman enables access
-to all devices on the host, turns off graphdriver mount options, as well as
-turning off most of the security measures protecting the host from the
-container.
+By default, Podman containers are “unprivileged” (=false) and cannot, for
+example, modify parts of the operating system. This is because by default a
+container is only allowed limited access to devices. A "privileged" container
+is given the same access to devices as the user launching the container.
+
+A privileged container turns off the security features that isolate the
+container from the host. Dropped Capabilities, limited devices, read/only mount
+points, Apparmor/SELinux separation, and Seccomp filters are all disabled.
+
+Rootless containers cannot have more privileges than the account that launched them.
**--publish**, **-p**=*port*