mirror of
https://github.com/containers/podman.git
synced 2025-06-03 20:33:20 +08:00
man: Document the interaction between --systemd and --privileged
Users need to know about this side effect. Fixes: 5a2405ae1b3a ("Don't mount /dev/tty* inside privileged...") Fixes: f4c81b0aa5fd ("Only prevent VTs to be mounted inside ...") Signed-off-by: Martin Roukala (né Peres) <martin.roukala@mupuf.org>
This commit is contained in:
@ -9,7 +9,9 @@ Give extended privileges to this container. The default is **false**.
|
||||
By default, Podman containers are unprivileged (**=false**) and cannot, for
|
||||
example, modify parts of the operating system. This is because by default a
|
||||
container is only allowed limited access to devices. A "privileged" container
|
||||
is given the same access to devices as the user launching the container.
|
||||
is given the same access to devices as the user launching the container, with
|
||||
the exception of virtual consoles (_/dev/tty\d+_) when running in systemd
|
||||
mode (**--systemd=always**).
|
||||
|
||||
A privileged container turns off the security features that isolate the
|
||||
container from the host. Dropped Capabilities, limited devices, read-only mount
|
||||
|
@ -24,6 +24,7 @@ Running the container in systemd mode causes the following changes:
|
||||
* Podman sets the default stop signal to **SIGRTMIN+3**.
|
||||
* Podman sets **container_uuid** environment variable in the container to the
|
||||
first 32 characters of the container id.
|
||||
* Podman will not mount virtual consoles (_/dev/tty\d+_) when running with **--privileged**.
|
||||
|
||||
This allows systemd to run in a confined container without any modifications.
|
||||
|
||||
|
Reference in New Issue
Block a user