
Users need to know about this side effect. Fixes: 5a2405ae1b3a ("Don't mount /dev/tty* inside privileged...") Fixes: f4c81b0aa5fd ("Only prevent VTs to be mounted inside ...") Signed-off-by: Martin Roukala (né Peres) <martin.roukala@mupuf.org>
972 B
####> This option file is used in: ####> podman create, exec, run ####> If file is edited, make sure the changes ####> are applicable to all of those.
--privileged
Give extended privileges to this container. The default is false.
By default, Podman containers are unprivileged (=false) and cannot, for example, modify parts of the operating system. This is because by default a container is only allowed limited access to devices. A "privileged" container is given the same access to devices as the user launching the container, with the exception of virtual consoles (/dev/tty\d+) when running in systemd mode (--systemd=always).
A privileged container turns off the security features that isolate the container from the host. Dropped Capabilities, limited devices, read-only mount points, Apparmor/SELinux separation, and Seccomp filters are all disabled.
Rootless containers cannot have more privileges than the account that launched them.