Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
L
lxc
Project
Overview
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
Chen Yisong
lxc
Commits
ac8f64dc
Unverified
Commit
ac8f64dc
authored
May 29, 2017
by
Christian Brauner
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
README: reword id mapping restrictions when unpriv
Suggested-by:
Serge Hallyn
<
serge@hallyn.com
>
Signed-off-by:
Christian Brauner
<
christian.brauner@ubuntu.com
>
parent
486e37c8
Show whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
4 additions
and
4 deletions
+4
-4
README.md
README.md
+4
-4
No files found.
README.md
View file @
ac8f64dc
...
...
@@ -70,10 +70,10 @@ quite restricted. Just to highlight the two most common problems:
inside of the container will not be able to boot up correctly.
2.
User Namespaces: As outlined above, user namespaces are a big security
enhancement. However,
users which are unprivileged on the host will only b
e
able to establish a mapping for their own UID if they do not rely on
privileged helpers. A standard POSIX system however, requires 65536 UIDs and
GIDs
to be available to guarantee full functionality.
enhancement. However,
without relying on privileged helpers users who ar
e
unprivileged on the host are only permitted to map their own UID into
a container. A standard POSIX system however, requires 65536 UIDs and GIDs
to be available to guarantee full functionality.
## Configuration
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment