-
I have a containerised program that requires raw access to services:
my-rootful:
container_name: my-rootful
image: my-program
cap_add:
- SYS_RAWIO
devices:
- /dev/sda:rw I wonder if it's possible to do the same thing, but rootless. I tried to use the same 1. The non-privileged user does not have
|
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 2 replies
-
Unprivileged users normally can't map UID 0 from outside of namespaces they create into their own, so items owned by that user appear as the overflow ID. There's a bit more about this in the "Unmapped user and group IDs" section in |
Beta Was this translation helpful? Give feedback.
Unprivileged users normally can't map UID 0 from outside of namespaces they create into their own, so items owned by that user appear as the overflow ID. There's a bit more about this in the "Unmapped user and group IDs" section in
user_namespaces(7)
. Capabilities likeCAP_SYS_RAWIO
only "work" in the initial namespace, as noted in the "Effect of capabilities within a user namespace" section.