How to specify a gid and uid for a mapped block device? #18966
Unanswered
mailinglists35
asked this question in
Q&A
Replies: 1 comment 5 replies
-
In a rootless container or a container within a separate user namespace, all UIDs not mapped to the user namespace will be mapped as the nobody user. Privileged processes within the container can not chown files owned by nobody. If you want these files to be chownable then the host UID would need to be mapped within the user namespace. |
Beta Was this translation helpful? Give feedback.
5 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
I am trying to run libvirt+qemu inside podman, as a fedora image. It runs fine with a minimum generated vm by virt-manager running on oracle linux 9.2 host, minus network device.
But I need to map a block device from the host, and then libvirt attempts to chown it because is owned by uid/gid
nobody
with 0770, and it failsHow can I specify the uid and gid of the mapped block device inside the container to 107:107 to keep libvirt happy? (assuming my user id has access rights to host real block device via membership in group
disk
). I don't mind security, I can run the podman as root if that's a solution, all I care is to be able to run the fedora libvirt and qemu processes because the one on el9 host has lots of cut features.Beta Was this translation helpful? Give feedback.
All reactions