security: remove blurb about userns conflicting with r/o (#4396)

As of
66eb2a3e8f
in runc, this is no longer true (in fact, it was never true; the problem
was a bug in runc, not a kernel check). Let's remove it.

Signed-off-by: Tycho Andersen <tycho@docker.com>
This commit is contained in:
Tycho Andersen 2017-09-08 12:05:56 -06:00 committed by Misty Stanley-Jones
parent 99a697824b
commit 972cb35179
1 changed files with 0 additions and 3 deletions

View File

@ -251,9 +251,6 @@ The following standard Docker features are incompatible with running a Docker
daemon with user namespaces enabled:
- sharing PID or NET namespaces with the host (`--pid=host` or `--network=host`).
- A `--read-only` container filesystem. This is a Linux kernel restriction
against remounting an already-mounted filesystem with modified flags when
inside a user namespace.
- external (volume or storage) drivers which are unaware or incapable of using
daemon user mappings.
- Using the `--privileged` mode flag on `docker run` without also specifying