Search results for query: idmap

  1. fschauer

    How to add hard drive attached to host to an LXC

    ...UID 999 on the host - GID 996 in the container to GID 996 on the host First map UIDs 0-998 in the container to 100000-100998 on the host: lxc.idmap = u 0 100000 999 Then map UID 999 in the container to 999 on the host: lxc.idmap = u 999 999 1 And finally map the remaining UIDs 1000-65535...
  2. A

    LXC idmap bug

    Thanks for your answer yes, but that's ok. Also this is missing one uid/gid mapping. Nevertheless, I just tried your code and still doesn't work.
  3. fschauer

    LXC idmap bug

    ...on the host - ... What you actually want is: - uid 1 in the ct to uid 100001 on the host - uid 2 in the ct to uid 100002 on the host - ... To fix this, change your mapping configuration to this: lxc.idmap: u 0 1070 1 lxc.idmap: u 1 100001 65534 lxc.idmap: g 0 1070 1 lxc.idmap: g 1 100001 65534
  4. A

    LXC idmap bug

    ...an Alpine LXC, mapping uid & gid from 0(root) CT to 1070(nextcloud) host. All files ownerships are shifted 1 place! What's going on here? lxc.idmap: u 0 1070 1 lxc.idmap: u 1 100000 65535 lxc.idmap: g 0 1070 1 lxc.idmap: g 1 100000 65535 alpine-nextcloud:~# getent passwd...
  5. C

    Rootless Docker inside unprivileged LXC container

    ...and /etc/subgid of Proxmox. For example, I changed the default 100000:65536 to 100000:165536 then on the LXC, you need to map with: lxc.idmap: u 0 100000 165536 lxc.idmap: g 0 100000 165536 However, I'm having trouble getting docker to run, and it constantly errors out with "medium not...
  6. V

    [SOLVED] Mount SMB/CIFS share to lxc with write permissions

    ...it is mounted has a normal mount point setup: mp0: /mnt/ncshare/,mp=/mnt/ncshare/ then the container has uid/gid remapping configured: lxc.idmap: u 0 100000 1005 lxc.idmap: g 0 100000 1005 lxc.idmap: u 1005 1005 1 lxc.idmap: g 1005 1005 1 lxc.idmap: u 1006 101006 64530 lxc.idmap: g 1006...
  7. V

    root user cannot run 'su' command - lxc container

    Hello, I have an unprivileged lcx container where I changed the UID mapping in the file /etc/pve/lxc/101.conf. The file looks like this now: While I managed to get access to the mounted folder I was aiming for, I can't run any su command. I can't even change user with su - user. When I try to...
  8. 5

    Koxi CLX on each TTY

    ...none bind,optional,create=dir lxc.cgroup2.devices.allow: c 116:* rwm lxc.mount.entry: /dev/snd dev/snd none bind,optional,create=dir lxc.idmap: u 0 100000 65536 lxc.idmap: g 0 100000 5 lxc.idmap: g 5 5 1 lxc.idmap: g 6 100006 23 lxc.idmap: g 29 29 1 lxc.idmap: g 30 100030 14 I found...
  9. S

    Setting up nvidia gpu for stable diffusion in a LXC container ?

    .../ssh_key.pub # to add permissions mapping for nvidia video devices LXC_CONF_FILE="/etc/pve/nodes/proxmox/lxc/$vmid.conf" echo "lxc.idmap: u 0 100000 65536" >> "$LXC_CONF_FILE" echo "lxc.idmap: g 0 100000 44" >> "$LXC_CONF_FILE" echo "lxc.idmap: g 44 44 1" >> "$LXC_CONF_FILE" echo "lxc.idmap...
  10. A

    [Guide] Jellyfin + remote network shares + HW transcoding with Intel's QSV + unprivileged LXC

    Try running this command in the lxc instead /usr/lib/jellyfin-ffmpeg/vainfo --display drm --device /dev/dri/renderD128 & This /usr/lib/jellyfin-ffmpeg/ffmpeg -v verbose -init_hw_device vaapi=va:/dev/dri/renderD128 -init_hw_device opencl@va
  11. M

    [Guide] Jellyfin + remote network shares + HW transcoding with Intel's QSV + unprivileged LXC

    Using this lxc-idmap tool I was able to confirm the correctness of my configuration. However, I tried and the container starts fine but it seems like it doesn't have full root access to the renderD128 device and the following command: # vainfo --display drm --device /dev/dri/renderD128 fails...
  12. S

    Setting up nvidia gpu for stable diffusion in a LXC container ?

    ...c 226:0 rwm lxc.cgroup2.devices.allow: c 226:128 rwm lxc.mount.entry: /dev/dri/renderD128 dev/dri/renderD128 none bind,optional,create=file lxc.idmap: u 0 100000 65536 lxc.idmap: g 0 100000 44 lxc.idmap: g 44 44 1 lxc.idmap: g 45 100045 62 lxc.idmap: g 107 104 1 lxc.idmap: g 108 100108 65428...
  13. A

    [Guide] Jellyfin + remote network shares + HW transcoding with Intel's QSV + unprivileged LXC

    Hey sorry for the late reply, This looks like it would be ok. Does everything seem to be working in order? I think this line lxc.idmap: g 45 100045 61 you would have to put either 62 or 60 instead of 61 if it wasnt working for you
  14. E

    [Guide] Jellyfin + remote network shares + HW transcoding with Intel's QSV + unprivileged LXC

    ...none bind,optional,create=file. Removing this line from 101.conf enables the container to start normally. My 101.conf looks like this: lxc.idmap: u 0 100000 65536 lxc.idmap: g 0 100000 44 lxc.idmap: g 44 44 1 lxc.idmap: g 104 104 1 lxc.cgroup2.devices.allow: c 226:1 rwm...
  15. M

    [Guide] Jellyfin + remote network shares + HW transcoding with Intel's QSV + unprivileged LXC

    ...226, 128 Aug 20 23:32 renderD128 # cat /etc/group video:x:44 render:x:103 Is the following OK? # nano /etc/pve/lxc/<lxc_id>.conf lxc.idmap: u 0 100000 65536 lxc.idmap: g 0 100000 44 lxc.idmap: g 44 44 1 lxc.idmap: g 45 100045 61 lxc.idmap: g 106 103 1 lxc.idmap: g 107 100107 65429...
  16. A

    [Guide] Jellyfin + remote network shares + HW transcoding with Intel's QSV + unprivileged LXC

    ...on your host id are 44 and 104 and the uid and gid of video and render on the lxc are 44 and 106 that you do this instead to your lxc.conf lxc.idmap: u 0 100000 65536 lxc.idmap: g 0 100000 44 lxc.idmap: g 44 44 1 lxc.idmap: g 45 100045 61 lxc.idmap: g 106 104 1 lxc.idmap: g 107 100107 65429...
  17. A

    [TUTORIAL] LXC ID mapping tool

    ...the uid or gid the output is flipped. For example ill fill out 104 for the host id and 106 for the client id but the output will show this lxc.idmap: u 0 100000 104 lxc.idmap: g 0 100000 104 lxc.idmap: u 104 106 1 lxc.idmap: g 104 106 1 lxc.idmap: u 105 100105 65431 lxc.idmap: g 105 100105...
  18. U

    NFS mount on unprivileged LXC (NAS > NODE > LXC)

    ...a feeling LXC just do not get permissions to access shares, like the node, although it must have these permissions to do so. Hence, I blame idmap or something related with that. ls -l result makes me believe that something went wrong in last step NODE -> LXC, but not NAS -> NODE or NAS ->...