Search results for query: idmap

  1. A

    [SOLVED] LXC unable to Access GPU by id mapping, error

    Yeah this is really great ! also when moving to another PVE you don't have to setup the subGID on the host before restoring the LXC
  2. M

    [SOLVED] LXC unable to Access GPU by id mapping, error

    Your mapping if slightly off, correct would be: # lxc.idmap: u 0 100000 65536 # lxc.idmap: g 0 100000 44 # lxc.idmap: g 44 44 1 # lxc.idmap: g 45 100045 60 # lxc.idmap: g 105 104 1 # lxc.idmap: g 106 100106 65430 Getting these mappings right is a pain :) THANK you - this is a much more...
  3. A

    [SOLVED] LXC unable to Access GPU by id mapping, error

    ...with the help of id mapping. But sadly enough I'm unable to get it to work and get an error when trying to run the LXC. Error after apply idmapping in the .conf: lxc.idmap: invalid map entry 'g 105 104 1': container gid 105 is also mapped by entry 'g 45 100045 61' lxc_map_ids: 245 newgidmap...
  4. M

    LXC + unprivileged + Docker OK | but LXC + privileged + Docker broken?

    ...lxc.apparmor.profile = generated lxc.apparmor.allow_nesting = 1 lxc.mount.auto = sys:mixed lxc.monitor.unshare = 1 lxc.idmap = u 0 100000 65536 lxc.idmap = g 0 100000 65536 lxc.console.path = none lxc.cgroup2.devices.deny = c 5:1 rwm lxc.tty.max = 0 lxc.environment = TERM=linux lxc.uts.name =...
  5. A

    ID.Map

    ...Weiß jemand wo mein Fehler ist? Weil entweder der Container startet nicht oder der Container startet user Proxmox hat Zugriff auf die Freigabe aber dann nicht mehr auf sein Home Verzeichnis. Config ohne IDMap siehe Anhang. Der Mountpoint im Container hat den Besitzer, nobody und nogroup.
  6. S

    mapping container uid to host clobbers uid in container?

    I know this is yet another idmap question... but... I have an unprivileged ubuntu container to which i bind mount a directory from the host. The user:group in the container I want to map is 999:999. I would like to map that to 1000:1000 on the host because that's the what the permissions are...
  7. leesteken

    Passthrought USB TV tuner (DVB RTL2838) to unprivileged container inside Debian Bullseye host

    I stopped using the old way of doing this with allow, mount and idmap. This is my new configuration (for the first tuner): dev0: /dev/dvb/adapter0/demux0,gid=44,uid=0 dev1: /dev/dvb/adapter0/dvr0,gid=44,uid=0 dev2: /dev/dvb/adapter0/frontend0,gid=44,uid=0 dev3: /dev/dvb/adapter0/net0,gid=44,uid=0
  8. E

    Passthrought USB TV tuner (DVB RTL2838) to unprivileged container inside Debian Bullseye host

    ...it works only if I run the software that use the dvb dongle with sudo. Is it normal? I saw that some may use mapping the video group: lxc.idmap = g 0 100000 44 lxc.idmap = g 44 44 1 lxc.idmap = g 45 100045 65491 But I can't this working because I get the newidmap gid range 44-45 not allowed...
  9. J

    Snapshot feature not available

    ...and this discussion https://forum.proxmox.com/threads/why-do-bind-mounts-prevent-snapshots.85495/ Annoyingly, the mount points are cephfs, which supports snapshots. I'm not sure mounting a host directory using lxc.mount.entry, is a good idea, as I'm using lxc.idmap
  10. A

    [SOLVED] Blind map to HDD partition not changing with chown

    ...group `userfs (1000)' ... Creating home directory `/home/userfs' ... proxmox shell: nano /etc/pve/lxc/106.conf Add at end # map userid lxc.idmap: u 0 100000 1000 lxc.idmap: g 0 100000 1000 lxc.idmap: u 1000 1000 1 lxc.idmap: g 1000 1000 1 lxc.idmap: u 1001 101001 64535 lxc.idmap: g 1001...
  11. S

    LXC and mount point. Permission denied - again!

    ...onboot: 1 ostype: debian rootfs: local-zfs:subvol-101-disk-0,size=8G swap: 1024 unprivileged: 1 lxc.idmap: u 0 100000 1005 lxc.idmap: g 0 100000 1005 lxc.idmap: u 1005 1005 1 lxc.idmap: g 1005 1005 1 lxc.idmap: u 1006 101006 64530 lxc.idmap: g 1006 101006 64530 /etc/subuid root:1005:1...
  12. S

    newgidmap: gid range [1005-1006) -> [1005-1006) not allowed

    I have a windows share that is mounted on the proxmox host. I'm trying to make the files available in the guest (unprivileged docker container). At first I can see the files in the container ok but they are read only. Following the guide here...
  13. P

    “EPERM: Operation not permitted.” when adding bind mount as datastore

    Darn, I just stumbled on your post and was surprised to see no answer. I'm tryring to do something similar and running into the same issue. Only difference is I have an NFS share that I'm passing through to my PBS container from PVE and attempting to mount that as a datastore. Getting the...
  14. T

    Lxc u/gid mapping (unprivileged passthrough + mount)

    ...UID and GID. If we want to map 44 and 108, we have to fill the mappings before, in between and after. For example: Mapping 44 and 108 UID lxc.idmap = u 0 100000 44 #map LXC uid 0 to host uid 100000 for 44 mappings (up tp 100043) lxc.idmap = u 44 44 1 #map LXC uid 44 to host...
  15. M

    Mountpoint externe SSD Syncthing

    ...ostype: debian rootfs: SSD1TB:193/vm-193-disk-0.raw,size=20G swap: 4096 unprivileged: 1 lxc.idmap: u 0 100000 1100 lxc.idmap: g 0 100000 1100 lxc.idmap: u 1100 1100 1 lxc.idmap: g 1100 1100 1 lxc.idmap: u 1101 101101 64435 lxc.idmap: g 1101 101101 64435 /etc/subuid root:100000:65536...
  16. D

    Why do bind mounts prevent snapshots?

    ...to get permissions to work correctly. mp0: /mnt/pve/nas1-scratch,mp=/mnt/scratch mp1: /mnt/pve/nas1-media,mp=/mnt/media unprivileged: 1 lxc.idmap: u 0 100000 864 lxc.idmap: g 0 100000 864 lxc.idmap: u 864 864 2 lxc.idmap: g 864 864 1 lxc.idmap: u 866 100866 64670 lxc.idmap: g 865 100865 64671
  17. T

    Lxc u/gid mapping (unprivileged passthrough + mount)

    ...work yet. Here I'm currently struggling with the uid/gid mapping. For example: To access the local proxmox ZFS/directory, I have to map lxc.idmap = u 0 100000 1005 lxc.idmap = g 0 100000 1005 lxc.idmap = u 1005 1005 1 lxc.idmap = g 1005 1005 1 lxc.idmap = u 1006 101006 64530 lxc.idmap = g...
  18. V

    [SOLVED] Unpriv LXC UID mapping for ZFS Bind Mount - SMB File server for family

    ...ostype: debian rootfs: local:100/vm-100-disk-0.raw,size=2G swap: 512 unprivileged: 1 lxc.idmap: u 0 100000 1000 lxc.idmap: g 0 100000 1000 lxc.idmap: u 1000 1000 6 lxc.idmap: g 1000 1000 6 lxc.idmap: u 1006 101005 64531 lxc.idmap: g 1006 101005 64531 set users ids to each to 1000, 1001...
  19. fschauer

    [SOLVED] Unpriv LXC UID mapping for ZFS Bind Mount - SMB File server for family

    I assume you want to map UIDs 1000-1004 in the container to the same UIDs on the host. In that case this part can be abbreviated to: lxc.idmap: u 1000 1000 5 lxc.idmap: g 1000 1000 5 The first number stands for the ID in the container. The second number stands for the ID on the host. The...