Skip to content

Commit b496125

Browse files
authored
Merge pull request #3684 from bbodenmiller/patch-3
Improve doc code formatting
2 parents ac1d1ad + e458cf1 commit b496125

1 file changed

Lines changed: 2 additions & 2 deletions

File tree

docs/reference/run.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1241,15 +1241,15 @@ uid=0(root) gid=0(root) groups=10(wheel),29(audio),99(nogroup),777
12411241
| `--cap-add` | Add Linux capabilities |
12421242
| `--cap-drop` | Drop Linux capabilities |
12431243
| `--privileged` | Give extended privileges to this container |
1244-
| `--device=[]` | Allows you to run devices inside the container without the --privileged flag. |
1244+
| `--device=[]` | Allows you to run devices inside the container without the `--privileged` flag. |
12451245

12461246
By default, Docker containers are "unprivileged" and cannot, for
12471247
example, run a Docker daemon inside a Docker container. This is because
12481248
by default a container is not allowed to access any devices, but a
12491249
"privileged" container is given access to all devices (see
12501250
the documentation on [cgroups devices](https://www.kernel.org/doc/Documentation/cgroup-v1/devices.txt)).
12511251

1252-
The --privileged flag gives all capabilities to the container. When the operator
1252+
The `--privileged` flag gives all capabilities to the container. When the operator
12531253
executes `docker run --privileged`, Docker will enable access to all devices on
12541254
the host as well as set some configuration in AppArmor or SELinux to allow the
12551255
container nearly all the same access to the host as processes running outside

0 commit comments

Comments
 (0)