From 8fec7c26d4e831481674bcab7a0539affc91da29 Mon Sep 17 00:00:00 2001 From: Hao Zhang <21521210@zju.edu.cn> Date: Wed, 27 Apr 2016 08:50:46 -0400 Subject: [PATCH] update cgroup link in doc of run Signed-off-by: Hao Zhang <21521210@zju.edu.cn> --- docs/reference/run.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/reference/run.md b/docs/reference/run.md index 11503b2a8e..d135aa9965 100644 --- a/docs/reference/run.md +++ b/docs/reference/run.md @@ -1083,7 +1083,7 @@ By default, Docker containers are "unprivileged" and cannot, for example, run a Docker daemon inside a Docker container. This is because by default a container is not allowed to access any devices, but a "privileged" container is given access to all devices (see -the documentation on [cgroups devices](https://www.kernel.org/doc/Documentation/cgroups/devices.txt)). +the documentation on [cgroups devices](https://www.kernel.org/doc/Documentation/cgroup-v1/devices.txt)). When the operator executes `docker run --privileged`, Docker will enable to access to all devices on the host as well as set some configuration