assign a starting UID and GID that is the highest-assigned one plus the
offset (in this case, `65536`). Be careful not to allow any overlap in the
ranges.
3. Verify that previous images are not available using the `docker image ls`
command. The output should be empty.
4. Start a container from the `hello-world` image.
```console
$ docker run hello-world
```
5. Verify that a namespaced directory exists within `/var/lib/docker/` named
with the UID and GID of the namespaced user, owned by that UID and GID,
and not group-or-world-readable. Some of the subdirectories are still
owned by `root` and have different permissions.
```console
$ sudo ls -ld /var/lib/docker/231072.231072/
drwx------ 11 231072 231072 11 Jun 21 21:19 /var/lib/docker/231072.231072/
$ sudo ls -l /var/lib/docker/231072.231072/
total 14
drwx------ 5 231072 231072 5 Jun 21 21:19 aufs
drwx------ 3 231072 231072 3 Jun 21 21:21 containers
drwx------ 3 root root 3 Jun 21 21:19 image
drwxr-x--- 3 root root 3 Jun 21 21:19 network
drwx------ 4 root root 4 Jun 21 21:19 plugins
drwx------ 2 root root 2 Jun 21 21:19 swarm
drwx------ 2 231072 231072 2 Jun 21 21:21 tmp
drwx------ 2 root root 2 Jun 21 21:19 trust
drwx------ 2 231072 231072 3 Jun 21 21:19 volumes
```
Your directory listing may have some differences, especially if you
use a different container storage driver than `aufs`.
The directories which are owned by the remapped user are used instead
of the same directories directly beneath `/var/lib/docker/` and the
unused versions (such as `/var/lib/docker/tmp/` in the example here)
can be removed. Docker does not use them while `userns-remap` is
enabled.
## Disable namespace remapping for a container
If you enable user namespaces on the daemon, all containers are started with
user namespaces enabled by default. In some situations, such as privileged
containers, you may need to disable user namespaces for a specific container.