/lxc/doc/examples/ |
H A D | seccomp-v2.conf | 12 mount 21 mount
|
/lxc/hooks/ |
H A D | unmount-namespace.c | 34 #include <sys/mount.h> /* umount2 */ 67 struct mount { struct 73 static void mount_free(struct mount *mnt) { 80 struct mount *a = (struct mount*)a_; 81 struct mount *b = (struct mount*)b_; 88 static int mount_should_error(const struct mount *mnt) { 96 * our /self. We then use openat(2) to avoid having to mount a temporary /proc. 98 static int read_mounts(int procfd, struct mount **m [all...] |
H A D | mountecryptfsroot | 19 # This hook can be used to mount an ecryptfs filesystem as a container's 22 # 1. add 'lxc.hook.pre-mount = /usr/share/lxc/hooks/mountecryptfsroot' to 33 # f. mount -t ecryptfs -o ecryptfs_cipher=aes,ecryptfs_key_bytes=16,ecryptfs_passthrough=n,ecryptfs_enable_filename_crypto=n,ecryptfs_sig=${sig},sig=${sig},verbosity=0 /var/lib/lxc/$c/rootfs.crypt /var/lib/lxc/$c/rootfs 49 mount -n -t ecryptfs -o ecryptfs_cipher=aes,ecryptfs_key_bytes=16,ecryptfs_passthrough=n,ecryptfs_enable_filename_crypto=n,ecryptfs_sig=${sig},sig=${sig},verbosity=0 $ecryptfs_crypt $LXC_ROOTFS_PATH
|
/lxc/doc/ |
H A D | lxc.container.conf | 1 # the fstab mount file 2 lxc.mount = ./fstab
|
/lxc/src/lxc/bdev/ |
H A D | lxcrsync.c | 33 #include <sys/mount.h> 104 if (mount(NULL, "/", NULL, MS_SLAVE|MS_REC, NULL)) { 111 if (orig->ops->mount(orig) < 0) { 115 if (new->ops->mount(new) < 0) {
|
H A D | bdev.h | 32 #include <sys/mount.h> 69 // mount requires src and dest to be set. 70 int (*mount)(struct bdev *bdev); member in struct:bdev_ops 75 /* given original mount, rename the paths for cloned container */ 85 * 'lxc.rootfs' value, dest will be mount dir (i.e. $libdir/lxc) When clone 109 * in case of mount/umount.
|
H A D | bdev.c | 43 #include <sys/mount.h> 79 .mount = &aufs_mount, 91 .mount = &btrfs_mount, 103 .mount = &dir_mount, 115 .mount = &loop_mount, 127 .mount = &lvm_mount, 139 .mount = &nbd_mount, 151 .mount = &ovl_mount, 163 .mount = &rbd_mount, 175 .mount [all...] |
H A D | lxcdir.c | 35 * for a simple directory bind mount, we substitute the old container 122 ret = mount(bdev->src, bdev->dest, "bind", MS_BIND | MS_REC | mntflags, mntdata);
|
H A D | lxczfs.c | 30 #include <sys/mount.h> 45 * it is always mounted. That means 'mount' is really never needed and could be 46 * noop, but for the sake of flexibility let's always bind-mount. 101 int ret = mount(bdev->src, bdev->dest, "bind", MS_BIND | MS_REC | mntflags, mntdata); 254 // zfs mount is output up to ' ' 277 ERROR("No mount target specified or out of memory");
|
/lxc/src/lxc/ |
H A D | initutils.h | 33 #include <sys/mount.h>
|
H A D | conf.c | 45 #include <sys/mount.h> 231 "pre-start", "pre-mount", "mount", "autodev", "start", "stop", "post-stop", "clone", "destroy" }; 533 ret = mount(rootfs, target, "none", MS_BIND | MS_REC | mntflags, mntdata); 658 * to do one MS_BIND mount and then MS_REMOUNT|MS_RDONLY the same 659 * one. According to mount(2) manpage, MS_BIND honors MS_RDONLY from 664 * fs is remounted read-only or the mount fails because it's busy... 697 source = lxc_string_replace("%r", conf->rootfs.path ? conf->rootfs.mount : "", default_mounts[i].source); 709 destination = lxc_string_replace("%r", conf->rootfs.path ? conf->rootfs.mount : "", default_mounts[i].destination); 719 r = safe_mount(source, destination, default_mounts[i].fstype, mflags, default_mounts[i].options, conf->rootfs.path ? conf->rootfs.mount 2070 make_anonymous_mount_file(struct lxc_list *mount) argument 2110 setup_mount_entries(const struct lxc_rootfs *rootfs, struct lxc_list *mount, const char *lxc_name, const char *lxc_path) argument [all...] |
H A D | criu.c | 30 #include <sys/mount.h> 84 * want to use `--ext-mount-map auto`'s result here because the pts 156 * -o $(directory)/$(action).log --ext-mount-map auto 158 * --enable-fs hugetlbfs --enable-fs tracefs --ext-mount-map console:/dev/pts/n 251 DECLARE_ARG("--ext-mount-map"); 346 /* only add --ext-mount-map for actual bind mounts */ 367 DECLARE_ARG("--ext-mount-map"); 401 DECLARE_ARG("--ext-mount-map"); 446 DECLARE_ARG(opts->c->lxc_conf->rootfs.mount); 467 DECLARE_ARG("--ext-mount [all...] |
H A D | conf.h | 219 * optionals pivot_root, rootfs mount paths 221 * @mount : where it is mounted 222 * @options : mount options 227 char *mount; member in struct:lxc_rootfs 245 LXC_AUTO_CGROUP_RO = 0x010, /* /sys/fs/cgroup (partial mount, read-only) */ 246 LXC_AUTO_CGROUP_RW = 0x020, /* /sys/fs/cgroup (partial mount, read-write) */ 247 LXC_AUTO_CGROUP_MIXED = 0x030, /* /sys/fs/cgroup (partial mount, paths r/o, cgroup r/w) */ 248 LXC_AUTO_CGROUP_FULL_RO = 0x040, /* /sys/fs/cgroup (full mount, read-only) */ 249 LXC_AUTO_CGROUP_FULL_RW = 0x050, /* /sys/fs/cgroup (full mount, read-write) */ 250 LXC_AUTO_CGROUP_FULL_MIXED = 0x060, /* /sys/fs/cgroup (full mount, paren [all...] |
H A D | start.c | 39 #include <sys/mount.h> 433 if (conf->rootfs.mount && setenv("LXC_ROOTFS_MOUNT", conf->rootfs.mount, 1)) 434 SYSERROR("Failed to set environment variable: LXC_ROOTFS_MOUNT=%s.", conf->rootfs.mount); 786 ret = snprintf(path, sizeof(path), "%s/dev/null", handler->conf->rootfs.mount); 791 * same mount namespace. However, some containers may not have a 1053 * example, any {u}mount() operations performed here will be reflected on the 1335 /* If the backing store is a device, mount it here and now. */ 1345 ERROR("Error setting up rootfs mount as root before spawn."); 1474 if (handler->conf->rootfs.path && handler->conf->rootfs.mount) { [all...] |
/lxc/templates/ |
H A D | lxc-sshd.in | 139 lxc.mount.entry = /dev dev none ro,bind 0 0 140 lxc.mount.entry = /lib lib none ro,bind 0 0 141 lxc.mount.entry = /bin bin none ro,bind 0 0 142 lxc.mount.entry = /usr usr none ro,bind 0 0 143 lxc.mount.entry = /sbin sbin none ro,bind 0 0 144 lxc.mount.entry = tmpfs run/sshd tmpfs mode=0644 0 0 145 lxc.mount.entry = @LXCTEMPLATEDIR@/lxc-sshd $init_path none ro,bind 0 0 146 lxc.mount.entry = /etc/init.d etc/init.d none ro,bind 0 0 148 lxc.mount.auto = cgroup:mixed proc:mixed sys:mixed 154 lxc.mount [all...] |
H A D | lxc-fedora.in | 278 # lxc will maintain these links and bind mount ptys over /dev/lxc/* 314 mount -o bind /dev ${rootfs_path}/dev 315 mount -t proc proc ${rootfs_path}/proc 348 # don't mount devpts, for pete's sake 379 chroot ${rootfs_path} ln -s /dev/null /etc/systemd/system/tmp.mount 531 mount -o bind /dev ${bootstrap}/dev 532 mount -t proc proc ${bootstrap}/proc 570 # mount image to "squashfs" 571 # mount contained LiveOS to stage0 606 mount [all...] |
H A D | lxc-slackware.in | 238 /bin/mount -v -n -o remount,ro / 305 # Try to mount /proc: 306 /sbin/mount -v proc /proc -n -t proc 2> /dev/null 334 /sbin/mount -f -w / 644 lxc.mount = $rootfs/etc/fstab
|
/lxc/config/init/systemd/ |
H A D | lxc-apparmor-load | 6 # don't load profiles if mount mediation is not supported 7 SYSF=/sys/kernel/security/apparmor/features/mount/mask
|
/lxc/src/lxc/lsm/ |
H A D | lsm.c | 29 #include <sys/mount.h>
|
H A D | apparmor.c | 27 #include <sys/mount.h> 45 #define AA_MOUNT_RESTR "/sys/kernel/security/apparmor/features/mount/mask"
|
/lxc/src/tests/ |
H A D | lxc-test-symlink | 50 lxc.mount.entry = $dirname opt/xxx/dir none bind,create=dir 51 lxc.mount.entry = $fname opt/xxx/file none bind,create=file 52 lxc.mount.entry = $fname2 opt/xxx/file2 none bind 53 lxc.mount.entry = $dirname /var/lib/lxc/symtest1/rootfs/opt/xxx/dir2 none bind,create=dir
|
H A D | lxc-test-utils.c | 35 #include <sys/mount.h> 130 lxc_error("%s\n", "Failed to open initial mount namespace."); 135 lxc_error("%s\n", "Could not unshare mount namespace."); 141 if (mount(NULL, "/", NULL, MS_REC | MS_PRIVATE, 0) < 0) { 192 if (mount(tmpf1, "/proc/self/mountinfo", NULL, MS_BIND, 0) < 0) { 199 if (mount(tmpf2, "/proc/self/mountinfo", NULL, MS_BIND, 0) < 0) { 219 lxc_error("Failed to switch back to initial mount namespace: %s.\n", strerror(errno));
|
H A D | lxc-test-apparmor-mount | 4 # without mount features 46 MOUNTSR=/sys/kernel/security/apparmor/features/mount 78 # root. However, in order to not have the bind mount 79 # of an empty directory over the securitfs 'mount' directory 185 mount --bind $dnam $MOUNTSR 193 echo "FAIL: confined container started without mount restrictions" 204 echo "FAIL: unconfined container failed to start without mount restrictions" 221 echo "FAIL: excepted container failed to start without mount restrictions"
|
H A D | lxc-test-unpriv | 40 mount -t tmpfs none ${MOUNTDIR} 43 mount -t overlayfs -o lowerdir="${MOUNTDIR}/lowerdir",upperdir="${MOUNTDIR}/upperdir" none "${MOUNTDIR}/overlayfs"
|
/lxc/src/lxc/tools/ |
H A D | lxc_usernsexec.c | 38 #include <sys/mount.h> 126 if (mount(NULL, "/", NULL, MS_SLAVE|MS_REC, NULL)) {
|