Searched refs:mount (Results 1 - 25 of 45) sorted by relevance

12

/lxc/doc/examples/
H A Dseccomp-v2.conf12 mount
21 mount
/lxc/hooks/
H A Dunmount-namespace.c34 #include <sys/mount.h> /* umount2 */
67 struct mount { struct
73 static void mount_free(struct mount *mnt) {
80 struct mount *a = (struct mount*)a_;
81 struct mount *b = (struct mount*)b_;
88 static int mount_should_error(const struct mount *mnt) {
96 * our /self. We then use openat(2) to avoid having to mount a temporary /proc.
98 static int read_mounts(int procfd, struct mount **m
[all...]
H A Dmountecryptfsroot19 # This hook can be used to mount an ecryptfs filesystem as a container's
22 # 1. add 'lxc.hook.pre-mount = /usr/share/lxc/hooks/mountecryptfsroot' to
33 # f. mount -t ecryptfs -o ecryptfs_cipher=aes,ecryptfs_key_bytes=16,ecryptfs_passthrough=n,ecryptfs_enable_filename_crypto=n,ecryptfs_sig=${sig},sig=${sig},verbosity=0 /var/lib/lxc/$c/rootfs.crypt /var/lib/lxc/$c/rootfs
49 mount -n -t ecryptfs -o ecryptfs_cipher=aes,ecryptfs_key_bytes=16,ecryptfs_passthrough=n,ecryptfs_enable_filename_crypto=n,ecryptfs_sig=${sig},sig=${sig},verbosity=0 $ecryptfs_crypt $LXC_ROOTFS_PATH
/lxc/doc/
H A Dlxc.container.conf1 # the fstab mount file
2 lxc.mount = ./fstab
/lxc/src/lxc/bdev/
H A Dlxcrsync.c33 #include <sys/mount.h>
104 if (mount(NULL, "/", NULL, MS_SLAVE|MS_REC, NULL)) {
111 if (orig->ops->mount(orig) < 0) {
115 if (new->ops->mount(new) < 0) {
H A Dbdev.h32 #include <sys/mount.h>
69 // mount requires src and dest to be set.
70 int (*mount)(struct bdev *bdev); member in struct:bdev_ops
75 /* given original mount, rename the paths for cloned container */
85 * 'lxc.rootfs' value, dest will be mount dir (i.e. $libdir/lxc) When clone
109 * in case of mount/umount.
H A Dbdev.c43 #include <sys/mount.h>
79 .mount = &aufs_mount,
91 .mount = &btrfs_mount,
103 .mount = &dir_mount,
115 .mount = &loop_mount,
127 .mount = &lvm_mount,
139 .mount = &nbd_mount,
151 .mount = &ovl_mount,
163 .mount = &rbd_mount,
175 .mount
[all...]
H A Dlxcdir.c35 * for a simple directory bind mount, we substitute the old container
122 ret = mount(bdev->src, bdev->dest, "bind", MS_BIND | MS_REC | mntflags, mntdata);
H A Dlxczfs.c30 #include <sys/mount.h>
45 * it is always mounted. That means 'mount' is really never needed and could be
46 * noop, but for the sake of flexibility let's always bind-mount.
101 int ret = mount(bdev->src, bdev->dest, "bind", MS_BIND | MS_REC | mntflags, mntdata);
254 // zfs mount is output up to ' '
277 ERROR("No mount target specified or out of memory");
/lxc/src/lxc/
H A Dinitutils.h33 #include <sys/mount.h>
H A Dconf.c45 #include <sys/mount.h>
231 "pre-start", "pre-mount", "mount", "autodev", "start", "stop", "post-stop", "clone", "destroy" };
533 ret = mount(rootfs, target, "none", MS_BIND | MS_REC | mntflags, mntdata);
658 * to do one MS_BIND mount and then MS_REMOUNT|MS_RDONLY the same
659 * one. According to mount(2) manpage, MS_BIND honors MS_RDONLY from
664 * fs is remounted read-only or the mount fails because it's busy...
697 source = lxc_string_replace("%r", conf->rootfs.path ? conf->rootfs.mount : "", default_mounts[i].source);
709 destination = lxc_string_replace("%r", conf->rootfs.path ? conf->rootfs.mount : "", default_mounts[i].destination);
719 r = safe_mount(source, destination, default_mounts[i].fstype, mflags, default_mounts[i].options, conf->rootfs.path ? conf->rootfs.mount
2070 make_anonymous_mount_file(struct lxc_list *mount) argument
2110 setup_mount_entries(const struct lxc_rootfs *rootfs, struct lxc_list *mount, const char *lxc_name, const char *lxc_path) argument
[all...]
H A Dcriu.c30 #include <sys/mount.h>
84 * want to use `--ext-mount-map auto`'s result here because the pts
156 * -o $(directory)/$(action).log --ext-mount-map auto
158 * --enable-fs hugetlbfs --enable-fs tracefs --ext-mount-map console:/dev/pts/n
251 DECLARE_ARG("--ext-mount-map");
346 /* only add --ext-mount-map for actual bind mounts */
367 DECLARE_ARG("--ext-mount-map");
401 DECLARE_ARG("--ext-mount-map");
446 DECLARE_ARG(opts->c->lxc_conf->rootfs.mount);
467 DECLARE_ARG("--ext-mount
[all...]
H A Dconf.h219 * optionals pivot_root, rootfs mount paths
221 * @mount : where it is mounted
222 * @options : mount options
227 char *mount; member in struct:lxc_rootfs
245 LXC_AUTO_CGROUP_RO = 0x010, /* /sys/fs/cgroup (partial mount, read-only) */
246 LXC_AUTO_CGROUP_RW = 0x020, /* /sys/fs/cgroup (partial mount, read-write) */
247 LXC_AUTO_CGROUP_MIXED = 0x030, /* /sys/fs/cgroup (partial mount, paths r/o, cgroup r/w) */
248 LXC_AUTO_CGROUP_FULL_RO = 0x040, /* /sys/fs/cgroup (full mount, read-only) */
249 LXC_AUTO_CGROUP_FULL_RW = 0x050, /* /sys/fs/cgroup (full mount, read-write) */
250 LXC_AUTO_CGROUP_FULL_MIXED = 0x060, /* /sys/fs/cgroup (full mount, paren
[all...]
H A Dstart.c39 #include <sys/mount.h>
433 if (conf->rootfs.mount && setenv("LXC_ROOTFS_MOUNT", conf->rootfs.mount, 1))
434 SYSERROR("Failed to set environment variable: LXC_ROOTFS_MOUNT=%s.", conf->rootfs.mount);
786 ret = snprintf(path, sizeof(path), "%s/dev/null", handler->conf->rootfs.mount);
791 * same mount namespace. However, some containers may not have a
1053 * example, any {u}mount() operations performed here will be reflected on the
1335 /* If the backing store is a device, mount it here and now. */
1345 ERROR("Error setting up rootfs mount as root before spawn.");
1474 if (handler->conf->rootfs.path && handler->conf->rootfs.mount) {
[all...]
/lxc/templates/
H A Dlxc-sshd.in139 lxc.mount.entry = /dev dev none ro,bind 0 0
140 lxc.mount.entry = /lib lib none ro,bind 0 0
141 lxc.mount.entry = /bin bin none ro,bind 0 0
142 lxc.mount.entry = /usr usr none ro,bind 0 0
143 lxc.mount.entry = /sbin sbin none ro,bind 0 0
144 lxc.mount.entry = tmpfs run/sshd tmpfs mode=0644 0 0
145 lxc.mount.entry = @LXCTEMPLATEDIR@/lxc-sshd $init_path none ro,bind 0 0
146 lxc.mount.entry = /etc/init.d etc/init.d none ro,bind 0 0
148 lxc.mount.auto = cgroup:mixed proc:mixed sys:mixed
154 lxc.mount
[all...]
H A Dlxc-fedora.in278 # lxc will maintain these links and bind mount ptys over /dev/lxc/*
314 mount -o bind /dev ${rootfs_path}/dev
315 mount -t proc proc ${rootfs_path}/proc
348 # don't mount devpts, for pete's sake
379 chroot ${rootfs_path} ln -s /dev/null /etc/systemd/system/tmp.mount
531 mount -o bind /dev ${bootstrap}/dev
532 mount -t proc proc ${bootstrap}/proc
570 # mount image to "squashfs"
571 # mount contained LiveOS to stage0
606 mount
[all...]
H A Dlxc-slackware.in238 /bin/mount -v -n -o remount,ro /
305 # Try to mount /proc:
306 /sbin/mount -v proc /proc -n -t proc 2> /dev/null
334 /sbin/mount -f -w /
644 lxc.mount = $rootfs/etc/fstab
/lxc/config/init/systemd/
H A Dlxc-apparmor-load6 # don't load profiles if mount mediation is not supported
7 SYSF=/sys/kernel/security/apparmor/features/mount/mask
/lxc/src/lxc/lsm/
H A Dlsm.c29 #include <sys/mount.h>
H A Dapparmor.c27 #include <sys/mount.h>
45 #define AA_MOUNT_RESTR "/sys/kernel/security/apparmor/features/mount/mask"
/lxc/src/tests/
H A Dlxc-test-symlink50 lxc.mount.entry = $dirname opt/xxx/dir none bind,create=dir
51 lxc.mount.entry = $fname opt/xxx/file none bind,create=file
52 lxc.mount.entry = $fname2 opt/xxx/file2 none bind
53 lxc.mount.entry = $dirname /var/lib/lxc/symtest1/rootfs/opt/xxx/dir2 none bind,create=dir
H A Dlxc-test-utils.c35 #include <sys/mount.h>
130 lxc_error("%s\n", "Failed to open initial mount namespace.");
135 lxc_error("%s\n", "Could not unshare mount namespace.");
141 if (mount(NULL, "/", NULL, MS_REC | MS_PRIVATE, 0) < 0) {
192 if (mount(tmpf1, "/proc/self/mountinfo", NULL, MS_BIND, 0) < 0) {
199 if (mount(tmpf2, "/proc/self/mountinfo", NULL, MS_BIND, 0) < 0) {
219 lxc_error("Failed to switch back to initial mount namespace: %s.\n", strerror(errno));
H A Dlxc-test-apparmor-mount4 # without mount features
46 MOUNTSR=/sys/kernel/security/apparmor/features/mount
78 # root. However, in order to not have the bind mount
79 # of an empty directory over the securitfs 'mount' directory
185 mount --bind $dnam $MOUNTSR
193 echo "FAIL: confined container started without mount restrictions"
204 echo "FAIL: unconfined container failed to start without mount restrictions"
221 echo "FAIL: excepted container failed to start without mount restrictions"
H A Dlxc-test-unpriv40 mount -t tmpfs none ${MOUNTDIR}
43 mount -t overlayfs -o lowerdir="${MOUNTDIR}/lowerdir",upperdir="${MOUNTDIR}/upperdir" none "${MOUNTDIR}/overlayfs"
/lxc/src/lxc/tools/
H A Dlxc_usernsexec.c38 #include <sys/mount.h>
126 if (mount(NULL, "/", NULL, MS_SLAVE|MS_REC, NULL)) {

Completed in 45 milliseconds

12