By default we use mnt, but that means that lxc fstab entries do not work
when placed under the container's /mnt/.

Switching the default away from /mnt would work too, if noone
objects.  (I see no downside, but figured I'd play it safe for now)

Signed-off-by: Serge Hallyn <serge.hal...@ubuntu.com>
---
 templates/lxc-ubuntu-cloud.in |    1 +
 templates/lxc-ubuntu.in       |    1 +
 2 files changed, 2 insertions(+)

diff --git a/templates/lxc-ubuntu-cloud.in b/templates/lxc-ubuntu-cloud.in
index 267dbab..bcf669d 100644
--- a/templates/lxc-ubuntu-cloud.in
+++ b/templates/lxc-ubuntu-cloud.in
@@ -54,6 +54,7 @@ lxc.rootfs = $rootfs
 lxc.mount  = $path/fstab
 lxc.arch = $arch
 lxc.cap.drop = sys_module mac_admin
+lxc.pivotdir = lxc_putold
 
 lxc.cgroup.devices.deny = a
 # Allow any mknod (but not using the node)
diff --git a/templates/lxc-ubuntu.in b/templates/lxc-ubuntu.in
index 822554f..2445efd 100644
--- a/templates/lxc-ubuntu.in
+++ b/templates/lxc-ubuntu.in
@@ -284,6 +284,7 @@ lxc.rootfs = $rootfs
 lxc.mount  = $path/fstab
 lxc.arch = $arch
 lxc.cap.drop = sys_module mac_admin mac_override
+lxc.pivotdir = lxc_putold
 
 lxc.cgroup.devices.deny = a
 # Allow any mknod (but not using the node)
-- 
1.7.9.5


------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
Lxc-devel mailing list
Lxc-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/lxc-devel

Reply via email to