By default we use mnt, but that means that lxc fstab entries do not work when placed under the container's /mnt/.
Switching the default away from /mnt would work too, if noone objects. (I see no downside, but figured I'd play it safe for now) Signed-off-by: Serge Hallyn <serge.hal...@ubuntu.com> --- templates/lxc-ubuntu-cloud.in | 1 + templates/lxc-ubuntu.in | 1 + 2 files changed, 2 insertions(+) diff --git a/templates/lxc-ubuntu-cloud.in b/templates/lxc-ubuntu-cloud.in index 267dbab..bcf669d 100644 --- a/templates/lxc-ubuntu-cloud.in +++ b/templates/lxc-ubuntu-cloud.in @@ -54,6 +54,7 @@ lxc.rootfs = $rootfs lxc.mount = $path/fstab lxc.arch = $arch lxc.cap.drop = sys_module mac_admin +lxc.pivotdir = lxc_putold lxc.cgroup.devices.deny = a # Allow any mknod (but not using the node) diff --git a/templates/lxc-ubuntu.in b/templates/lxc-ubuntu.in index 822554f..2445efd 100644 --- a/templates/lxc-ubuntu.in +++ b/templates/lxc-ubuntu.in @@ -284,6 +284,7 @@ lxc.rootfs = $rootfs lxc.mount = $path/fstab lxc.arch = $arch lxc.cap.drop = sys_module mac_admin mac_override +lxc.pivotdir = lxc_putold lxc.cgroup.devices.deny = a # Allow any mknod (but not using the node) -- 1.7.9.5 ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today's security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ _______________________________________________ Lxc-devel mailing list Lxc-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/lxc-devel