]> git.proxmox.com Git - lxc.git/blame - config/ubuntu.common.conf.in
bump version to 3.0.2+pve1-1
[lxc.git] / config / ubuntu.common.conf.in
CommitLineData
f49c89ac
WB
1# This derives from the global common config
2lxc.include = @LXCTEMPLATECONFIG@/common.conf
3
4# Default mount entries
5lxc.mount.entry = /sys/kernel/debug sys/kernel/debug none bind,optional 0 0
6lxc.mount.entry = /sys/kernel/security sys/kernel/security none bind,optional 0 0
7lxc.mount.entry = /sys/fs/pstore sys/fs/pstore none bind,optional 0 0
8lxc.mount.entry = mqueue dev/mqueue mqueue rw,relatime,create=dir,optional 0 0
9
10# When using LXC with apparmor, the container will be confined by default.
11# If you wish for it to instead run unconfined, copy the following line
12# (uncommented) to the container's configuration file.
13#lxc.apparmor.profile = unconfined
14
15# Uncomment the following line to autodetect squid-deb-proxy configuration on the
16# host and forward it to the guest at start time.
17#lxc.hook.pre-start = /usr/share/lxc/hooks/squid-deb-proxy-client
18
19# If you wish to allow mounting block filesystems, then use the following
20# line instead, and make sure to grant access to the block device and/or loop
21# devices below in lxc.cgroup.devices.allow.
22#lxc.apparmor.profile = lxc-container-default-with-mounting
23
24# Extra cgroup device access
25## rtc
26lxc.cgroup.devices.allow = c 254:0 rm
27## tun
28lxc.cgroup.devices.allow = c 10:200 rwm
29## hpet
30lxc.cgroup.devices.allow = c 10:228 rwm
31## kvm
32lxc.cgroup.devices.allow = c 10:232 rwm
33## To use loop devices, copy the following line to the container's
34## configuration file (uncommented).
35#lxc.cgroup.devices.allow = b 7:* rwm