From 016399943d708c8a80a55c0b103a0f9bde39ac06 Mon Sep 17 00:00:00 2001 From: =?utf8?q?Fabian=20Gr=C3=BCnbichler?= Date: Wed, 21 Sep 2016 10:33:10 +0200 Subject: [PATCH] pct: restructure mount point section --- pct.adoc | 43 ++++++++++++++++++++++++++----------------- 1 file changed, 26 insertions(+), 17 deletions(-) diff --git a/pct.adoc b/pct.adoc index 0678c58..2b72f96 100644 --- a/pct.adoc +++ b/pct.adoc @@ -354,10 +354,17 @@ also provide an easy way to share data between different containers. Mount Points ~~~~~~~~~~~~ -Beside the root directory the container can also have additional mount points. +The root mount point is configured with the `rootfs` property, and you can +configure up to 10 additional mount points. The corresponding options +are called `mp0` to `mp9`, and they can contain the following setting: + +include::pct-mountpoint-opts.adoc[] + Currently there are basically three types of mount points: storage backed mount points, bind mounts and device mounts. +.Storage backed mount points + Storage backed mount points are managed by the {pve} storage subsystem and come in three different flavors: @@ -368,39 +375,41 @@ in three different flavors: - Directories: passing `size=0` triggers a special case where instead of a raw image a directory is created. +.Bind mount points + Bind mounts are considered to not be managed by the storage subsystem, so you cannot make snapshots or deal with quotas from inside the container, and with unprivileged containers you might run into permission problems caused by the user mapping, and cannot use ACLs from inside an unprivileged container. -Similarly device mounts are not managed by the storage, but for these the -`quota` and `acl` options will be honored. - -WARNING: Because of existing issues in the Linux kernel's freezer -subsystem the usage of FUSE mounts inside a container is strongly -advised against, as containers need to be frozen for suspend or -snapshot mode backups. If FUSE mounts cannot be replaced by other -mounting mechanisms or storage technologies, it is possible to -establish the FUSE mount on the Proxmox host and use a bind -mount point to make it accessible inside the container. - WARNING: For security reasons, bind mounts should only be established using source directories especially reserved for this purpose, e.g., a directory hierarchy under `/mnt/bindmounts`. Never bind mount system directories like `/`, `/var` or `/etc` into a container - this poses a great security risk. The bind mount source path must not contain any symlinks. -The root mount point is configured with the 'rootfs' property, and you can -configure up to 10 additional mount points. The corresponding options -are called 'mp0' to 'mp9', and they can contain the following setting: +.Device mount points -include::pct-mountpoint-opts.adoc[] +Similar to bind mounts, device mounts are not managed by the storage, but for +these the `quota` and `acl` options will be honored. + +.FUSE mounts + +WARNING: Because of existing issues in the Linux kernel's freezer +subsystem the usage of FUSE mounts inside a container is strongly +advised against, as containers need to be frozen for suspend or +snapshot mode backups. -.Typical Container 'rootfs' configuration +If FUSE mounts cannot be replaced by other mounting mechanisms or storage +technologies, it is possible to establish the FUSE mount on the Proxmox host +and use a bind mount point to make it accessible inside the container. + +.Typical Container `rootfs` configuration ---- rootfs: thin1:base-100-disk-1,size=8G ---- + Using quotas inside containers ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -- 2.39.2