Skip to content

Commit 41e6e6a

Browse files
committed
config-linux: Drop the default-filesystem section
Users who need these mounts would have to explicitly set them up in their configuration (as runtime-tools continues to do [1]) if they wanted to guarantee their presence. Users who don't need them can omit them from their configuration. I don't see how keeping a SHOULD-strength runtime requirement helps either of those workflows. [1]: opencontainers/runtime-tools#24 Signed-off-by: W. Trevor King <[email protected]>
1 parent 7278567 commit 41e6e6a

File tree

1 file changed

+0
-14
lines changed

1 file changed

+0
-14
lines changed

config-linux.md

Lines changed: 0 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -3,20 +3,6 @@
33
This document describes the schema for the [Linux-specific section](config.md#platform-specific-configuration) of the [container configuration](config.md).
44
The Linux container specification uses various kernel features like namespaces, cgroups, capabilities, LSM, and filesystem jails to fulfill the spec.
55

6-
## Default Filesystems
7-
8-
The Linux ABI includes both syscalls and several special file paths.
9-
Applications expecting a Linux environment will very likely expect these file paths to be setup correctly.
10-
11-
The following filesystems SHOULD be made available in each container's filesystem:
12-
13-
| Path | Type |
14-
| -------- | ------ |
15-
| /proc | [procfs](https://www.kernel.org/doc/Documentation/filesystems/proc.txt) |
16-
| /sys | [sysfs](https://www.kernel.org/doc/Documentation/filesystems/sysfs.txt) |
17-
| /dev/pts | [devpts](https://www.kernel.org/doc/Documentation/filesystems/devpts.txt) |
18-
| /dev/shm | [tmpfs](https://www.kernel.org/doc/Documentation/filesystems/tmpfs.txt) |
19-
206
## Namespaces
217

228
A namespace wraps a global system resource in an abstraction that makes it appear to the processes within the namespace that they have their own isolated instance of the global resource.

0 commit comments

Comments
 (0)