diff options
author | Scott Murray <scott.murray@konsulko.com> | 2023-02-13 19:48:05 -0500 |
---|---|---|
committer | Scott Murray <scott.murray@konsulko.com> | 2023-02-13 19:48:05 -0500 |
commit | 0907a8b8f37e4374eba4f61a63dc29107bcf11f8 (patch) | |
tree | 6a865527bad885a16d9557596eb4172c395fadc6 /dynamic-layers/meta-agl-ic-container/recipes-container/lxc-config/lxc-config-agl-demo-platform/mount.in | |
parent | c111707a036678c92df8cf633a9ee74f11cdfb13 (diff) |
Add example IC EG container demo image
Changes:
- Add a meta-agl-ic-container dynamic layer hierarchy to hold
metadata dependent on the agl-ic-container feature.
- Add configuration to allow building the agl-demo-platform image
as a guest container with agl-ic-container.
- Add a agl-lxc-demo-platform image that uses agl-demo-platform as
the IVI guest container.
NOTE: While this image boots, further integration of IC EG work is
required to actually successfully boot the agl-demo-platform guest.
Bug-AGL: SPEC-4703
Change-Id: I60a46b6ae3c950c4aa25554639d7828462745bfa
Signed-off-by: Scott Murray <scott.murray@konsulko.com>
Diffstat (limited to 'dynamic-layers/meta-agl-ic-container/recipes-container/lxc-config/lxc-config-agl-demo-platform/mount.in')
-rw-r--r-- | dynamic-layers/meta-agl-ic-container/recipes-container/lxc-config/lxc-config-agl-demo-platform/mount.in | 17 |
1 files changed, 17 insertions, 0 deletions
diff --git a/dynamic-layers/meta-agl-ic-container/recipes-container/lxc-config/lxc-config-agl-demo-platform/mount.in b/dynamic-layers/meta-agl-ic-container/recipes-container/lxc-config/lxc-config-agl-demo-platform/mount.in new file mode 100644 index 000000000..262f09bdc --- /dev/null +++ b/dynamic-layers/meta-agl-ic-container/recipes-container/lxc-config/lxc-config-agl-demo-platform/mount.in @@ -0,0 +1,17 @@ +# lxc mount setting +lxc.mount.entry = /var/lib/lxc/ivi-demo/system.conf etc/systemd/system.conf.d/10-environment.conf none bind,optional,create=file + +lxc.mount.auto = cgroup:mixed proc:mixed sys:mixed +lxc.mount.entry = shm /dev/shm tmpfs defaults 0 0 +lxc.mount.entry = /sys/kernel/security sys/kernel/security none ro,bind,optional 0 0 +lxc.mount.entry = tmpfs run tmpfs defaults +lxc.mount.entry = /run/udev/data run/udev/data none ro,bind,optional,create=dir + +lxc.cgroup.devices.allow = c 226:* rwm +lxc.mount.entry = /dev/dri dev/dri none bind,optional,create=dir + +lxc.mount.entry = /run/drm-lease-manager/lease-ivi var/display/drm-lease-manager/lease none bind,create=file + +lxc.cgroup.devices.allow = c 13:* rwm +lxc.mount.entry = /dev/input dev/input none bind,optional,create=dir +lxc.mount.entry = /run/pipewire/pipewire-0 var/pipewire-0 none bind,optional,create=file |