Glauber Costa <glommer@xxxxxxxxxxxxx> writes: > On 03/15/2013 07:21 PM, Serge Hallyn wrote: >> Quoting Glauber Costa (glommer@xxxxxxxxxxxxx): >>> On 03/15/2013 06:00 PM, Serge Hallyn wrote: >>>> Quoting Eric W. Biederman (ebiederm@xxxxxxxxxxxx): >>>>> Glauber Costa <glommer@xxxxxxxxxxxxx> writes: >>>>> >> Well shoot, I can't find it right now. Not even in Eric's git tree. >> IIRC upon lookup of /dev/pts it tried to find $rootfs/dev/pts/ptmx >> and open that instead. >> > Which gives a very good explanation about why haven't I seen it =) > Eric ? It is definitely in the development branches of my git tree. I have half a dozen patches that touch devpts. I believe the latest dev branch I have published is userns-always-map-user-v110. And the code is in there. They have not reached the top of my queue in importance at this time, and last time I was testing them there was a subtle race in something. I expect it was just a change in pty layer that I haven't followed closely enough. > What it a /dev/ptmx already exist? will it use it? That would be bad, > since that /dev/ptmx could be a host-side one. I actually believe > linking to $rootfs/dev/pts/ptmx is more robust than my solution against > remounts. So provided it can guarantee that the ptmx is not ever the > root ptmx, I would ack that. For those playing with udev, especially older udev where udev is still udev and creates devices you can use the following udev rule to create the pts/ptmx symlink. KERNEL=="ptmx" NAME:="pts/ptmx" SYMLINK="ptmx" Before we do anything clever in the kernel it is definitely worth seeing how far we can take that little udev rule. I have heard of no container that runs a distro's initrd, or uses the distro's code to mount root. So containers even for old distro's can and do tweak the distro's a little. It is worth keeping the tweaks small but udev and their kin are an important bit of that. As much as I hate the notion I suspect for most of device management what we want is to act like devtmpfs, and run all of the device node creation etc outside of the container (possibly even with bind mounts). Acting like devtmpfs should be something that is possible with no kernel changes. Whereas allowing unprivileged processes to create device nodes probably has issues I haven't thought of yet. Eric -- To unsubscribe from this list: send the line "unsubscribe linux-fsdevel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html