Quoting Michael H. Warfield (m...@wittsend.com):
> On Fri, 2013-11-01 at 15:03 -0500, Serge Hallyn wrote: 
> > Quoting Michael H. Warfield (m...@wittsend.com):
> > > The only place that's being used is in creating a symlink...
> > > 
> > > /dev/.lxc/$name -> /dev/.lxc/$pathhash
> > > 
> > > I use it for the same reason you wanted the extra bind mounts to
> > > $lxcpath/$lxcname.dev.  In your case, you wanted to see the dev mappings
> > 
> > Oh - gotcha.  Well in that case I'd say just create your own unique
> > $name.$index.  that should be enough info.
> 
> > Oh now unprivileged container creation of course will not be able
> > to do this as I won't be able to create /dev/.lxc/anything as uid
> > 1000.
> 
> Oh, we're going to have to look into that then.  We're doing other
> privileged operations like the bind mounts...  Hmmm...  It may have to

bind mounts are ok.  we can do this in a private mntns.  That's how
I currently get around our inability to mknod in a userns - I
bind mount devices from the host into the container's /dev.

-serge

------------------------------------------------------------------------------
Android is increasing in popularity, but the open development platform that
developers love is also attractive to malware creators. Download this white
paper to learn more about secure code signing practices that can help keep
Android apps secure.
http://pubads.g.doubleclick.net/gampad/clk?id=65839951&iu=/4140/ostg.clktrk
_______________________________________________
Lxc-devel mailing list
Lxc-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/lxc-devel

Reply via email to