We're looking at changing lxc to show /dev/ptmx as a real file rather than 
symlink. This is however not particularly easy because:
 - It can't be a bind-mount from the host (or it will interact with the host's 
devpts)
 - It can't be a straight mknod (because that's not allowed in unprivileged 
containers)

So we're looking at re-ordering the liblxc code to setup a bind-mount
from /dev/pts/ptmx to /dev/ptmx INSIDE the container, which should work.

That part of the kernel has changed quite a bit, so making sure we don't
break things for supported kernels (2.6.32 or higher) is going to be a
bit tricky.


Note that there is nothing wrong with /dev/ptmx being a symlink to 
/dev/pts/ptmx and I'd argue it's actually "more right" than having it be a 
device node. But since that's not what udev/devtmpfs do, we probably should 
mimic the host's behavior.

** Changed in: lxd (Ubuntu)
       Status: New => Invalid

** Also affects: lxc (Ubuntu)
   Importance: Undecided
       Status: New

** Changed in: lxc (Ubuntu)
       Status: New => Triaged

** Changed in: lxc (Ubuntu)
   Importance: Undecided => Wishlist

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1684481

Title:
  KVM guest execution start apparmor blocks on /dev/ptmx now
  (regression?)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1684481/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to