Bug 1223881 - udev events inside a super privileged container
Summary: udev events inside a super privileged container
Keywords:
Status: CLOSED CANTFIX
Alias: None
Product: Red Hat Enterprise Linux 7
Classification: Red Hat
Component: systemd
Version: 7.2
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: rc
: ---
Assignee: systemd-maint
QA Contact: qe-baseos-daemons
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2015-05-21 15:24 UTC by Fabian Deutsch
Modified: 2016-05-06 10:28 UTC (History)
11 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2015-05-22 12:03:31 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)

Description Fabian Deutsch 2015-05-21 15:24:43 UTC
Description of problem:
udev events are not available inside of an SPC (super privileged container), but some components (like vdsm from RHEV) require those events to work correctly.

We need a way to retrieve the udev events inside the container.

Version-Release number of selected component (if applicable):


How reproducible:


Steps to Reproduce:
1. run any SPC
2. On the host run udevadm monitor --udev --env
3. In the container run udevadm monitor --udev --env
4. On the host run udevadm trigger --action=change --subsystem-match=block

Actual results:
udevadm on the host shows the udev events
udevadm in the container does not show the udev events

Expected results:
udevadm in the container shows the udev events

Additional info:

Comment 7 Fabian Deutsch 2016-05-06 10:28:18 UTC
Time has passed.

A nice way to get custom udev rules onto the host might be, to use LABELs to name the udev rules which should be copied frmo the container onto the host.

I.e.

LABEL org.storaged.udev.rules /etc/…/foo.rule

This rule would be copied to the host each time a new image is deployed.

This drops the burden from the image/container to move the rule to the right place.
There is just a component needed on the host side to perform this acton.

This idea actually comes from cadvisor who is using labels to expose config files inside a container.

In addition: By dropping most namespaces and bindmounting /runevents should get inside of a container.


Note You need to log in before you can comment on or make changes to this bug.