public inbox for gentoo-user@lists.gentoo.org
 help / color / mirror / Atom feed
* [gentoo-user] /dev/shm in a Linux container
@ 2015-09-27 14:38 lee
  2015-09-27 15:06 ` Mike Gilbert
  0 siblings, 1 reply; 3+ messages in thread
From: lee @ 2015-09-27 14:38 UTC (permalink / raw
  To: gentoo-user

Hi,

when updating a guest in an LXC, emerging python pointed out a problem
with a broken /dev/shm.  So I found out how to mount /dev/shm in the
container and updated.

However, I'm wondering how secure that is, and I wonder if I should
leave it mounted or disable the mount.  It might be a very bad idea to
leave it mounted, and there's probably good reasons not to have it
mounted by default, yet I don't know if anything in the container might
use or need this mount after updating.


-- 
Again we must be afraid of speaking of daemons for fear that daemons
might swallow us.  Finally, this fear has become reasonable.


^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2015-09-27 15:35 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2015-09-27 14:38 [gentoo-user] /dev/shm in a Linux container lee
2015-09-27 15:06 ` Mike Gilbert
2015-09-27 15:35   ` Poison BL.

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox