On 2010-10-13, Kostik Belousov wrote: > You might consider creating some well-controlled name instead of failed > one, and printing a diagnostic describing what happen. Couldn't this cause a security problem or POLA violation with devfs rules? Name based rules may be used to hide devices or change device permissions. -- Jaakko