Date: Mon, 15 Jun 2015 09:53:53 +0000 From: "Bjoern A. Zeeb" <bzeeb-lists@lists.zabbadoz.net> To: kikuchan@uranus.dti.ne.jp Cc: freebsd-jail@freebsd.org, freebsd-virtualization@freebsd.org Subject: Re: How to implement jail-aware SysV IPC (with my nasty patch) Message-ID: <2B7AA933-CB74-4737-8330-6E623A31C6DA@lists.zabbadoz.net> In-Reply-To: <cc18282ebe394476120a139239225782@imap.cm.dream.jp> References: <cc18282ebe394476120a139239225782@imap.cm.dream.jp>
next in thread | previous in thread | raw e-mail | index | archive | help
Hi, removed hackers, added virtualization. > On 12 Jun 2015, at 01:17 , kikuchan@uranus.dti.ne.jp wrote: >=20 > Hello, >=20 > I=E2=80=99m (still) trying to figure out how jail-aware SysV IPC = mechanism should be. The best way probably is to finally get the =E2=80=9Ccommon=E2=80=9D = VIMAGE framework into HEAD to allow easy virtualisation of other = services. That work has been sitting in perforce for a few years and = simply needs updating for sysctls I think. Then use that to virtualise things and have a vipc like we have vnets. = The good news is that you have identified most places and have the = cleanup functions already so it=E2=80=99d be a matter of transforming = your changes (assuming they are correct and working fine; haven=E2=80=99t = actually read the patch in detail;-) to the different infrastructure. = And that=E2=80=99s the easiest part. Bjoern
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?2B7AA933-CB74-4737-8330-6E623A31C6DA>