Date: Wed, 18 Jan 2006 12:14:13 -0800 From: Doug Barton <dougb@FreeBSD.org> To: Ensel Sharon <user@dhp.com> Cc: freebsd-hackers@freebsd.org, Kris Kennaway <kris@obsecurity.org> Subject: Re: tuning to run large (1000+) numbers of null_mounts Message-ID: <43CEA195.5000708@FreeBSD.org> In-Reply-To: <Pine.LNX.4.21.0601181452360.8684-100000@shell.dhp.com> References: <Pine.LNX.4.21.0601181452360.8684-100000@shell.dhp.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Ensel Sharon wrote: > hmmm...the cut and paste of that loud warning was from a 6.0-RELEASE man > page ... if I need to be CURRENT to get the updated man page, do I also > need to be CURRENT to get the safe null_mount code itself ? > > Or is 6.0-RELEASE safe ? (re: null_mount) It probably wouldn't hurt to try upgrading to 6-stable. -- This .signature sanitized for your protection
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?43CEA195.5000708>