From owner-freebsd-hackers@FreeBSD.ORG Mon Nov 30 14:29:57 2009 Return-Path: Delivered-To: freebsd-hackers@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id DD0C8106566C for ; Mon, 30 Nov 2009 14:29:56 +0000 (UTC) (envelope-from xorquewasp@googlemail.com) Received: from mail-ew0-f226.google.com (mail-ew0-f226.google.com [209.85.219.226]) by mx1.freebsd.org (Postfix) with ESMTP id 6814C8FC1F for ; Mon, 30 Nov 2009 14:29:56 +0000 (UTC) Received: by ewy26 with SMTP id 26so4147995ewy.3 for ; Mon, 30 Nov 2009 06:29:55 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=googlemail.com; s=gamma; h=domainkey-signature:received:received:received:received :x-authentication-warning:date:from:to:subject:message-id :mime-version:content-type:content-disposition; bh=xJdHvqWBsr+W7r9ojt2SlJZnSrL/X1N9Kqxg2V19qIQ=; b=MMWd74S7BlHxxNl2Y6GB59JG9J9Hf3TlGDtH62gqT8fEeLdsH9En4tU8zrIZM96JaT /KNH/c1DaMuWd+n6NItRhRZ6/QVEsWMnreMCvDRzrsf6cko3arub9cgjSOWS0oxxk3Bv lW9TE9R6C9wxMIA1QAJr5wfF3bpz0NjWuyT3U= DomainKey-Signature: a=rsa-sha1; c=nofws; d=googlemail.com; s=gamma; h=x-authentication-warning:date:from:to:subject:message-id :mime-version:content-type:content-disposition; b=QFKpT4PBPSsS8BnSUxthvubBg8UkmTwEUenSEZzweTCPksHgSt3FbBQ/nETVC54ZBX IIl7xn2mXhPgjZq+eKn5G5PxrnW3bheIudWOZ4S0R/TNuTKjfls6ZBpN/ZqcJAk+SCmm aAL1em+jMtOZ/OtqkWcjLMj4KWBHrtc3Af1rk= Received: by 10.216.88.85 with SMTP id z63mr1509023wee.129.1259591394707; Mon, 30 Nov 2009 06:29:54 -0800 (PST) Received: from viper.internal.network (dsl78-143-202-207.in-addr.fast.co.uk [78.143.202.207]) by mx.google.com with ESMTPS id g9sm10401301gvc.25.2009.11.30.06.29.53 (version=TLSv1/SSLv3 cipher=OTHER); Mon, 30 Nov 2009 06:29:54 -0800 (PST) Received: from viper.internal.network (localhost [127.0.0.1]) by viper.internal.network (Postfix) with ESMTP id 899774AC25 for ; Mon, 30 Nov 2009 14:29:51 +0000 (UTC) Received: (from m0@localhost) by viper.internal.network (8.14.3/8.14.3/Submit) id nAUETpYt088225 for freebsd-hackers@freebsd.org; Mon, 30 Nov 2009 14:29:51 GMT (envelope-from xorquewasp@googlemail.com) X-Authentication-Warning: viper.internal.network: m0 set sender to xorquewasp@googlemail.com using -f Date: Mon, 30 Nov 2009 14:29:50 +0000 From: xorquewasp@googlemail.com To: freebsd-hackers@freebsd.org Message-ID: <20091130142950.GA86528@logik.internal.network> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Subject: UNIX domain sockets on nullfs still broken? X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 30 Nov 2009 14:29:57 -0000 jackd (audio/jack) creates a directory in /tmp with a UNIX domain socket in it. Clients connect to this socket to communicate with the server. $ jackd -d oss -r 44100 -p 128 $ ls -alF /tmp/jack-11001/default total 4 drwx------ 2 xw wheel 512 30 Nov 14:19 ./ drwx------ 3 xw wheel 512 30 Nov 14:19 ../ prw-r--r-- 1 xw wheel 0 30 Nov 14:19 jack-ack-fifo-54211-0| prw-r--r-- 1 xw wheel 0 30 Nov 14:19 jack-ack-fifo-54211-1| prw-r--r-- 1 xw wheel 0 30 Nov 14:19 jack-ack-fifo-54211-2| srwxr-xr-x 1 xw wheel 0 30 Nov 14:19 jack_0= srwxr-xr-x 1 xw wheel 0 30 Nov 14:19 jack_ack_0= $ sudo mount_nullfs /tmp/ /jail/k4m/tmp In the jail: k4m$ ls -alF /tmp/jack-11001/default drwx------ 2 xw wheel 512 30 Nov 14:19 ./ drwx------ 3 xw wheel 512 30 Nov 14:19 ../ prw-r--r-- 1 xw wheel 0 30 Nov 14:19 jack-ack-fifo-54211-0| prw-r--r-- 1 xw wheel 0 30 Nov 14:19 jack-ack-fifo-54211-1| prw-r--r-- 1 xw wheel 0 30 Nov 14:19 jack-ack-fifo-54211-2| srwxr-xr-x 1 xw wheel 0 30 Nov 14:19 jack_0= srwxr-xr-x 1 xw wheel 0 30 Nov 14:19 jack_ack_0= k4m$ ktrace jack_showtime jack server not running? k4m$ kdump | grep '/tmp/jack-11001' 76030 initial thread STRU struct sockaddr { AF_LOCAL, /tmp/jack-11001/default/jack_0 } 76030 initial thread NAMI "/tmp/jack-11001/default/jack_0" 76030 initial thread RET connect -1 errno 61 Connection refused $ uname -a FreeBSD viper.internal.network 8.0-RELEASE FreeBSD 8.0-RELEASE #0: Sat Nov 21 15:02:08 UTC 2009 root@mason.cse.buffalo.edu:/usr/obj/usr/src/sys/GENERIC amd64 xw