Date: Mon, 15 Jun 2015 09:53:53 +0000 From: "Bjoern A. Zeeb" <bzeeb-lists@lists.zabbadoz.net> To: kikuchan@uranus.dti.ne.jp Cc: freebsd-jail@freebsd.org, freebsd-virtualization@freebsd.org Subject: Re: How to implement jail-aware SysV IPC (with my nasty patch) Message-ID: <2B7AA933-CB74-4737-8330-6E623A31C6DA@lists.zabbadoz.net> In-Reply-To: <cc18282ebe394476120a139239225782@imap.cm.dream.jp> References: <cc18282ebe394476120a139239225782@imap.cm.dream.jp>
index | next in thread | previous in thread | raw e-mail
Hi, removed hackers, added virtualization. > On 12 Jun 2015, at 01:17 , kikuchan@uranus.dti.ne.jp wrote: > > Hello, > > I’m (still) trying to figure out how jail-aware SysV IPC mechanism should be. The best way probably is to finally get the “common” VIMAGE framework into HEAD to allow easy virtualisation of other services. That work has been sitting in perforce for a few years and simply needs updating for sysctls I think. Then use that to virtualise things and have a vipc like we have vnets. The good news is that you have identified most places and have the cleanup functions already so it’d be a matter of transforming your changes (assuming they are correct and working fine; haven’t actually read the patch in detail;-) to the different infrastructure. And that’s the easiest part. Bjoernhelp
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?2B7AA933-CB74-4737-8330-6E623A31C6DA>
