Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 15 Jun 2015 09:53:53 +0000
From:      "Bjoern A. Zeeb" <bzeeb-lists@lists.zabbadoz.net>
To:        kikuchan@uranus.dti.ne.jp
Cc:        freebsd-jail@freebsd.org, freebsd-virtualization@freebsd.org
Subject:   Re: How to implement jail-aware SysV IPC (with my nasty patch)
Message-ID:  <2B7AA933-CB74-4737-8330-6E623A31C6DA@lists.zabbadoz.net>
In-Reply-To: <cc18282ebe394476120a139239225782@imap.cm.dream.jp>
References:  <cc18282ebe394476120a139239225782@imap.cm.dream.jp>

index | next in thread | previous in thread | raw e-mail

Hi,

removed hackers, added virtualization.


> On 12 Jun 2015, at 01:17 , kikuchan@uranus.dti.ne.jp wrote:
> 
> Hello,
> 
> I’m (still) trying to figure out how jail-aware SysV IPC mechanism should be.

The best way probably is to finally get the “common” VIMAGE framework into HEAD to allow easy virtualisation of other services.  That work has been sitting in perforce for a few years and simply needs updating for sysctls I think.

Then use that to virtualise things and have a vipc like we have vnets.  The good news is that you have identified most places and have the cleanup functions already so it’d be a matter of transforming your changes (assuming they are correct and working fine; haven’t actually read the patch in detail;-)  to the different infrastructure.  And that’s the easiest part.


Bjoern



help

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?2B7AA933-CB74-4737-8330-6E623A31C6DA>