From owner-freebsd-virtualization@FreeBSD.ORG Mon Jun 15 09:54:11 2015 Return-Path: Delivered-To: freebsd-virtualization@hub.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 5341FFE7; Mon, 15 Jun 2015 09:54:11 +0000 (UTC) (envelope-from bzeeb-lists@lists.zabbadoz.net) Received: from mx1.sbone.de (mx1.sbone.de [IPv6:2a01:4f8:130:3ffc::401:25]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client CN "mx1.sbone.de", Issuer "SBone.DE" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 0CA9C8AF; Mon, 15 Jun 2015 09:54:10 +0000 (UTC) (envelope-from bzeeb-lists@lists.zabbadoz.net) Received: from mail.sbone.de (mail.sbone.de [IPv6:fde9:577b:c1a9:31::2013:587]) (using TLSv1 with cipher ADH-CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) by mx1.sbone.de (Postfix) with ESMTPS id 6418725D385E; Mon, 15 Jun 2015 09:53:58 +0000 (UTC) Received: from content-filter.sbone.de (content-filter.sbone.de [IPv6:fde9:577b:c1a9:31::2013:2742]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.sbone.de (Postfix) with ESMTPS id A0B5CC77036; Mon, 15 Jun 2015 09:53:57 +0000 (UTC) X-Virus-Scanned: amavisd-new at sbone.de Received: from mail.sbone.de ([IPv6:fde9:577b:c1a9:31::2013:587]) by content-filter.sbone.de (content-filter.sbone.de [fde9:577b:c1a9:31::2013:2742]) (amavisd-new, port 10024) with ESMTP id DoU4RFTYq7x1; Mon, 15 Jun 2015 09:53:56 +0000 (UTC) Received: from [IPv6:fde9:577b:c1a9:4420:cabc:c8ff:fe8b:4fe6] (orange-tun0-ula.sbone.de [IPv6:fde9:577b:c1a9:4420:cabc:c8ff:fe8b:4fe6]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.sbone.de (Postfix) with ESMTPSA id B88BAC76FD3; Mon, 15 Jun 2015 09:53:54 +0000 (UTC) Content-Type: text/plain; charset=utf-8 Mime-Version: 1.0 (Mac OS X Mail 8.2 \(2098\)) Subject: Re: How to implement jail-aware SysV IPC (with my nasty patch) From: "Bjoern A. Zeeb" In-Reply-To: Date: Mon, 15 Jun 2015 09:53:53 +0000 Cc: freebsd-jail@freebsd.org, freebsd-virtualization@freebsd.org Content-Transfer-Encoding: quoted-printable Message-Id: <2B7AA933-CB74-4737-8330-6E623A31C6DA@lists.zabbadoz.net> References: To: kikuchan@uranus.dti.ne.jp X-Mailer: Apple Mail (2.2098) X-BeenThere: freebsd-virtualization@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: "Discussion of various virtualization techniques FreeBSD supports." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 15 Jun 2015 09:54:11 -0000 Hi, removed hackers, added virtualization. > On 12 Jun 2015, at 01:17 , kikuchan@uranus.dti.ne.jp wrote: >=20 > Hello, >=20 > I=E2=80=99m (still) trying to figure out how jail-aware SysV IPC = mechanism should be. The best way probably is to finally get the =E2=80=9Ccommon=E2=80=9D = VIMAGE framework into HEAD to allow easy virtualisation of other = services. That work has been sitting in perforce for a few years and = simply needs updating for sysctls I think. Then use that to virtualise things and have a vipc like we have vnets. = The good news is that you have identified most places and have the = cleanup functions already so it=E2=80=99d be a matter of transforming = your changes (assuming they are correct and working fine; haven=E2=80=99t = actually read the patch in detail;-) to the different infrastructure. = And that=E2=80=99s the easiest part. Bjoern