Brandon Fosdick wrote:
Robert Watson wrote:
 > (1) Modifying the name space exclusion assumption for jails, so that the

   file system name spaces overlap.  One way to do this is with nullfs.

nullfs looks interesting. I was thinking about sharing files between jails 
using NFS, but it looks like nullfs would do the trick with better performance. 
Although the bugs section of the man page for mount_nullfs is rather scary. 
Does anyone have any experience with it? Does it actually work?

If the point here is to make /tmp/mysql.sock show up in another jail's file 
space, can I use a symlink instead? Can a jailed process see the target of the 
symlink?

Symlinks are just a path mapping mechanism performed by the kernel at lookup time, that is, before the actual access. In a jail only those parts of a filesystem are visible that are at or below the jail's root directory. The same goes for normal chroots. So if the symlink points to a location outside this scope you cannot access the object.

Hardlinks would work, but only if the jails concerned live in the same filesystem. Though they can of course be confined in separate, non-overlapping parts of that filesystem.

   Uwe
--
Uwe Doering         |  EscapeBox - Managed On-Demand UNIX Servers
[EMAIL PROTECTED]  |  http://www.escapebox.net
_______________________________________________
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Reply via email to