tuning to run large (1000+) numbers of null_mounts

Kris Kennaway kris at obsecurity.org
Wed Jan 18 12:19:43 PST 2006


On Wed, Jan 18, 2006 at 02:54:04PM -0500, Ensel Sharon wrote:
> 
> 
> On Wed, 18 Jan 2006, Kris Kennaway wrote:
> 
> > >      RISK.  BEWARE OF DOG.  SLIPPERY WHEN WET.
> > > 
> > > So, based on this, all of my null_mounts are actually mounted read-only.
> > 
> > As others have said, this is no longer applicable to FreeBSD 6.0, and
> > it's been removed from HEAD.
> 
> 
> hmmm...the cut and paste of that loud warning was from a 6.0-RELEASE man
> page ... if I need to be CURRENT to get the updated man page, do I also
> need to be CURRENT to get the safe null_mount code itself ?
> 
> Or is 6.0-RELEASE safe ? (re: null_mount)
> 
> Thanks a lot.

6.0-RELEASE is also safe.  I only just removed the warning the other
day, but I'll also be merging it to 6.0-STABLE.

Kris
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 187 bytes
Desc: not available
Url : http://lists.freebsd.org/pipermail/freebsd-hackers/attachments/20060118/26a21a50/attachment.bin


More information about the freebsd-hackers mailing list