tuning to run large (1000+) numbers of null_mounts
Kris Kennaway
kris at obsecurity.org
Wed Jan 18 12:19:43 PST 2006
On Wed, Jan 18, 2006 at 02:54:04PM -0500, Ensel Sharon wrote:
>
>
> On Wed, 18 Jan 2006, Kris Kennaway wrote:
>
> > > RISK. BEWARE OF DOG. SLIPPERY WHEN WET.
> > >
> > > So, based on this, all of my null_mounts are actually mounted read-only.
> >
> > As others have said, this is no longer applicable to FreeBSD 6.0, and
> > it's been removed from HEAD.
>
>
> hmmm...the cut and paste of that loud warning was from a 6.0-RELEASE man
> page ... if I need to be CURRENT to get the updated man page, do I also
> need to be CURRENT to get the safe null_mount code itself ?
>
> Or is 6.0-RELEASE safe ? (re: null_mount)
>
> Thanks a lot.
6.0-RELEASE is also safe. I only just removed the warning the other
day, but I'll also be merging it to 6.0-STABLE.
Kris
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 187 bytes
Desc: not available
Url : http://lists.freebsd.org/pipermail/freebsd-hackers/attachments/20060118/26a21a50/attachment.bin
More information about the freebsd-hackers
mailing list