Skip to content

Commit ba60acf

Browse files
committed
Add documentation about running postmasters in FreeBSD jails (use
separate users).
1 parent fac2ba5 commit ba60acf

File tree

1 file changed

+13
-1
lines changed

1 file changed

+13
-1
lines changed

doc/src/sgml/runtime.sgml

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
<!-- $PostgreSQL: pgsql/doc/src/sgml/runtime.sgml,v 1.366 2006/04/03 23:35:02 tgl Exp $ -->
1+
<!-- $PostgreSQL: pgsql/doc/src/sgml/runtime.sgml,v 1.367 2006/04/11 19:26:42 momjian Exp $ -->
22

33
<chapter Id="runtime">
44
<title>Operating System Environment</title>
@@ -763,6 +763,18 @@ options "SEMMNS=240"
763763
setting <literal>kern.ipc.shm_use_phys</literal>.
764764
</para>
765765

766+
<para>
767+
If running in FreeBSD jails by enabling <application>sysconf</>'s
768+
<literal>security.jail.sysvipc_allowed</>, <application>postmaster</>s
769+
running in different jails should be run by different operating system
770+
users. This improves security because it prevents one jail from
771+
interfering with shared memory or semaphores in another, and it
772+
allows the PostgreSQL IPC cleanup code to function properly.
773+
(In FreeBSD 6.0 and later the IPC cleanup code doesn't properly detect
774+
processes in other jails, preventing the running of postmasters on the
775+
same port in different jails.)
776+
</para>
777+
766778
<para>
767779
<systemitem class="osname">FreeBSD</> versions before 4.0 work like
768780
<systemitem class="osname">NetBSD</> and <systemitem class="osname">

0 commit comments

Comments
 (0)
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy