| Property | Value |
|---|---|
| OID | 7ffffce3.7ffffd41 |
| Description | Jails |
| Label | |
| Type | node |
| Format | N |
| Flags |
|
| Child | Description |
|---|---|
| security.jail.mount_debugfs_allowed | Jail may mount the debugfs file system (deprecated) |
| security.jail.mount_anon_inodefs_allowed | Jail may mount the anon_inodefs file system (deprecated) |
| security.jail.mount_devfs_allowed | Jail may mount the devfs file system (deprecated) |
| security.jail.mount_tmpfs_allowed | Jail may mount the tmpfs file system (deprecated) |
| security.jail.mount_procfs_allowed | Jail may mount the procfs file system (deprecated) |
| security.jail.param | Jail parameters |
| security.jail.devfs_ruleset | Ruleset for the devfs filesystem in jail (deprecated) |
| security.jail.enforce_statfs | Processes in jail cannot see all mounted file systems (deprecated) |
| security.jail.mount_allowed | Processes in jail can mount/unmount jail-friendly file systems (deprecated) |
| security.jail.chflags_allowed | Processes in jail can alter system file flags (deprecated) |
| security.jail.allow_raw_sockets | Prison root can create raw sockets (deprecated) |
| security.jail.sysvipc_allowed | Processes in jail can use System V IPC primitives (deprecated) |
| security.jail.socket_unixiproute_only | Processes in jail are limited to creating UNIX/IP/route sockets only (deprecated) |
| security.jail.set_hostname_allowed | Processes in jail can set their hostnames (deprecated) |
| security.jail.jail_max_af_ips | Number of IP addresses a jail may have at most per address family (deprecated) |
| security.jail.vnet | Jail owns vnet? |
| security.jail.jailed | Process in jail? |
| security.jail.list | List of active jails |