Date: Sun, 16 Jul 2000 01:29:41 -0400 (EDT) From: Brian Fundakowski Feldman <green@FreeBSD.org> To: Robert Watson <robert@FreeBSD.org> Cc: freebsd-arch@FreeBSD.org Subject: Re: SysctlFS Message-ID: <Pine.BSF.4.21.0007160116310.877-100000@green.dyndns.org> In-Reply-To: <Pine.NEB.3.96L.1000715225806.23943A-100000@fledge.watson.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On Sat, 15 Jul 2000, Robert Watson wrote: > > > > Unless you can think of anything else that could possibly be the > > canonical namespace, struct vnode *rootvnode. > > On Coda diskless workstations, we have a kernel with an MFSROOT, and then > chroot processes to under the Coda tree. This technique is probably used > in other environments also (possibly NFS diskless boxes, et al?). One of > the traditional ambiguities in UNIX has been the nature of the root > directory -- it is defined specifically in the context of a process. > Chroot'd processes can chroot, and spawn processes that can then chroot. > Right there you can see three potential "real" root directories. :-) Now > imagine that jail() supported nesting... Yes, but there is always a mount entry for "/", and that is called rootvnode. If you'd prefer to think of it that way, it's often the same as proc0.p_fd->fd_fd.fd_rdir. We will always have a canonical root directory un{til,less} we move toward the Plan-9 design of per-process mount tables. If jail() supported a "breakout", it should only be to the canonical root, the first root, I believe. > That's one reason why I find the idea of absolute symlinks outside of the > chroot environment uncomfortable, and prefer some sort of light-weight > mount mechanism, or run-time constructed specialized links or the like, > rather than name-based construction. Well, it's just an idea. I fear there won't be a more elegant way of doing it short of per-process mount tables :) > Robert N M Watson > > robert@fledge.watson.org http://www.watson.org/~robert/ > PGP key fingerprint: AF B5 5F FF A6 4A 79 37 ED 5F 55 E9 58 04 6A B1 > TIS Labs at Network Associates, Safeport Network Services -- Brian Fundakowski Feldman \ FreeBSD: The Power to Serve! / green@FreeBSD.org `------------------------------' To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-arch" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.21.0007160116310.877-100000>