Date: Fri, 16 Apr 1999 12:55:37 -0700 (PDT) From: Matthew Dillon <dillon@apollo.backplane.com> To: Greg Black <gjb-freebsd@gba.oz.au> Cc: "Andrew J. Korty" <ajk@purdue.edu>, freebsd-hackers@FreeBSD.ORG Subject: Re: Entombing for FreeBSD Message-ID: <199904161955.MAA59781@apollo.backplane.com> References: <199904160332.WAA28377@poynting.physics.purdue.edu> <19990416113734.18605.qmail@alice.gba.oz.au>
next in thread | previous in thread | raw e-mail | index | archive | help
:> We think entombing is an elegant solution for a very common problem. :> It saves users time because it makes most of their mistakes :> reversible. Systems administrators profit as well, since entombing :> allows them to avoid the time-consuming task of restoring files :> from tape. I can't remember the last restore I did! : :If we're restricting this to restoring lost files, I can't :remember the last time I did that either. It was certainly more :than 15 years ago. I don't use entombing. Can't see the point. : :-- :Greg Black <gjb@acm.org> I've been thinking about this enombing thing... well, I hate to say it, but crowbaring into libc is *not* the right way to do it. It's just too intrusive. The right way to do it would be to write a device driver similar to NULLFS which handles backing up the files, thus giving the sysad the option to use such a device to mount-through those partitions that the sysad wants to keep checkpointed. Also, putting such intrusive code into libc would be fairly dangreous from a security point of view even if it is turned off. -Matt Matthew Dillon <dillon@backplane.com> To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199904161955.MAA59781>