lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <C323F837.4E04%kenneth.schmidt@pnl.gov>
Date:	Sat, 29 Sep 2007 12:40:23 -0700
From:	"Schmidt, Kenneth P" <kenneth.schmidt@....gov>
To:	Jan Dittmer <jdi@....org>
CC:	Al Viro <viro@....linux.org.uk>,
	"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>
Subject: FW: [patch 01/02] vfs: variant symlinks



On 9/28/07 11:22 AM, "Jan Dittmer" <jdi@....org> wrote:

> Ken Schmidt wrote:
>> Variant symlinks add the ability to embed variables in to the
>> contents of symbolic links so their targets can change based on
>> outside sources (user environment, uts, filesystems, etc.)
> 
> Could you elaborate why this is needed and what part cannot
> be solved in userspace (linkfarm on tmpfs or intelligent
> scripts)?

Several networked filesystems (i.e. afs) have similar concepts.  This just
moves it into the vfs layer so that it can be used on all of them and even
local filesystems.

The best example of how this can be useful is to allow a heterogeneous
environment which uses a common filesystem. For example, both x86_64 and
power systems could mount a root nfs share and execute with a common set of
configurations and data, but the binary directories (bin and lib) could
point to architecture specific directories.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ