*BSD News Article 13845


Return to BSD News archive

Newsgroups: comp.os.386bsd.development
Path: sserve!newshost.anu.edu.au!munnari.oz.au!news.Hawaii.Edu!ames!haven.umd.edu!uunet!mcsun!dxcern!vxcrna.cern.ch!roeber
From: roeber@vxcrna.cern.ch
Subject: Re: A challenge to all true hackers: objects and types
Message-ID: <1993Apr1.123723.1@vxcrna.cern.ch>
Sender: news@dxcern.cern.ch (USENET News System)
Reply-To: roeber@cern.ch
Organization: CERN -- European Organization for Nuclear Research
References: <1993Mar27.081223.2547@fcom.cc.utah.edu> <C4M2CH.1Cp@sugar.neosoft.com> <1993Mar30.234859.23609@fcom.cc.utah.edu> <C4rn9y.FMy@sugar.neosoft.com>
Date: Thu, 1 Apr 1993 11:37:23 GMT
Lines: 15

In article <C4rn9y.FMy@sugar.neosoft.com>, peter@NeoSoft.com (Peter da Silva) writes:
> [...]
> I'd suggest that getenv/putenv be a special case of a general logical
> symbol name space, *AND* that that namespace be exposed to the file system
> via (say) /env/pid/sym...

This would provide a nice solution to the perennial problem of a process
wanting to change its parent's environment.  But I think it would expose 
a need to have a better security model: people are pretty used to strong
firewalls between processes, even ones owned by the same user.

-- 
Frederick G. M. Roeber | CERN -- European Center for Nuclear Research
e-mail: roeber@cern.ch or roeber@caltech.edu | work: +41 22 767 31 80
r-mail: CERN/PPE, 1211 Geneva 23, Switzerland | home: +33 50 20 82 99