Return to BSD News archive
Newsgroups: comp.os.386bsd.development Path: sserve!newshost.anu.edu.au!munnari.oz.au!news.Hawaii.Edu!ames!haven.umd.edu!uunet!mcsun!dxcern!vxcrna.cern.ch!roeber From: roeber@vxcrna.cern.ch Subject: Re: A challenge to all true hackers: objects and types Message-ID: <1993Apr1.123723.1@vxcrna.cern.ch> Sender: news@dxcern.cern.ch (USENET News System) Reply-To: roeber@cern.ch Organization: CERN -- European Organization for Nuclear Research References: <1993Mar27.081223.2547@fcom.cc.utah.edu> <C4M2CH.1Cp@sugar.neosoft.com> <1993Mar30.234859.23609@fcom.cc.utah.edu> <C4rn9y.FMy@sugar.neosoft.com> Date: Thu, 1 Apr 1993 11:37:23 GMT Lines: 15 In article <C4rn9y.FMy@sugar.neosoft.com>, peter@NeoSoft.com (Peter da Silva) writes: > [...] > I'd suggest that getenv/putenv be a special case of a general logical > symbol name space, *AND* that that namespace be exposed to the file system > via (say) /env/pid/sym... This would provide a nice solution to the perennial problem of a process wanting to change its parent's environment. But I think it would expose a need to have a better security model: people are pretty used to strong firewalls between processes, even ones owned by the same user. -- Frederick G. M. Roeber | CERN -- European Center for Nuclear Research e-mail: roeber@cern.ch or roeber@caltech.edu | work: +41 22 767 31 80 r-mail: CERN/PPE, 1211 Geneva 23, Switzerland | home: +33 50 20 82 99