ugh.book
UFS: The Root of All Evil 267 That may be good by Unix standards, but it’s not great. Modern file systems use journaling, roll-b ...
268 The File System Date: Wed, 29 May 91 00:42:20 EDT From:
[email protected]
(Curtis Fennell)^3 Subject: Mixed up mail To: all-ai ...
UFS: The Root of All Evil 269 Good luck. We spoke with the current system administrator at the MIT AI Lab about this problem. He ...
270 The File System might be useful. Few people, that is, except for Macintosh users, who have known and enjoyed file types sinc ...
UFS: The Root of All Evil 271 hackers finally realized that lock files had to be made and maintained, they came up with the “loc ...
272 The File System AT&T, meanwhile, was trying to sell Unix into the corporate market, where record locking was required. I ...
UFS: The Root of All Evil 273 Only the Most Perfect Disk Pack Need Apply One common problem with Unix is perfection: while offer ...
274 The File System ber stored in a structure), and obtains a nonsensical value. What to do? Unix could abort the operation (ret ...
UFS: The Root of All Evil 275 Recall that Unix does place one hard-and-fast restriction on filenames: they may never, ever conta ...
276 The File System Moving Your Directories Historically, Unix provides no tools for maintaining recursive directories of files. ...
UFS: The Root of All Evil 277 inconsistencies when directory hierarchies are replicated. Filenames that were linked in the origi ...
278 The File System Weird, huh? It’s sort of like someone who sets his watch five minutes ahead and then arrives five minutes la ...
UFS: The Root of All Evil 279 Unfortunately, the whole underlying design of the Unix file system—direc- tories that are virtuall ...
282 ...
14 NFS Nightmare File System The “N” in NFS stands for Not, or Need, or perhaps Nightmare. —Henry Spencer In the mid-1980s, Sun ...
284 NFS NFS file servers simplify network management because only one computer need be regularly written to backup tape. NFS le ...
Not Fully Serviceable 285 By design, NFS is connectionless and stateless. In practice, it is neither. This conflict between desi ...
286 NFS Example #1: NFS is stateless, but many programs designed for Unix systems require record locking in order to guarantee ...
No File Security 287 is an exercise left to the reader.) But this hack doesn’t work over NFS. The stateless protocol doesn't kno ...
288 NFS MIT’s Project Athena attempted to add security to NFS using a network security system called Kerberos. True to its name, ...
«
9
10
11
12
13
14
15
16
17
18
»
Free download pdf