summaryrefslogtreecommitdiffstats
path: root/febootstrap.pod
diff options
context:
space:
mode:
authorRichard Jones <rjones@redhat.com>2009-05-11 14:51:22 +0100
committerRichard Jones <rjones@redhat.com>2009-05-11 15:41:41 +0100
commitd52fcf7521b8f9b1ec7bbeaaf93840af37d363cf (patch)
tree2e40039898704b34c73c42fa02b27a043ec0fe60 /febootstrap.pod
parente8d2809e31c5f4c937dc98239118855b2d1d006e (diff)
downloadfebootstrap-d52fcf7521b8f9b1ec7bbeaaf93840af37d363cf.tar.gz
febootstrap-d52fcf7521b8f9b1ec7bbeaaf93840af37d363cf.tar.xz
febootstrap-d52fcf7521b8f9b1ec7bbeaaf93840af37d363cf.zip
Be more careful about removing files in fakeroot during minimization.
Added febootstrap-install program.
Diffstat (limited to 'febootstrap.pod')
-rw-r--r--febootstrap.pod19
1 files changed, 14 insertions, 5 deletions
diff --git a/febootstrap.pod b/febootstrap.pod
index 109f6a2..e208603 100644
--- a/febootstrap.pod
+++ b/febootstrap.pod
@@ -129,8 +129,8 @@ so that yum thinks it is running as root. Fakeroot keeps track of
directory as C<I<TARGET>/fakeroot.log>.
This logfile is indexed by inode number, which makes certain
-operations safe and other operations unsafe. For example, deleting
-files is usually safe. Files should be replaced only by doing:
+operations safe and other operations unsafe.
+Files should be replaced only by doing:
echo updated-content > old-file
@@ -139,9 +139,12 @@ files is usually safe. Files should be replaced only by doing:
Deleting files and then creating new ones (even with a different name)
is usually unsafe, because the new files might reuse inodes claimed by
the old files, and so appear with peculiar permissions
-(eg. unreadable, or as a symbolic link). (XXX We need an
-C<febootstrap-install> utility to automate installing new files safely
-into a filesystem).
+(eg. unreadable, or as a symbolic link).
+
+Deleting files is also usually unsafe, although the reasons are more
+subtle. If you just use C<rm> then the inode number is not deleted
+from C<fakeroot.log> which means it can be reused by another file
+later on.
In most cases it's usually safest to use C<febootstrap-run>.
@@ -156,6 +159,11 @@ permissions.
=item *
+Use L<febootstrap-install(8)> to install a file with permissions
+in the root filesystem.
+
+=item *
+
Generate an initramfs (compressed cpio) file containing the correct
permissions using the tool C<febootstrap-to-initramfs>.
@@ -218,6 +226,7 @@ L<http://et.redhat.com/~rjones/febootstrap>
L<febootstrap-to-initramfs(8)>,
L<febootstrap-minimize(8)>,
L<febootstrap-run(8)>,
+L<febootstrap-install(8)>,
L<fakeroot(1)>,
L<fakechroot(1)>,
L<yum(8)>,