[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <17391.1245777648@redhat.com>
Date: Tue, 23 Jun 2009 18:20:48 +0100
From: David Howells <dhowells@...hat.com>
To: Alan Cox <alan@...rguk.ukuu.org.uk>
Cc: dhowells@...hat.com, Miklos Szeredi <miklos@...redi.hu>,
hch@...radead.org, linux-fsdevel@...r.kernel.org,
linux-kernel@...r.kernel.org, torvalds@...ux-foundation.org,
viro@...IV.linux.org.uk, adilger@....com, akpm@...ux-foundation.org
Subject: Re: [RFC] O_NOACC: open without any access
Alan Cox <alan@...rguk.ukuu.org.uk> wrote:
> Which means the device could be unloaded, something else loaded and your
> handle wouldn't be invalidated but would be stale ?
It would not be stale. The O_NOACC handle would effectively be a route to the
inode on the underlying fs, and so shouldn't affect normal opens that do get
routed to the device driver.
However, Miklos's O_FILESYSTEM suggestion would work as a differentiation to
O_NOACC, if you want the latter to go to the device driver.
> Perhaps it would make more sense to me if I knew why you needed to do this ?
How about I give you an example:
There's a pioctl to kick a file out of the local cache and reload it. AFS
symlinks are stored in the local cache, and so you might conceivably want to
eject one from the local cache on your machine. This is an operation on the
symlink object itself, _not_ on the target of the symlink.
However, unless I can open a symlink without it giving me an error or trying
to open the target, I cannot issue an ioctl() upon it.
Also, this is a command, not an attribute, and so using lsetxattr() is a bit
of a violation of semantics, and, furthermore, it's not an attribute of the
file.
Now, consider that I may, at some point in the future, or in some other netfs,
need to deal with device files. I may want to eject a dev file from the
cache; I might want to lock one into the cache. I need to affect the
filesystem object underlying the device file, not the device driver's opinion
of the device file. The device driver knows nothing about the filesystem's
local caching, and shouldn't have to deal with it. I need a way to operate on
a device file without (a) incurring ->open() side effects of a dev file, (b)
pestering the device driver, (c) incurring a failure because the dev file
doesn't have a corresponding driver, or (d) requiring permission to open that
dev file.
It is probably worth adding an fscachectl() syscall to handle caching commands,
since these are fairly simple and need to be applied to NFS as well as AFS, but
there are other file commands too (not just things that get attributes). See:
http://www.openafs.org/cgi-bin/cvsweb.cgi/openafs/doc/pdf/fscm-ispec.pdf?rev=1.1&content-type=text/x-cvsweb-markup
for more information.
David
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists