[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20170907203610.GX5426@ZenIV.linux.org.uk>
Date: Thu, 7 Sep 2017 21:36:11 +0100
From: Al Viro <viro@...IV.linux.org.uk>
To: Gustavo Padovan <gustavo@...ovan.org>
Cc: linux-media@...r.kernel.org, Hans Verkuil <hverkuil@...all.nl>,
Mauro Carvalho Chehab <mchehab@....samsung.com>,
Shuah Khan <shuahkh@....samsung.com>,
linux-kernel@...r.kernel.org,
Gustavo Padovan <gustavo.padovan@...labora.com>,
linux-fsdevel@...r.kernel.org,
Riley Andrews <riandrews@...roid.com>
Subject: Re: [PATCH v3 14/15] fs/files: export close_fd() symbol
On Thu, Sep 07, 2017 at 03:42:25PM -0300, Gustavo Padovan wrote:
> From: Gustavo Padovan <gustavo.padovan@...labora.com>
>
> Rename __close_fd() to close_fd() and export it to be able close files
> in modules using file descriptors.
>
> The usecase that motivates this change happens in V4L2 where we send
> events to userspace with a fd that has file installed in it. But if for
> some reason we have to cancel the video stream we need to close the files
> that haven't been shared with userspace yet. Thus the export of
> close_fd() becomes necessary.
>
> fd_install() happens when we call an ioctl to queue a buffer, but we only
> share the fd with userspace later, and that may happen in a kernel thread
> instead.
NAK. As soon as the reference is in descriptor table, you *can't* do anything
to it. This "sharing" part is complete BS - being _told_ that descriptor is
there does not matter at all. That descriptor might be hit with dup2() as
soon as fd_install() has happened. Or be closed, or any number of other things.
You can not take it back. Once fd_install() is done, it's fucking done, period.
If V4L2 requires removing it from descriptor table, it's a shitty API and needs
to be fixed.
Again, NAK.
Powered by blists - more mailing lists