Alexander Viro wrote:
>
> On Mon, 13 May 2002, Peter Chubb wrote:
>
> > This is why in SVr4, struct cred is cloned at open time, and passed
> > down to each VFS operation.
>
> That doesn't work for shared mappings over holes. Unfortunately.
> Yes, credentials cache a-la 4.4BSD would help in many cases, but
> we have no reasonably credentials when kswapd writes a dirty page
> on disk. It _can_ cause allocations. And many processes might've
> touched that page until it finally got written out - which credentials
> would you use?
I'd rather have the check done when the page gets dirty in the
first place. Refuse the CoW if there is not diskspace to write
it back. Right now we can go beyond the diskspace we are allowed
to use and we will silently loose data if we go beyond the
available diskspace.
-- Kasper Dupont -- der bruger for meget tid på usenet. For sending spam use mailto:razor-report@daimi.au.dk - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
This archive was generated by hypermail 2b29 : Tue May 14 2002 - 12:00:19 EST