|From:||"Michael Kerrisk" <mtk.manpages-AT-gmail.com>|
|To:||"Alan Cox" <alan-AT-lxorguk.ukuu.org.uk>|
|Subject:||Re: [PATCH] alternative to sys_indirect, part 1|
|Date:||Thu, 24 Apr 2008 14:34:27 +0200|
|Cc:||"Ulrich Drepper" <drepper-AT-redhat.com>, linux-kernel-AT-vger.kernel.org, netdev-AT-vger.kernel.org, akpm-AT-linux-foundation.org, "Linus Torvalds" <torvalds-AT-linux-foundation.org>, "Michael Kerrisk" <mtk.manpages-AT-gmail.com>, michael.kerrisk-AT-gmail.com, linux-man-AT-vger.kernel.org|
On 4/24/08, Alan Cox <firstname.lastname@example.org> wrote: > > - I decided against using the O_* flags here. Most are not useful and > > we might need the bits for something else at some time. Hence the > > new SOCKFL_* flag. The intend is to define SOCKFL_CLOEXEC and > > O_CLOEXEC to the same value. In this case there is zero overhead. > > > Given we will never have 2^32 socket types, and in a sense this is part > of the type why not just use > > socket(PF_INET, SOCK_STREAM|SOCK_CLOEXEC, ...) > > that would be far far cleaner, no new syscalls on the socket side at all. That''s not quite true. There is still the problem of accept(). It's worth trying to summarize all of the syscalls that create file descriptors to get a handle on how many new syscalls might really be required. AFAIK, the list below is all of the syscalls that create FDs on Linux. The following system calls all have a flags argument that either already has a O_CLOEXEC functionality, or to which that functionality could be added: * open() * openat() * fcntl(F_DUPFD) * timerfd_create() * mq_open() (on Linux MQ descriptors are really just file descriptors) For the following system calls, we could overload another argument for the purpose: * socket() (using the 'type' argument, as per Alan's suggestion) The following syscalls don't have a flags argument, but does it matter? For each of them there is an alternative API that can be used instead, if the functionality is required. * dup2() -- use fcntl(F_DUPFD) instead * dup() -- use fcntl(F_DUPFD) instead * creat() -- use open() instead The following system call doesn't have a flags argument, but we could conceivably overload the existing 'fd' argument. When creating a new file descriptor, the 'fd' argument must be -1. We could say that to create a new fd, the argument must be say NEW_SIGNALFD, defined as -MAXINT, ORed with the desired flags. * signalfd() (glibc API supplies a flags argument, but the syscall doesn't have one) The following system calls don't have a flags argument, and the only way to solve the problem is a new syscall, or sys_indirect(). * eventfd() (glibc API supplies a flags argument, but the syscall doesn't have one) * accept() * pipe() * inotify_init() * epoll_create() So the alternative to sys_indirect(), at least for the purpose of O_CLOEXEC and similar, would be to create 5 new system calls (or six, if one finds the signalfd() hack too ugly, which perhaps it is; or 7 if one doesn't like Alan's suggestion for socket() -- if one went the route of new syscalls, then I'd suggest creating a new socket()-type syscall with a flags argument). Cheers, Michael -- I'll likely only see replies if they are CCed to mtk.manpages at gmail dot com -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to email@example.com More majordomo info at http://vger.kernel.org/majordomo-info.html
Copyright © 2008, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds