> I'm trying to write an AFS syscall framework for the Linux kernel that can do
> two things:
Pick any 2? ;-)
> (1) Handle PAGs without the need to subvert the groups list and override the
> set/getgroups syscalls.
>
> (2) Cache authentication data per PAG, doing garbage collection automatically
> when a PAG no longer has any attached processes.
>
> (3) Pass other AFS syscall operations to interfaces in whatever AFS
> filesystem module is currently loaded (OpenAFS, Arla, etc.).
>
> However, (3) is somewhat tricky as the interface isn't very consistent. For
> instance, it would appear that all PIOCTL commands should require a path, but
> some of them don't:-/ I don't know why these commands were made PIOCTLs rather
> than using the CALL interface, but it makes multiplexing in the core kernel
> more difficult.
History. Realistically I'd only worry about pioctls that do take a path,
and assume the others will be handled some other way. In fact:
> I'm wondering how attached OpenAFS is to this interface? Can OpenAFS be
> altered to use the following access points instead:
Generally I think this interface will work. I have a few questions:
> (1) setpag(pag_t pag)
If you don't specify a pag it should allocate you one, and for non-priviledged
users this should be the only allowed mode.
> (2) getpag()
I assume:
fs is a text representation of whose filesystem you're doing this for?
("openafs", "arla", etc)
domain is what's typically referred to as an afs cell
I'd also like to see a priviledged "unsetpag()", e.g. I no longer wish to be
in a pag.
> (3) settok(const char *fs, const char *domain, size_t size, const void *data)
>
> (4) gettok(const char *fs, const char *domain, size_t size, void *data)
>
> (5) deltok(const char *fs, const char *domain)
>
> (6) cleartoks(const char *fs)
Currently it's possible to set a token when you have no pag, and these
become associated with the uid that set them. (The pag number is not the uid;
Instead any process without a pag but with a uid that has tokens associated
with it gets those tokens.) As long as the above don't bind tightly to a pag,
sure.
As to pioctl, will it be able to handle things where path cannot be stat'd
in advance? For instance, the prefetching hint (VIOCPREFETCH), if you
could stat it, it wouldn't be a prefetch. Another concern there would be
dangling mount points (a mount point you still have to a volume that's
been deleted) when calling VIOC_AFS_DELETE_MT_PT or VIOC_AFS_STAT_MT_PT.
As long as this is doable, we will conform.
> (7) pioctl(const char *path, int cmd, void *arg, int followsymlinks)
>
> (Where path is mandatory.)
>
> It may be possible to replace this entirely with calls to setxattr and
> co. from userspace... apart from VIOC_AFS_STAT_MT_PT that is, and that
> could be done with open/ioctl/close on the directory.
To the extent we can we'd avoid relying on this (8), but I think we'll need it
for now.
> (8) fsctl(const char *fs, const char *cmd, struct fsctl_buf)
>
> Using:
>
> struct fsctl_buf { size_t in_size, out_size; void *in, *out; };
>
> All miscellaneous ops would be done through this. It would work
> internally as nfsservctl does in 2.5.
The only other concern is transition for existing sites, and that need not
be done in the kernel. All we ask is the current "afs syscall" number be
left vacant, and sites that care can patch their kernel. Nothing need be
distributed.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/