Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S965285AbVKIIOQ (ORCPT ); Wed, 9 Nov 2005 03:14:16 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S965297AbVKIIOQ (ORCPT ); Wed, 9 Nov 2005 03:14:16 -0500 Received: from fachschaft.cup.uni-muenchen.de ([141.84.250.61]:10633 "EHLO fachschaft.cup.uni-muenchen.de") by vger.kernel.org with ESMTP id S965285AbVKIIOQ (ORCPT ); Wed, 9 Nov 2005 03:14:16 -0500 Date: Wed, 9 Nov 2005 08:55:16 +0100 (CET) From: Oliver Neukum To: Jeff Garzik Cc: Linux Kernel , Jens Axboe Subject: Re: userspace block driver? In-Reply-To: <4371A4ED.9020800@pobox.com> Message-ID: References: <4371A4ED.9020800@pobox.com> MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 865 Lines: 24 On Wed, 9 Nov 2005, Jeff Garzik wrote: > > Has anybody put any thought towards how a userspace block driver would work? > > Consider a block device implemented via an SSL network connection. I don't > want to put SSL in the kernel, which means the only other alternative is to > pass data to/from a userspace daemon. I am afraid this is impossible without some heavy infrastructure work. You will almost inevitably deadlock. Yes, you can mlock() your driver, but that still will not tell the kernel that GFP_KERNEL must be replaced with GFP_NOIO if it is triggered by syscalls you are doing. Regards Oliver - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/