Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1750989AbWCIJyK (ORCPT ); Thu, 9 Mar 2006 04:54:10 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1751782AbWCIJyK (ORCPT ); Thu, 9 Mar 2006 04:54:10 -0500 Received: from pproxy.gmail.com ([64.233.166.182]:7641 "EHLO pproxy.gmail.com") by vger.kernel.org with ESMTP id S1750989AbWCIJyI (ORCPT ); Thu, 9 Mar 2006 04:54:08 -0500 DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=gmail.com; h=received:message-id:date:from:user-agent:mime-version:to:cc:subject:references:in-reply-to:content-type:content-transfer-encoding; b=k1g8tarS8UZlQmzM75jJfsIQYmOPTYTi7e3I76cDbVh18AT2lVJjInZ0HynljLBmueZci34uhZDe4JSEjPmaUVV07TZ4efBT3A/LeNN04OohFA9l+whkg38KCmZtEg6eI5bq8KJhOtQ0A/kGuTyRw5LMj6B8PY429BJRU84jnXs= Message-ID: <440FFB7F.8050902@gmail.com> Date: Thu, 09 Mar 2006 17:55:11 +0800 From: Yi Yang User-Agent: Thunderbird 1.5 (Windows/20051201) MIME-Version: 1.0 To: Arjan van de Ven CC: LKML , Andrew Morton Subject: Re: [2.6.16-rc5-m3 PATCH] inotify: add the monitor for the event source References: <440F075F.1030404@gmail.com> <1141836798.12175.1.camel@laptopd505.fenrus.org> <440FBA9C.3050109@gmail.com> <1141882513.2883.2.camel@laptopd505.fenrus.org> In-Reply-To: <1141882513.2883.2.camel@laptopd505.fenrus.org> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2775 Lines: 77 Arjan van de Ven wrote: > On Thu, 2006-03-09 at 13:18 +0800, Yi Yang wrote: > >> Arjan van de Ven wrote: >> >>> On Thu, 2006-03-09 at 00:33 +0800, Yi Yang wrote: >>> >>> >>>> Current inotify implementation only focus on change of file system, but it doesn't >>>> know who results in this change, this patch adds three fields to struct inotify_event, >>>> tgid, uid and gid, they will save process ID, user ID and user group ID of the process >>>> which leads to change in the file system, such software as anti-virus can make use >>>> of this feature to monitor who is modifying a specific file. >>>> >>>> >>> this patch appears to change the ABI! That is bad bad bad. >>> >>> >> a change of struct inotify_event can't change ABI, can you describe it >> more clear? >> > > it breaks ABI because this structure is communicated to userspace, and > you change both the layout and the size of it. What else would ABI > mean?? > Many structures exported to user space in kernel are undergoing some change, A good application shouldn't count on invariability forever, My test application hasn't any problem before change and after change. > > >>> Also, how can you guarantee that "current" is valid and meaningful at >>> the place you use it to get the user id ?? >>> >>> >> Of course, current process/thread never disappears before fsnotify_* >> returns. >> > > but... what makes you think it's not a kernel thread such as kjournald? > (which have basically meaningless current) > you can get values of these fields without any problem for kernel thread although they are useless. > > >>> Also the process ID part is really bogus, after all the process may have >>> exited by the time the inotify client gets to it, and the PID may even >>> already have been reused. >>> >>> >>> >> Your concern is correct, but uid and git can give out some hints, I ever >> considered to >> save the name of current process, however that needs a bigger and >> length-variable >> inotify_event struct, moreover, to get the full path name of current >> process/thread >> in kernel will have a big overhead, so I must select a comprise way. >> > > there is no "full path name" concept in linux like that. And even worse, > many processes will not have *any* path because they have been deleted, > especially the viruses will use this ;) > For this case you said, this patch has now way really, do you have a good way to handle this case? > > > - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/