Am 31.08.2012 16:42, schrieb Jeff Cody: > On 08/30/2012 06:15 PM, Eric Blake wrote: >> On 08/30/2012 11:47 AM, Jeff Cody wrote: >>> This is derived from the Supriya Kannery's reopen patches. >>> >>> This contains the raw-posix driver changes for the bdrv_reopen_* >>> functions. All changes are staged into a temporary scratch buffer >>> during the prepare() stage, and copied over to the live structure >>> during commit(). Upon abort(), all changes are abandoned, and the >>> live structures are unmodified. >>> >>> The _prepare() will create an extra fd - either by means of a dup, >>> if possible, or opening a new fd if not (for instance, access >>> control changes). Upon _commit(), the original fd is closed and >>> the new fd is used. Upon _abort(), the duplicate/new fd is closed. >>> >> >>> + if ((raw_s->open_flags & ~fcntl_flags) == (s->open_flags & >>> ~fcntl_flags)) { >>> + /* dup the original fd */ >>> + /* TODO: use qemu fcntl wrapper */ >>> + raw_s->fd = fcntl(s->fd, F_DUPFD_CLOEXEC, 0); >> >> I assume this TODO has to be fixed to allow compilation on systems that >> lack F_DUPFD_CLOEXEC. > > Yes, either that or add the logic here.
Would qemu_dup_flags() from osdep.c be the right thing here? It was introduces with Corey's fd passing series. >>> + if (raw_s->fd == -1) { >>> + ret = -1; >>> + goto error; >>> + } >>> + ret = fcntl_setfl(raw_s->fd, raw_s->open_flags); >>> + } else { >>> + raw_s->fd = qemu_open(state->bs->filename, raw_s->open_flags, >>> 0644); >> >> Is raw_s->open_flags every going to contain O_CREAT, or is the 0644 mode >> argument spurious? > > Thanks, you are right, it is spurious. The raw_s->open_flags are > explicitly set via raw_parse_flags(), so we know it will never contain > O_CREAT. We can probably assert it. Kevin