From owner-freebsd-hackers Fri Jan 23 04:54:10 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id EAA28155 for hackers-outgoing; Fri, 23 Jan 1998 04:54:10 -0800 (PST) (envelope-from owner-freebsd-hackers@FreeBSD.ORG) Received: from word.smith.net.au (ppp11.portal.net.au [202.12.71.111]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id EAA28147 for ; Fri, 23 Jan 1998 04:54:05 -0800 (PST) (envelope-from mike@word.smith.net.au) Received: from word (localhost [127.0.0.1]) by word.smith.net.au (8.8.8/8.8.5) with ESMTP id XAA00609; Fri, 23 Jan 1998 23:15:40 +1030 (CST) Message-Id: <199801231245.XAA00609@word.smith.net.au> X-Mailer: exmh version 2.0zeta 7/24/97 To: "Alfred Perlstein" cc: daniel_sobral@voga.com.br, mike@smith.net.au, hackers@FreeBSD.ORG Subject: Re: uiomove() In-reply-to: Your message of "Fri, 23 Jan 1998 07:39:53 CDT." <199801230845.IAA11935@fang.cs.sunyit.edu> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Date: Fri, 23 Jan 1998 23:15:40 +1030 From: Mike Smith Sender: owner-freebsd-hackers@FreeBSD.ORG Precedence: bulk > I'm hoping i don't get yelled at here, but why not queue all subsequent > open operations and block those processes operations on the device? > at least until a read is done? This doesn't necessarily help; if a process holding an open descriptor on your device forks, there are now two processes holding open descriptors but there has been no second open() call. This has been discussed to death. > what's the point of an encryption card if you can't have multiple processes > acesses it, at least "transparently" in parrallel? I dunno, but the card in question performs stream, not block encryption, and there is no mechanism (that Daniel seems to know of anyway) to recover context from the card to allow switching streams. -- \\ Sometimes you're ahead, \\ Mike Smith \\ sometimes you're behind. \\ mike@smith.net.au \\ The race is long, and in the \\ msmith@freebsd.org \\ end it's only with yourself. \\