In the current union mount design, files that will be modified are copied up from the lower layer file system to the top layer at open() time. However, there are three cases in which metadata can be modified through a file descriptor opened O_RDONLY: fchown(), fchmod(), and utimensat(). Currently, we only copy up a file before it is open, never after. Implementing these system calls would require replacing the read-only open file descriptor from the lower file system with a new file descriptor from the topmost layer - in other words, a huge nasty hack. My question: How often do applications actually attempt fchown(), fchmod(), or utimensat() on an O_RDONLY file descriptor? Would it break a lot of applications if a union mount file returned EBADF or EPERM in this case? -VAL -- To unsubscribe from this list: send the line "unsubscribe linux-fsdevel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html