From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from psmtp.com (na3sys010amx145.postini.com [74.125.245.145]) by kanga.kvack.org (Postfix) with SMTP id A68866B0031 for ; Sat, 13 Jul 2013 20:57:22 -0400 (EDT) Received: by mail-ie0-f177.google.com with SMTP id aq17so22182244iec.8 for ; Sat, 13 Jul 2013 17:57:22 -0700 (PDT) Message-ID: <51E1F769.7090208@gmail.com> Date: Sun, 14 Jul 2013 08:57:13 +0800 From: Sam Ben MIME-Version: 1.0 Subject: Re: RFC: named anonymous vmas References: <20130622103158.GA16304@infradead.org> <20130624114832.GA9961@infradead.org> In-Reply-To: <20130624114832.GA9961@infradead.org> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Sender: owner-linux-mm@kvack.org List-ID: To: Christoph Hellwig Cc: Alex Elsayed , linux-mm@kvack.org, linux-kernel@vger.kernel.org Hi Christoph, On 06/24/2013 07:48 PM, Christoph Hellwig wrote: > On Sat, Jun 22, 2013 at 12:47:29PM -0700, Alex Elsayed wrote: >> Couldn't this be done by having a root-only tmpfs, and having a userspace >> component that creates per-app directories with restrictive permissions on >> startup/app install? Then each app creates files in its own directory, and >> can pass the fds around. > Honestly having a device that allows passing fds around that can be > mmaped sounds a lot simpler. I have to admit that I expect /dev/zero > to do this, but looking at the code it creates new file structures > at ->mmap time which would defeat this. Could you point out where done this? > > -- > To unsubscribe, send a message with 'unsubscribe linux-mm' in > the body to majordomo@kvack.org. For more info on Linux MM, > see: http://www.linux-mm.org/ . > Don't email: email@kvack.org -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@kvack.org. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: email@kvack.org From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752025Ab3GNA5X (ORCPT ); Sat, 13 Jul 2013 20:57:23 -0400 Received: from mail-ie0-f170.google.com ([209.85.223.170]:45497 "EHLO mail-ie0-f170.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751748Ab3GNA5W (ORCPT ); Sat, 13 Jul 2013 20:57:22 -0400 Message-ID: <51E1F769.7090208@gmail.com> Date: Sun, 14 Jul 2013 08:57:13 +0800 From: Sam Ben User-Agent: Mozilla/5.0 (X11; Linux i686; rv:17.0) Gecko/20130329 Thunderbird/17.0.5 MIME-Version: 1.0 To: Christoph Hellwig CC: Alex Elsayed , linux-mm@kvack.org, linux-kernel@vger.kernel.org Subject: Re: RFC: named anonymous vmas References: <20130622103158.GA16304@infradead.org> <20130624114832.GA9961@infradead.org> In-Reply-To: <20130624114832.GA9961@infradead.org> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Christoph, On 06/24/2013 07:48 PM, Christoph Hellwig wrote: > On Sat, Jun 22, 2013 at 12:47:29PM -0700, Alex Elsayed wrote: >> Couldn't this be done by having a root-only tmpfs, and having a userspace >> component that creates per-app directories with restrictive permissions on >> startup/app install? Then each app creates files in its own directory, and >> can pass the fds around. > Honestly having a device that allows passing fds around that can be > mmaped sounds a lot simpler. I have to admit that I expect /dev/zero > to do this, but looking at the code it creates new file structures > at ->mmap time which would defeat this. Could you point out where done this? > > -- > To unsubscribe, send a message with 'unsubscribe linux-mm' in > the body to majordomo@kvack.org. For more info on Linux MM, > see: http://www.linux-mm.org/ . > Don't email: email@kvack.org