linux-kernel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* RFC: named anonymous vmas
@ 2013-06-21 23:42 Colin Cross
  2013-06-22  5:12 ` Kyungmin Park
                   ` (2 more replies)
  0 siblings, 3 replies; 14+ messages in thread
From: Colin Cross @ 2013-06-21 23:42 UTC (permalink / raw)
  To: lkml; +Cc: Linux-MM, Android Kernel Team, John Stultz

One of the features of ashmem (drivers/staging/android/ashmem.c) that
hasn't gotten much discussion about moving out of staging is named
anonymous memory.

In Android, ashmem is used for three different features, and most
users of it only care about one feature at a time.  One is volatile
ranges, which John Stultz has been implementing.  The second is
anonymous shareable memory without having a world-writable tmpfs that
untrusted apps could fill with files.  The third and most heavily used
feature within the Android codebase is named anonymous memory, where a
region of anonymous memory can have a name associated with it that
will show up in /proc/pid/maps.  The Dalvik VM likes to use this
feature extensively, even for memory that will never be shared and
could easily be allocated using an anonymous mmap, and even malloc has
used it in the past.  It provides an easy way to collate memory used
for different purposes across multiple processes, which Android uses
for its "dumpsys meminfo" and "librank" tools to determine how much
memory is used for java heaps, JIT caches, native mallocs, etc.

I'd like to add this feature for anonymous mmap memory.  I propose
adding an madvise2(unsigned long start, size_t len_in, int behavior,
void *ptr, size_t size) syscall and a new MADV_NAME behavior, which
treats ptr as a string of length size.  The string would be copied
somewhere reusable in the kernel, or reused if it already exists, and
the kernel address of the string would get stashed in a new field in
struct vm_area_struct.  Adjacent vmas would only get merged if the
name pointer matched, and naming part of a mapping would split the
mapping.  show_map_vma would print the name only if none of the other
existing names rules match.

Any comments as I start implementing it?  Is there any reason to allow
naming a file-backed mapping and showing it alongside the file name in
/proc/pid/maps?

^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: RFC: named anonymous vmas
  2013-06-21 23:42 RFC: named anonymous vmas Colin Cross
@ 2013-06-22  5:12 ` Kyungmin Park
  2013-06-22  5:20   ` Colin Cross
  2013-06-22 10:31 ` Christoph Hellwig
  2013-07-14  0:27 ` Sam Ben
  2 siblings, 1 reply; 14+ messages in thread
From: Kyungmin Park @ 2013-06-22  5:12 UTC (permalink / raw)
  To: Colin Cross
  Cc: lkml, Linux-MM, Android Kernel Team, John Stultz, Hyunhee Kim,
	Marek Szyprowski, Tomasz Stanislawski

On Sat, Jun 22, 2013 at 8:42 AM, Colin Cross <ccross@google.com> wrote:
> One of the features of ashmem (drivers/staging/android/ashmem.c) that
> hasn't gotten much discussion about moving out of staging is named
> anonymous memory.
>
> In Android, ashmem is used for three different features, and most
> users of it only care about one feature at a time.  One is volatile
> ranges, which John Stultz has been implementing.  The second is
> anonymous shareable memory without having a world-writable tmpfs that
> untrusted apps could fill with files.  The third and most heavily used
> feature within the Android codebase is named anonymous memory, where a
> region of anonymous memory can have a name associated with it that
> will show up in /proc/pid/maps.  The Dalvik VM likes to use this

Good to know it. I didn't know ashmem provides these features.
we are also discussing these requirement internally. and study how to
show who request these anon memory and which callback is used for it.

> feature extensively, even for memory that will never be shared and
> could easily be allocated using an anonymous mmap, and even malloc has
> used it in the past.  It provides an easy way to collate memory used
> for different purposes across multiple processes, which Android uses
> for its "dumpsys meminfo" and "librank" tools to determine how much
> memory is used for java heaps, JIT caches, native mallocs, etc.
Same requirement for app developers. they want to know what's the
meaning these anon memory is allocated and how to find out these anon
memory is allocated at their codes.
>
> I'd like to add this feature for anonymous mmap memory.  I propose
> adding an madvise2(unsigned long start, size_t len_in, int behavior,
> void *ptr, size_t size) syscall and a new MADV_NAME behavior, which
> treats ptr as a string of length size.  The string would be copied
> somewhere reusable in the kernel, or reused if it already exists, and
> the kernel address of the string would get stashed in a new field in
> struct vm_area_struct.  Adjacent vmas would only get merged if the
> name pointer matched, and naming part of a mapping would split the
> mapping.  show_map_vma would print the name only if none of the other
> existing names rules match.
Do you want to create new syscall? can it use current madvise and only
allow this feature at linux only?
As you know it's just hint and it doesn't break existing memory behaviors.
>
> Any comments as I start implementing it?  Is there any reason to allow
> naming a file-backed mapping and showing it alongside the file name in
> /proc/pid/maps?
>

Thank you,
Kyungmin Park

^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: RFC: named anonymous vmas
  2013-06-22  5:12 ` Kyungmin Park
@ 2013-06-22  5:20   ` Colin Cross
  0 siblings, 0 replies; 14+ messages in thread
From: Colin Cross @ 2013-06-22  5:20 UTC (permalink / raw)
  To: Kyungmin Park
  Cc: lkml, Linux-MM, Android Kernel Team, John Stultz, Hyunhee Kim,
	Marek Szyprowski, Tomasz Stanislawski

On Fri, Jun 21, 2013 at 10:12 PM, Kyungmin Park <kmpark@infradead.org> wrote:
> On Sat, Jun 22, 2013 at 8:42 AM, Colin Cross <ccross@google.com> wrote:
>> One of the features of ashmem (drivers/staging/android/ashmem.c) that
>> hasn't gotten much discussion about moving out of staging is named
>> anonymous memory.
>>
>> In Android, ashmem is used for three different features, and most
>> users of it only care about one feature at a time.  One is volatile
>> ranges, which John Stultz has been implementing.  The second is
>> anonymous shareable memory without having a world-writable tmpfs that
>> untrusted apps could fill with files.  The third and most heavily used
>> feature within the Android codebase is named anonymous memory, where a
>> region of anonymous memory can have a name associated with it that
>> will show up in /proc/pid/maps.  The Dalvik VM likes to use this
>
> Good to know it. I didn't know ashmem provides these features.
> we are also discussing these requirement internally. and study how to
> show who request these anon memory and which callback is used for it.
>
>> feature extensively, even for memory that will never be shared and
>> could easily be allocated using an anonymous mmap, and even malloc has
>> used it in the past.  It provides an easy way to collate memory used
>> for different purposes across multiple processes, which Android uses
>> for its "dumpsys meminfo" and "librank" tools to determine how much
>> memory is used for java heaps, JIT caches, native mallocs, etc.
> Same requirement for app developers. they want to know what's the
> meaning these anon memory is allocated and how to find out these anon
> memory is allocated at their codes.
>>
>> I'd like to add this feature for anonymous mmap memory.  I propose
>> adding an madvise2(unsigned long start, size_t len_in, int behavior,
>> void *ptr, size_t size) syscall and a new MADV_NAME behavior, which
>> treats ptr as a string of length size.  The string would be copied
>> somewhere reusable in the kernel, or reused if it already exists, and
>> the kernel address of the string would get stashed in a new field in
>> struct vm_area_struct.  Adjacent vmas would only get merged if the
>> name pointer matched, and naming part of a mapping would split the
>> mapping.  show_map_vma would print the name only if none of the other
>> existing names rules match.
> Do you want to create new syscall? can it use current madvise and only
> allow this feature at linux only?
> As you know it's just hint and it doesn't break existing memory behaviors.

The existing madvise syscall only takes a single int to modify the
vma, which is not enough to pass a pointer to a string.

^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: RFC: named anonymous vmas
  2013-06-21 23:42 RFC: named anonymous vmas Colin Cross
  2013-06-22  5:12 ` Kyungmin Park
@ 2013-06-22 10:31 ` Christoph Hellwig
  2013-06-22 17:30   ` Colin Cross
  2013-07-14  0:27 ` Sam Ben
  2 siblings, 1 reply; 14+ messages in thread
From: Christoph Hellwig @ 2013-06-22 10:31 UTC (permalink / raw)
  To: Colin Cross; +Cc: lkml, Linux-MM, Android Kernel Team, John Stultz

On Fri, Jun 21, 2013 at 04:42:41PM -0700, Colin Cross wrote:
> ranges, which John Stultz has been implementing.  The second is
> anonymous shareable memory without having a world-writable tmpfs that
> untrusted apps could fill with files.

I still haven't seen any explanation of what ashmem buys over a shared
mmap of /dev/zero in that respect, btw.


^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: RFC: named anonymous vmas
  2013-06-22 10:31 ` Christoph Hellwig
@ 2013-06-22 17:30   ` Colin Cross
       [not found]     ` <kq4v0b$p8p$3@ger.gmane.org>
  2013-08-01  8:29     ` Christoph Hellwig
  0 siblings, 2 replies; 14+ messages in thread
From: Colin Cross @ 2013-06-22 17:30 UTC (permalink / raw)
  To: Christoph Hellwig; +Cc: lkml, Linux-MM, Android Kernel Team, John Stultz

On Sat, Jun 22, 2013 at 3:31 AM, Christoph Hellwig <hch@infradead.org> wrote:
> On Fri, Jun 21, 2013 at 04:42:41PM -0700, Colin Cross wrote:
>> ranges, which John Stultz has been implementing.  The second is
>> anonymous shareable memory without having a world-writable tmpfs that
>> untrusted apps could fill with files.
>
> I still haven't seen any explanation of what ashmem buys over a shared
> mmap of /dev/zero in that respect, btw.

I believe the difference is that ashmem ties the memory to an fd, so
it can be passed to another process and mmaped to get to the same
memory, but /dev/zero does not.  Passing a /dev/zero fd and mmaping it
would result in a brand new region of zeroed memory.  Opening a tmpfs
file would allow sharing memory by passing the fd, but we don't want a
world-writable tmpfs.

^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: RFC: named anonymous vmas
       [not found]     ` <kq4v0b$p8p$3@ger.gmane.org>
@ 2013-06-24 11:48       ` Christoph Hellwig
  2013-06-24 17:26         ` Colin Cross
  2013-07-14  0:57         ` Sam Ben
  0 siblings, 2 replies; 14+ messages in thread
From: Christoph Hellwig @ 2013-06-24 11:48 UTC (permalink / raw)
  To: Alex Elsayed; +Cc: linux-mm, linux-kernel

On Sat, Jun 22, 2013 at 12:47:29PM -0700, Alex Elsayed wrote:
> Couldn't this be done by having a root-only tmpfs, and having a userspace 
> component that creates per-app directories with restrictive permissions on 
> startup/app install? Then each app creates files in its own directory, and 
> can pass the fds around.

Honestly having a device that allows passing fds around that can be
mmaped sounds a lot simpler.  I have to admit that I expect /dev/zero
to do this, but looking at the code it creates new file structures
at ->mmap time which would defeat this.


^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: RFC: named anonymous vmas
  2013-06-24 11:48       ` Christoph Hellwig
@ 2013-06-24 17:26         ` Colin Cross
  2013-06-24 23:45           ` John Stultz
  2013-07-14  0:57         ` Sam Ben
  1 sibling, 1 reply; 14+ messages in thread
From: Colin Cross @ 2013-06-24 17:26 UTC (permalink / raw)
  To: Christoph Hellwig; +Cc: Alex Elsayed, Linux-MM, lkml

On Mon, Jun 24, 2013 at 4:48 AM, Christoph Hellwig <hch@infradead.org> wrote:
> On Sat, Jun 22, 2013 at 12:47:29PM -0700, Alex Elsayed wrote:
>> Couldn't this be done by having a root-only tmpfs, and having a userspace
>> component that creates per-app directories with restrictive permissions on
>> startup/app install? Then each app creates files in its own directory, and
>> can pass the fds around.

If each app gets its own writable directory that's not really
different than a world writable tmpfs.  It requires something that
watches for apps to exit for any reason and cleans up their
directories, and it requires each app to come up with an unused name
when it wants to create a file, and the kernel can give you both very
cleanly.

^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: RFC: named anonymous vmas
  2013-06-24 17:26         ` Colin Cross
@ 2013-06-24 23:45           ` John Stultz
  0 siblings, 0 replies; 14+ messages in thread
From: John Stultz @ 2013-06-24 23:45 UTC (permalink / raw)
  To: Colin Cross; +Cc: Christoph Hellwig, Alex Elsayed, Linux-MM, lkml

On Mon, Jun 24, 2013 at 10:26 AM, Colin Cross <ccross@google.com> wrote:
> On Mon, Jun 24, 2013 at 4:48 AM, Christoph Hellwig <hch@infradead.org> wrote:
>> On Sat, Jun 22, 2013 at 12:47:29PM -0700, Alex Elsayed wrote:
>>> Couldn't this be done by having a root-only tmpfs, and having a userspace
>>> component that creates per-app directories with restrictive permissions on
>>> startup/app install? Then each app creates files in its own directory, and
>>> can pass the fds around.
>
> If each app gets its own writable directory that's not really
> different than a world writable tmpfs.  It requires something that
> watches for apps to exit for any reason and cleans up their
> directories, and it requires each app to come up with an unused name
> when it wants to create a file, and the kernel can give you both very
> cleanly.

Though, I believe having a daemon that has exclusive access to tmpfs,
and creates, unlinks and passes the fd to the requesting application
would provide a userspace only implementation of the second feature
requirement ("without having a world-writable tmpfs that untrusted
apps could fill with files").  Though I'm not sure what the
proc/<pid>/maps naming would look like on the unlinked file, so it
might not solve the third naming issue.

thanks
-john

^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: RFC: named anonymous vmas
  2013-06-21 23:42 RFC: named anonymous vmas Colin Cross
  2013-06-22  5:12 ` Kyungmin Park
  2013-06-22 10:31 ` Christoph Hellwig
@ 2013-07-14  0:27 ` Sam Ben
  2 siblings, 0 replies; 14+ messages in thread
From: Sam Ben @ 2013-07-14  0:27 UTC (permalink / raw)
  To: Colin Cross; +Cc: lkml, Linux-MM, Android Kernel Team, John Stultz

Hi Colin,
On 06/22/2013 07:42 AM, Colin Cross wrote:
> One of the features of ashmem (drivers/staging/android/ashmem.c) that
> hasn't gotten much discussion about moving out of staging is named
> anonymous memory.
>
> In Android, ashmem is used for three different features, and most
> users of it only care about one feature at a time.  One is volatile
> ranges, which John Stultz has been implementing.  The second is
> anonymous shareable memory without having a world-writable tmpfs that
> untrusted apps could fill with files.  The third and most heavily used

How to understand "anonymous shareable memory without having a 
world-writable tmpfs that untrusted apps could fill with files"?

> feature within the Android codebase is named anonymous memory, where a
> region of anonymous memory can have a name associated with it that
> will show up in /proc/pid/maps.  The Dalvik VM likes to use this
> feature extensively, even for memory that will never be shared and
> could easily be allocated using an anonymous mmap, and even malloc has
> used it in the past.  It provides an easy way to collate memory used
> for different purposes across multiple processes, which Android uses
> for its "dumpsys meminfo" and "librank" tools to determine how much
> memory is used for java heaps, JIT caches, native mallocs, etc.
>
> I'd like to add this feature for anonymous mmap memory.  I propose
> adding an madvise2(unsigned long start, size_t len_in, int behavior,
> void *ptr, size_t size) syscall and a new MADV_NAME behavior, which
> treats ptr as a string of length size.  The string would be copied
> somewhere reusable in the kernel, or reused if it already exists, and
> the kernel address of the string would get stashed in a new field in
> struct vm_area_struct.  Adjacent vmas would only get merged if the
> name pointer matched, and naming part of a mapping would split the
> mapping.  show_map_vma would print the name only if none of the other
> existing names rules match.
>
> Any comments as I start implementing it?  Is there any reason to allow
> naming a file-backed mapping and showing it alongside the file name in
> /proc/pid/maps?
>
> --
> To unsubscribe, send a message with 'unsubscribe linux-mm' in
> the body to majordomo@kvack.org.  For more info on Linux MM,
> see: http://www.linux-mm.org/ .
> Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>


^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: RFC: named anonymous vmas
  2013-06-24 11:48       ` Christoph Hellwig
  2013-06-24 17:26         ` Colin Cross
@ 2013-07-14  0:57         ` Sam Ben
  1 sibling, 0 replies; 14+ messages in thread
From: Sam Ben @ 2013-07-14  0:57 UTC (permalink / raw)
  To: Christoph Hellwig; +Cc: Alex Elsayed, linux-mm, linux-kernel

Hi Christoph,
On 06/24/2013 07:48 PM, Christoph Hellwig wrote:
> On Sat, Jun 22, 2013 at 12:47:29PM -0700, Alex Elsayed wrote:
>> Couldn't this be done by having a root-only tmpfs, and having a userspace
>> component that creates per-app directories with restrictive permissions on
>> startup/app install? Then each app creates files in its own directory, and
>> can pass the fds around.
> Honestly having a device that allows passing fds around that can be
> mmaped sounds a lot simpler.  I have to admit that I expect /dev/zero
> to do this, but looking at the code it creates new file structures
> at ->mmap time which would defeat this.

Could you point out where done this?

>
> --
> To unsubscribe, send a message with 'unsubscribe linux-mm' in
> the body to majordomo@kvack.org.  For more info on Linux MM,
> see: http://www.linux-mm.org/ .
> Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>


^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: RFC: named anonymous vmas
  2013-06-22 17:30   ` Colin Cross
       [not found]     ` <kq4v0b$p8p$3@ger.gmane.org>
@ 2013-08-01  8:29     ` Christoph Hellwig
  2013-08-01  8:36       ` Rich Felker
  1 sibling, 1 reply; 14+ messages in thread
From: Christoph Hellwig @ 2013-08-01  8:29 UTC (permalink / raw)
  To: Colin Cross
  Cc: Christoph Hellwig, lkml, Linux-MM, Android Kernel Team,
	John Stultz, libc-alpha

Btw, FreeBSD has an extension to shm_open to create unnamed but fd
passable segments.  From their man page:

    As a FreeBSD extension, the constant SHM_ANON may be used for the path
    argument to shm_open().  In this case, an anonymous, unnamed shared
    memory object is created.  Since the object has no name, it cannot be
    removed via a subsequent call to shm_unlink().  Instead, the shared
    memory object will be garbage collected when the last reference to the
    shared memory object is removed.  The shared memory object may be shared
    with other processes by sharing the file descriptor via fork(2) or
    sendmsg(2).  Attempting to open an anonymous shared memory object with
    O_RDONLY will fail with EINVAL. All other flags are ignored.

To me this sounds like the best way to expose this functionality to the
user.  Implementing it is another question as shm_open sits in libc,
we could either take it and shm_unlink to the kernel, or use O_TMPFILE
on tmpfs as the backend.

^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: RFC: named anonymous vmas
  2013-08-01  8:29     ` Christoph Hellwig
@ 2013-08-01  8:36       ` Rich Felker
  2013-08-02 15:11         ` Christoph Hellwig
  2013-08-03 23:54         ` KOSAKI Motohiro
  0 siblings, 2 replies; 14+ messages in thread
From: Rich Felker @ 2013-08-01  8:36 UTC (permalink / raw)
  To: Christoph Hellwig
  Cc: Colin Cross, lkml, Linux-MM, Android Kernel Team, John Stultz,
	libc-alpha

On Thu, Aug 01, 2013 at 01:29:51AM -0700, Christoph Hellwig wrote:
> Btw, FreeBSD has an extension to shm_open to create unnamed but fd
> passable segments.  From their man page:
> 
>     As a FreeBSD extension, the constant SHM_ANON may be used for the path
>     argument to shm_open().  In this case, an anonymous, unnamed shared
>     memory object is created.  Since the object has no name, it cannot be
>     removed via a subsequent call to shm_unlink().  Instead, the shared
>     memory object will be garbage collected when the last reference to the
>     shared memory object is removed.  The shared memory object may be shared
>     with other processes by sharing the file descriptor via fork(2) or
>     sendmsg(2).  Attempting to open an anonymous shared memory object with
>     O_RDONLY will fail with EINVAL. All other flags are ignored.
> 
> To me this sounds like the best way to expose this functionality to the
> user.  Implementing it is another question as shm_open sits in libc,
> we could either take it and shm_unlink to the kernel, or use O_TMPFILE
> on tmpfs as the backend.

I'm not sure what the purpose is. shm_open with a long random filename
and O_EXCL|O_CREAT, followed immediately by shm_unlink, is just as
good except in the case where you have a malicious user killing the
process in between these two operations.

Rich

^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: RFC: named anonymous vmas
  2013-08-01  8:36       ` Rich Felker
@ 2013-08-02 15:11         ` Christoph Hellwig
  2013-08-03 23:54         ` KOSAKI Motohiro
  1 sibling, 0 replies; 14+ messages in thread
From: Christoph Hellwig @ 2013-08-02 15:11 UTC (permalink / raw)
  To: Rich Felker
  Cc: Christoph Hellwig, Colin Cross, lkml, Linux-MM,
	Android Kernel Team, John Stultz, libc-alpha

On Thu, Aug 01, 2013 at 04:36:08AM -0400, Rich Felker wrote:
> I'm not sure what the purpose is. shm_open with a long random filename
> and O_EXCL|O_CREAT, followed immediately by shm_unlink, is just as
> good except in the case where you have a malicious user killing the
> process in between these two operations.

The Android people already have an shm API doesn't leave traces in the
filesystem, and I at least conceptually agree that having an API that
doesn't introduce posisble other access is a good idea.  This is the
same reason why the O_TMPFILE API was added in this releases.


^ permalink raw reply	[flat|nested] 14+ messages in thread

* Re: RFC: named anonymous vmas
  2013-08-01  8:36       ` Rich Felker
  2013-08-02 15:11         ` Christoph Hellwig
@ 2013-08-03 23:54         ` KOSAKI Motohiro
  1 sibling, 0 replies; 14+ messages in thread
From: KOSAKI Motohiro @ 2013-08-03 23:54 UTC (permalink / raw)
  To: Rich Felker
  Cc: Christoph Hellwig, Colin Cross, lkml, Linux-MM,
	Android Kernel Team, John Stultz, libc-alpha

On Thu, Aug 1, 2013 at 4:36 AM, Rich Felker <dalias@aerifal.cx> wrote:
> On Thu, Aug 01, 2013 at 01:29:51AM -0700, Christoph Hellwig wrote:
>> Btw, FreeBSD has an extension to shm_open to create unnamed but fd
>> passable segments.  From their man page:
>>
>>     As a FreeBSD extension, the constant SHM_ANON may be used for the path
>>     argument to shm_open().  In this case, an anonymous, unnamed shared
>>     memory object is created.  Since the object has no name, it cannot be
>>     removed via a subsequent call to shm_unlink().  Instead, the shared
>>     memory object will be garbage collected when the last reference to the
>>     shared memory object is removed.  The shared memory object may be shared
>>     with other processes by sharing the file descriptor via fork(2) or
>>     sendmsg(2).  Attempting to open an anonymous shared memory object with
>>     O_RDONLY will fail with EINVAL. All other flags are ignored.
>>
>> To me this sounds like the best way to expose this functionality to the
>> user.  Implementing it is another question as shm_open sits in libc,
>> we could either take it and shm_unlink to the kernel, or use O_TMPFILE
>> on tmpfs as the backend.
>
> I'm not sure what the purpose is. shm_open with a long random filename
> and O_EXCL|O_CREAT, followed immediately by shm_unlink, is just as
> good except in the case where you have a malicious user killing the
> process in between these two operations.

Practically, filename length is restricted by NAME_MAX(255bytes). Several
people don't think it is enough long length. The point is, race free API.

^ permalink raw reply	[flat|nested] 14+ messages in thread

end of thread, other threads:[~2013-08-03 23:55 UTC | newest]

Thread overview: 14+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2013-06-21 23:42 RFC: named anonymous vmas Colin Cross
2013-06-22  5:12 ` Kyungmin Park
2013-06-22  5:20   ` Colin Cross
2013-06-22 10:31 ` Christoph Hellwig
2013-06-22 17:30   ` Colin Cross
     [not found]     ` <kq4v0b$p8p$3@ger.gmane.org>
2013-06-24 11:48       ` Christoph Hellwig
2013-06-24 17:26         ` Colin Cross
2013-06-24 23:45           ` John Stultz
2013-07-14  0:57         ` Sam Ben
2013-08-01  8:29     ` Christoph Hellwig
2013-08-01  8:36       ` Rich Felker
2013-08-02 15:11         ` Christoph Hellwig
2013-08-03 23:54         ` KOSAKI Motohiro
2013-07-14  0:27 ` Sam Ben

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).