Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S261593AbVAGUYe (ORCPT ); Fri, 7 Jan 2005 15:24:34 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S261567AbVAGUWc (ORCPT ); Fri, 7 Jan 2005 15:22:32 -0500 Received: from fw.osdl.org ([65.172.181.6]:10182 "EHLO mail.osdl.org") by vger.kernel.org with ESMTP id S261600AbVAGUV0 (ORCPT ); Fri, 7 Jan 2005 15:21:26 -0500 Date: Fri, 7 Jan 2005 12:21:17 -0800 From: Chris Wright To: Matt Mackall Cc: "Jack O'Quin" , Alan Cox , Andreas Steinmetz , Lee Revell , Chris Wright , Linux Kernel Mailing List , Andrew Morton , Ingo Molnar , LAD mailing list Subject: Re: [PATCH] [request for inclusion] Realtime LSM Message-ID: <20050107122117.G2357@build.pdx.osdl.net> References: <1104374603.9732.32.camel@krustophenia.net> <20050103140359.GA19976@infradead.org> <1104862614.8255.1.camel@krustophenia.net> <20050104182010.GA15254@infradead.org> <1104865034.8346.4.camel@krustophenia.net> <41DB4476.8080400@domdv.de> <1104898693.24187.162.camel@localhost.localdomain> <20050107011820.GC2995@waste.org> <87brc17pj6.fsf@sulphur.joq.us> <20050107200245.GW2940@waste.org> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.2.5i In-Reply-To: <20050107200245.GW2940@waste.org>; from mpm@selenic.com on Fri, Jan 07, 2005 at 12:02:46PM -0800 Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1283 Lines: 30 * Matt Mackall (mpm@selenic.com) wrote: > On Thu, Jan 06, 2005 at 11:54:05PM -0600, Jack O'Quin wrote: > > Note that sched_setschedule() provides no way to handle the mlock() > > requirement, which cannot be done from another process. > > I'm pretty sure that part can be done by a privileged server handing > out mlocked shared memory segments. It can actually be done with plain ol' rlimits (RLIMIT_MEMLOCK). > The trouble with introducing something into the kernel is that once > done, it can't be undone. So you're absolutely going to meet > resistance to anything that can be a) done sufficiently in userspace > or b) can reasonably be done in a more generic manner so as to meet > the needs of a wider future audience. The onus is on the submitter to > meet these requirements because we can't easily kick out a broken API > after we accept it. Indeed (although in this case it's not adding an API as much as using an existing one). thanks, -chris -- Linux Security Modules http://lsm.immunix.org http://lsm.bkbits.net - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/