From owner-freebsd-bugs@freebsd.org Tue Sep 22 20:18:06 2015 Return-Path: Delivered-To: freebsd-bugs@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 3D8DF9CED6C for ; Tue, 22 Sep 2015 20:18:06 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 2A5E61862 for ; Tue, 22 Sep 2015 20:18:06 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id t8MKI6iD054689 for ; Tue, 22 Sep 2015 20:18:06 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: freebsd-bugs@FreeBSD.org Subject: [Bug 201611] [patch] Add devfs_get_cdevpriv_from_file(9) Date: Tue, 22 Sep 2015 20:18:06 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 11.0-CURRENT X-Bugzilla-Keywords: patch X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: aritger@nvidia.com X-Bugzilla-Status: New X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: freebsd-bugs@FreeBSD.org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 7bit X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-bugs@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 22 Sep 2015 20:18:06 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=201611 --- Comment #6 from Andy Ritger --- (In reply to John Baldwin from comment #5) Thanks for looking at this, John. If the ioctl called by Process A returned a new file descriptor, that would be workable. Though, the user-space code to use this would then need to be a bit different between FreeBSD and other UNIX platforms: at least on Linux, I'm not sure how straight-forward it would be to create a new file descriptor within the kernel code that processes the ioctl. We chose opening the file in user space, in order to create the fd, as the least complex way to create it. In process B, the resource that is being shared won't necessarily be mmaped into the process's CPU virtual address space: sharing a resource can mean other things, such as mapping into the GPU's (not CPU's virtual address space). Is there concern with looking up the cdevpriv from the struct file? -- You are receiving this mail because: You are the assignee for the bug.