Dmitrii Kuvaiskii
Dmitrii Kuvaiskii
Just some references for history (when I was reviewing #842): - The `libos_fd_handle::flags` is for file descriptors (FDs). Described in Gramine here: https://github.com/gramineproject/gramine/blob/cf43bbca4c48456378b34621a1a271c6b3bd8148/libos/include/libos_handle.h#L228 - The `libos_handle::flags` is for file descriptions...
I feel like there is a bit of confusion. Let me summarize what flows we want to enable: 1. **Anonymous mmap** -- `mmap(MAP_ANONYMOUS, /*fd=*/-1)` and `mmap(MAP_ANONYMOUS | MAP_SHARED, /*fd=*/-1)`. Classic...
@llly Some comments on your proposal. > Application in LibOS I dislike this phrase. Please replace with `Application running in Gramine` or simply `Application in Gramine`. > In which `.mmap`...
> Only one `passthrough` mode that shared memory is created in untrusted memory, but is invisible by another Gramine or native process or its child. But why? I and Borys...
@llly My feedback on the new design. Overall looks good to me. > `sys.insecure__shared_memory = "[none|passthrough]"` Now I think that we don't need this additional manifest option, since the user...
Replying to @boryspoplawski. Also, @llly please see if my replies make sense. > Why do we need a new in-manifest mount? Well, I agree that it will always have `/dev/shm/`....
@woju What do you mean by `sed shebang`?
@woju I see your point. Is it something that we want to do in the future, or do you want to see this change now? If now, then what exactly...
> If we switched GSC to `apt install gramine` ... @woju We are not going to do this in any near future. GSC is very frequently used to test the...
@mkow What do you think about Woju's reply?