From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-wr0-f198.google.com (mail-wr0-f198.google.com [209.85.128.198]) by kanga.kvack.org (Postfix) with ESMTP id E56B36B0033 for ; Thu, 23 Nov 2017 01:29:21 -0500 (EST) Received: by mail-wr0-f198.google.com with SMTP id z75so11459681wrc.5 for ; Wed, 22 Nov 2017 22:29:21 -0800 (PST) Received: from mx0a-001b2d01.pphosted.com (mx0b-001b2d01.pphosted.com. [148.163.158.5]) by mx.google.com with ESMTPS id h7si2857079edj.339.2017.11.22.22.29.20 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 22 Nov 2017 22:29:20 -0800 (PST) Received: from pps.filterd (m0098414.ppops.net [127.0.0.1]) by mx0b-001b2d01.pphosted.com (8.16.0.21/8.16.0.21) with SMTP id vAN6TFS3132623 for ; Thu, 23 Nov 2017 01:29:19 -0500 Received: from e06smtp12.uk.ibm.com (e06smtp12.uk.ibm.com [195.75.94.108]) by mx0b-001b2d01.pphosted.com with ESMTP id 2edrv08gwk-1 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=NOT) for ; Thu, 23 Nov 2017 01:29:18 -0500 Received: from localhost by e06smtp12.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Thu, 23 Nov 2017 06:29:17 -0000 Date: Thu, 23 Nov 2017 08:29:10 +0200 From: Mike Rapoport Subject: Re: [PATCH v3 0/4] vm: add a syscall to map a process memory into a pipe References: <1511379391-988-1-git-send-email-rppt@linux.vnet.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Message-Id: <20171123062909.GB2303@rapoport-lnx> Sender: owner-linux-mm@kvack.org List-ID: To: "Michael Kerrisk (man-pages)" Cc: Andrew Morton , Alexander Viro , "linux-mm@kvack.org" , "linux-fsdevel@vger.kernel.org" , lkml , Linux API , criu@openvz.org, Arnd Bergmann , Pavel Emelyanov , Thomas Gleixner , Josh Triplett , Jann Horn , Yossi Kuperman On Wed, Nov 22, 2017 at 09:43:31PM +0100, Michael Kerrisk (man-pages) wrote: > Hi Mike, > > On 22 November 2017 at 20:36, Mike Rapoport wrote: > > Hi, > > > > This patches introduces new process_vmsplice system call that combines > > functionality of process_vm_read and vmsplice. > > > > It allows to map the memory of another process into a pipe, similarly to > > what vmsplice does for its own address space. > > > > The patch 2/4 ("vm: add a syscall to map a process memory into a pipe") > > actually adds the new system call and provides its elaborate description. > > Where is the man page for this new syscall? It's still WIP, I'll send it out soon. > Cheers, > > Michael > > > The patchset is against -mm tree. > > > > v3: minor refactoring to reduce code duplication > > v2: move this syscall under CONFIG_CROSS_MEMORY_ATTACH > > give correct flags to get_user_pages_remote() > > > > Andrei Vagin (3): > > vm: add a syscall to map a process memory into a pipe > > x86: wire up the process_vmsplice syscall > > test: add a test for the process_vmsplice syscall > > > > Mike Rapoport (1): > > fs/splice: introduce pages_to_pipe helper > > > > arch/x86/entry/syscalls/syscall_32.tbl | 1 + > > arch/x86/entry/syscalls/syscall_64.tbl | 2 + > > fs/splice.c | 262 +++++++++++++++++++-- > > include/linux/compat.h | 3 + > > include/linux/syscalls.h | 4 + > > include/uapi/asm-generic/unistd.h | 5 +- > > kernel/sys_ni.c | 2 + > > tools/testing/selftests/process_vmsplice/Makefile | 5 + > > .../process_vmsplice/process_vmsplice_test.c | 188 +++++++++++++++ > > 9 files changed, 450 insertions(+), 22 deletions(-) > > create mode 100644 tools/testing/selftests/process_vmsplice/Makefile > > create mode 100644 tools/testing/selftests/process_vmsplice/process_vmsplice_test.c > > > > -- > > 2.7.4 > > > > -- > Michael Kerrisk > Linux man-pages maintainer; http://www.kernel.org/doc/man-pages/ > Linux/UNIX System Programming Training: http://man7.org/training/ > -- Sincerely yours, Mike. -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@kvack.org. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: email@kvack.org