Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933012Ab1CWO6z (ORCPT ); Wed, 23 Mar 2011 10:58:55 -0400 Received: from zeniv.linux.org.uk ([195.92.253.2]:48403 "EHLO ZenIV.linux.org.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932945Ab1CWO6x (ORCPT ); Wed, 23 Mar 2011 10:58:53 -0400 Date: Wed, 23 Mar 2011 14:57:49 +0000 From: Al Viro To: Stephen Wilson Cc: Thomas Gleixner , Ingo Molnar , "H. Peter Anvin" , Andrew Morton , Michel Lespinasse , Andi Kleen , Rik van Riel , KOSAKI Motohiro , Matt Mackall , David Rientjes , Nick Piggin , Andrea Arcangeli , Mel Gorman , Hugh Dickins , x86@kernel.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v2 resend 0/12] enable writing to /proc/pid/mem Message-ID: <20110323145748.GA22723@ZenIV.linux.org.uk> References: <1300891441-16280-1-git-send-email-wilsons@start.ca> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1300891441-16280-1-git-send-email-wilsons@start.ca> User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 796 Lines: 16 On Wed, Mar 23, 2011 at 10:43:49AM -0400, Stephen Wilson wrote: > Hello, > > This is a resend[1] of a patch series that implements safe writes to > /proc/pid/mem. Such functionality is useful as it gives debuggers a simple and > efficient mechanism to manipulate a process' address space. Memory can be read > and written using single calls to pread(2) and pwrite(2) instead of iteratively > calling into ptrace(2). It's in local queue already, along with other procfs fixes; I'm going to push it today, with several more procfs race fixes added. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/