The quilt patch titled Subject: userfaultfd-update-documentation-to-describe-dev-userfaultfd-v7 has been removed from the -mm tree. Its filename was userfaultfd-update-documentation-to-describe-dev-userfaultfd-v7.patch This patch was dropped because it was folded into userfaultfd-update-documentation-to-describe-dev-userfaultfd.patch ------------------------------------------------------ From: Axel Rasmussen <axelrasmussen@xxxxxxxxxx> Subject: userfaultfd-update-documentation-to-describe-dev-userfaultfd-v7 Date: Fri, 19 Aug 2022 13:52:00 -0700 improve wording in two spots in the documentation, per Mike Link: https://lkml.kernel.org/r/20220819205201.658693-5-axelrasmussen@xxxxxxxxxx Acked-by: Peter Xu <peterx@xxxxxxxxxx> Signed-off-by: Axel Rasmussen <axelrasmussen@xxxxxxxxxx> Reviewed-by: Shuah Khan <skhan@xxxxxxxxxxxxxxxxxxx> Cc: Al Viro <viro@xxxxxxxxxxxxxxxxxx> Cc: Dave Hansen <dave.hansen@xxxxxxxxxxxxxxx> Cc: Dmitry V. Levin <ldv@xxxxxxxxxxxx> Cc: Gleb Fotengauer-Malinovskiy <glebfm@xxxxxxxxxxxx> Cc: Hugh Dickins <hughd@xxxxxxxxxx> Cc: Jan Kara <jack@xxxxxxx> Cc: Jonathan Corbet <corbet@xxxxxxx> Cc: Mel Gorman <mgorman@xxxxxxxxxxxxxxxxxxx> Cc: Mike Kravetz <mike.kravetz@xxxxxxxxxx> Cc: Mike Rapoport <rppt@xxxxxxxxxx> Cc: Mike Rapoport <rppt@xxxxxxxxxxxxx> Cc: Nadav Amit <namit@xxxxxxxxxx> Cc: Suren Baghdasaryan <surenb@xxxxxxxxxx> Cc: Vlastimil Babka <vbabka@xxxxxxx> Cc: Zhang Yi <yi.zhang@xxxxxxxxxx> Signed-off-by: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx> --- Documentation/admin-guide/mm/userfaultfd.rst | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) --- a/Documentation/admin-guide/mm/userfaultfd.rst~userfaultfd-update-documentation-to-describe-dev-userfaultfd-v7 +++ a/Documentation/admin-guide/mm/userfaultfd.rst @@ -66,14 +66,14 @@ userfaultfd(2) syscall. Access to this i only. Such a userfaultfd can be created using the userfaultfd(2) syscall with the flag UFFD_USER_MODE_ONLY. -- In order to also trap kernel page faults for the address space, then either - the process needs the CAP_SYS_PTRACE capability, or the system must have +- In order to also trap kernel page faults for the address space, either the + process needs the CAP_SYS_PTRACE capability, or the system must have vm.unprivileged_userfaultfd set to 1. By default, vm.unprivileged_userfaultfd is set to 0. -The second way, added to the kernel more recently, is by opening and issuing a -USERFAULTFD_IOC_NEW ioctl to /dev/userfaultfd. This method yields equivalent -userfaultfds to the userfaultfd(2) syscall. +The second way, added to the kernel more recently, is by opening +/dev/userfaultfd and issuing a USERFAULTFD_IOC_NEW ioctl to it. This method +yields equivalent userfaultfds to the userfaultfd(2) syscall. Unlike userfaultfd(2), access to /dev/userfaultfd is controlled via normal filesystem permissions (user/group/mode), which gives fine grained access to _ Patches currently in -mm which might be from axelrasmussen@xxxxxxxxxx are selftests-vm-add-hugetlb_shared-userfaultfd-test-to-run_vmtestssh.patch userfaultfd-add-dev-userfaultfd-for-fine-grained-access-control.patch userfaultfd-selftests-modify-selftest-to-use-dev-userfaultfd.patch userfaultfd-update-documentation-to-describe-dev-userfaultfd.patch selftests-vm-add-dev-userfaultfd-test-cases-to-run_vmtestssh.patch kselftests-removing-support-of-libhugetlbfs-from-kselftests-fix.patch