Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp103388ybx; Thu, 31 Oct 2019 16:44:29 -0700 (PDT) X-Google-Smtp-Source: APXvYqxsMBmurwIszKNQUMW23t0Dr3nyAVkoGRjn/RDLbqbYkgxmFAn2h8LtDBCqziGA5mzr//0V X-Received: by 2002:a50:b966:: with SMTP id m93mr9201734ede.228.1572565469494; Thu, 31 Oct 2019 16:44:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1572565469; cv=none; d=google.com; s=arc-20160816; b=XCF5ZsfyVc7VNKv1TYuefY6Ka3fYAMjHGSfJaEBMoWuhaz6Z8GShcYUF8Kt5e27MHu erl7VouZcrApgdLW3SktWX8QguoFyUI74pPEJ10oC7Bp3UywIm6jC6j8+tKNpIsxWC19 /ufV5ZsT41qOZToFhzW2WEgp5Oe/Twzy6h3K0rRj7Bomjdzg1DdJtdcKZC1KQKV6NQmt BWtXLVqyk/trVX+EkvQRUY/bkWTK2fIn3Aako632f+fkowfQMgizHE+tRIB1Lnb5pDaJ RGc6eIGSlHWkd5eVROFm9ajpOMXczOB5MZr4X0QTtKBmrrco0JaPlLdYsYm3GIa1F3H+ Yx0w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=DJUwbqfJhjIvZKgKfcZXkDMrFdd0WMNSyeKyd4hQW9M=; b=n2FpiXSoLYdXLbn9vZk/ZZcPthJeEKOFPHZ9XOV2BtLUdj0MOmvUz9fOXoqIZ6uopX 3swKnyEYeL0nVxx/GL/oH8apyBo8rtqFue82QJ3qS8YE8X3jm/LBMhrPZM7gtSnyfWJL UvdqQVngZQCcPK4JDHm47TlVsxjhoZ98wk6H6CaswdXqI7eBJJYGfgHf+3kbTB37kZR8 DMLABzYb6H/+kwWwYm7e0jJrVZoDeoW6S/QJtXV4eumomk6iY/V9lASxy2rcEdAdXVBE ASKjHQLAbcfm3IM2POgP+KamN/KC3eiCoTjeuVQ0/yKFVws1ufrprwsbYQJ9uiVpu1vE k4+g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id qn26si4445475ejb.395.2019.10.31.16.44.06; Thu, 31 Oct 2019 16:44:29 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728862AbfJaXi1 (ORCPT + 99 others); Thu, 31 Oct 2019 19:38:27 -0400 Received: from mga17.intel.com ([192.55.52.151]:57516 "EHLO mga17.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727969AbfJaXi0 (ORCPT ); Thu, 31 Oct 2019 19:38:26 -0400 X-Amp-Result: UNKNOWN X-Amp-Original-Verdict: FILE UNKNOWN X-Amp-File-Uploaded: False Received: from fmsmga005.fm.intel.com ([10.253.24.32]) by fmsmga107.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 31 Oct 2019 16:38:25 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.68,253,1569308400"; d="scan'208";a="400685375" Received: from iweiny-desk2.sc.intel.com ([10.3.52.157]) by fmsmga005.fm.intel.com with ESMTP; 31 Oct 2019 16:38:25 -0700 Date: Thu, 31 Oct 2019 16:38:25 -0700 From: Ira Weiny To: John Hubbard Cc: Andrew Morton , Al Viro , Alex Williamson , Benjamin Herrenschmidt , =?iso-8859-1?Q?Bj=F6rn_T=F6pel?= , Christoph Hellwig , Dan Williams , Daniel Vetter , Dave Chinner , David Airlie , "David S . Miller" , Jan Kara , Jason Gunthorpe , Jens Axboe , Jonathan Corbet , =?iso-8859-1?B?Suly9G1l?= Glisse , Magnus Karlsson , Mauro Carvalho Chehab , Michael Ellerman , Michal Hocko , Mike Kravetz , Paul Mackerras , Shuah Khan , Vlastimil Babka , bpf@vger.kernel.org, dri-devel@lists.freedesktop.org, kvm@vger.kernel.org, linux-block@vger.kernel.org, linux-doc@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-media@vger.kernel.org, linux-rdma@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, netdev@vger.kernel.org, linux-mm@kvack.org, LKML Subject: Re: [PATCH 13/19] media/v4l2-core: pin_longterm_pages (FOLL_PIN) and put_user_page() conversion Message-ID: <20191031233824.GL14771@iweiny-DESK2.sc.intel.com> References: <20191030224930.3990755-1-jhubbard@nvidia.com> <20191030224930.3990755-14-jhubbard@nvidia.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20191030224930.3990755-14-jhubbard@nvidia.com> User-Agent: Mutt/1.11.1 (2018-12-01) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Oct 30, 2019 at 03:49:24PM -0700, John Hubbard wrote: > 1. Change v4l2 from get_user_pages(FOLL_LONGTERM), to > pin_longterm_pages(), which sets both FOLL_LONGTERM and FOLL_PIN. > > 2. Because all FOLL_PIN-acquired pages must be released via > put_user_page(), also convert the put_page() call over to > put_user_pages_dirty_lock(). > Reviewed-by: Ira Weiny > Cc: Mauro Carvalho Chehab > Signed-off-by: John Hubbard > --- > drivers/media/v4l2-core/videobuf-dma-sg.c | 13 +++++-------- > 1 file changed, 5 insertions(+), 8 deletions(-) > > diff --git a/drivers/media/v4l2-core/videobuf-dma-sg.c b/drivers/media/v4l2-core/videobuf-dma-sg.c > index 28262190c3ab..9b9c5b37bf59 100644 > --- a/drivers/media/v4l2-core/videobuf-dma-sg.c > +++ b/drivers/media/v4l2-core/videobuf-dma-sg.c > @@ -183,12 +183,12 @@ static int videobuf_dma_init_user_locked(struct videobuf_dmabuf *dma, > dprintk(1, "init user [0x%lx+0x%lx => %d pages]\n", > data, size, dma->nr_pages); > > - err = get_user_pages(data & PAGE_MASK, dma->nr_pages, > - flags | FOLL_LONGTERM, dma->pages, NULL); > + err = pin_longterm_pages(data & PAGE_MASK, dma->nr_pages, > + flags, dma->pages, NULL); > > if (err != dma->nr_pages) { > dma->nr_pages = (err >= 0) ? err : 0; > - dprintk(1, "get_user_pages: err=%d [%d]\n", err, > + dprintk(1, "pin_longterm_pages: err=%d [%d]\n", err, > dma->nr_pages); > return err < 0 ? err : -EINVAL; > } > @@ -349,11 +349,8 @@ int videobuf_dma_free(struct videobuf_dmabuf *dma) > BUG_ON(dma->sglen); > > if (dma->pages) { > - for (i = 0; i < dma->nr_pages; i++) { > - if (dma->direction == DMA_FROM_DEVICE) > - set_page_dirty_lock(dma->pages[i]); > - put_page(dma->pages[i]); > - } > + put_user_pages_dirty_lock(dma->pages, dma->nr_pages, > + dma->direction == DMA_FROM_DEVICE); > kfree(dma->pages); > dma->pages = NULL; > } > -- > 2.23.0 >