Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp7379007rwb; Wed, 23 Nov 2022 05:58:35 -0800 (PST) X-Google-Smtp-Source: AA0mqf5UXWdyehPP7kwDIW9gCKXhhoBmoRbj/OAKlPenhYkMKEgzgb/+jZH+CGiVaaBthVPE12gm X-Received: by 2002:a17:906:8613:b0:7a6:a48b:5e2a with SMTP id o19-20020a170906861300b007a6a48b5e2amr8443498ejx.338.1669211915434; Wed, 23 Nov 2022 05:58:35 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1669211915; cv=none; d=google.com; s=arc-20160816; b=lROiwXI86nmxuvfaHqpLDFAnASwl9sCxq0ZZXnDRpikaEn4klevzGz6PSGUGmdN9Kz AUpAFMAVYxPSQiNsbZBFtk+lqSx5QbYl7jesvbZi0oj26f7PDHc+G+2IG1hx3CQsfEtL CXbgdP2G8WIy602kMo+viKlBd9/iHCfNdaS7U43Iq/SffEA0VAOZ3ESiZtaOiMgxpMP+ SAaR6Z0Z7NSVZSE7Hju0upgrbz6JsD5LahDl3MGBg3QtD0fBnIJZ49AQmeNtXenxA9/R VLctzAz2K9safM25jfzCZ8a64Uwsh+CXn4FwfbDi4n5uYGC7wkT05Ku1QRzqdTb5Oc4J bh+Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id; bh=pC/2tdNxaEAjhUPRQAqGLeeUE7Qkmv/m9MW3HIaTBGg=; b=jdPyFRMBmOWjR7kZteuSQY1aN3HegRNn7p/ZlkzJDRE3rRiRYu6PlYy+qw5LuSNVvP I7c359ZEI+5s/nYVt68yGNW1lK2y3d77Fx3FUaYF6wwGRTaV3ykiNS9zRWrZ9Czm4GdI wf6JdUKLYDmotZKqQF5kvCf8iS9Nz5FycPFwGqELedNf3P7fixCXcvE3nsfg/7uRcPsZ iDBrzYHHMX4JLGcT6Lmx3TrjUaw/Vpd49Njff2HmtnUlXf9/ISthOqTW6z/snadQIszZ XZ9dUB6ayyQZXzZ1iWcERkxBvIAk9DOQgT3waZLpVQ0SSdY7UeJjWKtOi+Kqd4eNA3pT iP4w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=xs4all.nl Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id hr13-20020a1709073f8d00b007ad95fdd21csi16469974ejc.761.2022.11.23.05.58.06; Wed, 23 Nov 2022 05:58:35 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=xs4all.nl Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238806AbiKWNe2 (ORCPT + 89 others); Wed, 23 Nov 2022 08:34:28 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38372 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238921AbiKWNcZ (ORCPT ); Wed, 23 Nov 2022 08:32:25 -0500 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 78F0628706; Wed, 23 Nov 2022 05:18:40 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 1BA6261CAC; Wed, 23 Nov 2022 13:18:40 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 74BDEC433C1; Wed, 23 Nov 2022 13:18:32 +0000 (UTC) Message-ID: Date: Wed, 23 Nov 2022 14:18:31 +0100 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.4.1 Subject: Re: [PATCH mm-unstable v1 15/20] media: pci/ivtv: remove FOLL_FORCE usage Content-Language: en-US To: David Hildenbrand , linux-kernel@vger.kernel.org Cc: x86@kernel.org, linux-alpha@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-ia64@vger.kernel.org, linux-mips@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, sparclinux@vger.kernel.org, linux-um@lists.infradead.org, etnaviv@lists.freedesktop.org, dri-devel@lists.freedesktop.org, linux-samsung-soc@vger.kernel.org, linux-rdma@vger.kernel.org, linux-media@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-mm@kvack.org, linux-perf-users@vger.kernel.org, linux-security-module@vger.kernel.org, linux-kselftest@vger.kernel.org, Linus Torvalds , Andrew Morton , Jason Gunthorpe , John Hubbard , Peter Xu , Greg Kroah-Hartman , Andrea Arcangeli , Hugh Dickins , Nadav Amit , Vlastimil Babka , Matthew Wilcox , Mike Kravetz , Muchun Song , Shuah Khan , Lucas Stach , David Airlie , Oded Gabbay , Arnd Bergmann , Christoph Hellwig , Alex Williamson , Andy Walls , Mauro Carvalho Chehab References: <20221116102659.70287-1-david@redhat.com> <20221116102659.70287-16-david@redhat.com> From: Hans Verkuil In-Reply-To: <20221116102659.70287-16-david@redhat.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-6.7 required=5.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,NICE_REPLY_A,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 16/11/2022 11:26, David Hildenbrand wrote: > FOLL_FORCE is really only for ptrace access. R/O pinning a page is > supposed to fail if the VMA misses proper access permissions (no VM_READ). > > Let's just remove FOLL_FORCE usage here; there would have to be a pretty > good reason to allow arbitrary drivers to R/O pin pages in a PROT_NONE > VMA. Most probably, FOLL_FORCE usage is just some legacy leftover. I'm pretty sure about that as well, so: Acked-by: Hans Verkuil Regards, Hans > > Cc: Andy Walls > Cc: Mauro Carvalho Chehab > Signed-off-by: David Hildenbrand > --- > drivers/media/pci/ivtv/ivtv-udma.c | 2 +- > drivers/media/pci/ivtv/ivtv-yuv.c | 5 ++--- > 2 files changed, 3 insertions(+), 4 deletions(-) > > diff --git a/drivers/media/pci/ivtv/ivtv-udma.c b/drivers/media/pci/ivtv/ivtv-udma.c > index 210be8290f24..99b9f55ca829 100644 > --- a/drivers/media/pci/ivtv/ivtv-udma.c > +++ b/drivers/media/pci/ivtv/ivtv-udma.c > @@ -115,7 +115,7 @@ int ivtv_udma_setup(struct ivtv *itv, unsigned long ivtv_dest_addr, > > /* Pin user pages for DMA Xfer */ > err = pin_user_pages_unlocked(user_dma.uaddr, user_dma.page_count, > - dma->map, FOLL_FORCE); > + dma->map, 0); > > if (user_dma.page_count != err) { > IVTV_DEBUG_WARN("failed to map user pages, returned %d instead of %d\n", > diff --git a/drivers/media/pci/ivtv/ivtv-yuv.c b/drivers/media/pci/ivtv/ivtv-yuv.c > index 4ba10c34a16a..582146f8d70d 100644 > --- a/drivers/media/pci/ivtv/ivtv-yuv.c > +++ b/drivers/media/pci/ivtv/ivtv-yuv.c > @@ -63,12 +63,11 @@ static int ivtv_yuv_prep_user_dma(struct ivtv *itv, struct ivtv_user_dma *dma, > > /* Pin user pages for DMA Xfer */ > y_pages = pin_user_pages_unlocked(y_dma.uaddr, > - y_dma.page_count, &dma->map[0], FOLL_FORCE); > + y_dma.page_count, &dma->map[0], 0); > uv_pages = 0; /* silence gcc. value is set and consumed only if: */ > if (y_pages == y_dma.page_count) { > uv_pages = pin_user_pages_unlocked(uv_dma.uaddr, > - uv_dma.page_count, &dma->map[y_pages], > - FOLL_FORCE); > + uv_dma.page_count, &dma->map[y_pages], 0); > } > > if (y_pages != y_dma.page_count || uv_pages != uv_dma.page_count) {