Message ID | 1478142286-18427-4-git-send-email-jann@thejh.net (mailing list archive) |
---|---|
State | New, archived |
Headers | show |
On 11/03, Jann Horn wrote: > > This shouldn't change behavior in any way - at this point, there should be > no non-writable mappings, only the initial stack mapping -, So this FOLL_FORCE just adds the unnecessary confusion, > but this change > makes it easier to reason about the correctness of the following commits > that place restrictions on forced memory writes. and to me it looks like a good cleanup regardless. Exactly because it is not clear why do we need FOLL_FORCE. > Signed-off-by: Jann Horn <jann@thejh.net> > Reviewed-by: Janis Danisevskis <jdanis@android.com> Acked-by: Oleg Nesterov <oleg@redhat.com> -- To unsubscribe from this list: send the line "unsubscribe linux-security-module" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
diff --git a/fs/exec.c b/fs/exec.c index 4e497b9ee71e..dbc2dd2f0829 100644 --- a/fs/exec.c +++ b/fs/exec.c @@ -191,7 +191,7 @@ static struct page *get_arg_page(struct linux_binprm *bprm, unsigned long pos, { struct page *page; int ret; - unsigned int gup_flags = FOLL_FORCE; + unsigned int gup_flags = 0; #ifdef CONFIG_STACK_GROWSUP if (write) {