Received: by 2002:a25:824b:0:0:0:0:0 with SMTP id d11csp1784051ybn; Thu, 26 Sep 2019 02:06:27 -0700 (PDT) X-Google-Smtp-Source: APXvYqxxryW9ChngyrZ6DrIwR96cRMDDV71yI1gvEacByC1MhsUwtUOAXbBUTRkNx7ecWC819MYB X-Received: by 2002:a50:fc0c:: with SMTP id i12mr2396763edr.82.1569488787035; Thu, 26 Sep 2019 02:06:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1569488787; cv=none; d=google.com; s=arc-20160816; b=FXveCFjg4LnitP0ZtdNo2S5KLTpJdWxQkEQoXujZcdzL+Fvgw8d7AaxFcp9oWAD7gH BwuPePw/lxBE5OrxbY2+9LebQ2seqzlaBy7zzL75OqhdrE56VZq2Chd+sFc8wq2S82Iq zW4lPU0mAplq4hDyYmp68BflKhpZecY+nnsF8j1O7dwAzi6b7Kr4REkdPEsCdaKta6bI kLfXgkq+m3d6SL7P1CtpfBn/ky9VE4Yx1uXN2JmXEas8lHe8m3AkJb8EVyd2DXRCWqao zDcIpoNGB0KxrQdVj3oOM2FxK4p2ypl9lKZ8PpQrJJJg3nagSmWqg7srsclbVKgnklDk FWNg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:reply-to:message-id :subject:cc:to:from:date; bh=5tsIP6B9f8ZRQiq3Sz8eLZrvQ721GjbMy2gXjIFaDyY=; b=NXAISgElk/DFM+AcyADqCmdlaiKEdYKdU2Kz3NYX2k7a43LlSJhn06JLbyTRzm7g/W jadlC/8kGnjCv2p6c6OOQa8oRlEcrjSQM5jQ1sk7hGIA6gCAX+MYaQ2OMIUBhcO7KkEN fDuh9GzTdnJWQaPfaF0ySysmhJ+NLfNgJoHEM4u9mu+A6q7w7L5256hPidar7E9FW2Xm nWhK9PiLkw4e7Ooeqkjg2Bc3Bbw7gRaKA7v7J4K5cwvYIYR+SWVCO6QnXvgLp83X/bCd 5M6qhHSqAlz3qN5iPnC3j/sm8m7dV/Q93HelJifnQiVPkjC4z7PWoCVaiAJa9GOKVHQ1 RIXQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y13si641524ejw.2.2019.09.26.02.06.02; Thu, 26 Sep 2019 02:06:27 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2633711AbfIYCAU (ORCPT + 99 others); Tue, 24 Sep 2019 22:00:20 -0400 Received: from mga11.intel.com ([192.55.52.93]:16413 "EHLO mga11.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2394649AbfIYCAU (ORCPT ); Tue, 24 Sep 2019 22:00:20 -0400 X-Amp-Result: UNKNOWN X-Amp-Original-Verdict: FILE UNKNOWN X-Amp-File-Uploaded: False Received: from orsmga006.jf.intel.com ([10.7.209.51]) by fmsmga102.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 24 Sep 2019 19:00:19 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.64,546,1559545200"; d="scan'208";a="193620694" Received: from richard.sh.intel.com (HELO localhost) ([10.239.159.54]) by orsmga006.jf.intel.com with ESMTP; 24 Sep 2019 19:00:16 -0700 Date: Wed, 25 Sep 2019 09:59:57 +0800 From: Wei Yang To: Wei Yang Cc: tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, x86@kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH] x86/mm: fix function name typo in pmd_read_atomic() comment Message-ID: <20190925015956.GA20295@richard> Reply-To: Wei Yang References: <20190925014453.20236-1-richardw.yang@linux.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190925014453.20236-1-richardw.yang@linux.intel.com> User-Agent: Mutt/1.9.4 (2018-02-28) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org To be honest, I have a question on how this works. As the comment says, we need to call pmd_read_atomic before using pte_offset_map_lock to avoid data corruption. For example, in function swapin_walk_pmd_entry: pmd_none_or_trans_huge_or_clear_bad(pmd) pmd_read_atomic(pmd) --- 1 pte_offset_map_lock(mm, pmd, ...) --- 2 At point 1, we are assured the content is intact. While in point 2, we would read pmd again to calculate the pte address. How we ensure this time the content is intact? Because pmd_none_or_trans_huge_or_clear_bad() ensures the pte is stable, so that the content won't be changed? Thanks for your time in advance. -- Wei Yang Help you, Help me