Received: by 2002:a05:6a10:6744:0:0:0:0 with SMTP id w4csp2037532pxu; Fri, 9 Oct 2020 06:29:08 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxdbFSDF8+AsUvX71LebRaRyM2xGkpcypdK7I+PfueV+Hzl+mIrZpXWBLc9a0BqL49H3dpp X-Received: by 2002:a50:d98d:: with SMTP id w13mr15253966edj.37.1602250148415; Fri, 09 Oct 2020 06:29:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1602250148; cv=none; d=google.com; s=arc-20160816; b=TAZF86TeSHcS3r+BSb4Nh6E8TAjgdNhYElUA9PkR24S0alqEeuWgSyheb9r4vlOfbs FwinvY27E2X6mkCENihV/WAZyl8XrLPaRVqxlI5RH+IIDHsrzwGHFGdXyIBFpQTRoShH 6dCKF6UGwwzPpvcSpf07uY7hHCOzkBnnT1zz0Uh6EkVx4orN92XIklv4KdO/wxSKpQu0 1VfjQGA8ojiZUDb7uqv0ZTyWpQtDDRnp7Zc+5i+OkMR047qQzpbEDNuWAb3O7ZJRTbLi Hf58pfa6FCcyQtkQDqXJwqyUyZdVip8ZKZhnbHTmuoZVGp73++yWFvAnv0MCfBRCkcJI xuhA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=K8oqjNwy1IItwzS5nAtnJfKoqbYdlnvHoUJ/yQIxMlE=; b=c/er1ZTkIuHwHFmzm59ttUMqzGwXkOfYtvwg7PYiI10fiR+RuUTAnk77ywlf7UkSFD fsw5TamPcDBlokrsEHnMHrlHsGV1pB1JO/Xnq8vObAm0SNE1h+YeiPfzHvXW+HXRqEwB +QBqDbgT6WmZNosfzz+iirFqQcOo2IfgFqs4YFRVYm5aRIRIEFFCRmgjkNcgu+L4PBmx 8yYJ3bbHbN7Txtqw1lnWZD+b8ujB7cfGu7aMjK9Fks0vujZsaFAx0K4GkK6e9j5tiOEL +RHzTlMvW64NbNc94aF8f+A/vuRGYPvE5NcRFsX+6iIY8sDNN3CoJIzEOvvUNx5ameP6 rpyA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ziepe.ca header.s=google header.b=cdaBlGmB; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id bu15si5926827ejb.548.2020.10.09.06.28.42; Fri, 09 Oct 2020 06:29:08 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@ziepe.ca header.s=google header.b=cdaBlGmB; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388552AbgJIMbN (ORCPT + 99 others); Fri, 9 Oct 2020 08:31:13 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35038 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728317AbgJIMbM (ORCPT ); Fri, 9 Oct 2020 08:31:12 -0400 Received: from mail-qt1-x844.google.com (mail-qt1-x844.google.com [IPv6:2607:f8b0:4864:20::844]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4DE64C0613D5 for ; Fri, 9 Oct 2020 05:31:12 -0700 (PDT) Received: by mail-qt1-x844.google.com with SMTP id c23so7776968qtp.0 for ; Fri, 09 Oct 2020 05:31:12 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ziepe.ca; s=google; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to; bh=K8oqjNwy1IItwzS5nAtnJfKoqbYdlnvHoUJ/yQIxMlE=; b=cdaBlGmBZL4cakXZlvJuZERmIRIX6jD7dwzimgC10KWdoWEXxqnVyCAO2D0RVxCrE3 SiHI343vdap2cRRglH6ua6mGWuo7/fxfox6RkGqmDhIsAnKFSeohUX9VYGJSKAwhIU6B 2TcxKC37KpT1QUH/a9OmlQtDEo327+kakIXLdXGqBOKFhRN4BS67JiDu+bvG4a5CPI+r pqcyhIAj+gFL2/lmzDWusy4E62ErCo67w+IagQCo+gX4l+6CaOr61WFu2i1yy0l+Wgf3 xGuhQ4gDKh6os3wK0BjatM5g2y6nWPQvLIHBtHwaCM52uhc/sKGK0XWe8qKcZr9st8fm fLCQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=K8oqjNwy1IItwzS5nAtnJfKoqbYdlnvHoUJ/yQIxMlE=; b=lrtVTrbvtI+Zrw+3VJwQZiuVoufZ1RruOzfgAlLaIbpEA0qzppKRe9AtUmswxiPWFV W4Ok9BN6Cx4iXPj3xd6kKRcAIh/pHf4mrOiYf+gbjEKaFRR9WFk8CyS61Q+AU7EZC/M7 Bs4A13MYtrW+6Zhe+6TilwBHNGBHKJUmdMpqKfh0wGBeBZ3kEJFMu2hM4zp9AXG80Lu8 cz8kbek1aUL3YIhK5sUZ8L6Hcfp7E6Dd/geUx3tN/w6s6jVcjMB3oEkPoVqt+MGvacca BOLw2gID2jYj0ezJJSWH4jjp2mXj+dpBqeEqCeNNpu+RTi74G1rZbA3aTPjFdl6LdDM4 /Kzg== X-Gm-Message-State: AOAM5308KGAZqqypF4hnX86JTy/CQ5OAj6eTVqDmoXI1ZApljdJ9PD6/ goAbqM31vqI2vZTv2qMLXrdyfg== X-Received: by 2002:ac8:d8d:: with SMTP id s13mr12568868qti.42.1602246671500; Fri, 09 Oct 2020 05:31:11 -0700 (PDT) Received: from ziepe.ca (hlfxns017vw-156-34-48-30.dhcp-dynamic.fibreop.ns.bellaliant.net. [156.34.48.30]) by smtp.gmail.com with ESMTPSA id g1sm6069368qtp.74.2020.10.09.05.31.10 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 09 Oct 2020 05:31:10 -0700 (PDT) Received: from jgg by mlx with local (Exim 4.94) (envelope-from ) id 1kQrYD-001xsF-Sz; Fri, 09 Oct 2020 09:31:09 -0300 Date: Fri, 9 Oct 2020 09:31:09 -0300 From: Jason Gunthorpe To: Daniel Vetter Cc: DRI Development , LKML , kvm@vger.kernel.org, linux-mm@kvack.org, linux-arm-kernel@lists.infradead.org, linux-samsung-soc@vger.kernel.org, linux-media@vger.kernel.org, linux-s390@vger.kernel.org, Daniel Vetter , Kees Cook , Dan Williams , Andrew Morton , John Hubbard , =?utf-8?B?SsOpcsO0bWU=?= Glisse , Jan Kara , Arnd Bergmann , Greg Kroah-Hartman , David Hildenbrand , "Rafael J. Wysocki" Subject: Re: [PATCH v2 14/17] resource: Move devmem revoke code to resource framework Message-ID: <20201009123109.GO5177@ziepe.ca> References: <20201009075934.3509076-1-daniel.vetter@ffwll.ch> <20201009075934.3509076-15-daniel.vetter@ffwll.ch> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20201009075934.3509076-15-daniel.vetter@ffwll.ch> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Oct 09, 2020 at 09:59:31AM +0200, Daniel Vetter wrote: > +struct address_space *iomem_get_mapping(void) > +{ > + return iomem_inode->i_mapping; This should pair an acquire with the release below > + /* > + * Publish /dev/mem initialized. > + * Pairs with smp_load_acquire() in revoke_iomem(). > + */ > + smp_store_release(&iomem_inode, inode); However, this seems abnormal, initcalls rarely do this kind of stuff with global data.. The kernel crashes if this fs_initcall is raced with iomem_get_mapping() due to the unconditional dereference, so I think it can be safely switched to a simple assignment. Jason